Siddharth Pujarasiddhath.hashnode.dev·Dec 16, 2024What if YOU controlled your identity, not a third party?Learn how blockchain is changing the way we verify identities — Read more! Decentralized Identity Verification: A Deep Dive into Blockchain Use Cases In a world driven by digital interactions, ensuring secure, private, and reliable identity verificat...DecentralizedIdentity
Aniket R Chateani-r.hashnode.dev·Dec 14, 2024What's Private Mode? Is it Really Private? Let's Clear Up Some Common Myths!Hey there, internet homies! 🌐 Have you ever clicked on the "Private Mode" button in your browser and thought, "Aha! Now my browsing is 100% secret!"? Well, I hate to burst your vibe, but things aren't that simple. In this blog, we're going to take a...1 likeprivacy
Asclique Innovationascliqueinnovation.hashnode.dev·Dec 12, 2024What is the most significant strength of a DHT-based search engine?The most significant strength of a DHT-based search engine lies in its decentralized structure, which ensures enhanced scalability, privacy, and fault tolerance. Here’s why this is critical: Key Strengths of a DHT-Based Search Engine Decentralizatio...dht search engine
Lukas J Hanblog.lukasjhan.com·Dec 5, 2024Reflecting on My Master's Journey: Authentication, Privacy, and BeyondAs I look back on this transformative year, I'm filled with a sense of accomplishment and excitement for the future. I recently completed my master's degree, focusing on a topic that lies at the intersection of digital privacy and user empowerment: d...Master degree in cybersecurity
Code Skycodesky.cloudhero.in·Nov 27, 2024Azure Private Endpoint and VNet-to-VNet Peering: A Comprehensive GuideAs organizations embrace cloud technologies, secure and scalable networking becomes a cornerstone of their infrastructure. Azure provides robust networking capabilities, including Azure Private Endpoint and VNet-to-VNet Peering, to ensure seamless, s...Azure
Mauricio ETchaoticgoodcyber.tech·Nov 24, 2024Secure Messaging Apps: Signal, Telegram, Session, Element, ThreemaMobile apps collect a lot of user data, often more than necessary. This data can be used for targeted advertising, sold to third parties, or potentially accessed by government agencies. With a second Trump presidency, everyone should be concerned abo...54 readsApps & Gearprivacy rights
WS BlogforWelfare Scotland Blogblog.welfare.scot·Nov 23, 2024Say ‘No’ To The Trading In Your Personal DetailsYour data is precious and in the UK, a data controller needs to be registered with the UK’s Information Commissioner to collect, store, process and use your personal data. The main piece of legislation relating to the use of your data is Articles 7(3...93 readsData Protection
Nguyen Thi Thaoharrypage.hashnode.dev·Nov 21, 2024How a Hacker Could Exploit Canvas FingerprintingCanvas fingerprinting is a tracking technique where a unique identifier is generated based on the graphics rendering capabilities of a user's device, particularly the <canvas> element in HTML. The process involves using the <canvas> element to render...19 likescanvas
bhushan cegendarydark555.hashnode.dev·Nov 21, 2024Project Tourbillon explores anonymity for digital payments BIS SWITZERLANDhttps://www.youtube.com/watch?v=rahFmNukBF8 Project Tourbillon, developed by the Bank for International Settlements (BIS) Innovation Hub Swiss Centre, demonstrates a new privacy paradigm for retail central bank digital currencies (CBDC). The experime...BIS Research
Gabi Dobocanblog.telepat.io·Nov 20, 2024Small Language Models: The Unsung Heroes of AI EfficiencyDigital landscapes are seeing a seismic shift towards language models that can process, learn, and perform tasks akin to human cognition. While large language models (LLMs) like GPT-3 have captivated attention, small language models (SLMs) are quietl...domain-specific knowledge