Trust Service Providers according to eIDAS

Trust Service Providers (TSPs) are an idea that has come of age in Europe.  The notion of individual citizen privacy is still in debate in the US given the fact that President Trump and both houses of Congress recently passed legislation that effectively eliminates public privacy in the digital world.

How Trust Service Providers assure identification of signatories & services by using strong authentication, digital certificates & electronic signatures

Source: Trust Service Providers according to eIDAS

Thanks to Cryptomathic

All of the Creepy Things Facebook Knows About You

“Facebook knows more about your personal life than you probably realize. As part of the company’s increasingly aggressive advertising operation, Facebook goes to great lengths to track you across the web. The company compiles a list of personal details about every user that includes major life events and general interests. For years, details have been murky about how exactly the social network targets ads—but the company has finally given us a glimpse into how the secret sauce is made.

If you’re curious about all the data points Facebook is using to target ads to you, here’s the full list:

Location
Age
Generation
Gender
Language
Education level
Field of study
School
Ethnic affinity
Income and net worth
Home ownership and type
Home value
Property size
Square footage of home
Year home was built
Household composition
Users who have an anniversary within 30 days
Users who are away from family or hometown
Users who are friends with someone who has an anniversary, is newly married or engaged, recently moved, or has an upcoming birthday
Users in long-distance relationships
Users in new relationships
Users who have new jobs
Users who are newly engaged
Users who are newly married
Users who have recently moved
Users who have birthdays soon
Parents
Expectant parents
Mothers, divided by “type” (soccer, trendy, etc.)
Users who are likely to engage in politics
Conservatives and liberals
Relationship status
Employer
Industry
Job title
Office type
Interests
Users who own motorcycles
Users who plan to buy a car (and what kind/brand of car, and how soon)
Users who bought auto parts or accessories recently
Users who are likely to need auto parts or services
Style and brand of car you drive
Year car was bought
Age of car
How much money user is likely to spend on next car
Where user is likely to buy next car
How many employees your company has
Users who own small businesses
Users who work in management or are executives
Users who have donated to charity (divided by type)
Operating system
Users who play canvas games
Users who own a gaming console
Users who have created a Facebook event
Users who have used Facebook Payments
Users who have spent more than average on Facebook Payments
Users who administer a Facebook page
Users who have recently uploaded photos to Facebook
Internet browser
Email service
Early/late adopters of technology
Expats (divided by what country they are from originally)
Users who belong to a credit union, national bank or regional bank
Users who investor (divided by investment type)
Number of credit lines
Users who are active credit card users
Credit card type
Users who have a debit card
Users who carry a balance on their credit card
Users who listen to the radio
Preference in TV shows
Users who use a mobile device (divided by what brand they use)
Internet connection type
Users who recently acquired a smartphone or tablet
Users who access the Internet through a smartphone or tablet
Users who use coupons
Types of clothing user’s household buys
Time of year user’s household shops most
Users who are “heavy” buyers of beer, wine or spirits
Users who buy groceries (and what kinds)
Users who buy beauty products
Users who buy allergy medications, cough/cold medications, pain relief products, and over-the-counter meds
Users who spend money on household products
Users who spend money on products for kids or pets, and what kinds of pets
Users whose household makes more purchases than is average
Users who tend to shop online (or off)
Types of restaurants user eats at
Kinds of stores user shops at
Users who are “receptive” to offers from companies offering online auto insurance, higher education or mortgages, and prepaid debit cards/satellite TV
Length of time user has lived in house
Users who are likely to move soon
Users who are interested in the Olympics, fall football, cricket or Ramadan
Users who travel frequently, for work or pleasure
Users who commute to work
Types of vacations user tends to go on
Users who recently returned from a trip
Users who recently used a travel app
Users who participate in a timeshare”

[Washington Post]
Michael Nunezm.nunez@gizmodo.com@MichaelFNunez

Just in case you thought that they respected your privacy.  But after all, its free, right?

You might look at SafeJunction

The Creepy Things Facebook Knows About You

Thanks to Gozmodo

When Academics Attack! Data De-Identification Debates

In information security, we talk a lot about data breaches but not quite as much about the vast volumes of user data collected with permission. There’s a large marketing industry built around predictive analytics, using collected data to predict consumer behavior or to directly influence it. Beyond that, there are other ‘big data’ industries.

Source: When Academics Attack! Data De-Identification Debates | The State of Security

Thanks to The State of Security

Tech, privacy and security: A debate we need to have

Naked CIO: It’s time to think hard about the attitudes of technology companies towards privacy and security.

Apple Computer’s refusal to unlock the terrorist phone has raised the bar on privacy for all of us.  SafeJunction is on the record that our technology is available for anyone who wants to use it lawfully.  We will not support the use of privatized data for illegal means or ways that would threaten national security or the life and welfare of any citizen.

Source: Tech, privacy and security: A debate we need to have – TechRepublic

Thanks to Tech Republic

Your Digital Footprint and Why You Need To Manage It

“Our always online lifestyle leaves a digital footprint that contains all of your activity online from all of your devices. As a prospective employee, how are you managing your digital footprint?”

 

This post would suggest that most if not all of us have little or no awareness of the trail we leave when we use the Internet each day, nor do we have any control of the digital information that our expanding array of IoT devices accumulate and catalog.

 

We might want to consider some ways of changing the situation.

Source: Your Digital Footprint and Why You Need To Manage It | Daniel Burrus | LinkedIn

Thanks to Daniel Burris and LinkedIn

Cyber activists from 42 countries issue open letter against software ‘backdoors’

“Nearly 200 experts, companies and advocacy groups urge governments to end efforts to ‘mandate insecure encryption’ amid surveillance concerns”

For this one, let’s get it right the first time instead of dancing around the solution with half-measures!

Check out SafeJunction in 2016.

Source: Cyber activists from 42 countries issue open letter against software ‘backdoors’

Thanks to The Guardian

U.S. presidential candidates don’t understand encryption

Last week, the terrorism-focused GOP debate showcased several candidates’ staggering ignorance of the Internet and information security. Saturday night’s Democratic debate was no better.

Source: U.S. presidential candidates don’t understand encryption

Thanks to VB

Could 2016 see the first cyber attacks on wearables?

Why would you expect that the data being transmitted from your iWatch or Fitbit to be secure?  Is it encrypted?  Does the system where it lands validate your identity? Does it validate the accuracy of the data itself?

Source: Could 2016 see the first cyber attacks on wearables? | cyber attack squad

the-internet-of-things - Copy

Thanks to Cyber Attack Squad

Tesla Model S hacked, researchers ask for global standards to be adopted

Internet connected vehicles are about to become commonplace, with Tesla leading the way in this market – but what the risks?

Source: Tesla Model S hacked, researchers ask for global standards to be adopted | ITProPortal.com

Thanks to ITProPortal.com

Controversies – Are Shutterfly’s Face Prints of Non-Members Illegal?

Another consequence of surveillance cameras and smartphones is the ability to bio-metrically profile your facial image and then store it for sale and use to other third-party agencies like law enforcement and the NSA.  And 48 or 50 states in the US have made this practice legal, for obvious reasons.

“Brian Norberg claims in his class action suit that although he’s not a Shutterfly user, a friend uploaded a picture of him to the service and tagged it with his name, which created a biometric profile of Norberg. Now the service recognizes him in other photos.”

Source: Controversies – Are Shutterfly’s Face Prints of Non-Members Illegal? – AllGov – News

Thanks to AllGov-News