Cryptocurrency: Inception and Deviation

Though today there is a general public understanding of cryptocurrencies and their potential lucrative investment opportunities, the inception of the first cryptocurrency, Bitcoin, was created to be a resistance to the centralised control of the means of exchange. Stated in Bitcoin’s Whitepaper, released in 2008, was the goal of user anonymity, blockchain record-keeping and currency scarcity. These goals aimed to…

Operational Security

Operational security (OPSEC) refers to the habits and behaviours you perform to enforce good security. This is probably the most underrated security control and if done poorly can result in the destruction of your Privacy, Security and Anonymity. Privacy is about content. Privacy relates to maintaining confidentiality and keeping secrets, whilst Anonymity relates to your actions potentially being seen, but…

The 773 Million Record “Collection #1” Data Breach

Publisher: https://www.troyhunt.com/the-773-million-record-collection-1-data-reach/ Many people will land on this page after learning that their email address has appeared in a data breach I’ve called “Collection #1”. Most of them won’t have a tech background or be familiar with the concept of credential stuffing so I’m going to write this post for the masses and link out to more detailed material for…

NASA Eyes Blockchain and Crypto Tokens to Secure Critical Air Traffic Information.

A recent report from the NASA Ames Research Center proposes a blockchain solution to improve air traffic control networks. According to the report, the prototype uses blockchain to minimize potential security risks from new aircraft surveillance technology mandated by the Federal Aviation Administration by 2020. The new surveillance system opens avenues for data interception as it publicly broadcasts sensitive flight information…

101: SIM Card Registration | Privacy International

SIM card registration allows the state to know the identity of the owner of a SIM card, and thus who is most likely making a call or sending a message. As a condition for the purchase or activation of a SIM card, the user is asked to provide personal data as well as a valid ID. Those details are held…

The World’s Worst Passwords List: How Many Do You Have?

Publish date: January 10, 2019 Published by Nathan House When it comes to password hygiene, many of us are still ignoring the basics. Password management specialist, SplashData has released its eighth ‘Worst Passwords of the Year’ list: a roundup of the most commonly used and easily guessable passwords. The list is based on an evaluation of more than 5 million passwords leaked on…

How Apps on Android Share Data with Facebook – Report

Saturday, December 29, 2018 A video presentation of the finding of this report can be found here, as presented at 35th Chaos Computer Congress (35C3) Previous research has shown how 42.55 percent of free apps on the Google Play store could share data with Facebook, making Facebook the second most prevalent third-party tracker after Google’s parent company Alphabet. In this…