#mirror-registries

[ follow ]
Information security
fromBusiness Matters
2 days ago

Why Trust and Verification Are Critical for Modern Online Platform Businesses

Trust is essential yet fragile in the digital economy, with platforms facing increasing challenges from sophisticated online scams.
#cryptocurrency
Cryptocurrency
fromnews.bitcoin.com
11 hours ago

Bitcoin Rebounds, But Crypto's Security Crisis Intensifies Week in Review

Bitcoin and major cryptocurrencies rose, indicating risk appetite despite ongoing geopolitical and economic uncertainties.
fromnews.bitcoin.com
2 weeks ago
Cryptocurrency

Human Error, Not Hacking, Cited as Top Cause for Crypto Access Loss

Human error is the leading cause of cryptocurrency access loss, affecting 35% of holders, primarily due to forgotten passwords and lost seed phrases.
Cryptocurrency
fromnews.bitcoin.com
11 hours ago

Bitcoin Rebounds, But Crypto's Security Crisis Intensifies Week in Review

Bitcoin and major cryptocurrencies rose, indicating risk appetite despite ongoing geopolitical and economic uncertainties.
Cryptocurrency
fromnews.bitcoin.com
2 weeks ago

Human Error, Not Hacking, Cited as Top Cause for Crypto Access Loss

Human error is the leading cause of cryptocurrency access loss, affecting 35% of holders, primarily due to forgotten passwords and lost seed phrases.
fromwww.housingwire.com
2 days ago

Disconnected systems fueling title, wire fraud risks

Disconnected systems, inconsistent definitions of data, and the manual nature of data movement create ongoing challenges in the title industry, according to FundingShield President Adam Chaudhary.
Real estate
EU data protection
fromwww.independent.co.uk
2 days ago

What are EU digital identity wallets? The benefits and risks explained

The Independent provides accessible journalism on critical issues like reproductive rights and digital identity, emphasizing the importance of on-the-ground reporting.
#digital-identity
Privacy technologies
fromComputerworld
1 day ago

World ID expands its 'proof of human' vision for the AI era

World ID aims to enhance digital identity security through innovative technology and tools, but concerns about safety persist.
Privacy technologies
fromComputerworld
1 day ago

World ID expands its 'proof of human' vision for the AI era

World ID aims to enhance digital identity security through innovative technology and tools, but concerns about safety persist.
Wearables
fromEngadget
2 days ago

Sam Altman's 'human verification' company thinks its eye-scanning orbs could solve ticket scalping

Concert Kit uses World ID to help artists combat ticket scalping by verifying real human buyers.
NYC startup
fromTechCrunch
1 day ago

Sam Altman's project World looks to scale its human verification empire. First stop: Tinder. | TechCrunch

World project integrates verification tech into various sectors, starting with dating apps, to distinguish human users from AI.
Artificial intelligence
fromTechRepublic
2 days ago

AI Upgrades, Security Breaches, and Industry Shifts Define This Week in Tech - TechRepublic

AI innovation and security threats are reshaping technology and corporate strategies across various platforms and applications.
fromNature
5 days ago

Researchers: here's how to audit your fragmented digital identity

A search for 'Guo Wei' in ORCID returned 616 profiles, none affiliated with the Jiangsu University of Science and Technology, highlighting the difficulty in verifying academic identities.
Higher education
#identity-verification
Privacy professionals
fromEngadget
3 days ago

Anthropic will ask Claude users to verify their identities 'for a few use cases'

Anthropic is implementing identity verification for certain capabilities on Claude, requiring users to provide a government-issued ID and a selfie.
Privacy technologies
fromFast Company
1 month ago

This crypto ring certifies your digital self with real-life handshakes

Quartz is a speculative ring concept using biometric verification and physical handshakes to authenticate identity and prevent AI-driven spoofing scams targeting older adults.
Privacy professionals
fromEngadget
3 days ago

Anthropic will ask Claude users to verify their identities 'for a few use cases'

