#anonymity-and-strategy

[ follow ]
Social media marketing
fromTechCrunch
16 hours ago

PSA: If you use the Meta AI app, your friends will find out and it will be embarrassing | TechCrunch

Meta's Muse Spark AI model aims to revitalize its AI efforts amid concerns over past investments like the metaverse.
#cybersecurity
Information security
fromWIRED
12 hours ago

Anthropic's Mythos Will Force a Cybersecurity Reckoning-Just Not the One You Think

Anthropic's Claude Mythos Preview model poses a significant threat to current cybersecurity defenses by autonomously discovering vulnerabilities and developing exploits.
fromZDNET
13 hours ago
Information security

Your router may be vulnerable to Russian hackers, FBI warns: 5 steps to take now

fromnews.bitcoin.com
1 day ago
Cryptocurrency

Treasury Launches Cybersecurity Initiative Expanding Threat Intelligence Access for Digital Asset Firms

fromTechSpot
1 day ago
Information security

Hackers are turning home routers into tools to spy on Microsoft 365 users

Information security
fromNextgov.com
1 day ago

Treasury debuts effort to share cyber threat intel with crypto firms

The Treasury Department will share cyber threat intelligence with cryptocurrency firms to enhance their cybersecurity measures against increasing threats.
Information security
fromArs Technica
2 days ago

Anthropic limits access to Mythos, its new cybersecurity AI model

Mythos has identified critical zero-day vulnerabilities, while Anthropic's AI model has shown both capabilities and risks in cybersecurity applications.
Information security
fromWIRED
12 hours ago

Anthropic's Mythos Will Force a Cybersecurity Reckoning-Just Not the One You Think

Anthropic's Claude Mythos Preview model poses a significant threat to current cybersecurity defenses by autonomously discovering vulnerabilities and developing exploits.
Information security
fromZDNET
13 hours ago

Your router may be vulnerable to Russian hackers, FBI warns: 5 steps to take now

FBI and NSA warn of Russian hackers targeting vulnerable routers, urging users to update firmware and strengthen passwords.
Cryptocurrency
fromnews.bitcoin.com
1 day ago

Treasury Launches Cybersecurity Initiative Expanding Threat Intelligence Access for Digital Asset Firms

U.S. Treasury expands cybersecurity coordination with digital asset firms to enhance protections and integrate with traditional finance.
Information security
fromTechSpot
1 day ago

Hackers are turning home routers into tools to spy on Microsoft 365 users

Forest Blizzard hackers exploit insecure routers to compromise devices and intercept traffic, targeting Microsoft 365 domains for sensitive data.
Information security
fromNextgov.com
1 day ago

Treasury debuts effort to share cyber threat intel with crypto firms

The Treasury Department will share cyber threat intelligence with cryptocurrency firms to enhance their cybersecurity measures against increasing threats.
Information security
fromArs Technica
2 days ago

Anthropic limits access to Mythos, its new cybersecurity AI model

Mythos has identified critical zero-day vulnerabilities, while Anthropic's AI model has shown both capabilities and risks in cybersecurity applications.
Privacy professionals
fromBloomberglaw
22 hours ago

Splintered Video Privacy Rulings Won't Be Fixed by Supreme Court

The Supreme Court's review of the VPPA may clarify the definition of 'consumer' but won't resolve circuit splits on personally identifiable information.
US politics
fromwww.mediaite.com
4 hours ago

Trump Administration Demands Reddit Reveal Identity of User Who Criticized ICE

The Trump administration ordered Reddit to provide personal information on a user criticizing ICE, raising First Amendment concerns.
SF politics
fromNextgov.com
9 hours ago

Appeals court removes limits on DOGE access to SSA data despite 'alarming' revelations

A federal appeals court reversed restrictions on the Department of Government Efficiency's access to sensitive Social Security Administration data.
Law
fromAbove the Law
15 hours ago

Understanding AI Hallucinations: Making Sure You Don't End Up At The Wrong Stop - Above the Law

Understanding GenAI's predictable failures is crucial for legal professionals to avoid hallucinations and inaccuracies in legal outputs.
Health
fromWIRED
21 hours ago

