Yet another messenger to adopt the Snapchat feature.
Without SnapChat or Telegraph, you can also set anything to disappear from everyone’s view – except those you want to be able to see it, use it, or destroy it. And they don’t have to share anything with you except a means of identifying themselves in advance. Curious?
Check out SafeJunction
Source: You can set your photos and videos to disappear from Telegram
Thanks to Marsha Collier and Mashable
Although there’s little press these days, Privacy and Security should be at the top of your list when prioritizing your IoT Project needs.
Why, you ask? Would you leave an unlocked car on the street? Would you use a debit card without a chip or pin?
The answer is simple. You wouldn’t.
7 Things to Consider When Planning Your IoT Project
Thanks to and your friends at SafeJunction
Trust Service Providers (TSPs) are an idea that has come of age in Europe. The notion of individual citizen privacy is still in debate in the US given the fact that President Trump and both houses of Congress recently passed legislation that effectively eliminates public privacy in the digital world.
How Trust Service Providers assure identification of signatories & services by using strong authentication, digital certificates & electronic signatures
Source: Trust Service Providers according to eIDAS
Thanks to Cryptomathic
ISP lobby groups make case against the FCC’s broadband privacy rules.
And now begins the nit picking argument about language and the meaning of terms in the law that govern enforcement and permitted acts that affect public communications and the Internet. “Sensitive” is the favorite these days. Its become the new speak for “privacy”, as if the Fourth Amendment of the US Constitution doesn’t protect a citizens “sensitive” information or property. Many of our long standing concepts about what is and what is not private are being turned on their heads by changes in surveillance technologies (read: security cameras and recording systems) and the new realities of 21st century living.
Source: ISPs say your Web browsing and app usage history isn’t “sensitive” | Ars Technica
Thanks to Ars Technica
Right or wrong, Edward Snowden’s revelations about NSA surveillance have focused attention on the Fourth Amendment and national security in ways that our founding father’s never could have imagined.
After the June 2013 leaks by Edward Snowden about NSA surveillance of Americans’ communications, Pew Research Center began an in-depth exploration of people’s views and behaviors related to privacy. Here’s what we learned.
Source: The state of privacy in America | Pew Research Center
Thanks to Pew Research
- Privacy – or a lack of it – is what drives concern about IoT in the USA (70%) and France (69%) versus a global average of 62%
- While around the world 54% name security their number one concern, in the UK it’s significantly higher (67%)
- 65% of Chinese and 61% of South African mobile users demand transparency from wearables providers over the use of their data compared to 52% worldwide
- 17% of Indians don’t want their TV to be connected to the internet compared to just 10% of the global sample.
Source: IOT Report 2016
Thanks to MEF – Mobile Ecosystem Forum
How can businesses continue to respect privacy concerns while still permitting the use of big data to drive business value?
Companies will now have an even greater obligation to protect the personal information entrusted to them, no matter how it’s processed’
Big data use is expected to grow exponentially in the next few years now that the noise and excitement over the volumes of data we have at our fingertips are starting to be replaced by action and practical experimentation, and many organizations start to really capitalize on their investments in analytics, data collection and storage.
The facts of Internet life in 2017 are that privacy still seems unimportant to most users, but the increasing number of incidents of abuse and cyber crime will attract more and more public attention.
Source: Big Data vs. Privacy: A balancing act
Thanks to Predictive Analytics Times
In a rare public article, we hear about the current US position on cyberwar and surveillance. The interesting question is where we might go with our protections in 2017 and beyond and will Clapper be a part of that effort.
Source: America’s Top Spy James Clapper and the Future of Cyberwar and Surveillance
Thanks to TCIH 2.0 and WIRED
“How to Enable WhatsApp Two-Step Verification Passcode to Prevent Your Account from Being Hacked”
This isn’t rocket science folks – even though it adds a step that takes an additional minute to secure your transaction. Is your privacy worth an extra minute?
Source: WhatsApp Adds 2-Step Verification Passcode — Enable this Security Feature
Thanks to The Hacker News