7 tips for your Internet of Things projects

Although there’s little press these days, Privacy and Security should be at the top of your list when prioritizing your IoT Project needs.

Why, you ask?  Would you leave an unlocked car on the street?  Would you use a debit card without a chip or pin?

The answer is simple.  You wouldn’t.

7 Things to Consider When Planning Your IoT Project

Thanks to    and your friends at SafeJunction

Phony VPN Services Are Cashing in on America’s War on Privacy

First, I didn’t realize that we had a War on Privacy.  But it’s still unfortunate that bad companies are taking advantage of the few enlightened Americans who do care about Privacy.  So beware of any schemes that purport to protect your connections, identity, conversations, or data.  The undergrowth in the jungle out there is thickening.

Sad.

Source: Phony VPN Services Are Cashing in on America’s War on Privacy – Motherboard

Thanks to Motherboard

Trust Service Providers according to eIDAS

Trust Service Providers (TSPs) are an idea that has come of age in Europe.  The notion of individual citizen privacy is still in debate in the US given the fact that President Trump and both houses of Congress recently passed legislation that effectively eliminates public privacy in the digital world.

How Trust Service Providers assure identification of signatories & services by using strong authentication, digital certificates & electronic signatures

Source: Trust Service Providers according to eIDAS

Thanks to Cryptomathic

Phony VPN Services Are Cashing in on America’s War on Privacy

Sad.

And now all of the respectable privacy services will become subject to greater scrutiny.

Source: Phony VPN Services Are Cashing in on America’s War on Privacy – Motherboard

Thanks to Motherboard

Outrage grows over Congress’ Internet privacy vote – Mar. 29, 2017

The Republican-led Congress has stirred the online hornet’s nest.

In a climate where the Trump Administration has stated commitments to “clean-up the mess in Washington” it seems curious that they – and the Congress – have eliminated all vestiges of online privacy.  The punch line seems to be the creation of “public” information systems where anything goes and then the potential for creation of numerous, lucrative business opportunities for elitist “private” information systems for the rich and others willing or capable of paying for it.  David Sarnoff and his son Robert would roll over in their graves.

Source: Outrage grows over Congress’ Internet privacy vote – Mar. 29, 2017

Thanks to CNN Tech

Shameless crooks fling Star Trek-themed ransomware at world

What is the world coming to? Obviously an off-shore exploit. No self-respecting US citizen – crook or not – would defile our national treasure Star Trek. To boldy go where no man has gone before. Hmmmm! Source: Shameless crooks fling Star Trek-themed ransomware at world • The Register Thanks to The Register

Source: Shameless crooks fling Star Trek-themed ransomware at world | The Cloud Is Huge 2.0

Thanks to The Cloud is Huge

ISPs say your Web browsing and app usage history isn’t “sensitive”

ISP lobby groups make case against the FCC’s broadband privacy rules.

And now begins the nit picking argument about language and the meaning of terms in the law that govern enforcement and permitted acts that affect public communications and the Internet.  “Sensitive” is the favorite these days.  Its become the new speak for “privacy”, as if the Fourth Amendment of the US Constitution doesn’t protect a citizens “sensitive” information or property.  Many of our long standing concepts about what is and what is not private are being turned on their heads by changes in surveillance technologies (read: security cameras and recording systems) and the new realities of 21st century living.

Source: ISPs say your Web browsing and app usage history isn’t “sensitive” | Ars Technica

Thanks to Ars Technica

Judge Has Doubts About Gmail Privacy Deal

Two proposed settlements involving Google drew very different reactions from two federal judges on Thursday in San Jose, with one headed toward approval and the other drawing a rebuke over the clas…

SafeJunction technology prevents providers like Google from viewing or analyzing emails in-transit or even after they are stored.

Source: Judge Has Doubts About Gmail Privacy Deal

Thanks to Courthouse News Service

10 Predictions for the Future of IoT

IoT and its diverse connected devices poses a serious threat to the security of our homes, automobiles, businesses, and personal devices.  Consumers need to realize that there’s more to connectivity and access than meets the eye.  And privacy is at the heart of the challenge.

What is the future of IoT going to be like? Ahmed Banafa gives us 10 key points to take into account while illuminating the future of this promising technology

1. Platforms

2.Standards and Ecosystems

3.Event Stream Processing

4.Operating Systems

5.Processors and Architecture

6.Low-Power, Wide-Area Networks

7.Low-Power, Short-Range IoT Networks

8.Device (Thing) Management

9.Analytics

10.Security

Source: 10 Predictions for the Future of IoT – OpenMind

Thanks to OpenMind