Why ‘Anonymized Data’ Isn’t So Anonymous

Why ‘Anonymized Data’ Isn’t So Anonymous

The researchers gave this example from one of the two identified individuals: Many of the movies this person rated on Netflix were not rated by this person on IMDb. Deanonymizing the Netflix dataset revealed information that was not already public.

This colorful printed patch makes you pretty much invisible to AI

This colorful printed patch makes you pretty much invisible to AI

They could be used to fool self-driving cars into reading a stop sign as a lamppost, for example, or they could trick medical AI vision systems that are designed to identify diseases.

Austria mulls user registration for online platforms

Austria mulls user registration for online platforms

Austria said Wednesday it was considering a law to make it mandatory for big internet platforms to register their users and deprive those behind hate posts of anonymity.

Are Private Messaging dApps The Next Big Thing in Blockchain?

Are Private Messaging dApps The Next Big Thing in Blockchain?

Blockchain technology, with its decentralization and anonymity features, may offer a solution to privacy-focused people when it comes to online communication services. However, it does not solve the privacy issue, as it still has access to users IP-addresses and login information — and this data can be leaked due to hacks or provided to authorities upon subpoenas.

Data Surveillance Shows Why We Need Cash, Cryptocurrencies

Data Surveillance Shows Why We Need Cash, Cryptocurrencies

Cryptocurrencies like bitcoin afford us with financial autonomy by allowing us to send money directly without the need to rely on a third party. The first step, as Brito points out, is to recognize the critical role that digital cash plays in securing our financial autonomy.

Remailers: Send Emails without Registration

Remailers: Send Emails without Registration

In Whonix-Workstation, remailers can be used over Tor. Not with the goal to offer even more anonymity for (web) e-mails than Tor could provide, just as a cheap tool to send mails without registration.

Free & Open Source Software (FOSS) | Go Incognito 1.4

Free & Open Source Software (FOSS) | Go Incognito 1.4

This lesson will explain what is FOSS (Free and open source software) as well as the benefits of FOSS for our privacy/security, control of our data, freedom, usage, and protection from hackers. #techlore #incognito #FOSS

Pseudonymisation and the Blockchain: why would an honest person need a privacy coin?

Pseudonymisation and the Blockchain: why would an honest person need a privacy coin?

Private keys, under the control of individuals, remain hidden from the system forever… Indeed, according to Bill Gates and plenty of others, the anonymity associated with Bitcoin and other cryptocurrencies is what makes them attractive to criminals, and therefore implicated in death and destruction worldwide (let’s hope no Windows computers have ever been used in such misadventures, otherwise where else could guilt by association be implied..?

E-Mail

E-Mail

Susimail is a web-based email client intended primarily for use with Postman's mail servers, and is designed with security and anonymity in mind. Anonymity Friendly Email Provider List [ edit ]

Whonix and Tor Limitations

Whonix and Tor Limitations

For example, it is poor operational security to use the same Whonix-Workstation to check email via Tor, while simultaneously publishing an anonymous document. If a user selects a new entry and exit relay each time the Tor network is used, the attacker can correlate all traffic sent with a probability of (c/n)2.

Online survival Kit

Online survival Kit

Before you even think about making your computer secure or installing software for encrypting communications or data, you should adopt some good habits by following these common sense tips to help you avoid having your email account or computer hacked.

Banning anonymous social media accounts will do more harm than good | James Ball

Banning anonymous social media accounts will do more harm than good | James Ball

Angela Rayner became the latest in a long line of politicians to suggest that anonymous social media accounts should be banned in an attempt on Sunday to crack down on abusive and threatening behaviour online.

For Hackers, Anonymity Was Once Critical. That’s Changing.

For Hackers, Anonymity Was Once Critical. That’s Changing.

I met Grifter, whose real name is Neil Wyler; Dead Addict, who, citing privacy concerns, spoke with me on the condition that I not share his real name; Nico Sell, which, while undeniably the name she uses publicly, may or may not be her legal name; and dozens of other self-described hackers in August at Defcon, an annual hacking convention — one of the world’s largest — held in Las Vegas.

Report: Anonymity could be the answer to feeling happier online

Report: Anonymity could be the answer to feeling happier online

Platforms like YouTube and Netflix, which focus on entertainment and content and largely eschew social interaction or personal identity, were the ones impacting their users in a positive way.