Though today there is a general public understanding of cryptocurrencies and their potential lucrative investment opportunities, the inception of the first cryptocurrency, Bitcoin, was created to be a resistance to the centralised control of the means of exchange. Stated in Bitcoin’s Whitepaper, released in 2008, was the goal of user anonymity, blockchain record-keeping and currency scarcity. These goals aimed to…
SIM card registration allows the state to know the identity of the owner of a SIM card, and thus who is most likely making a call or sending a message. As a condition for the purchase or activation of a SIM card, the user is asked to provide personal data as well as a valid ID. Those details are held…
Publish date: January 10, 2019 Published by Nathan House When it comes to password hygiene, many of us are still ignoring the basics. Password management specialist, SplashData has released its eighth ‘Worst Passwords of the Year’ list: a roundup of the most commonly used and easily guessable passwords. The list is based on an evaluation of more than 5 million passwords leaked on…
Saturday, December 29, 2018 A video presentation of the finding of this report can be found here, as presented at 35th Chaos Computer Congress (35C3) Previous research has shown how 42.55 percent of free apps on the Google Play store could share data with Facebook, making Facebook the second most prevalent third-party tracker after Google’s parent company Alphabet. In this…