Google, Facebook, and Amazon benefit from an outdated definition of “monopoly”

Google, Facebook, and Amazon benefit from an outdated definition of “monopoly”

For decades the standard for evaluating whether to break up monopolies, or block the mergers that create them, has been “consumer welfare.” And this consumer welfare standard has predominantly been interpreted as low prices.

How to painlessly remember your passwords – Data Driven Investor – Medium

How to painlessly remember your passwords – Data Driven Investor – Medium

Hence, that example satisfies all requirements for creating a secure password to have upper, lower case letters, special character and number and in the same time noticeably effortless to remember the phrase, today’s computer technology will require at least 550 years to crack that password!

Kennedy: The unholy alliance between state and tech

Kennedy: The unholy alliance between state and tech

While I applaud Cook's natural inclination to preserve privacy and thus liberty, which is implied in several amendments especially the first and fourth, it is this special insidious cronyism that has developed between big tech and big government that's worrisome.

Is Decentralisation the new Utopia from centralized governments?

Is Decentralisation the new Utopia from centralized governments?

Decentralized technologies eliminate the need to position a human intermediary in systems by providing a global platform for respective parties to interact on a peer to peer network. The country’s government operates on Blockchain and all the citizens are provided with digital tokens which function as Voter Id card.

“Information Fiduciaries” Must Protect Your Data Privacy

“Information Fiduciaries” Must Protect Your Data Privacy

Accordingly, several law professors have proposed adapting these venerable fiduciary rules to apply to online companies that collect personal data from their customers.

The Titan M Chip Powers Up Pixel 3 Security

The Titan M Chip Powers Up Pixel 3 Security

In order to use it to protect keys, that’s a reasonable thing to do, but you know there’s still going to be the risk of attacks like Spectre, Meltdown, and Rowhammer,” says Will Drewry, principle software engineer at Google, referring to prominent examples of pernicious hardware-based attacks.

Secret Government Report Shows Gaping Holes in Privacy Protections From U.S. Surveillance

Secret Government Report Shows Gaping Holes in Privacy Protections From U.S. Surveillance

The report raises questions about whether the FBI is fully complying with PPD-28 as well as whether it’s seeking to carve out certain surveillance activities from the directive’s modest requirements:

The currency of the future is personal data

The currency of the future is personal data

Unfortunately, if blockchain startups need regular people to understand and care about new “self-sovereign data” business models, they’re likely to remain as niche as other cypherpunk projects that sought to redistribute the power of the internet.

“Human Trafficking” Bill Allows More Government Spying on Americans

“Human Trafficking” Bill Allows More Government Spying on Americans

“H.R. 6729 [the Empowering Financial Institutions to Fight Human Trafficking Act of 2018] is a disguised effort to expand the Patriot Act,” U.S. Representative Justin Amash (R-Mich.) said on Saturday, asserting that the bill is really intended to “conceal the bill’s true purpose: to give the government more power to unconstitutionally spy on law-abiding Americans without a warrant.”

You Should Really Take Your Privacy Seriously, Here’s Why…

You Should Really Take Your Privacy Seriously, Here’s Why…

Privacy means that not only do other people not have unwanted access to your information, but also that you can also control what data is public and what stays private. The ways companies collect and use your information are determined by the company’s privacy policy.

Does the internet know you better than you know yourself?

Does the internet know you better than you know yourself?

People might care more about their online privacy if the full power of online service providers, especially social media apps like Facebook, were more obvious to us as ordinary internet users.

Congress Moves Forward with Dangerous Attack on Private Drones

Congress Moves Forward with Dangerous Attack on Private Drones

And worst of all, we expect these powers to come in a routine Federal Aviation Administration (FAA) reauthorization bill, with no chance for meaningful debate on how best to limit the government’s authority to intercept or destroy drones.

Rule 41 Grants New Hacking Powers to FBI

Rule 41 Grants New Hacking Powers to FBI

The FBI and other law enforcement agencies will be able to search multiple computers across the country with a single warrant thanks to a controversial rule change that takes effect on Thursday.

Librem 5, the world’s first ethical, user-controlled smartphone, makes steady progress for initial shipping beginning April 2019 – Purism

Librem 5, the world’s first ethical, user-controlled smartphone, makes steady progress for initial shipping beginning April 2019 – Purism

With all the advancements Purism is making with the hardware, software, development kits, and services, during testing two silicon bugs were discovered in the Librem 5’s CPU, manufactured by NXP, that affects power management and power consumption.

Researchers Discover Computer Screens Emit Sounds that Reveal Data

Researchers Discover Computer Screens Emit Sounds that Reveal Data

What’s happening, according to the research, is that some components in the power supplies of LCD monitors, which is nearly all flat-screen displays, emit faint sounds as the load on them changes.

Cyberbalkanization and the Future of the Internets – Skycoin – Medium

Cyberbalkanization and the Future of the Internets – Skycoin – Medium

By maintaining supreme control over internet traffic flow and web service user data, the US gained enormous strategic advantages in its effort to maintains its status as the world superpower.