Troy Hunt: Beyond Passwords: 2FA, U2F and Google Advanced Protection

Troy Hunt: Beyond Passwords: 2FA, U2F and Google Advanced Protection

For example, if you physically have someone's mobile phone in your hand and it's unlocked, you could login to an account by initiating a password reset, receiving the email in their email client then entering the "2nd factor" token sent via SMS or generated by a soft token app on the device.

Delay, Deny and Deflect: How Facebook’s Leaders Fought Through Crisis

Delay, Deny and Deflect: How Facebook’s Leaders Fought Through Crisis

This account of how Mr. Zuckerberg and Ms. Sandberg navigated Facebook’s cascading crises, much of which has not been previously reported, is based on interviews with more than 50 people.

SuperCooKey – A SuperCookie Built Into TLS 1.2 and 1.3

SuperCooKey – A SuperCookie Built Into TLS 1.2 and 1.3

TLS 1.3 has a heavily touted feature called 0-RTT that has been paraded by CloudFlare as a huge speed benefit to users because it allows sessions to be resumed quickly from previous visits. In the screen that pops up, enter security.tls.enable_0rtt_data into the search bar, and make sure that the setting is set to FALSE.

The father of the web is redefining the internet, and he’s not asking for permission

The father of the web is redefining the internet, and he’s not asking for permission

In response to the growing threat of data-hungry internet enterprises, Sir Tim Berners-Lee’s new initiative, Inrupt, is aiming to decentralize the web and rewrite the rules of online business with its new open-source project, Solid.

Preannouncement: Relaunch of mailbox.org

Preannouncement: Relaunch of mailbox.org

After eight months of busy work behind the scenes, we can now announce that from next week, mailbox.org will present itself in a new outfit. Our team is really looking forward to the relaunch and the new “mailbox.org 2.0”.

AI-based lie detection system will screen travellers to EU for ‘biomarkers of deceit’

AI-based lie detection system will screen travellers to EU for ‘biomarkers of deceit’

iBorderCtrl provides a unified solution with aim to speed up the border crossing at the EU external borders and at the same time enhance the security and confidence regarding border control checks by bringing together many state of the art technologies (hardware and software) ranging from biometric verification, automated deception detection, document authentication and risk assessment.

‘Surveillance State’ is alive, well — and operating against us all

‘Surveillance State’ is alive, well — and operating against us all

They reveal the CIA not only intercepted emails of U.S. citizens but they were emails of the most sensitive kind — written to Congress and involving whistleblowers reporting alleged wrongdoing within the Intelligence Community.

We Need to Have an Honest Talk About Our Data

We Need to Have an Honest Talk About Our Data

So if you look at Netflix’s ability to start a subscription business, I think it gives you hope that business models can change, and if people are used to free things, they actually can be persuaded that a paid model makes the world better.

Need medical help? Sorry, not until you sign away your privacy

Need medical help? Sorry, not until you sign away your privacy

I dutifully entered my info anyway—immediate physical needs have a way of leapfrogging over data privacy concerns, even for people like me who feel strongly about maintaining control over how their information is collected and used.

Whatsapp's 'Status' Section To Start Showing Ads, Confirms VP Chris Daniels

Whatsapp's 'Status' Section To Start Showing Ads, Confirms VP Chris Daniels

The modible messaging sevice Whatapp's Vice President Chris Daniels on Wednesday confirmed that the company is going to put advertisements in its 'Status' feature. Clearing the air on Facebook's monetisation efforts towards WhatsApp, Daniels told reporter, "We are going to be putting ads in 'Status'.

Privacy is the new norm

Privacy is the new norm

Something that’s being looked at afresh is contextual advertising, where relevant ad experiences are delivered in real time to people depending on what they’re focusing on that minute. Contextual advertising doesn’t get in the way and because it’s directly relevant people aren’t irritated by it.

#18 - Build our own internet with André Staltz by

#18 - Build our own internet with André Staltz by

#18 - Build our own internet with André Staltz by published on 2018-10-28T11:00:58Z This time however, we go a more non-technical route, and chat about how we can build our own internet, and how other people are already doing it.

Spotify creeps on your music and moods to target ads

Spotify creeps on your music and moods to target ads

It is a known factor that one’s music listening habits say a lot about one’s personality, and that’s the idea Spotify has been using to bank on its data analytics to help marketers target consumers with advertisements over the years, according to The Guardian.

We have to rewrite antitrust law to deal with tech monopolies, says ‘Positive Populism’ author Steve Hilton

We have to rewrite antitrust law to deal with tech monopolies, says ‘Positive Populism’ author Steve Hilton

Yeah, and also the other thing I like doing is having people on who’ve written interesting books, whether they’re from the right or left or no particular political place, just looking at an issue.

