Trust Service Providers according to eIDAS

Trust Service Providers (TSPs) are an idea that has come of age in Europe.  The notion of individual citizen privacy is still in debate in the US given the fact that President Trump and both houses of Congress recently passed legislation that effectively eliminates public privacy in the digital world.

How Trust Service Providers assure identification of signatories & services by using strong authentication, digital certificates & electronic signatures

Source: Trust Service Providers according to eIDAS

Thanks to Cryptomathic

ISPs say your Web browsing and app usage history isn’t “sensitive”

ISP lobby groups make case against the FCC’s broadband privacy rules.

And now begins the nit picking argument about language and the meaning of terms in the law that govern enforcement and permitted acts that affect public communications and the Internet.  “Sensitive” is the favorite these days.  Its become the new speak for “privacy”, as if the Fourth Amendment of the US Constitution doesn’t protect a citizens “sensitive” information or property.  Many of our long standing concepts about what is and what is not private are being turned on their heads by changes in surveillance technologies (read: security cameras and recording systems) and the new realities of 21st century living.

Source: ISPs say your Web browsing and app usage history isn’t “sensitive” | Ars Technica

Thanks to Ars Technica

The state of privacy in America

Right or wrong, Edward Snowden’s revelations about NSA surveillance have focused attention on the Fourth Amendment and national security in ways that our founding father’s never could have imagined.

After the June 2013 leaks by Edward Snowden about NSA surveillance of Americans’ communications, Pew Research Center began an in-depth exploration of people’s views and behaviors related to privacy. Here’s what we learned.

Source: The state of privacy in America | Pew Research Center

Thanks to Pew Research

The Impact of Trust on IoT

  • Privacy – or a lack of it – is what drives concern about IoT in the USA (70%) and France (69%) versus a global average of 62%
  • While around the world 54% name security their number one concern, in the UK it’s significantly higher (67%)
  • 65% of Chinese and 61% of South African mobile users demand transparency from wearables providers over the use of their data compared to 52% worldwide
  • 17% of Indians don’t want their TV to be connected to the internet compared to just 10% of the global sample.

Source: IOT Report 2016

Thanks to MEF – Mobile Ecosystem Forum

Big Data vs. Privacy: A balancing act

How can businesses continue to respect privacy concerns while still permitting the use of big data to drive business value?

Companies will now have an even greater obligation to protect the personal information entrusted to them, no matter how it’s processed’

Big data use is expected to grow exponentially in the next few years now that the noise and excitement over the volumes of data we have at our fingertips are starting to be replaced by action and practical experimentation, and many organizations start to really capitalize on their investments in analytics, data collection and storage.

The facts of Internet life in 2017 are that privacy still seems unimportant to most users, but the increasing number of incidents of abuse and cyber crime will attract more and more public attention.

Source: Big Data vs. Privacy: A balancing act

Thanks to Predictive Analytics Times

America’s Top Spy James Clapper and the Future of Cyberwar and Surveillance

In a rare public article, we hear about the current US position on cyberwar and surveillance.  The interesting question is where we might go with our protections in 2017 and beyond and will Clapper be a part of that effort.

Source: America’s Top Spy James Clapper and the Future of Cyberwar and Surveillance

Thanks to TCIH 2.0 and WIRED

WhatsApp Adds​ ​2-Step Verification Passcode — Enable this Security Feature

“How to Enable WhatsApp Two-Step Verification Passcode to Prevent Your Account from Being Hacked”

This isn’t rocket science folks – even though it adds a step that takes an additional minute to secure your transaction.  Is your privacy worth an extra minute?

Source: WhatsApp Adds 2-Step Verification Passcode — Enable this Security Feature

iStock_000070827565_Medium

Thanks to The Hacker News

IOT Report 2016 – Cites concerns about trusting your privacy

“This latest report was launched on April 7th in association with AVG Technologies and conducted by On Device Research. The study examines consumer perceptions about the future of a connected world. It reveals that while consumers see the tangible benefit of IoT (just 1 consumer in 10 say a world of connected devices won’t deliver such value), more than half also harbour concerns about the perceived risks and threats in a world of connected devices.”

Source: IOT Report 2016

the-internet-of-things - Copy

Thanks to MEF

Internet of Things a Spyglass on Workers?

“Congress is showing some bipartisan support for the “internet of things,” but some worker advocates say lawmakers may be overlooking the employee privacy implications of technological advances in the workplace.The House Sept. 12 passed with overwhelming bipartisan support a resolution (H.Res. 847) calling on policy makers to come up with a strategy to encourage the internet of things.The buzz phrase refers to the increasing power of technology to allow machines and people to communicate with each other via linked sensors, whether it’s a pacemaker that sends performance information to doctors or crop sensors that tell farmers when it’s time for more water.”

SafeJunction protects your IoT identity and data,

Source: Internet of Things a Spyglass on Workers? | Bloomberg BNA

internet-of-things

Thanks to Bloomberg BNA

Changing Tactics: The Rise of the Privacy Advocates

Justin Brookman of the Center for Democracy and Technology certainly thinks privacy advocates are gaining traction. Five years ago, for example, the public really wasn’t engaged in the conversation about privacy at all.

“The issues weren’t intuitive to them, and the message wasn’t getting out,” Brookman said.

The privacy conversation continues with increased awareness of threats to Internet users identities and information.  Until there’s a major event, breach, or high profile privacy breach, users will continue to assume that they won’t get hacked, have their financial services compromised, or be embarrassed.  SafeJunction continues to believe that our privacy products will continue to be relevant, but market adoption will be slow.

Changing Tactics

privacy1-520x245

Thanks to