Equifax Breach "Entirely Preventable": House Oversight Committee

The House Committee recommended that Equifax "provide more transparency to consumers" about data use and security practices and reduce the use of social security numbers as identifiers, longstanding priorities of EPIC.

Big tech has your kid’s data — and you probably gave it to them

Big tech has your kid’s data — and you probably gave it to them

The report calls on parents and schools to examine the type of gadgets children play with, like smart speakers, wifi-powered toys, and gaming apps, all of which are collecting data on kids.

Face Value

Face Value

Face Value What do we actually give up when we upload our face to these apps? Joseph Atick, a forefather of facial recognition technology, reckons with its future. And we head to China, where you’ll need your face to use the bathroom.

Consumer groups, NGOs and industry call jointly for the Council of the EU to advance ePrivacy reform

Consumer groups, NGOs and industry call jointly for the Council of the EU to advance ePrivacy reform

The letter was sent prior to yesterday's (4 December) meeting in the TTE Council, with signatories sharing concerns over the slow progress of the negotiations in the Council of the EU despite the repeated scandals that demonstrate the clear and urgent need to strengthen privacy and security of electronic communications in the online environment.

Quora Data Breach Affects 100 Million Users

Quora Data Breach Affects 100 Million Users

On December 3rd, 2018, the infamous Question and Answer site, Quora announced that the private messages and account information from around 100 million users was exposed by a “malicious third party.” The breach was first discovered by Quora on Friday, according to chief executive, Adam D’Angelo, and an investigation is still underway.

This Week in Data Breaches: Amazon, Uber, USPS, and More

This Week in Data Breaches: Amazon, Uber, USPS, and More

Bloom: Take Back Control of Your Data At Bloom, we are giving you the tools to take back control of your data. Bloom enables you to own, authorize the use of, and protect your data using the latest advancements in blockchain technology. More on Privacy and Data Security from Bloom

Schneier on Security

We project that about 60% of the searches for individuals of European-descent will result in a third cousin or closer match, which can allow their identification using demographic identifiers. We demonstrate that the technique can also identify research participants of a public sequencing project.

Surveillance state: NSW intensifies citizen tracking

Surveillance state: NSW intensifies citizen tracking

"Law enforcement authorities habitually push for greater access to private data and information to help them do their job and will likely call to increase The Capability to include less serious crimes and public nuisances," Mr Greenwich said.

[Money20/20] America May Soon Have a Mobile National ID, with IDEMIA’s Help

[Money20/20] America May Soon Have a Mobile National ID, with IDEMIA’s Help

With Openshaw noting that in the US, drivers’ licenses are essentially “the de facto national ID”, the two IDEMIA execs explained that IDEMIA is currently working with 38 state governments on their drivers’ license programs, and that a significant part of these efforts entails the Mobile Driver License, or MDL, concept.

Signal >> Blog >> Technology preview: Sealed sender for Signal

Signal >> Blog >> Technology preview: Sealed sender for Signal

We have been exploring techniques to further reduce the amount of information that is accessible to the service, and the latest beta release includes changes designed to move Signal incrementally closer to the goal of hiding another piece of metadata: who is messaging whom.

The Next Tech Unicorns Won’t Exploit Personal Data; They’ll Have None. #PriTech

The Next Tech Unicorns Won’t Exploit Personal Data; They’ll Have None. #PriTech

But the Facebook boss spent $30 million on the properties surrounding his Palo Alto home in a desperate bid for a little privacy, while companies just like his stripped it away from their customers. Privacy law firms exist to conduct audits and help companies take remedial action, but they are just not practical for smaller firms.

Easy censorship-resistant communication with Syndie

Easy censorship-resistant communication with Syndie

Syndie operates like blogs, newsgroups, and forums. Then click “Create posts,” now see “Anyone can reply to an authorized post” is checked? If you want to make your forum as “forum,” then simply check “Anyone can post” in “Create posts.”

DTA attacks China-style social credit claims about Govpass digital identity

DTA attacks China-style social credit claims about Govpass digital identity

The ASPI report also takes a swing at both federal government agencies (Govpass) and Australia Post (Digital iD) for developing broadly similar digital identity credentials, saying neither scheme “is governed by dedicated legislation, beyond existing laws such as the inadequate Privacy Act 1988, leaving Australians vulnerable to having their data misused.”

Coming soon: everyone’s genetic anonymity undermined by distant relatives – and there’s nothing you can do about it

Coming soon: everyone’s genetic anonymity undermined by distant relatives – and there’s nothing you can do about it

As the researchers go on to show in their paper, it is now possible to take DNA from a supposedly anonymous dataset, find matches in public genetic databases, and then work out the identity of the individual by building a family tree.