With 5G, you won't just be watching video. It'll be watching you, too

With 5G, you won't just be watching video. It'll be watching you, too

They would hinge on interactive video layers that use emotional analysis based on your phone's front-facing camera to adjust what you're watching in real time. For context, that matches the value of the entire mobile media market – video, music and games – last year.

Why the NSA Called Me After Midnight and Requested My Source Code

Why the NSA Called Me After Midnight and Requested My Source Code

Maybe people would die, or at least Dave instilled that impression on me as he politely asked if I would be willing to give him my source code; all the while, apologizing for not being able to tell me anything more about the situation.

Quantum Computing – Is the World of a Security Internet Over?

Quantum Computing – Is the World of a Security Internet Over?

After decades and billions of dollars in research, designs are finally coming online that can solve tasks faster than classical computer designs.

Thousands Of Swedes Are Inserting Microchips Under Their Skin

Thousands Of Swedes Are Inserting Microchips Under Their Skin

Proponents of the tiny chips say they're safe and largely protected from hacking, but one scientist is raising privacy concerns around the kind of personal health data that might be stored on the devices.

Vivaldi 2.0 review: The modern Web browser does not have to be so bland

Vivaldi 2.0 review: The modern Web browser does not have to be so bland

I've been using Vivaldi daily since the pre-release versions first hit the Web, and at this point it's difficult to imagine going back to another browser that doesn't have a way to stack tabs, view two (or more) tabs side by side, take notes with full-page screenshots, control my search suggestion privacy settings, or browse the Web without ever taking my fingers off the keyboard.

Samsung patents a fingerprint reader that works on the entire screen

Samsung patents a fingerprint reader that works on the entire screen

The first patent showed an implementation of the fingerprint reader on the screen similar to what we see on other smartphones, where only part of the screen can be used as a fingerprint scanner. However, the second patent describes a more advanced fingerprint scanner that uses the full-screen screen and a low-power independent processor.

Blockchain Hype — Time to get Real – Sankalp Shangari – Medium

Blockchain Hype — Time to get Real – Sankalp Shangari – Medium

Adoption of Blockchain in various industries especially in startups is like the first carbon atom of a diamond. Blockchains over the time can become a core component that will effectively function as the backbone of different industries.

#WeHearYouKhashoggi

#WeHearYouKhashoggi

The disappearance of the journalist Jamal Khashoggi is becoming a major international incident as Western governments line up to cast doubt on the implausible and inconsistent story offered by Saudi Arabia about his death.

Purging long-forgotten online accounts: Worth the trouble?

Purging long-forgotten online accounts: Worth the trouble?

Yahoo, for instance, didn’t allow users to delete accounts or change personally identifying information they shared, such as their birthday, until pressured to do so after the breach.

You like HTTPS. We like HTTPS. Except when a quirk of TLS can smash someone's web privacy

You like HTTPS. We like HTTPS. Except when a quirk of TLS can smash someone's web privacy

The researchers observe that a website can issue a new session identifier on every visit and "thus track a user indefinitely as long as the time between two visits does not exceed the session resumption lifetime of the user's browser."

Is There Any Way to Protect Your Information Online?

Is There Any Way to Protect Your Information Online?

Even your Gmail account isn’t as private as you thought: “Our automated systems analyze your content (including emails) to provide you with personally relevant product features, such as customized search results, tailored advertising and spam and malware detection,” states Google’s policy.

Facebook admits its camera-equipped listening device can collect your data for ads

Facebook admits its camera-equipped listening device can collect your data for ads

Given that Facebook's business model relies on using people's data to serve them personalised ads, it seemed fair to assume that the Portal smart speaker could serve a purpose beyond simply acting as a voice-activated home assistant that can handle video calls.

A Beginner’s Guide to Staying Safe Online

A Beginner’s Guide to Staying Safe Online

Encrypting your email, being elusive with your social media information, and avoiding the lure of “checking in” are good starting points for protecting your online data privacy.

Stop Saying Privacy Is Dead – Member Feature Stories – Medium

Stop Saying Privacy Is Dead – Member Feature Stories – Medium

In our own work, we’ve identified and criticized many different and dangerous ways that industry and government are collecting, using, and sharing our personal information, and this is largely due to infrastructure that has been created for the purpose of exploiting our data.

Criptext launches the first encrypted email app on Linux

Criptext launches the first encrypted email app on Linux

Our goal since launching in August was to make Criptext a community-driven effort towards protecting email privacy and being available on Linux is the purest demonstration of this commitment. Aren’t there other secure email services out there that are open source?

What’s the difference between Monero, Zcash, and BEAM?

What’s the difference between Monero, Zcash, and BEAM?

That means that when Monero reaches Bitcoin’s current scale concerning the total number of transactions, its blockchain will be about 5 terabytes — hardly sustainable for a regular PC, let alone on smaller devices.

More