- How to manage your online/offline purchases and why it matters https://en.wikipedia.org/wiki/List_of_data_breaches 13 comments privacy
Linking pages
- Local-first software: You own your data, in spite of the cloud https://www.inkandswitch.com/local-first.html 418 comments
- The US is suing Apple for anti-competitive behaviour. But the company’s walled-off tech ecosystem has driven its bold innovation https://theconversation.com/the-us-is-suing-apple-for-anti-competitive-behaviour-but-the-companys-walled-off-tech-ecosystem-has-driven-its-bold-innovation-226512 141 comments
- How Bullshit Has Dominated The Tech Industry | by fulalas | Medium https://medium.com/@fulalas/how-bullshit-has-dominated-the-software-market-bc63257f2a91 103 comments
- Plain wrong: Millions of utility customers’ passwords stored in plain text | Ars Technica https://arstechnica.com/tech-policy/2019/02/plain-wrong-millions-of-utility-customers-passwords-stored-in-plain-text/ 29 comments
- Message Digests, aka Hashing Functions | Veracode https://www.veracode.com/blog/research/message-digests-aka-hashing-functions 25 comments
- Buy bitcoin and other crypto without KYC by following these safe and easy guidelines. | Trezor Blog https://blog.trezor.io/buy-bitcoin-without-kyc-33b883029ff1 20 comments
- Comparing Altcoins: How Do Solana and Others Stack Up To Ethereum? - The Street Crypto: Bitcoin and cryptocurrency news, advice, analysis and more https://www.thestreet.com/crypto/defi/comparing-altcoins-how-do-solana-and-others-stack-up-to-ethereum 19 comments
- What is Web3? The Decentralized Internet of the Future Explained https://www.freecodecamp.org/news/what-is-web3/ 18 comments
- Collecting Data? Start with 'Why?' | Grok Interactive https://www.grok-interactive.com/blog/data-start-with-why/ 18 comments
- Designing for Privacy — An Emerging Software Pattern | by Milan Stankovic, PhD | Level Up Coding https://medium.com/@milstan/designing-for-privacy-an-emerging-software-pattern-7c632cb1de35 14 comments
- Attack of the week: searchable encryption and the ever-expanding leakage function – A Few Thoughts on Cryptographic Engineering https://blog.cryptographyengineering.com/2019/02/11/attack-of-the-week-searchable-encryption-and-the-ever-expanding-leakage-function/ 10 comments
- Winning the debate on encryption — a 101 guide for politicians | by Privacy International | Privacy International | Medium https://medium.com/privacy-international/winning-the-debate-on-encryption-a-101-guide-for-politicians-4ff4353d427 4 comments
- What is Web3? The Decentralized Internet of the Future Explained https://www.freecodecamp.org/news/what-is-web3/amp/?__twitter_impression=true&%3Bs=09 3 comments
- Why should I give you my ID card · Thibault Meunier https://thibault.uk/posts/why-give-id-card/ 1 comment
- Breached Password Detection - FusionAuth https://fusionauth.io/learn/expert-advice/security/breached-password-detection 0 comments
- The day after the GDPR: End of an Era? – NO Complexity https://nocomplexity.com/gdpr-issues/ 0 comments
- How Blockchain Can Make Passwords Obsolete https://cointelegraph.com/news/how-blockchain-can-make-passwords-obsolete 0 comments
- Should You Outsource Your Core App or Software? - FullStack - Ofer Zelig's Blog https://fullstack.info/should-you-outsource-your-core-app-or-software/ 0 comments
- Super basic security advice. The actual bare minimum you can do to… | by Perplamps | Medium https://medium.com/@perplamps/super-basic-security-advice-f9ba900c416b 0 comments
- How to increase the value of your anonymized data? | by brighter AI | Generate vision | Medium https://medium.com/generate-vision/how-to-increase-the-value-of-your-anonymized-data-c182ba4fc8db 0 comments
Related searches:
Search whole site: site:en.wikipedia.org
Search title: List of data breaches - Wikipedia
See how to search.