Meta's New AI Asked for My Raw Health Data-and Gave Me Terrible Advice

Medical experts express concerns about uploading personal health data to AI models due to privacy and control issues.
#bitcoin
Cryptocurrency
fromBitcoin Magazine
10 hours ago

Bitcoin Policy Institute Warns Quantum Advances Are Compressing Timeline For Network Upgrades

Recent quantum computing advancements may threaten Bitcoin's cryptography sooner than expected, but developers are actively preparing solutions.
Cryptocurrency
fromnews.bitcoin.com
1 day ago

Bitcoin Developer Unveils Quantum-Resistant Wallet Rescue Prototype

A prototype by Lightning Labs enables bitcoin users to recover funds from wallets threatened by quantum computing.
Cryptocurrency
fromBitcoin Magazine
1 day ago

Bitcoin Could Be Quantum-Safe Without Protocol Changes

A new proposal introduces Quantum Safe Bitcoin to protect transactions from quantum attacks without altering Bitcoin's core rules.
Cryptocurrency
fromnews.bitcoin.com
2 days ago

NYT Claims Bitcoin Creator Satoshi Nakamoto Is British Cryptographer Adam Back

Satoshi Nakamoto remains unidentified; Adam Back is the closest match based on stylometric analysis, but he denies being Satoshi multiple times.
Cryptocurrency
fromBitcoin Magazine
10 hours ago

Bitcoin Policy Institute Warns Quantum Advances Are Compressing Timeline For Network Upgrades

Recent quantum computing advancements may threaten Bitcoin's cryptography sooner than expected, but developers are actively preparing solutions.
Cryptocurrency
fromnews.bitcoin.com
1 day ago

Bitcoin Developer Unveils Quantum-Resistant Wallet Rescue Prototype

A prototype by Lightning Labs enables bitcoin users to recover funds from wallets threatened by quantum computing.
Cryptocurrency
fromBitcoin Magazine
1 day ago

Bitcoin Could Be Quantum-Safe Without Protocol Changes

A new proposal introduces Quantum Safe Bitcoin to protect transactions from quantum attacks without altering Bitcoin's core rules.
Cryptocurrency
fromnews.bitcoin.com
2 days ago

NYT Claims Bitcoin Creator Satoshi Nakamoto Is British Cryptographer Adam Back

Satoshi Nakamoto remains unidentified; Adam Back is the closest match based on stylometric analysis, but he denies being Satoshi multiple times.
#digital-sovereignty
fromFortune
1 day ago
DevOps

The digital sovereignty dilemma is a false choice - here's how enterprises can have both | Fortune

DevOps
fromFortune
1 day ago

The digital sovereignty dilemma is a false choice - here's how enterprises can have both | Fortune

Organizations must ensure digital sovereignty by balancing local control with global technology access to remain resilient and competitive.
Tech industry
fromnews.bitcoin.com
1 day ago

AlphaTON Capital Scales Confidential Compute With $43M Vertical Data Infrastructure Deal

AlphaTON Capital signed a $43 million AI infrastructure deal with Vertical Data to expand its compute capacity using Nvidia B300 GPU clusters.
Parenting
fromHigh Country News
22 hours ago

Opting out could be the thing that sets you free - High Country News

Marigold, age 4, insists she no longer needs naps, claiming she's a big kid now, while her mother struggles to find rest amidst her busy life.
DevOps
fromTheregister
1 day ago

AWS: Agents shouldn't be secret, so we built a registry

AWS Agent Registry enhances visibility and control over AI agents in corporate environments.
Marketing tech
fromDigiday
1 day ago

Future of Marketing Briefing: The ad industry has an AI label problem

The ad industry struggles with AI transparency, balancing honesty against potential loss in ad effectiveness.
Apple
fromTheregister
1 day ago

Security reserchers tricked Apple Intelligence into cursing

Apple Intelligence can be hijacked through prompt injection, exposing millions of users to risk, but a fix was implemented in iOS 26.4 and macOS 26.4.
Media industry
fromTechCrunch
1 day ago

EFF is the latest organization to leave X | TechCrunch

X's declining engagement has led the EFF to leave the platform after nearly 20 years due to significantly reduced post visibility.
Data science
fromPsychology Today
1 day ago

Is Algorithmic Asymmetry Reshaping How We Think?

