Trust Service Providers (TSPs) are an idea that has come of age in Europe. The notion of individual citizen privacy is still in debate in the US given the fact that President Trump and both houses of Congress recently passed legislation that effectively eliminates public privacy in the digital world.
How Trust Service Providers assure identification of signatories & services by using strong authentication, digital certificates & electronic signatures
Source: Trust Service Providers according to eIDAS
Thanks to Cryptomathic
And now all of the respectable privacy services will become subject to greater scrutiny.
Source: Phony VPN Services Are Cashing in on America’s War on Privacy – Motherboard
Thanks to Motherboard
The Privacy conversation heats-up again. Politics and the Internet make strange bedfellows.
Source: Closet To Cloud: Is Privacy Dead or Alive in the US? Chapter One.
Thanks to Closet To Cloud Blogspot
The Republican-led Congress has stirred the online hornet’s nest.
In a climate where the Trump Administration has stated commitments to “clean-up the mess in Washington” it seems curious that they – and the Congress – have eliminated all vestiges of online privacy. The punch line seems to be the creation of “public” information systems where anything goes and then the potential for creation of numerous, lucrative business opportunities for elitist “private” information systems for the rich and others willing or capable of paying for it. David Sarnoff and his son Robert would roll over in their graves.
Source: Outrage grows over Congress’ Internet privacy vote – Mar. 29, 2017
Thanks to CNN Tech
What is the world coming to? Obviously an off-shore exploit. No self-respecting US citizen – crook or not – would defile our national treasure Star Trek. To boldy go where no man has gone before. Hmmmm! Source: Shameless crooks fling Star Trek-themed ransomware at world • The Register Thanks to The Register
Source: Shameless crooks fling Star Trek-themed ransomware at world | The Cloud Is Huge 2.0
Thanks to The Cloud is Huge
ISP lobby groups make case against the FCC’s broadband privacy rules.
And now begins the nit picking argument about language and the meaning of terms in the law that govern enforcement and permitted acts that affect public communications and the Internet. “Sensitive” is the favorite these days. Its become the new speak for “privacy”, as if the Fourth Amendment of the US Constitution doesn’t protect a citizens “sensitive” information or property. Many of our long standing concepts about what is and what is not private are being turned on their heads by changes in surveillance technologies (read: security cameras and recording systems) and the new realities of 21st century living.
Source: ISPs say your Web browsing and app usage history isn’t “sensitive” | Ars Technica
Thanks to Ars Technica
Two proposed settlements involving Google drew very different reactions from two federal judges on Thursday in San Jose, with one headed toward approval and the other drawing a rebuke over the clas…
SafeJunction technology prevents providers like Google from viewing or analyzing emails in-transit or even after they are stored.
Source: Judge Has Doubts About Gmail Privacy Deal
Thanks to Courthouse News Service
IoT and its diverse connected devices poses a serious threat to the security of our homes, automobiles, businesses, and personal devices. Consumers need to realize that there’s more to connectivity and access than meets the eye. And privacy is at the heart of the challenge.
What is the future of IoT going to be like? Ahmed Banafa gives us 10 key points to take into account while illuminating the future of this promising technology
2.Standards and Ecosystems
3.Event Stream Processing
5.Processors and Architecture
6.Low-Power, Wide-Area Networks
7.Low-Power, Short-Range IoT Networks
8.Device (Thing) Management
Source: 10 Predictions for the Future of IoT – OpenMind
Thanks to OpenMind
Right or wrong, Edward Snowden’s revelations about NSA surveillance have focused attention on the Fourth Amendment and national security in ways that our founding father’s never could have imagined.
After the June 2013 leaks by Edward Snowden about NSA surveillance of Americans’ communications, Pew Research Center began an in-depth exploration of people’s views and behaviors related to privacy. Here’s what we learned.
Source: The state of privacy in America | Pew Research Center
Thanks to Pew Research
The message: Your mobile and computing devices can be attacked, breached, infected, or otherwise compromised anytime – anywhere – and without warning. The important truth about technology in the 21st Century is that its fraught with danger AND you ignore the threats until YOU become a victim.
Source: Top Story: Malicious fake app bricks phone and installs ransomware | Komando.com
Thanks to Komando.com