OhekaforNo Trust Verify blogblog.notrustverify.ch·Sep 14, 2023Alephium x Nym #2 Using Alephium’s wallet through Nym’s mixnetNymConnect is an interface allowing in one click to connect to the mixnet of Nym. The goal of NymConnect is to improve the privacy of the applications you already use by protecting your traffic from an observer and even from the application itself. T...DiscussNym Connectprivacy
OhekaforNo Trust Verify blogblog.notrustverify.ch·Sep 14, 2023Access to Meduza through Nym’s mixnetNymConnect provides a seamless, one-click interface for connecting to the Nym mixnet, with the primary objective of enhancing the confidentiality of your interactions with applications and websites. It offers robust protection by safeguarding your tr...DiscussNym Connectprivacy
Rico van Zelstrvz.hashnode.dev·Sep 12, 2023How to block ChatGPT from scraping your website.Introduction In today's digital day and age, web scraping and parsing have become common techniques for various applications, including data collection, content analysis, and most presently teaching AI models. While these practices can be legitimate ...Discuss·1 likeAI
Gin Bluegin.hashnode.dev·Sep 11, 2023NextDNS: The Future of Internet Security and PrivacyIntroduction In an era where our lives are increasingly intertwined with the digital world, ensuring online security and safeguarding our privacy has never been more crucial. Enter NextDNS, a revolutionary DNS (Domain Name System) service that not on...Discuss·30 readsdns
Kralhexkralhex.hashnode.dev·Aug 30, 2023Understanding EncryptionIntroduction In today's digital age, where information flows freely and data is a valuable asset, ensuring the security and privacy of our digital communication has become more crucial than ever. Encryption stands as one of the cornerstones of this s...Discussencryption
Jeevan Alokjeevanalok.hashnode.dev·Aug 28, 2023Privacy-Preserving Data Sharing in the Era of Big Data and Machine Learning (Part 1)In the age of big data and machine learning, organisations are faced with the dual challenge of extracting meaningful insights from vast datasets while safeguarding individual privacy. As organisations collect and process massive data for machine lea...Discuss#cybersecurity
Stackzerostackzero.hashnode.dev·Aug 14, 2023Secret Codes Unlocked: How to Implement Substitution CiphersAre you ready to implement substitution ciphers with your own hands and take your encryption skills to the next level?In our previous article, we explored the fascinating world of substitution ciphers and how we can use them to encode our secret mess...Discuss·1 likeCryptography
Zahiruddin Tavargerezahere.com·Aug 14, 2023Moq Data-Collection Controversy: The Other Side of The StoryThe Context Moq is a very popular, open-source project that provides a mocking library for .NET developers. It has come under fire for quietly collecting data without the knowledge or consent of its users. Crux of The Matter Moq is was everything w...Discuss·510 readsNews & TrendsOpen Source
Stackzerostackzero.hashnode.dev·Aug 12, 2023Substitution ciphers? An overview of the basicsSubstitution ciphers are one of the simplest and oldest methods of encryption. They involve replacing plaintext letters or characters with others in a fixed pattern to create ciphertext.They represent probably the most widely used encryption system i...DiscussCaesar Cipher
Ali Almasinote.al1almasi.ir·Aug 4, 2023Island. Make a separate space for apps you don't trust enough!What's "Island"? As many of us probably know, the trust in domestic (Islamic Republic) applications is decreasing day by day, and perhaps many of us - as far as we could - removed Iranian apps from our phones. In this article, I want to introduce the...Discussiran