A Cypherpunk's Manifesto

Therefore, privacy in an open society requires anonymous transaction systems. An anonymous system empowers individuals to reveal their identity when desired and only when desired; this is the essence of privacy. We are defending our privacy with cryptography, with anonymous mail forwarding systems, with digital signatures, and with electronic money.

Digital IDs Are More Dangerous Than You Think

Digital IDs Are More Dangerous Than You Think

In the design and deployment of Digital ID systems, we must advocate for the principles of data minimization, decentralization, consent, and limited access that reinforce our fundamental rights.

Four Puzzling Issues Of Identity Authentication In The Digital Era

Four Puzzling Issues Of Identity Authentication In The Digital Era

Password-less Authentication Use of PIN to eliminate passwords Biometrics in two/multi-factor authentication for better security Advantage of physical tokens as against onetime codes by SMS

With genetic-identity registries, it’s the end of anonymity as we know it

With genetic-identity registries, it’s the end of anonymity as we know it

Already, 60 percent of Americans of Northern European descent — the primary group using the genetic-genealogy sites — can be identified through such databases whether or not they’ve joined one themselves, according to a new study.

5 Best Anonymous Browsers for Private Web Browsing

5 Best Anonymous Browsers for Private Web Browsing

Based on the protection of the user’s identity and privacy, “Epic” is a web browser based on Chrome or Chromium (unlike Tor that is based on FireFox), even its appearance is very similar to that of Chrome’s incognito window option., that is responsible for establishing communication through the Internet with the safest and most private connection possible.

Ancestry Sites Could Soon Expose Nearly Anyone's Identity, Researchers Say

Ancestry Sites Could Soon Expose Nearly Anyone's Identity, Researchers Say

Thanks to new technology, the investigators in the Golden State Killer case isolated the genetic material that’s now collected by consumer genetic testing companies from the suspected killer’s DNA left behind at a crime scene.

European Nation Microchips National ID Cards For Banking, Voting, Insurance

European Nation Microchips National ID Cards For Banking, Voting, Insurance

"Since the turn of the 21st century, Estonia has offered each citizen a government-issued 'digital identity' — including a chip-embedded national ID card that can be used for social security, health insurance, voter registration, banking and much more," the Los Angeles Times reported.

Online survival Kit

Online survival Kit

Before you even think about making your computer secure or installing software for encrypting communications or data, you should adopt some good habits by following these common sense tips to help you avoid having your email account or computer hacked.

Regain Control of Your Digital Identity – Hacker Noon

Regain Control of Your Digital Identity – Hacker Noon

Currently, the SelfKey Identity Wallet enables individuals to securely store personal data and digital assets on their local machine. Likewise, there’s no need to send your browser and application history back to social media platforms, furthering the problem of unnecessarily oversharing personal information — which get repackaged, targeted or utilized as a digital commodity.

What to Know About Aadhaar, India's Biometric Identity System

What to Know About Aadhaar, India's Biometric Identity System

India’s Supreme Court, in a landmark ruling, said that private companies could no longer require users to provide their Aadhaar details as a condition of service.

Scroll Explainer: What is the Aadhaar case and what is at stake for Indians?

Scroll Explainer: What is the Aadhaar case and what is at stake for Indians?

Beginning in 2009, the Indian government began enrolling residents onto a platform known as Aadhaar, which provided each enrollee with a 12-digit unique identification number linked to both their demographic and biometric details, including fingerprints and iris scans.

Data Custody Is A Massive Issue

Data Custody Is A Massive Issue

It refers to the process of having the legal right and authentic control over particular set(s) of data elements which are then authorized for storage and use by any particular custodian(s) of that data.

AT&T and Verizon want to manage your identity across websites and apps

AT&T and Verizon want to manage your identity across websites and apps

The four major US mobile carriers have unveiled a system that would let them manage your logins across any third-party website or app that hooks into it. AT&T VP Johannes Jaskolski, who is managing the carriers' Project Verify consortium, told Krebs that the system will not centralize subscriber data into a multi-carrier database.

12 months on from Equifax breach: No change?

12 months on from Equifax breach: No change?

A year ago … 145.5 million U.S. adults had their social security numbers stolen in an easily preventable breach. Equifax is one of many problems that will keep happening if people continue to use SSN for identity.

Google Wants to Kill the URL

Google Wants to Kill the URL

"They’re hard to read, it’s hard to know which part of them is supposed to be trusted, and in general I don’t think URLs are working as a good way to convey site identity.

• Chart: The Crimes Americans Worry About Most

• Chart: The Crimes Americans Worry About Most

That's according to a new Gallup poll which found that 67 percent of U.S. adults frequently or occasionally fret about having personal, credit card or financial information stolen by hackers.

More