Report: Firm Tracking Purchase, Transaction Histories of Millions Maybe Not Really Anonymizing Them

The nation’s largest financial data broker, Yodlee, holds extensive and supposedly anonymized banking and credit card transaction histories on millions of Americans. Internal documents obtained by Motherboard, however, appear to indicate that Yodlee clients could potentially de-anonymize those records by simply… Read more… Source: https://gizmodo.com/report-firm-tracking-purchase-and-transaction-historie-1841799352 Proactive Computing found this story and shared it with you. […]

What Is an Encryption Backdoor?

You might have heard the term “encryption backdoor” in the news recently. We’ll explain what it is, why it’s one of the most hotly contested topics in the tech world, and how it could affect the devices you use every day. Read This Article on How-To Geek › Source: https://www.howtogeek.com/544727/what-is-an-encryption-backdoor/ Proactive Computing found this story […]

Signal is finally bringing its secure messaging to the masses

Enlarge (credit: Getty Images) Last month, the cryptographer and coder known as Moxie Marlinspike was getting settled on an airplane when his seatmate, a midwestern-looking man in his 60s, asked for help. He couldn’t figure out how to enable airplane mode on his aging Android phone. But when Marlinspike saw the screen, he wondered for […]

Google offers free Titan security keys to help secure political campaigns

While Facebook stands firm on its decision not to ban false political ads, Google is moving in the other direction. After banning political ad targeting last year, the company has announced new plans to help tighten security within campaigns. In part… Source: https://www.engadget.com/2020/02/11/google-free-titan-security-keys-secure-political-campaigns/ Proactive Computing found this story and shared it with you. The Article […]

CIA secretly owned world’s top encryption supplier, could read ally & adversary messages for decades

For more than half a century, governments all over the world trusted a single company to keep the communications of their spies, soldiers and diplomats secret. That company was secretly run by the CIA, which had the ability to read all those communications for decades. Greg Miller at the Washington Post: The company, Crypto AG, […]

Lindsey Graham Is Quietly Preparing a Mess of a Bill Trying to Destroy End-to-End Encryption

Top Trump ally and consistent encryption scaremonger Senator Lindsey Graham is working on a bill that could coerce tech companies to stop providing end-to-end encryption by threatening them with massive legal liability, The Eliminating Abusive and Rampant Neglect of Interactive Technologies Act of 2019 (or EARN IT… Read more… Source: https://gizmodo.com/lindsey-graham-is-quietly-preparing-a-mess-of-a-bill-tr-1841394208 Proactive Computing found this […]

Apple reportedly backed off encrypting iCloud data after pressure from the FBI

A new report suggests that Apple previously dropped a large-scale user encryption plan due to pressure from the FBI. The news comes as Apple is mired in a spat with law enforcement over access to iPhones that belonged to the suspect in the December 2019 shooting at a U.S. Naval base in Pensacola, Florida.  According […]

ProtonMail debuts an encrypted calendar app

ProtonMail is known for its encrypted email service, which it offers as a more secure alternative to products like Google’s Gmail. In recent years, the company started by CERN researchers has begun to branch out further, offering encrypted contacts t… Source: https://www.engadget.com/2019/12/31/protonmail-encrypted-calendar/ Proactive Computing found this story and shared it with you. The Article Was […]

Scientists in Scotland help develop world's first encryption system that is 'unbreakable' by hackers

New chip stores data as light which is then scrambled differently every single time information is sent onwards Source: https://www.independent.co.uk/news/uk/home-news/quantum-computing-hackers-unbreakable-encryption-communications-a9256401.html Proactive Computing found this story and shared it with you. The Article Was Written/Published By: Colin Drury