Anthropic is implementing identity verification for certain capabilities on Claude, requiring users to provide a government-issued ID and a selfie.
Privacy technologies
fromFast Company
1 month ago

This crypto ring certifies your digital self with real-life handshakes

Quartz is a speculative ring concept using biometric verification and physical handshakes to authenticate identity and prevent AI-driven spoofing scams targeting older adults.
fromBitcoin Magazine
5 days ago

Relics Of A Revolution, Part III: The Suit, The Songs, The System

Afroman's response to the botched raid was not just a legal victory; it was protest art in the modern age—raw, low-budget, absurdist, and deeply American.
Social justice
Digital life
fromwww.dw.com
5 days ago

Dangerous Apps In the Web of Data Brokers

Smartphone apps collect detailed location data, often shared with data brokers, posing security risks to users, including soldiers and government officials.
Europe politics
fromTheregister
6 days ago

Digital sovereignty isn't just a buzzword - it's the future

European governments and companies are prioritizing digital sovereignty due to concerns over US control and dependency.
Cryptocurrency
fromnews.bitcoin.com
15 hours ago

This Week in Crypto Law (Apr. 12, 2026)

This week in crypto law showed a shift from experimentation to integration with federal authority reinforced and traditional finance deepening digital asset involvement.
EU data protection
fromnews.bitcoin.com
2 days ago

MiCA Decoded: Your Crypto White Paper Can't Just Be a Gitbook or PDF

A MiCA white paper is a formal regulatory document, not a marketing tool, with strict compliance requirements for crypto-assets in the EU.
#data-privacy
Privacy professionals
fromZDNET
4 days ago

A data removal service helped me reclaim my privacy - see if you need one, too

Personal data is collected and sold by brokers, making removal services essential for protecting sensitive information.
Privacy professionals
fromZDNET
4 days ago

A data removal service helped me reclaim my privacy - see if you need one, too

Personal data is collected and sold by brokers, making removal services essential for protecting sensitive information.
#iam
Information security
fromComputerworld
4 days ago

Curity looks to reinvent IAM with runtime authorization for AI agents

Traditional IAM tools are inadequate for managing agent access, which is ephemeral and complex, requiring a new approach to runtime enforcement.
Information security
fromInfoWorld
4 days ago

Curity looks to reinvent IAM with runtime authorization for AI agents

Traditional IAM tools are inadequate for managing agent access, which is ephemeral and complex, requiring a new approach to runtime enforcement.
Information security
fromComputerworld
4 days ago

Curity looks to reinvent IAM with runtime authorization for AI agents

Traditional IAM tools are inadequate for managing agent access, which is ephemeral and complex, requiring a new approach to runtime enforcement.
Information security
fromInfoWorld
4 days ago

Curity looks to reinvent IAM with runtime authorization for AI agents

Traditional IAM tools are inadequate for managing agent access, which is ephemeral and complex, requiring a new approach to runtime enforcement.
#artificial-intelligence
Cryptocurrency
fromnews.bitcoin.com
1 day ago

Circle Launches USDC Bridge for Native Cross-Chain Transfers Across EVM Networks

Circle launched the USDC Bridge, enabling direct cross-chain USDC transfers without third-party involvement.
Deliverability
fromnews.bitcoin.com
2 weeks ago

Dmail Network to Cease Operations Following Five Years of Service

Dmail Network will permanently shut down its services on May 15, 2026, due to unsustainable infrastructure costs and a failed economic model.
#age-verification
EU data protection
fromWIRED
3 days ago

Europe's Online Age Verification App Is Here

The European online age verification app ensures anonymous age verification using ID cards or passports, protecting children from harmful content.
Privacy technologies
fromThe Verge
3 days ago

Age verification is a mess but we're doing it anyway

Age verification methods on the internet are flawed, leading to challenges in effectively preventing underage access to inappropriate content.
fromAbove the Law
2 days ago
Privacy technologies

