Trust Service Providers according to eIDAS

Trust Service Providers (TSPs) are an idea that has come of age in Europe.  The notion of individual citizen privacy is still in debate in the US given the fact that President Trump and both houses of Congress recently passed legislation that effectively eliminates public privacy in the digital world.

How Trust Service Providers assure identification of signatories & services by using strong authentication, digital certificates & electronic signatures

Source: Trust Service Providers according to eIDAS

Thanks to Cryptomathic

Phony VPN Services Are Cashing in on America’s War on Privacy

Sad.

And now all of the respectable privacy services will become subject to greater scrutiny.

Source: Phony VPN Services Are Cashing in on America’s War on Privacy – Motherboard

Thanks to Motherboard

Outrage grows over Congress’ Internet privacy vote – Mar. 29, 2017

The Republican-led Congress has stirred the online hornet’s nest.

In a climate where the Trump Administration has stated commitments to “clean-up the mess in Washington” it seems curious that they – and the Congress – have eliminated all vestiges of online privacy.  The punch line seems to be the creation of “public” information systems where anything goes and then the potential for creation of numerous, lucrative business opportunities for elitist “private” information systems for the rich and others willing or capable of paying for it.  David Sarnoff and his son Robert would roll over in their graves.

Source: Outrage grows over Congress’ Internet privacy vote – Mar. 29, 2017

Thanks to CNN Tech

Shameless crooks fling Star Trek-themed ransomware at world

What is the world coming to? Obviously an off-shore exploit. No self-respecting US citizen – crook or not – would defile our national treasure Star Trek. To boldy go where no man has gone before. Hmmmm! Source: Shameless crooks fling Star Trek-themed ransomware at world • The Register Thanks to The Register

Source: Shameless crooks fling Star Trek-themed ransomware at world | The Cloud Is Huge 2.0

Thanks to The Cloud is Huge

ISPs say your Web browsing and app usage history isn’t “sensitive”

ISP lobby groups make case against the FCC’s broadband privacy rules.

And now begins the nit picking argument about language and the meaning of terms in the law that govern enforcement and permitted acts that affect public communications and the Internet.  “Sensitive” is the favorite these days.  Its become the new speak for “privacy”, as if the Fourth Amendment of the US Constitution doesn’t protect a citizens “sensitive” information or property.  Many of our long standing concepts about what is and what is not private are being turned on their heads by changes in surveillance technologies (read: security cameras and recording systems) and the new realities of 21st century living.

Source: ISPs say your Web browsing and app usage history isn’t “sensitive” | Ars Technica

Thanks to Ars Technica

Judge Has Doubts About Gmail Privacy Deal

Two proposed settlements involving Google drew very different reactions from two federal judges on Thursday in San Jose, with one headed toward approval and the other drawing a rebuke over the clas…

SafeJunction technology prevents providers like Google from viewing or analyzing emails in-transit or even after they are stored.

Source: Judge Has Doubts About Gmail Privacy Deal

Thanks to Courthouse News Service

10 Predictions for the Future of IoT

IoT and its diverse connected devices poses a serious threat to the security of our homes, automobiles, businesses, and personal devices.  Consumers need to realize that there’s more to connectivity and access than meets the eye.  And privacy is at the heart of the challenge.

What is the future of IoT going to be like? Ahmed Banafa gives us 10 key points to take into account while illuminating the future of this promising technology

1. Platforms

2.Standards and Ecosystems

3.Event Stream Processing

4.Operating Systems

5.Processors and Architecture

6.Low-Power, Wide-Area Networks

7.Low-Power, Short-Range IoT Networks

8.Device (Thing) Management

9.Analytics

10.Security

Source: 10 Predictions for the Future of IoT – OpenMind

Thanks to OpenMind

The state of privacy in America

Right or wrong, Edward Snowden’s revelations about NSA surveillance have focused attention on the Fourth Amendment and national security in ways that our founding father’s never could have imagined.

After the June 2013 leaks by Edward Snowden about NSA surveillance of Americans’ communications, Pew Research Center began an in-depth exploration of people’s views and behaviors related to privacy. Here’s what we learned.

Source: The state of privacy in America | Pew Research Center

Thanks to Pew Research

Malicious fake app bricks phone and installs ransomware

The message:  Your mobile and computing devices can be attacked, breached, infected, or otherwise compromised anytime – anywhere – and without warning.  The important truth about technology in the 21st Century is that its fraught with danger AND you ignore the threats until YOU become a victim.

So curious!

Source: Top Story: Malicious fake app bricks phone and installs ransomware | Komando.com

Thanks to Komando.com