How Blockchain Helps To Maintain Your Data Sovereignty

How Blockchain Helps To Maintain Your Data Sovereignty

Based on this technology, they built the company Personal Digital Spaces (PDS) to enable individuals to establish property rights over their personal information.

Jack Dorsey wants to decentralize Twitter

Jack Dorsey wants to decentralize Twitter

Ultimately, Dorsey hopes that the work will go beyond the creation of an open standard for decentralized social media, building a community around it too.There are several ways in which Web3 technology, such as blockchain, could help address the problems with social media sites that we see today.

Most Facebook employees wouldn’t trust it with their financial data: survey

Most Facebook employees wouldn’t trust it with their financial data: survey

Between Facebook’s Libra project and Google’s new Google Pay-linked checking accounts, Big Tech is demonstrating big plans to integrate itself into the world of digital finance.The survey, released today, polled more than 5,000 professionals working at various companies, including Apple, Google, Amazon, Facebook, and Uber.

Unknown Fund is Going to Invest and Donate $100 Million for the Development of Ideas of Anonymity — Unknown Fund

Unknown Fund is Going to Invest and Donate $100 Million for the Development of Ideas of Anonymity — Unknown Fund

Unknown Fund is Going to Invest and Donate $75 Million for the Development of Ideas of Anonymity.The Unknown Fund also sees incredible opportunities to protect the rights and freedoms of people that technology such as blockchain and cryptocurrencies give us.

The Internet Of Trusted Things: IoTeX To Power Privacy-Focused Consumer Goods

The Internet Of Trusted Things: IoTeX To Power Privacy-Focused Consumer Goods

He works at a company that emphasizes security, data ownership, and privacy integration with the Internet of Things, and discussed these issues with us as IoTeX moves toward a Mainnet beta launch later today.

Top 3 Bitcoin Wallets for Privacy and Anonymity

Top 3 Bitcoin Wallets for Privacy and Anonymity

Besides, Wasabi supports Tor connections for greater security and a Coinjoin system that completely anonymizes the coins inside a wallet by mixing them in a pool with several users and throwing the same balance for everyone in one address and the spare change in another.

5 Encrypted Messaging Apps Doing A Better Job Than WhatsApp

5 Encrypted Messaging Apps Doing A Better Job Than WhatsApp

Loki Messenger is an open source and decentralized encrypted messaging service using blockchain technology to secure user data.The decentralized nature of blockchain technology allows the Loki Project to create a privacy suite enabling users to interact securely with the internet, encompassing encrypted messaging services, forums, online marketplaces and social media platforms.

Tide Foundation

Tide Foundation

Decentralized blockchains with specific protocols such like Tide help organizations to encrypt their sensitive data and provide a strict framework for accessing it, protecting against security breaches and helping meet privacy regulation.

Privacy Matters And More For Our Trading Choices

Privacy Matters And More For Our Trading Choices

Even DEX’s fail to protect user privacy as sensitive information like receiving and sending address, and the transaction value is often saved on a public blockchain for anyone to see. Zero-knowledge proof explained with following example:Peggy knows the magic word that will open a secret door in a cave.

How Blockchain Technology Can Prevent Non-Consensual Surveillance

How Blockchain Technology Can Prevent Non-Consensual Surveillance

Apparently, when travelers are going through the Chinese border patrol process, workers are taking their phones and other devices into a separate room before returning them later on.

AI Proving to Be an Integral Part of Cryptocurrency High Volume Transaction Security

AI Proving to Be an Integral Part of Cryptocurrency High Volume Transaction Security

Crypto mining | Image source: PixabayBlockchain technology can decentralize the process of transferring money by making transactions transparent and allowing the community of users to verify them.

Privacy hazard: Centralized financial blue chips behind Facebook's GlobalCoin

Privacy hazard: Centralized financial blue chips behind Facebook's GlobalCoin

Totally centralized and run by the same payment processors already dominating the financial sector, Facebook's GlobalCoin looks more like a blockchain trojan horse than a cryptocurrency proper. So far a dozen companies have joined Project Libra / GlobalCoin, among them some of the top e-commerce businesses and financial payment processors today:.

IOS App Trackers Are Collecting Your Personal Data

IOS App Trackers Are Collecting Your Personal Data

New revelations show that iOS apps gather massive amounts of personal data from unsuspecting users, highlighting the need for blockchain solutions to data privacy. Even without saving an entire file on the blockchain, the iOS/Android user can rest assured that the information has not been tampered with.

Microsoft Launches Decentralized Identity Tool on the Bitcoin Blockchain

Microsoft Launches Decentralized Identity Tool on the Bitcoin Blockchain

York Rhodes, a programme manager on Microsoft’s Blockchain Engineering Team, mentioned to CoinDesk that the Microsoft team has been working for a year on a key signing validation software founded on public networks like Bitcoin or Ethereum, and one that can handle a great number of throughput than the underlying Blockchain on which it is run.

“Blockchain in Cybersecurity: The future?” (From our Forums.)

“Blockchain in Cybersecurity: The future?” (From our Forums.)

NASA has decided to use blockchain technology as a way of enhancing security and minimizing denial of service and other different traffic service attacks. Also, blockchain security means there is no centralized authority in control of the network to verify the data going through it which makes it hard for hackers to orchestrate an attack.

