Though today there is a general public understanding of cryptocurrencies and their potential lucrative investment opportunities, the inception of the first cryptocurrency, Bitcoin, was created to be a resistance to the centralised control of the means of exchange. Stated in Bitcoin’s Whitepaper, released in 2008, was the goal of user anonymity, blockchain record-keeping and currency scarcity. These goals aimed to…
Operational security (OPSEC) refers to the habits and behaviours you perform to enforce good security. This is probably the most underrated security control and if done poorly can result in the destruction of your Privacy, Security and Anonymity. Privacy is about content. Privacy relates to maintaining confidentiality and keeping secrets, whilst Anonymity relates to your actions potentially being seen, but…
Publisher: https://www.troyhunt.com/the-773-million-record-collection-1-data-reach/ Many people will land on this page after learning that their email address has appeared in a data breach I’ve called “Collection #1”. Most of them won’t have a tech background or be familiar with the concept of credential stuffing so I’m going to write this post for the masses and link out to more detailed material for…
A recent report from the NASA Ames Research Center proposes a blockchain solution to improve air traffic control networks. According to the report, the prototype uses blockchain to minimize potential security risks from new aircraft surveillance technology mandated by the Federal Aviation Administration by 2020. The new surveillance system opens avenues for data interception as it publicly broadcasts sensitive flight information…
SIM card registration allows the state to know the identity of the owner of a SIM card, and thus who is most likely making a call or sending a message. As a condition for the purchase or activation of a SIM card, the user is asked to provide personal data as well as a valid ID. Those details are held…
Publish date: January 10, 2019 Published by Nathan House When it comes to password hygiene, many of us are still ignoring the basics. Password management specialist, SplashData has released its eighth ‘Worst Passwords of the Year’ list: a roundup of the most commonly used and easily guessable passwords. The list is based on an evaluation of more than 5 million passwords leaked on…
Saturday, December 29, 2018 A video presentation of the finding of this report can be found here, as presented at 35th Chaos Computer Congress (35C3) Previous research has shown how 42.55 percent of free apps on the Google Play store could share data with Facebook, making Facebook the second most prevalent third-party tracker after Google’s parent company Alphabet. In this…