438 Experts Said Age Verification Is Dangerous. Legislators Are Moving Forward With It Anyway. - Above the Law

Age verification mandates for the internet are technically flawed, threaten privacy, and may cause more harm than good, according to 438 researchers from 32 countries.
fromTNW | Government-Policy
4 days ago
Privacy technologies

The EU says its age verification app is ready

The European Commission's age verification app uses zero-knowledge proof technology to confirm user age without exposing personal data.
EU data protection
fromWIRED
3 days ago

Europe's Online Age Verification App Is Here

The European online age verification app ensures anonymous age verification using ID cards or passports, protecting children from harmful content.
Privacy technologies
fromThe Verge
3 days ago

Age verification is a mess but we're doing it anyway

Age verification methods on the internet are flawed, leading to challenges in effectively preventing underage access to inappropriate content.
Privacy technologies
fromAbove the Law
2 days ago

438 Experts Said Age Verification Is Dangerous. Legislators Are Moving Forward With It Anyway. - Above the Law

Age verification mandates for the internet are technically flawed, threaten privacy, and may cause more harm than good, according to 438 researchers from 32 countries.
#privacy
Privacy technologies
fromComputerWeekly.com
2 days ago

Privacy, power, and encryption: why end-to-end security matters | Computer Weekly

Privacy is a fundamental human condition, and end-to-end encryption is essential for protecting communications in a surveillance-heavy world.
Cryptocurrency
fromnews.bitcoin.com
1 day ago

Less Than 1% of Crypto Projects Disclose Market Maker Deals

91% of crypto protocols generate revenue, but less than 1% disclose market maker deals, highlighting transparency issues and risks for investors.
#ai-governance
fromComputerWeekly.com
2 weeks ago
EU data protection

AI-driven identity must exist in a robust compliance framework | Computer Weekly

Governance must precede AI adoption to avoid compliance failures and ethical risks in identity verification systems.
#bitcoin
Cryptocurrency
fromBitcoin Magazine
2 days ago

When Quantum Computers Come For Your Bitcoin: What Classical Property Law Says Happens Next

Bitcoin's future is challenged by quantum computing, raising questions about ownership and legality of coins accessed through quantum-derived keys.
Cryptocurrency
fromBitcoin Magazine
2 days ago

When Quantum Computers Come For Your Bitcoin: What Classical Property Law Says Happens Next

Bitcoin's future is challenged by quantum computing, raising questions about ownership and legality of coins accessed through quantum-derived keys.
Cryptocurrency
fromnews.bitcoin.com
4 days ago

Bitcoin Developers Propose Freezing Coins That Skip Quantum-Safe Migration Under BIP-361

BIP-361 proposes a five-year timeline for Bitcoin holders to migrate funds from legacy addresses to avoid permanent freezing due to quantum threats.
Cryptocurrency
fromBitcoin Magazine
4 days ago

Bitcoin Developers Propose Bitcoin Quantum Migration Plan That Would Freeze Legacy Coins

Bitcoin developers are addressing quantum computing risks with BIP-361, proposing a shift to quantum-resistant cryptography to protect the network.
Cryptocurrency
fromnews.bitcoin.com
1 week ago

Bitcoin Developer Unveils Quantum-Resistant Wallet Rescue Prototype

A prototype by Lightning Labs enables bitcoin users to recover funds from wallets threatened by quantum computing.
#generative-ai
Privacy technologies
fromNextgov.com
4 weeks ago

New methods for assuring digital identity and authenticity

Generative AI is transforming content creation, increasing the need for reliable identity verification and authenticity in digital media.
Digital life
fromBig Think
2 weeks ago

3 ways to prove you're human online

Generative AI is rapidly increasing information production, leading to a potential scarcity of human-generated content and a need for new human verification methods.
Privacy technologies
fromNextgov.com
4 weeks ago

New methods for assuring digital identity and authenticity

Generative AI is transforming content creation, increasing the need for reliable identity verification and authenticity in digital media.
Cryptocurrency
fromnews.bitcoin.com
1 day ago

Chainalysis Details 'Shadow Crypto Economy' Exposure as Grinex Suspends Operations

