Read: 22/11/2021 www.theregister.com
Security researchers have checked the web's public key infrastructure and have measured a long-known but little-analyzed security threat: hidden root Certificate Authorities. Certificate Authorities, or CAs, vouch for the digital certificates we use to establish trust online.
certificate authorities chain of trust cryptography cybersecurity fake identity fraud identity documents identity theft internet internet infrastructure mistaken identity public key crypto ssl stolen identity threat vectors university research unknown identity vulnerabilities web browsers
Read: 9/11/2021 www.technologyreview.com
The threat comes from quantum computers, which work very differently from the classical computers we use today. Instead of the traditional bits made of 1s and 0s, they use quantum bits that can represent different values at the same time.
cryptography cyberpunk future cybersecurity data archaeology data collection data security data storage data theft encryption end to end encryption future future problems future tech infocalypse patient people post-quantum cryptography quantum computing sad lmao speculative futures us dhs
Read: 25/10/2021 www.vice.com
Bianca Lewis, or as she is known in the hacker world: BiaSciLab, is part of the next generation of hackers. At 14 years old, she has already made a name for herself in hacker conference circles when a few years ago, she was among a group of kids that hacked into an election reporting system.
code cryptography cybersecurity cybersecurity industry girls who hack hackers inclusion interviews representation software software development stem vice.com
Read: 7/8/2021 towardsdatascience.com
A Perceptual image hash (PIH) is a short hexadecimal string (e.g. ‘00081c3c3c181818’ ) based on an image’s appearance. Perceptual image hashes, despite being hashes, are not cryptographically secure hashes.
ai algorithms cryptography cybersecurity hashing algorithms machine learning vulnerabilities
Read: 5/8/2021 www.vice.com
Apple plans to introduce a new feature that would scan messages sent to and by child users of iPhones to determine if the images contain nudity, the company announced on Thursday. The move is a major development in the ongoing debate around privacy and the inspection of communications.
apple child abuse children children and the internet computer vision cryptography csam image processing iphones machine learning message services privacy protecting children surveillance tech companies vice.com