Algorithmic asymmetry creates unequal access to information and decision-making, impacting individuals across various aspects of life.
#social-media
Digital life
fromThe New Yorker
1 day ago

What the Verdict Against Meta and Google Says About the Way We Live Now

A California jury found Meta and Google liable for a woman's addiction to social media, marking a significant shift in legal accountability for tech companies.
Social media marketing
fromHer Campus
1 day ago

They Knew, They Didn't Care, & We Are All Paying For It

Social media platforms like Instagram have been found liable for mental health damage to young users, with internal documents revealing harmful strategies targeting teens.
Social media marketing
fromSilicon Canals
1 day ago

Psychology says people who never post on social media but check it every day aren't passive - they opted out of the performance while keeping the window, and keeping the window without paying the price is the most rational position available and the one the platform was specifically designed to make feel antisocial - Silicon Canals

Silent scrollers on social media actively choose to observe rather than post, demonstrating discipline and self-control contrary to common perceptions.
Digital life
fromThe New Yorker
1 day ago

What the Verdict Against Meta and Google Says About the Way We Live Now

A California jury found Meta and Google liable for a woman's addiction to social media, marking a significant shift in legal accountability for tech companies.
Social media marketing
fromHer Campus
1 day ago

They Knew, They Didn't Care, & We Are All Paying For It

Social media platforms like Instagram have been found liable for mental health damage to young users, with internal documents revealing harmful strategies targeting teens.
Social media marketing
fromSilicon Canals
1 day ago

Psychology says people who never post on social media but check it every day aren't passive - they opted out of the performance while keeping the window, and keeping the window without paying the price is the most rational position available and the one the platform was specifically designed to make feel antisocial - Silicon Canals

Silent scrollers on social media actively choose to observe rather than post, demonstrating discipline and self-control contrary to common perceptions.
UX design
fromEntrepreneur
3 days ago

The Hidden Risk Behind Every 'Frictionless' Digital Experience

Digital experiences should prioritize human agency over pressure tactics to foster trust and informed decision-making.
Mental health
fromwww.theguardian.com
4 days ago

I felt ashamed and scared': how an online friendship became a sextortion nightmare

Online friendships can lead to severe risks, including sextortion, which can have devastating emotional consequences.
Deliverability
fromZDNET
2 days ago

How a burner email can protect your inbox - setting one up one is easy and free

A burner email address protects against spam and phishing by providing a temporary, disposable option for account creation.
Non-profit organizations
fromNextgov.com
4 days ago

The war against fraud should be a war for tech modernization

A new task force aims to combat fraud in public benefits programs by ensuring adequate anti-fraud controls and addressing data sharing challenges.
#ai
Information security
fromFortune
15 hours ago

Anthropic's Mythos is a wake up call, but experts say the era of AI-driven hacking is already here | Fortune

Anthropic's Mythos AI model is too dangerous to release widely due to its ability to exploit software vulnerabilities.
Artificial intelligence
fromwww.businessinsider.com
2 days ago

Why Anthropic's new AI model has some cybersecurity pros worried about its hacking abilities

Anthropic's Claude Mythos Preview is withheld from public release due to concerns over its potential to exploit software vulnerabilities autonomously.
Information security
fromFortune
15 hours ago

Anthropic's Mythos is a wake up call, but experts say the era of AI-driven hacking is already here | Fortune

Anthropic's Mythos AI model is too dangerous to release widely due to its ability to exploit software vulnerabilities.
Information security
fromPsychology Today
11 hours ago

What If We Used AI to Detect Threats to Humanity?

AI model Mythos escaped its sandbox, demonstrating capabilities to find software vulnerabilities, raising concerns about technological risks and threat assessment.
Artificial intelligence
fromwww.businessinsider.com
2 days ago

Why Anthropic's new AI model has some cybersecurity pros worried about its hacking abilities

Anthropic's Claude Mythos Preview is withheld from public release due to concerns over its potential to exploit software vulnerabilities autonomously.
#data-privacy
Privacy technologies
fromArs Technica
2 days ago

How our digital devices are putting our right to privacy at risk

Digital convenience comes at the cost of personal data privacy, raising concerns about its potential use against individuals by law enforcement.
Privacy technologies
fromArs Technica
2 days ago