Grinex's shutdown reveals crypto laundering tactics that evade typical enforcement actions, raising concerns about illicit fund movements.
#ai
fromTechzine Global
6 days ago
Information security

Runtime security becomes critical as AI accelerates threats

Artificial intelligence accelerates innovation and cyber threats, necessitating a focus on runtime security for effective enterprise protection.
Privacy technologies
fromComputerWeekly.com
2 weeks ago

Identity and AI: Questions of data security, trust and control | Computer Weekly

AI-driven identity solutions improve access control but raise compliance, privacy, and ethical concerns that organizations must address.
Information security
fromTechzine Global
6 days ago

Runtime security becomes critical as AI accelerates threats

Artificial intelligence accelerates innovation and cyber threats, necessitating a focus on runtime security for effective enterprise protection.
Privacy technologies
fromComputerWeekly.com
2 weeks ago

Identity and AI: Questions of data security, trust and control | Computer Weekly

AI-driven identity solutions improve access control but raise compliance, privacy, and ethical concerns that organizations must address.
#data-breach
Privacy professionals
fromSilicon Canals
2 weeks ago

Fintech apps demand your passport for verification - then leave it on an unprotected server - Silicon Canals

Duc's exposed server revealed unprotected sensitive personal data, highlighting significant gaps in fintech data protection practices.
Privacy professionals
fromEngadget
1 month ago

Social Security watchdog investigating claims that DOGE engineer copied its databases

A former software engineer associated with Elon Musk's Department of Government Efficiency is under investigation for allegedly possessing and attempting to transfer sensitive Social Security Administration databases containing personal information on over 500 million Americans.
Privacy professionals
fromSilicon Canals
2 weeks ago

Fintech apps demand your passport for verification - then leave it on an unprotected server - Silicon Canals

Duc's exposed server revealed unprotected sensitive personal data, highlighting significant gaps in fintech data protection practices.
Privacy professionals
fromEngadget
1 month ago

Social Security watchdog investigating claims that DOGE engineer copied its databases

A former software engineer associated with Elon Musk's Department of Government Efficiency is under investigation for allegedly possessing and attempting to transfer sensitive Social Security Administration databases containing personal information on over 500 million Americans.
Privacy technologies
fromnews.bitcoin.com
2 days ago

Anthropic Adds ID Verification to Claude for Select AI Users

Anthropic implemented ID checks for Claude users in April 2026 to limit abuse and meet legal obligations, while not storing ID images on its systems.
Cryptocurrency
fromnews.bitcoin.com
2 days ago

TRON Integrates deBridge MCP, Unlocking Seamless Cross-Chain Execution for AI Agents

TRON DAO integrates deBridge's Model Context Protocol for seamless cross-chain execution, enhancing developer access to liquidity and transaction management across multiple blockchains.
#tinder
Privacy technologies
fromwww.bbc.com
2 days ago

Tinder and Zoom offer 'proof of humanity' eye-scans to combat AI

Tinder will implement eye-scanning technology to verify users as human, addressing concerns over AI-generated fake profiles.
Privacy technologies
fromwww.bbc.com
2 days ago

Tinder and Zoom offer 'proof of humanity' eye-scans to combat AI

Tinder will implement eye-scanning technology to verify users as human, addressing concerns over AI-generated fake profiles.
Information security
fromnews.bitcoin.com
1 week ago

Web3 Security Provider Certik Opens AI Auditing Tool Access to Global Developers

Certik launched its AI Auditor, achieving an 88.6% hit rate against security incidents, enhancing proactive defense in Web3.
Cryptocurrency
fromnews.bitcoin.com
4 days ago

Atlas Goes Live on Rootstock With Support for BTC, ETH, USDC, and More

Rootstocklabs launched Atlas, a user-friendly interface for bridging Bitcoin and assets into the Rootstock network.
#identity-management
fromThe Hacker News
1 week ago
Information security

Shrinking the IAM Attack Surface through Identity Visibility and Intelligence Platforms (IVIP)

