Trust Service Providers according to eIDAS

Trust Service Providers (TSPs) are an idea that has come of age in Europe.  The notion of individual citizen privacy is still in debate in the US given the fact that President Trump and both houses of Congress recently passed legislation that effectively eliminates public privacy in the digital world.

How Trust Service Providers assure identification of signatories & services by using strong authentication, digital certificates & electronic signatures

Source: Trust Service Providers according to eIDAS

Thanks to Cryptomathic

Outrage grows over Congress’ Internet privacy vote – Mar. 29, 2017

The Republican-led Congress has stirred the online hornet’s nest.

In a climate where the Trump Administration has stated commitments to “clean-up the mess in Washington” it seems curious that they – and the Congress – have eliminated all vestiges of online privacy.  The punch line seems to be the creation of “public” information systems where anything goes and then the potential for creation of numerous, lucrative business opportunities for elitist “private” information systems for the rich and others willing or capable of paying for it.  David Sarnoff and his son Robert would roll over in their graves.

Source: Outrage grows over Congress’ Internet privacy vote – Mar. 29, 2017

Thanks to CNN Tech

Judge Has Doubts About Gmail Privacy Deal

Two proposed settlements involving Google drew very different reactions from two federal judges on Thursday in San Jose, with one headed toward approval and the other drawing a rebuke over the clas…

SafeJunction technology prevents providers like Google from viewing or analyzing emails in-transit or even after they are stored.

Source: Judge Has Doubts About Gmail Privacy Deal

Thanks to Courthouse News Service

Big Data vs. Privacy: A balancing act

How can businesses continue to respect privacy concerns while still permitting the use of big data to drive business value?

Companies will now have an even greater obligation to protect the personal information entrusted to them, no matter how it’s processed’

Big data use is expected to grow exponentially in the next few years now that the noise and excitement over the volumes of data we have at our fingertips are starting to be replaced by action and practical experimentation, and many organizations start to really capitalize on their investments in analytics, data collection and storage.

The facts of Internet life in 2017 are that privacy still seems unimportant to most users, but the increasing number of incidents of abuse and cyber crime will attract more and more public attention.

Source: Big Data vs. Privacy: A balancing act

Thanks to Predictive Analytics Times

What is Access Management and Why is it Important? | The Cloud Is Huge 2.0

Reblog from another of SafeJunction’s Blog Sites

Access Management is a really “dry” term that probably glazes over the eyes of most computer and mobile device users. I like to use a “gated community” or “storage unit” analogy because it illustrates a couple of significant pieces of both the concept and the practice itself. To enter a gated community or off-site storage unit in a vehicle I must possess an entry code. The road or driveway I use to enter is like the network connection to a computer or mobile device. Without the code, the gate won’t open and I won’t be able to drive through. The code is like the username and password of my device, but over time this device “entry point” has been “modernized” so that the operating system or apps on the device have taken over issuing the code without my having to or even knowing that it has. Even though we can still manually accomplish these functions, we’ve become so inattentive, lazy, and impatient that we now delegate permission to the device, operating system, apps, or other

Source: What is Access Management and Why is it Important? | The Cloud Is Huge 2.0

Thanks to The Cloud is Huge 2.0

Web of Trust browser add-on caught selling users’ data

“For now, anyone using the WOT extension is strongly recommended to immediately uninstall the extension right now.”

Just another nasty example of the lack of privacy, trust, or security on the Internet.  It continues to be a jungle out there.  What will it take?

Source: Web of Trust browser add-on caught selling users’ data

Trust

Thanks to SafeUM

Yahoo wants to spy on users through smart advertising

“Yahoo has filed a patent for a type of smart billboard that would collect people’s information and use it to deliver targeted ad content in real-time.

Using a combination of sensors, including microphones and cameras located either on the billboard or on drones nearby, it would watch and listen to people near the billboard to get a sense of who they were and how they were reacting, which would help it to tailor what it showed them.The patent showed that the billboard might work with advertising exchanges, meaning that it wouldn’t just display its own ads, but might also put them devices including tablets, phones, smartwatches and TVs.
“The ubiquity of mobile devices and the ability to craft individualized marketing strategies to meet the needs and interests of specific consumers have made a compelling case for such techniques as the most efficient use of marketing budgets. Nevertheless, a significant portion of such budgets is still devoted to more traditional channels.”

Source: Yahoo wants to spy on users through smart advertising

Thanks to SC Magazine

Software Flags ‘Suicidal’ Students, Presenting Privacy Dilemma

“School administrators increasingly have the power to track students’ Web browsing on school-issued laptops, even when the students are at home. The implications are complicated.”

Giving new meaning to Big Data!

Source: Software Flags ‘Suicidal’ Students, Presenting Privacy Dilemma : NPR Ed : NPR

Thanks to NPR

IBM and ARM partner for IoT domination

 

The mbed system is synonymous with tracking and Big Data of one kind or another.  As we continue to discover, IoT and tracking are mixed blessings to Internet users.  On the one hand the surveillance provided by tracking assists law enforcement agencies with solving crimes, but each users privacy (at some levels) is compromised.

SafeJunction continues to ask that users be given the option or revealing or protecting their privacy – at least as it has to do with information or data that is personal (like financial, medical, and family-centered stuff).

“ARM is adding IBM’s cloud into the guts of its Internet of Things mBed system.”

Source: IBM and ARM partner for IoT domination – Business Insider – Linkis.com

dig-ID

Thanks to- Business Insider – Linkis.com

Analytics for government: big data and Big Brother

“Transparency and privacy are two key areas where the public sector will not be able to rely on the private sector for innovation”

The gulf between national security surveillance efforts and the publics’ desire for privacy on the Internet continues to widen throughout the world.  As long as cybercrime is a viable “industry”, the situation will continue unabated,

Source: Analytics for government: big data and Big Brother – Telegraph

Thanks to The Telegraph