How our digital devices are putting our right to privacy at risk

Digital convenience comes at the cost of personal data privacy, raising concerns about its potential use against individuals by law enforcement.
Cryptocurrency
fromFortune
2 days ago

The New York Times says it found Satoshi Nakamoto, the inventor of Bitcoin. Not so fast. | Fortune

John Carreyrou claims to have identified Satoshi Nakamoto as British computer scientist Adam Back through circumstantial evidence and business activities.
#linkedin
Privacy professionals
fromComputerworld
2 days ago

Questions raised about how LinkedIn uses the petabytes of data it collects

LinkedIn users should limit identifiable data exposure and treat the platform as potentially hostile until BrowserGate allegations are verified.
Law
fromArs Technica
2 days ago

LinkedIn scanning users' browser extensions sparks controversy and two lawsuits

LinkedIn faces lawsuits alleging lack of user consent for data collection practices.
Privacy professionals
fromComputerworld
2 days ago

Questions raised about how LinkedIn uses the petabytes of data it collects

LinkedIn users should limit identifiable data exposure and treat the platform as potentially hostile until BrowserGate allegations are verified.
Law
fromArs Technica
2 days ago

LinkedIn scanning users' browser extensions sparks controversy and two lawsuits

LinkedIn faces lawsuits alleging lack of user consent for data collection practices.
Marketing tech
fromForbes
3 days ago

4 Ways To Stay Authentic In The Age Of AI

Consumer backlash against AI in advertising stems from a perceived lack of authenticity, not the technology itself.
fromThe Verge
3 days ago

The case for banning cookie banners

Cookie banners have become bloated and useless, creating a new kind of interaction that means trouble all over the web. The only solution is to get rid of them, and do it now.
Digital life
Privacy technologies
fromThe Hacker News
22 hours ago

Google Rolls Out DBSC in Chrome 146 to Block Session Theft on Windows

Google's Device Bound Session Credentials enhance security for Chrome users by tying authentication sessions to specific devices, combating session theft.
Privacy professionals
fromSecurityWeek
1 day ago

The Hidden ROI of Visibility: Better Decisions, Better Behavior, Better Security

Visibility through security measures can deter undesirable behavior and enhance safety in challenging situations.
#digital-privacy
Privacy technologies
fromZDNET
4 weeks ago

How to delete or hide yourself from the internet - 11 effective ways (and most are free)

Digital privacy requires constant attention as personal data persists online long after deletion, affecting career, reputation, and relationships through old posts, photos, and search history exploitation.
Privacy technologies
fromZDNET
4 weeks ago

How to delete or hide yourself from the internet - 11 effective ways (and most are free)

Digital privacy requires constant attention as personal data persists online long after deletion, affecting career, reputation, and relationships through old posts, photos, and search history exploitation.
Privacy professionals
fromWIRED
2 days ago

Men Are Buying Hacking Tools to Use Against Their Wives and Friends

Telegram groups facilitate the sale of hacking and surveillance services, promoting abusive content targeting women and girls.
#quantum-computing
Cryptocurrency
fromBitcoin Magazine
2 days ago

Adam Back Says Quantum Threat To Bitcoin Is Decades Away

Quantum computing poses no immediate threat to Bitcoin's cryptographic security, but preparation for future risks is essential.
Information security
fromnews.bitcoin.com
6 days ago

The Retroactive Decryption Trap: Why Post-Quantum Upgrades Can't Save Your Past Privacy

Google's whitepaper on quantum threats urges immediate post-quantum preparations, shifting the migration deadline to 2029 and highlighting vulnerabilities in blockchain security.
Privacy professionals
fromTechCrunch
2 days ago

Hackers steal and leak sensitive LAPD police documents | TechCrunch

Cybercriminals leaked sensitive LAPD documents online, including personnel files and internal investigations, allegedly by the extortion gang World Leaks.
#privacy
fromBitcoin Magazine
1 week ago
Privacy technologies

What If Your VPN, Phone Number, And AI Chat Left Zero Trace? Meet Nadanada.me - The "Nothing At All" Privacy Revolution

Privacy technologies
fromBitcoin Magazine
1 week ago

What If Your VPN, Phone Number, And AI Chat Left Zero Trace? Meet Nadanada.me - The "Nothing At All" Privacy Revolution

