- Nov 2022
-
blogs.perficient.com blogs.perficient.com
-
This is different than row-level security because row-level security is going to allow you to restrict the actual data that’s shown to them not the actual report that’s shown
-
- Jun 2022
-
www.nytimes.com www.nytimes.com
-
The goal is to gain “digital sovereignty.”
the age of borderless data is ending. What we're seeing is a move to digital sovereignty
-
- Feb 2022
-
Local file Local file
-
he transitionary approach is advisable when datasecurity plays a vital role.
-
- Jan 2022
-
www.nature.com www.nature.com
-
Happi, C. T., & Nkengasong, J. N. (2022). Two years of COVID-19 in Africa: Lessons for the world. Nature, 601(7891), 22–25. https://doi.org/10.1038/d41586-021-03821-8
-
- Dec 2021
-
-
Edge computing is an emerging new trend in cloud data storage that improves how we access and process data online. Businesses dealing with high-frequency transactions like banks, social media companies, and online gaming operators may benefit from edge computing.
Edge Computing: What It Is and Why It Matters0 https://en.itpedia.nl/2021/12/29/edge-computing-what-it-is-and-why-it-matters/ Edge computing is an emerging new trend in cloud data storage that improves how we access and process data online. Businesses dealing with high-frequency transactions like banks, social media companies, and online gaming operators may benefit from edge computing.
-
- Dec 2020
-
github.com github.com
-
One way to do that is to export them from @sapper/app directly, and rely on the fact that we can reset them immediately before server rendering to ensure that session data isn't accidentally leaked between two users accessing the same server.
-
- Nov 2020
-
knightcolumbia.org knightcolumbia.org
-
to be listed on Mastodon’s official site, an instance has to agree to follow the Mastodon Server Covenant which lays out commitments to “actively moderat[e] against racism, sexism, homophobia and transphobia”, have daily backups, grant more than one person emergency access, and notify people three months in advance of potential closure. These indirect methods are meant to ensure that most people who encounter a platform have a safe experience, even without the advantages of centralization.
Some of these baseline protections are certainly a good idea. The idea of advance notice of shut down and back ups are particularly valuable.
I'd not know of the Mastodon Server Covenant before.
-
-
Local file Local file
-
- Apr 2020
-
www.brucebnews.com www.brucebnews.com
-
Before we get to passwords, surely you already have in mind that Google knows everything about you. It knows what websites you’ve visited, it knows where you’ve been in the real world thanks to Android and Google Maps, it knows who your friends are thanks to Google Photos. All of that information is readily available if you log in to your Google account. You already have good reason to treat the password for your Google account as if it’s a state secret.
-
-
www.troyhunt.com www.troyhunt.com
-
I'm providing this data in a way that will not disadvantage those who used the passwords I'm providing.
-
-
-
lsts.research.vub.be lsts.research.vub.be
-
twitter.com twitter.com
-
Michael Veale on Twitter.
-
-
Local file Local file
-
DP-3T/documents. (n.d.). GitHub. Retrieved April 17, 2020, from https://github.com/DP-3T/documents
Tags
- is:article
- data
- proximity
- protection
- decentralized
- tracing
- tacking
- preserving
- security
- privacy
- lang:en
Annotators
-
-
www.csoonline.com www.csoonline.com
-
Download the billions of breached passwords and blacklist them all. Attackers have a copy; so should you.
-
- Mar 2020
-
www.graphitedocs.com www.graphitedocs.comGraphite1
-
Own Your Encryption KeysYou would never trust a company to keep a record of your password for use anytime they want. Why would you do that with your encryption keys? With Graphite, you don't have to. You own and manage your keys so only YOU can decrypt your content.
-
-
www.osano.com www.osano.com
-
startup focused on creating transparency in data. All that stuff you keep reading about the shenanigans with companies mishandling people's data? That's what we are working on fixing.
Tags
Annotators
URL
-
- Dec 2019
-
wellcomeopenresearch.org wellcomeopenresearch.org
-
greater integration of data, data security, and data sharing through the establishment of a searchable database.
Would be great to connect these efforts with others who work on this from the data end, e.g. RDA as mentioned above.
