How to painlessly remember your passwords – Data Driven Investor – Medium

How to painlessly remember your passwords – Data Driven Investor – Medium

Hence, that example satisfies all requirements for creating a secure password to have upper, lower case letters, special character and number and in the same time noticeably effortless to remember the phrase, today’s computer technology will require at least 550 years to crack that password!

No More Glass Safes: tnnl Brings Privacy to Digital Assets

PRAGUE, Oct. 31, 2018 /PRNewswire/ -- At Devcon4, Cryptographic Applications Research, LLC (Cryptario) today released a "dark" paper and protocol specification detailing tnnl, a privacy-layer for the Ethereum network.

Google makes it easier to delete your search history

Google makes it easier to delete your search history

Today's change makes things a lot easier as it requires just a click on the "Your data in Search" page to clear the entire search history that Google associates with the account.

Apple is focusing on its ad sales business because smartphone sales won’t cut it

Apple is focusing on its ad sales business because smartphone sales won’t cut it

Apple would share revenue with the apps displaying ads; the amount of that share would vary, the WSJ reports. Apple already sells some ads based on search terms in the App Store, which led to $1 billion in revenue last year.

New Brave Browser Release Available for General Download on Brave.com

New Brave Browser Release Available for General Download on Brave.com

The Muon-based Brave browser is no longer available for download on our site, but users who currently browse with it (latest version is 0.25.2) will continue to receive necessary updates until they are fully upgraded to this new release in the near future.

The Release of the – MaidSafe – Medium

The Release of the – MaidSafe – Medium

Crust supports hole punching so nodes can connect directly when they might otherwise not be able to. Put simply, this describes the way that Crust itself stores a dynamic list of directly-accessible peers that a node can contact if it wants to join the Network.

TSA lays out plans to use facial recognition for domestic flights

TSA lays out plans to use facial recognition for domestic flights

The airport security experience is about to see facial recognition technology taking on a bigger role, as TSA today released its roadmap to use biometrics technology in the coming years.

Facebook hacker accessed personal details for 29 million accounts

Facebook hacker accessed personal details for 29 million accounts

In September, a group of hackers used a flaw in Facebook’s “view as” feature to gain unauthorized access to millions of accounts — and today, the company released its most comprehensive statement yet on exactly what data was taken as part of the breach.

Google faces mounting pressure from Congress over Google+ privacy flaw

Google faces mounting pressure from Congress over Google+ privacy flaw

Republican leaders from the Senate Commerce Committee are demanding answers from Google CEO Sundar Pichai about a recently unveiled Google+ vulnerability, requesting the company’s internal communications regarding the issue in a letter today.

Press release: UK intelligence agency admits unlawfully spying on Privacy International

Press release: UK intelligence agency admits unlawfully spying on Privacy International

https://privacyinternational.org/sites/default/files/2018-03/A1.%20Claimant%27s%20re-amended%20statement%20of%20grounds.pdf The challenge to the acquisition, use, retention, disclosure, storage and deletion of ‘Bulk Personal Datasets’ (BPDs) and Bulk Communications Data (BCDs) by the UK Intelligence Agencies was commenced by Privacy International on 8 June 2015.

Companies Want Access To More & More Of Your Personal Data & From Where You Are To What’s In Your {DNA}

Companies Want Access To More & More Of Your Personal Data & From Where You Are To What’s In Your {DNA}

It’s true that consumers do gain some benefits from all the data gathering, such as more meaningful advertising and better customer service, pricing, and potentially even access to credit. At the same time, consumers don’t reward companies for offering better privacy protection.

Introducing the Librem Key – Purism

Introducing the Librem Key – Purism

In addition to multi-factor authentication, security tokens can also often store your private GPG keys in a tamper-proof way so you can protect them from attackers who may compromise your laptop.

Google’s Family Link can now turn off your teen’s phone during dinner

Google’s Family Link can now turn off your teen’s phone during dinner

Parents have had the ability to lock their kids’ devices from their Family Link apps, but soon they’ll be able to ask Google Assistant to do it for them with a voice command.

Tell HN: Using Gmail? You will be force logged into Chrome

Up until two days ago, logging into gmail and logging into chrome were two different things, as they obviously are (one is a web service the other is a web browser, to be pedantic again)

Today, Europe Lost The Internet. Now, We Fight Back.

Today, Europe Lost The Internet. Now, We Fight Back.

Today, in a vote that split almost every major EU party, Members of the European Parliament adopted every terrible proposal in the new Copyright Directive and rejected every good one, setting the stage for mass, automated surveillance and arbitrary censorship of the internet: text messages like tweets and Facebook updates; photos; videos; audio; software code -- any and all media that can be copyrighted.

Google back in court arguing against a global ‘right to be forgotten’

Google back in court arguing against a global ‘right to be forgotten’

Back in 2014 the court ruled search engines must respect Europeans’ privacy rights, and — on request — remove erroneous, irrelevant and/or outdated information about a private citizen. Individuals denied delisting can appeal to a national data protection agency, and indeed challenge a DPA decision in court — as in this case.

Exploit vendor drops Tor Browser zero-day on Twitter

Exploit vendor drops Tor Browser zero-day on Twitter

The NoScript add-on was rewritten at the end of last year to work on the new Firefox Quantum platform, hence the reason why the zero-day revealed today does not work on the new Tor Browser 8.x series.

Encrypted Email Service

To protect yourself, your family and your organization from the serious and growing risks of profiling, identity theft and privacy invasion online you need strong security for your email. Neomailbox has been providing secure and reliable email services for over 13 years, enabling thousands of individuals and organizations to protect their privacy online.

Privacy Is Still Personal

We solved privacy in the natural world with clothing, shelter, manners and laws. All these things need to be as casual and easily understood as clothing and shelter are in the physical world today.

California passes strongest net neutrality law in the country

California passes strongest net neutrality law in the country

That would essentially restore the net neutrality rules enacted federally under former President Barack Obama, which were later repealed by the Federal Communications Commission under the watch and guidance of current chairman Ajit Pai. But this bill actually goes further than those rules with an outright ban on zero-rating — the practice of offering free data, potentially to the advantage of some companies over others — of specific apps.

Open Quantum Safe

Open Quantum Safe

The field of quantum-safe cryptography, also called post-quantum or quantum-resistant cryptography, aims to construct public key cryptosystems that are believed to be secure even against quantum computers. The goal of the Open Quantum Safe (OQS) project is to support the development and prototyping quantum-resistant cryptography.

How Crypto-Anarchy Can Help You To Reclaim Your Privacy, Personal Liberty, and Financial Sovereignty

How Crypto-Anarchy Can Help You To Reclaim Your Privacy, Personal Liberty, and Financial Sovereignty

Since crypto-anarchists do not want government agencies or anyone else or that matter, knowing what they are up to they utilise privacy-enhancing technologies to communicate, peer-to-peer networks to engage in commerce and cryptocurrencies to transact.

The NSA Continues to Violate Americans' Internet Privacy Rights

The NSA Continues to Violate Americans' Internet Privacy Rights

The unconstitutional surveillance program at issue is called PRISM, under which the NSA, FBI, and CIA gather and search through Americans’ international emails, internet calls, and chats without obtaining a warrant.

Study from Vanderbilt professor finds Google tracking is even creepier than you thought

Study from Vanderbilt professor finds Google tracking is even creepier than you thought

Our experiments show that a dormant, stationary Android phone (with Chrome active in the background) communicated location information to Google 340 times during a 24-hour period, or at an average of 14 data communications per hour.