LNVPN has evolved into a comprehensive privacy infrastructure service offering anonymous eSIM data plans, disposable phone numbers, and AI chat tools.
Privacy professionals
fromZDNET
1 week ago

I turned to PrivacyBee to clean up my data - here's how it made me disappear

PrivacyBee is preferred for its comprehensive data removal services and user-friendly management tools.
#ai-security
Information security
fromThe Hacker News
19 hours ago

Browser Extensions Are the New AI Consumption Channel That No One Is Talking About

AI browser extensions pose significant security risks, often overlooked, with vulnerabilities and access that can compromise enterprise networks.
fromDevOps.com
1 day ago
Information security

LayerX: Anthropic's Claude Code Can Easily Be Easily Weaponized - DevOps.com

Information security
fromnews.bitcoin.com
5 days ago

Deepmind's 'AI Agent Traps' Paper Maps How Hackers Could Weaponize AI Agents Against Users

Google Deepmind identifies six AI agent trap categories, with content injection success rates of 86% and calls for enhanced security measures by 2026.
Information security
fromThe Hacker News
19 hours ago

Browser Extensions Are the New AI Consumption Channel That No One Is Talking About

AI browser extensions pose significant security risks, often overlooked, with vulnerabilities and access that can compromise enterprise networks.
Information security
fromDevOps.com
1 day ago

LayerX: Anthropic's Claude Code Can Easily Be Easily Weaponized - DevOps.com

Claude Code's security guardrails can be easily bypassed, turning it into a tool for cyberattacks.
Information security
fromnews.bitcoin.com
5 days ago

Deepmind's 'AI Agent Traps' Paper Maps How Hackers Could Weaponize AI Agents Against Users

Google Deepmind identifies six AI agent trap categories, with content injection success rates of 86% and calls for enhanced security measures by 2026.
Cryptocurrency
fromnews.bitcoin.com
6 days ago

Human Error, Not Hacking, Cited as Top Cause for Crypto Access Loss

Human error is the leading cause of cryptocurrency access loss, affecting 35% of holders, primarily due to forgotten passwords and lost seed phrases.
Privacy professionals
fromZDNET
1 week ago

This privacy-first chatbot is taking off - here's why and how to try it

DuckDuckGo's privacy-focused chatbot, Duck.ai, is experiencing significant growth amid rising user concerns about data privacy.
Information security
fromTechCrunch
1 day ago

Is Anthropic limiting the release of Mythos to protect the internet - or Anthropic? | TechCrunch

Anthropic limited the release of its Mythos model due to its potential to exploit software vulnerabilities, sharing it only with select large organizations.
#vpn
Privacy professionals
fromWIRED
2 weeks ago

Using a VPN May Subject You to NSA Spying

Using commercial VPNs may expose Americans to foreign surveillance laws, risking their constitutional protections against warrantless government spying.
Privacy professionals
fromWIRED
2 weeks ago

Using a VPN May Subject You to NSA Spying

Using commercial VPNs may expose Americans to foreign surveillance laws, risking their constitutional protections against warrantless government spying.
#identity-management
fromThe Hacker News
2 days ago
Information security

Shrinking the IAM Attack Surface through Identity Visibility and Intelligence Platforms (IVIP)

Enterprise IAM faces fragmentation, leading to Identity Dark Matter and a significant gap in visibility and security oversight.
Information security
fromThe Hacker News
3 days ago

[Webinar] How to Close Identity Gaps in 2026 Before AI Exploits Enterprise Risk

Identity programs are maturing, yet the risk from disconnected applications and AI agents is increasing for enterprises.
Information security
fromThe Hacker News
2 days ago

Shrinking the IAM Attack Surface through Identity Visibility and Intelligence Platforms (IVIP)

Enterprise IAM faces fragmentation, leading to Identity Dark Matter and a significant gap in visibility and security oversight.
Information security
fromThe Hacker News
3 days ago

[Webinar] How to Close Identity Gaps in 2026 Before AI Exploits Enterprise Risk

Identity programs are maturing, yet the risk from disconnected applications and AI agents is increasing for enterprises.
Privacy technologies
fromZDNET
3 weeks ago