Enterprise IAM faces fragmentation, leading to Identity Dark Matter and a significant gap in visibility and security oversight.
Information security
fromThe Hacker News
1 week ago

[Webinar] How to Close Identity Gaps in 2026 Before AI Exploits Enterprise Risk

Identity programs are maturing, yet the risk from disconnected applications and AI agents is increasing for enterprises.
Information security
fromThe Hacker News
1 week ago

Shrinking the IAM Attack Surface through Identity Visibility and Intelligence Platforms (IVIP)

Enterprise IAM faces fragmentation, leading to Identity Dark Matter and a significant gap in visibility and security oversight.
Information security
fromThe Hacker News
1 week ago

[Webinar] How to Close Identity Gaps in 2026 Before AI Exploits Enterprise Risk

Identity programs are maturing, yet the risk from disconnected applications and AI agents is increasing for enterprises.
Privacy professionals
fromSecurityWeek
3 weeks ago

Tycoon 2FA Fully Operational Despite Law Enforcement Takedown

Tycoon 2FA continues to operate despite international takedown efforts, facilitating phishing attacks and compromising accounts without alerts.
Information security
fromThe Hacker News
1 week ago

The Hidden Cost of Recurring Credential Incidents

Credential incidents cause significant operational costs and disruptions, impacting IT teams and overall business productivity beyond just breach prevention.
#crypto
Cryptocurrency
fromnews.bitcoin.com
5 days ago

Tether Launches Consumer Wallet App With Human-Readable Addresses and No Gas Tokens

Tether launched tether.wallet, a self-custodial digital wallet, on April 14, 2026, for 570 million users to access USDT, XAUT, and bitcoin.
Cryptocurrency
fromnews.bitcoin.com
6 days ago

New SEC Guidance Targets DeFi Interfaces, Self-Custodial Wallets, and Execution Routing Disclosures

Crypto trading interface operators can avoid broker-dealer registration if they meet 12 specific conditions outlined by the SEC.
#ai-agents
Information security
fromnews.bitcoin.com
2 weeks ago

Chainalysis Deploys AI Agents to Counter Criminal Use of Artificial Intelligence in Crypto

Chainalysis introduces AI agents to enhance fraud detection and compliance without requiring deep technical expertise, ensuring data quality and human oversight.
Cryptocurrency
fromnews.bitcoin.com
3 weeks ago

Trust Wallet Adds AI Transaction Layer to Self-Custody Wallet Infrastructure

Trust Wallet's Agent Kit allows developers to create AI agents for automated crypto transactions with user-defined permissions.
Information security
fromnews.bitcoin.com
2 weeks ago

Chainalysis Deploys AI Agents to Counter Criminal Use of Artificial Intelligence in Crypto

Chainalysis introduces AI agents to enhance fraud detection and compliance without requiring deep technical expertise, ensuring data quality and human oversight.
Cryptocurrency
fromnews.bitcoin.com
3 weeks ago

Trust Wallet Adds AI Transaction Layer to Self-Custody Wallet Infrastructure

Trust Wallet's Agent Kit allows developers to create AI agents for automated crypto transactions with user-defined permissions.
Privacy professionals
fromTheregister
1 month ago

Age verification isn't sage verification inside OSes

California's Digital Age Assurance Act attempts age verification for minors but is vague, incoherent, and creates liability risks without clearly defining compliance requirements or addressing practical implementation across diverse computing devices.
Cryptocurrency
from24/7 Wall St.
1 week ago

Is Ripple (XRP) Quantum-Safe? A Top XRPL Validator Just Published a Full Audit

Quantum computing poses a significant risk to cryptocurrency encryption, with Bitcoin being more vulnerable than XRP.
Artificial intelligence
fromTheregister
1 month ago

World pitch: scan eyeballs to tie identity to AI agents

World is launching AgentKit, a technology linking AI agents to verified human identities through iris-scanning orbs to prevent AI abuse and establish trust in agentic systems.
Cryptocurrency
fromnews.bitcoin.com
1 week ago