My 1-week Code and Legal Part Review on “Crypviser” Messenger.

My 1-week Code and Legal Part Review on “Crypviser” Messenger.

Crypviser positions itself as a protected, decentralized and anonymous messenger with identification via blockchain. Crypviser and its applications are under the complete control of this company:The source code is not public, so the question of security of messaging is closed.

9 Digital Identity Trends That Will Make or Break Businesses in 2019

9 Digital Identity Trends That Will Make or Break Businesses in 2019

4. Deepfakes mean “Fake News” With the proliferation of emerging “deepfakes” technologies, news and social media channels will be under pressure to guard against fraud.

Tide Foundation gives consumers full control of personal data on blockchain

Tide Foundation gives consumers full control of personal data on blockchain

As for consumers controlling encryption keys, the company says it has created a patented technology to simplify the process of managing those keys in order to put that process within reach of anyone, one that passes what they call “the Grandpa Test.” “We have developed a layer, a decentralized way to dumb down blockchain to a ubiquitous user experience on the web,” Yuval Hertzog, the other company co-founder explained.

Once hailed as unhackable, blockchains are now getting hacked

Once hailed as unhackable, blockchains are now getting hacked

A blockchain protocol is a set of rules that dictate how the computers in the network, called nodes , should verify new transactions and add them to the database.

Using blockchain to safeguard 1.3m citizens’ personal data

Using blockchain to safeguard 1.3m citizens’ personal data

The electronic ID-card system and blockchain technology are used to ensure health data integrity and mitigate internal threats to data.” As of 2018, according to the e-Estonia Guide, 99 per cent of all prescriptions filed in the country are digital and 97 per cent of patients have digital health records that are accessible to authorised users nationwide.

Trust Models for Secure Network Connections

Trust Models for Secure Network Connections

by Andrii Fedotov · by Security Zone · Like (1) Comment ( ) Save Tweet {{ articles[0].views | formatCount}} Views Join the DZone community and get the full member experience.

The Ground We Play On…

The Ground We Play On…

Sylo started its journey half a decade ago, with one dream — giving people the freedom they deserve while communicating online. Over the years Sylo has kept working on improving its technology-mix in the pursuit of providing better solutions that are free from any conditions.

BEAM vs. Grin: A Complete Comparrison – Real Simple Crypto

BEAM vs. Grin: A Complete Comparrison – Real Simple Crypto

As BEAM and Grin have started taking their first steps as live implementations of the MimbleWimble protocol, however, questions have begun to come up about what each project aims to do, how they aim to do it, and the groups behind them.

University Buys 14.4 Petabyte Bandwidth to Boost ‘Anonymous’ Torrent Client

University Buys 14.4 Petabyte Bandwidth to Boost ‘Anonymous’ Torrent Client

The Tribler lab at Delft University of Technology has sold part of its Bitcoin stash to purchase bandwidth for its anonymous torrent client. Professor Johan Pouwelse, leader and founder of the Tribler project, informs us that his lab at Delft University of Technology has bought 14.4 petabytes of Internet bandwidth.

OpenBazaar launches Haven, a privacy-focused app for socializing with friends and making purchases with cryptocurrencies

OpenBazaar launches Haven, a privacy-focused app for socializing with friends and making purchases with cryptocurrencies

Blockchain startup OB1, the developers of decentralized shopping platform OpenBazaar, have announced Haven , a privacy-focused app for socializing with friends and making purchases with cryptocurrencies.

Grin and BEAM: Two Groundbreaking Private Cryptocurrencies Just Went Live

Grin and BEAM: Two Groundbreaking Private Cryptocurrencies Just Went Live

Two further privacy-oriented cryptocurrencies launched in January 2019: Grin and BEAM. The blockchain technology was proposed by an anonymous developer called Tom Elvis Jedusor – an anagram of “Je Suis Voldemort.” MimbleWimble is built with privacy at its core.

2019: The Year of Enigma

2019: The Year of Enigma

If you’re organizing a conference or event this year and would like a member of the Enigma team to speak or present on privacy, secret contracts, or decentralization, we’re interested!

Six Reasons Why Privacy Coins Are Not Just For Criminals

Six Reasons Why Privacy Coins Are Not Just For Criminals

Financial Privacy for Businesses Businesses who accept and hold cryptocurrencies can also benefit from using anonymous coins over pseudonymous coins such as bitcoin. Hence, citizens who want to prevent their financial data from being harvested and potentially misused, anonymous digital currencies offer a great alternative to all existing payment methods.

This is How Much is Your Data Worth in Crypto

This is How Much is Your Data Worth in Crypto

Whenever you sign up for one of these apps, buyers contact you directly for your personal information in exchange for crypto tokens. The Wibson app lets users link up biographical info from Facebook and in this case running routes on Strava.

Blockchain, Explained with Christmas Gifts

Blockchain, Explained with Christmas Gifts

It’s permissionless – You don’t have to ask anyone’s permission to make the exchange (like a bank or another company). Blockchain is really just trying to make any exchange in the world as simple as giving a gift to someone in the same room – without all the middlemen.