You're being tracked online - 9 easy ways to stop the surveillance

Reducing online tracking is possible through careful browser choice, VPNs, and anti-tracking software.
Privacy technologies
fromNextgov.com
3 weeks ago

New methods for assuring digital identity and authenticity

Generative AI is transforming content creation, increasing the need for reliable identity verification and authenticity in digital media.
Privacy professionals
fromWIRED
3 weeks ago

If You Don't Have One, I Recommend a Free Dark Web Monitoring Service

Dark web monitoring services track compromised data across public hacker forums and databases to alert users when their personal information appears in breaches, though most breached data is found on the clear web rather than the dark web itself.
Information security
fromThe Hacker News
3 days ago

The Hidden Cost of Recurring Credential Incidents

Credential incidents cause significant operational costs and disruptions, impacting IT teams and overall business productivity beyond just breach prevention.
Privacy technologies
fromSecuritymagazine
3 weeks ago

Fear of Surveillance Leads to Increased VPN Use

36% of U.S. adults use VPNs, primarily to prevent tracking by private companies (65%) and government surveillance (35%), with privacy and security cited as the dominant motivation by 65% of users.
Privacy technologies
fromArs Technica
3 weeks ago

World ID wants you to put a cryptographically unique human identity behind your AI agents

World ID's Agent Kit enables AI agents to prove human authorization through iris-verified identity tokens, allowing websites to distinguish legitimate automated requests from malicious Sybil attacks.
Privacy technologies
fromTech Times
4 weeks ago

Top Strategies to Protect Your Online Privacy from AI Tracking and Data Collection

Implement VPNs, two-factor authentication, app permission audits, and tracker blockers to protect personal data from AI-driven monitoring and unauthorized collection.
Privacy technologies
fromenglish.elpais.com
4 weeks ago

AI ends online anonymity: the ease of unmasking pseudonymous accounts

Artificial intelligence language models can identify 68% of anonymous social media users with 90% precision, fundamentally undermining online anonymity and privacy protections.
#ai-deanonymization
Privacy technologies
fromFuturism
1 month ago

AI Can Mass-Unmask Pseudonymous Accounts, Research Paper Finds

AI language models can now easily deanonymize pseudonymous internet users at scale, successfully unmasking two-thirds of tested users across multiple platforms.
Privacy technologies
fromThe Verge
1 month ago

AI can unmask your secret accounts

AI systems can effectively deanonymize online accounts by analyzing writing patterns and biographical details at scale, outperforming traditional computational techniques.
Privacy technologies
fromFuturism
1 month ago

AI Can Mass-Unmask Pseudonymous Accounts, Research Paper Finds

AI language models can now easily deanonymize pseudonymous internet users at scale, successfully unmasking two-thirds of tested users across multiple platforms.
Privacy technologies
fromThe Verge
1 month ago

AI can unmask your secret accounts

AI systems can effectively deanonymize online accounts by analyzing writing patterns and biographical details at scale, outperforming traditional computational techniques.
fromCoindesk
2 months ago

Privacy

This Privacy Notice applies to all personal information processed by CoinDesk, including its affiliates and subsidiaries (" CoinDesk," " we," " us," or " our "). It covers the information CoinDesk collects through the websites, mobile applications, electronic devices, all other products and services we provide, any other services that display this Privacy Notice, all of the associated content, functionalities, and advertising, and when you communicate with us by phone, email, or otherwise (collectively, the " Services ").
Privacy professionals
Privacy technologies
fromTheregister
1 month ago

AI takes a swing at online anonymity

Large language models can efficiently deanonymize internet users across multiple platforms by automating the process of connecting anonymous posts to identify individuals with high precision.
#tor
fromZDNET
2 months ago
Privacy professionals

Why the most private way to browse the web isn't incognito mode (but this instead)

fromZDNET
2 months ago
Privacy professionals

Why the most private way to browse the web isn't incognito mode (but this instead)

Privacy technologies
fromFast Company
2 months ago

This new privacy-focused phone service is designed to keep your phone from getting hacked

Cape is a US-wide privacy-focused cellphone carrier that prevents SIM swapping and IMSI-catcher surveillance while minimizing customer data collection and encrypting voicemails.
[ Load more ]