Circle Announces Quantum-Resistant Roadmap to Secure Future Digital Asset Infrastructure

Circle's Arc platform will launch with post-quantum signature support to secure institutional assets against quantum threats.
#blockchain
Cryptocurrency
fromnews.bitcoin.com
1 week ago

Bitgo CEO Proposes Using a Public Blockchain as the Ultimate Solution for Government Fraud

Mike Belshe proposes using a public blockchain to combat state and federal fraud, potentially addressing losses of up to $521 billion annually.
Cryptocurrency
fromnews.bitcoin.com
2 weeks ago

REAL and Redstone Collaborate to Enhance Data Integrity for Tokenized Assets

REAL partners with Redstone to enhance data transparency and risk intelligence in its ecosystem for tokenized assets.
Cryptocurrency
fromTNW | Blockchain
2 weeks ago

Multi-Hop Transactions in Crypto. The Compliance Risk Behind Indirect Exposure

Public blockchains present compliance challenges due to multi-hop transactions, complicating the tracking of funds and enforcement of regulations.
Cryptocurrency
fromnews.bitcoin.com
1 week ago

Bitgo CEO Proposes Using a Public Blockchain as the Ultimate Solution for Government Fraud

Mike Belshe proposes using a public blockchain to combat state and federal fraud, potentially addressing losses of up to $521 billion annually.
Cryptocurrency
fromnews.bitcoin.com
2 weeks ago

REAL and Redstone Collaborate to Enhance Data Integrity for Tokenized Assets

REAL partners with Redstone to enhance data transparency and risk intelligence in its ecosystem for tokenized assets.
Cryptocurrency
fromTNW | Blockchain
2 weeks ago

Multi-Hop Transactions in Crypto. The Compliance Risk Behind Indirect Exposure

Public blockchains present compliance challenges due to multi-hop transactions, complicating the tracking of funds and enforcement of regulations.
#agentic-commerce
Privacy technologies
fromArs Technica
1 month ago

World ID wants you to put a cryptographically unique human identity behind your AI agents

World ID's Agent Kit enables AI agents to prove human authorization through iris-verified identity tokens, allowing websites to distinguish legitimate automated requests from malicious Sybil attacks.
Cryptocurrency
fromBitcoin Magazine
3 weeks ago

Trust Wallet Launches Agent Kit That Lets AI Execute Crypto Transactions

Trust Wallet launched the Agent Kit, enabling AI agents to execute crypto transactions while keeping users in control.
Privacy technologies
fromArs Technica
1 month ago

After Discord fiasco, age-check tech promises privacy by running locally. Does it work?

Age-verification systems using on-device face scans and cross-platform age keys reduce privacy risks, but widespread distrust of vendors and past data breaches undermine user confidence in these technologies.
Cryptocurrency
fromBitcoin Magazine
3 weeks ago

The Core Issue: Beneath The Binary, Verifying Trust

Bitcoin Core's build system emphasizes decentralization, transparency, and verifiability, allowing users to verify software without trusting intermediaries.
#discord
Information security
fromCointelegraph
1 month ago

Why Address Poisoning Works Without Stealing Private Keys

Address poisoning steals funds by manipulating transaction history and exploiting users copying lookalike addresses, not by stealing private keys.
fromSilicon Canals
1 month ago

The global infrastructure of digital ID is being built right now - and nobody voted for it - Silicon Canals

What I walked through wasn't just an immigration gate. It was a node in a rapidly expanding global infrastructure of digital identity, one being constructed at extraordinary speed, across dozens of countries, by a mix of governments, multilateral organizations, and private technology vendors. The people building it believe they are solving real problems: fraud, statelessness, inefficient public services, financial exclusion.
Privacy technologies
Privacy technologies
fromPCMAG
7 years ago

Why Google Is Embracing Blockchain

Google's exploration of blockchain could enable greater user control of data and help address privacy scandals while evolving its cloud-dominated business model.
[ Load more ]