Skip to main content

Home/ Math 1111: Cryptography/ Group items tagged data

Rss Feed Group items tagged

Derek Bruff

The Learning Analytics Landscape: Tension Between Student Privacy and the Process of Da... - 1 views

  •  
    Here's an example of surveillance vs. privacy that doesn't involve security. Instead, the goal is student learning.
jojodong

How to Protect Your Information Online - 0 views

  •  
    Advice: always assume that you are being hacked; use strong passwords; don't trust security questions to protect your data
Derek Bruff

Sonic hit with class action suit over POS data breach - 0 views

  •  
    Here's another company that's been hacked.
ckona0130

Spying on Students: School-Issued Devices and Student Privacy | Electronic Frontier Fou... - 0 views

  •  
    Even when college students use computer or electronic devices that belong to the school, any websites they visit, links they download, and videos they watch can offer behavioral information and data that is directly tied to that student's profile, and thus them too. It's important to be aware of this fact, and realize that whatever privacy you think that Mac in the back of the library offers you is in reality nonexistent. That Mac is uploading your data to the Cloud every minute you use it, and it's important to track and understand that your online information is being sent, without your consent, to other entities. So, be careful with what you search up next time.
mmukhin

Edward Snowden says Facebook is just as untrustworthy as the NSA - Vox - 0 views

  •  
    We need to really pay attention to how many different apps and resources we have connected to big sites like facebook, and google. Heck, Apple as a whole essentially has our entire lives on record. Don't link everything to facebook or google, and maybe consider diversifying your technology.
  •  
    Companies don't require a warrant to conduct data searches of their customers. The safest way to ensure that your data remains private while using services from a company is to use client based end to end encryption.
Derek Bruff

Beneblog: Technology Meets Society: Benetech's Human Rights Spin-off - 0 views

  •  
    During one of our classes, we briefly discussed the use of cryptography to protect eyewitness and victim information during the investigation of human rights violations. The individual I mentioned that day was Patrick Ball, who now will lead a new organization focused on "the data-driven and scientific side of analyzing human rights violations around the world."
Derek Bruff

Republicans are coming for your browsing histories, not your guns | VICE News - 0 views

  •  
    Senator John McCain has filed an amendment that would allow the FBI to retrieve email metadata and web browsing history without warrants. He's proposing we expand use of National Security Letters, which get around the need for warrants and often come with gag orders, so that if you receive an NSL asking for data, you can't tell anyone about it.
Derek Bruff

Forget Apple vs. the FBI: WhatsApp Just Switched on Encryption for a Billion People | W... - 1 views

  •  
    "With end-to-end encryption in place, not even WhatsApp's employees can read the data that's sent across its network. In other words, WhatsApp has no way of complying with a court order demanding access to the content of any message, phone call, photo, or video traveling through its service. Like Apple, WhatsApp is, in practice, stonewalling the federal government, but it's doing so on a larger front-one that spans roughly a billion devices."
‹ Previous 21 - 40 of 77 Next › Last »
Showing 20 items per page