You can set your photos and videos to disappear from Telegram

Yet another messenger to adopt the Snapchat feature.

Without SnapChat or Telegraph, you can also set anything to disappear from everyone’s view – except those you want to be able to see it, use it, or destroy it.  And they don’t have to share anything with you except a means of identifying themselves in advance.  Curious?

Check out SafeJunction

Source: You can set your photos and videos to disappear from Telegram

Thanks to Marsha Collier and Mashable

7 tips for your Internet of Things projects

Although there’s little press these days, Privacy and Security should be at the top of your list when prioritizing your IoT Project needs.

Why, you ask?  Would you leave an unlocked car on the street?  Would you use a debit card without a chip or pin?

The answer is simple.  You wouldn’t.

7 Things to Consider When Planning Your IoT Project

Thanks to    and your friends at SafeJunction

Trust Service Providers according to eIDAS

Trust Service Providers (TSPs) are an idea that has come of age in Europe.  The notion of individual citizen privacy is still in debate in the US given the fact that President Trump and both houses of Congress recently passed legislation that effectively eliminates public privacy in the digital world.

How Trust Service Providers assure identification of signatories & services by using strong authentication, digital certificates & electronic signatures

Source: Trust Service Providers according to eIDAS

Thanks to Cryptomathic

ISPs say your Web browsing and app usage history isn’t “sensitive”

ISP lobby groups make case against the FCC’s broadband privacy rules.

And now begins the nit picking argument about language and the meaning of terms in the law that govern enforcement and permitted acts that affect public communications and the Internet.  “Sensitive” is the favorite these days.  Its become the new speak for “privacy”, as if the Fourth Amendment of the US Constitution doesn’t protect a citizens “sensitive” information or property.  Many of our long standing concepts about what is and what is not private are being turned on their heads by changes in surveillance technologies (read: security cameras and recording systems) and the new realities of 21st century living.

Source: ISPs say your Web browsing and app usage history isn’t “sensitive” | Ars Technica

Thanks to Ars Technica

The state of privacy in America

Right or wrong, Edward Snowden’s revelations about NSA surveillance have focused attention on the Fourth Amendment and national security in ways that our founding father’s never could have imagined.

After the June 2013 leaks by Edward Snowden about NSA surveillance of Americans’ communications, Pew Research Center began an in-depth exploration of people’s views and behaviors related to privacy. Here’s what we learned.

Source: The state of privacy in America | Pew Research Center

Thanks to Pew Research

The Impact of Trust on IoT

  • Privacy – or a lack of it – is what drives concern about IoT in the USA (70%) and France (69%) versus a global average of 62%
  • While around the world 54% name security their number one concern, in the UK it’s significantly higher (67%)
  • 65% of Chinese and 61% of South African mobile users demand transparency from wearables providers over the use of their data compared to 52% worldwide
  • 17% of Indians don’t want their TV to be connected to the internet compared to just 10% of the global sample.

Source: IOT Report 2016

Thanks to MEF – Mobile Ecosystem Forum

Big Data vs. Privacy: A balancing act

How can businesses continue to respect privacy concerns while still permitting the use of big data to drive business value?

Companies will now have an even greater obligation to protect the personal information entrusted to them, no matter how it’s processed’

Big data use is expected to grow exponentially in the next few years now that the noise and excitement over the volumes of data we have at our fingertips are starting to be replaced by action and practical experimentation, and many organizations start to really capitalize on their investments in analytics, data collection and storage.

The facts of Internet life in 2017 are that privacy still seems unimportant to most users, but the increasing number of incidents of abuse and cyber crime will attract more and more public attention.

Source: Big Data vs. Privacy: A balancing act

Thanks to Predictive Analytics Times

America’s Top Spy James Clapper and the Future of Cyberwar and Surveillance

In a rare public article, we hear about the current US position on cyberwar and surveillance.  The interesting question is where we might go with our protections in 2017 and beyond and will Clapper be a part of that effort.

Source: America’s Top Spy James Clapper and the Future of Cyberwar and Surveillance

Thanks to TCIH 2.0 and WIRED

WhatsApp Adds​ ​2-Step Verification Passcode — Enable this Security Feature

“How to Enable WhatsApp Two-Step Verification Passcode to Prevent Your Account from Being Hacked”

This isn’t rocket science folks – even though it adds a step that takes an additional minute to secure your transaction.  Is your privacy worth an extra minute?

Source: WhatsApp Adds 2-Step Verification Passcode — Enable this Security Feature


Thanks to The Hacker News

IOT Report 2016 – Cites concerns about trusting your privacy

“This latest report was launched on April 7th in association with AVG Technologies and conducted by On Device Research. The study examines consumer perceptions about the future of a connected world. It reveals that while consumers see the tangible benefit of IoT (just 1 consumer in 10 say a world of connected devices won’t deliver such value), more than half also harbour concerns about the perceived risks and threats in a world of connected devices.”

Source: IOT Report 2016

the-internet-of-things - Copy

Thanks to MEF