Orchid says its new VPN protocol and token will make privacy more private. The launch of Orchid’s new product is expected this week. If successful, Orchid may revolutionize VPNs. Of course, lots of past products have also promised to “revolutionize” various things and yet never managed to accomplish anything revolutionary. It should be interesting to see what happens with Orchid’s new VPN. VPNs are supposed to establish secure, private connections […]
From an article by Chris Stanford in the New York Times: “It sounds like science fiction, but it isn’t. “Chinese scientists are working on a way to create an image of a person’s face from a genetic sample, using blood collected from ethnic Uighurs swept up in mass detentions in China’s Xinjiang region. “At least two Chinese researchers working on the technology have ties to institutions in Europe, and critics […]
Smart TVs are like regular television sets but with an internet connection. With the advent and growth of Netflix, Hulu and other streaming services, most saw internet-connected televisions as a cord-cutter’s dream. But like anything that connects to the internet, it opens up smart TVs to security vulnerabilities and hackers. Not only that, many smart TVs come with a camera and a microphone. But as is the case with most […]
This story describes recent censorship and hate speech in India. However, similar stories are happening in many countries around the world, including the good ol’ USA. Eugen Rochko describes the problems and at least one solution involving Mastodon. Mastodon, which is not owned by any one person or corporation and is decentralized, is often proposed as an alternative to Twitter. It is a free and open-source social networking service where […]
Google Warns 12,000 People They Were Hit By Government Hackers—Here’s What To Do If You’re A Target.
When we think of government employees hacking into private computers, we tend to think of such actions performed by our own government. While that is a risk, probably the even bigger risk is hacking by foreign governments. Just ask Google! You might want to read an article by Thomas Brewster published in Forbes at http://bit.ly/2OwLzDZ.
Experience is a great teacher. About ten years ago, someone broke into the trunk of my automobile and stole my business laptop computer while I was dining with friends in a local restaurant.Apparently, it was easy to get into the automobile’s trunk. Scratches on the trunk lid looked like a large screwdriver was used to “pop” the trunk open. I never recovered the laptop computer. Even worse, the thief probably […]
“Paying with just a wave of your phone can be more secure than a physical card.” Key takeaways: Mobile payments are safe—and they are faster and easier than paying cash or using a card. You can connect a debit card or a credit card to the digital wallet app in your phone to make mobile payments. If you have a smartphone, you can use that to pay for things with […]