Also, the presentation at http://www.gfbr.global/wp-content/uploads/2018/12/PG4-Alpha-Ahmadou-Diallo.pptx states
This data will be made available to the public and to scientific and humanitarian health communities to disseminate knowledge about the disease, support the expansion of research in West Africa, and improve patient care and future response to an outbreak.
but the notion of public access is not clearly articulated in the present article.
-
- Nov 2019
-
www.publicsafety.gc.ca www.publicsafety.gc.ca
- Oct 2018
-
mfeldstein.com mfeldstein.com
-
As a recap, Chegg discovered on September 19th a data breach dating back to April that "an unauthorized party" accessed a data base with access to "a Chegg user’s name, email address, shipping address, Chegg username, and hashed Chegg password" but no financial information or social security numbers. The company has not disclosed, or is unsure of, how many of the 40 million users had their personal information stolen.
-
- Sep 2018
-
nelsonslog.wordpress.com nelsonslog.wordpress.com
-
I love the voice of their help page. Someone very opinionated (in a good way) is building this product. I particularly like this quote: Your data is a liability to us, not an asset.
-
- Mar 2018
-
www.blog.google www.blog.google
-
Introducing Subscribe with Google
Interesting to see this roll out as Facebook is having some serious data collection problems. This looks a bit like a means for Google to directly link users with content they're consuming online and then leveraging it much the same way that Facebook was with apps and companies like Cambridge Analytica.
-
- Mar 2017
-
-
The Justice Department has announced charges against four people, including two Russian security officials, over cybercrimes linked to a massive hack of millions of Yahoo user accounts. [500M accounts, in 2014]
Two of the defendants — Dmitry Dokuchaev and his superior Igor Sushchin — are officers of the Russian Federal Security Service, or FSB. According to court documents, they "protected, directed, facilitated and paid" two criminal hackers, Alexsey Belan and Karim Baratov, to access information that has intelligence value. Belan also allegedly used the information obtained for his personal financial gain.
-
- Feb 2017
-
motherboard.vice.com motherboard.vice.com
-
A company that sells internet-connected teddy bears that allow kids and their far-away parents to exchange heartfelt messages left more than 800,000 customer credentials, as well as two million message recordings, totally exposed online for anyone to see and listen.
-
-
er.educause.edu er.educause.edu
-
Compliance, Privacy, and Security
on data compliance, privacy and security in EDU
-
-
hackeducation.com hackeducation.com
-
All along the way, or perhaps somewhere along the way, we have confused surveillance for care. And that’s my takeaway for folks here today: when you work for a company or an institution that collects or trades data, you’re making it easy to surveil people and the stakes are high. They’re always high for the most vulnerable. By collecting so much data, you’re making it easy to discipline people. You’re making it easy to control people. You’re putting people at risk. You’re putting students at risk.
-
- Jan 2017
-
arstechnica.com arstechnica.com
-
Thousands of poorly secured MongoDB databases have been deleted by attackers recently. The attackers offer to restore the data in exchange for a ransom -- but they may not actually have a copy.
-
- Oct 2016
-
www.troyhunt.com www.troyhunt.com
-
A large database of blood donors' personal information from the AU Red Cross was posted on a web server with directory browsing enabled, and discovered by someone scanning randomly. It is unknown whether anyone else downloaded the file before it was removed.
-
- Jun 2016
-
idlewords.com idlewords.com
-
Even if you trust everyone spying on you right now, the data they're collecting will eventually be stolen or bought by people who scare you. We have no ability to secure large data collections over time.
Fair enough.
And "Burn!!" on Microsoft with that link.
Tags
Annotators
URL
-
- Jan 2015
-
newleftreview.org newleftreview.org
-
But if you turn data into a money-printing machine for citizens, whereby we all become entrepreneurs, that will extend the financialization of everyday life to the most extreme level, driving people to obsess about monetizing their thoughts, emotions, facts, ideas—because they know that, if these can only be articulated, perhaps they will find a buyer on the open market. This would produce a human landscape worse even than the current neoliberal subjectivity. I think there are only three options. We can keep these things as they are, with Google and Facebook centralizing everything and collecting all the data, on the grounds that they have the best algorithms and generate the best predictions, and so on. We can change the status of data to let citizens own and sell them. Or citizens can own their own data but not sell them, to enable a more communal planning of their lives. That’s the option I prefer.
Very well thought out. Obviously must know about read write web, TSL certificate issues etc. But what does neoliberal subjectivity mean? An interesting phrase.
-