#peer-to-peer-messaging

[ follow ]
#data-privacy
Privacy professionals
fromZDNET
5 hours ago

I tried to wipe my digital footprint without paying for a data removal service - 5 free ways

Most sensitive information online is legally collected and aggregated by brokers, but removal is possible with effort and available tools.
EU data protection
fromThedrum
2 hours ago

The future of data, privacy and ethics

Misleading practices in e-commerce, such as false stock availability, are regulated by the European Commission to protect consumers.
fromZDNET
5 days ago
Privacy professionals

A data removal service helped me reclaim my privacy - see if you need one, too

Personal data is collected and sold by brokers, making removal services essential for protecting sensitive information.
fromenglish.elpais.com
3 weeks ago
Privacy professionals

This is how the illegal market for buying and selling personal data on Telegram works

Illicit data markets on Telegram in Latin America expose personal data, contributing to gender-based violence and highlighting vulnerabilities in government data management.
Privacy professionals
fromZDNET
5 hours ago

I tried to wipe my digital footprint without paying for a data removal service - 5 free ways

Most sensitive information online is legally collected and aggregated by brokers, but removal is possible with effort and available tools.
EU data protection
fromThedrum
2 hours ago

The future of data, privacy and ethics

Misleading practices in e-commerce, such as false stock availability, are regulated by the European Commission to protect consumers.
Privacy professionals
fromZDNET
5 days ago

A data removal service helped me reclaim my privacy - see if you need one, too

Personal data is collected and sold by brokers, making removal services essential for protecting sensitive information.
Privacy professionals
fromenglish.elpais.com
3 weeks ago

This is how the illegal market for buying and selling personal data on Telegram works

Illicit data markets on Telegram in Latin America expose personal data, contributing to gender-based violence and highlighting vulnerabilities in government data management.
#digital-economy
Cryptocurrency
fromForbes
18 hours ago

Can Crypto Finally Solve The "Paying For The Internet" Problem?

The traditional ad-based model is being challenged as creators and users seek fairer value distribution in digital platforms.
Information security
fromBusiness Matters
3 days ago

Why Trust and Verification Are Critical for Modern Online Platform Businesses

Trust is essential yet fragile in the digital economy, with platforms facing increasing challenges from sophisticated online scams.
#ai
fromNature
19 hours ago
Artificial intelligence

No humans allowed: scientific AI agents get their own social network

Information security
fromTechCrunch
2 hours ago

Mastodon says its flagship server was hit by a DDoS attack | TechCrunch

Mastodon's flagship server experienced a DDoS attack, causing significant outages and instability, but countermeasures were implemented to restore access.
#privacy
Privacy technologies
fromTechRepublic
1 hour ago

Chrome Privacy Concerns Rise as Expert Warns of Fingerprinting Risks

Browser fingerprinting poses significant privacy risks in Chrome, with at least thirty techniques currently in use to track users without consent.
fromElectronic Frontier Foundation
4 days ago
Privacy technologies

How Push Notifications Can Betray Your Privacy (and What to Do About It)

Push notifications can reveal personal information, and both Apple and Google have restrictions on sharing this data with law enforcement.
fromBitcoin Magazine
2 weeks ago
Privacy technologies

What If Your VPN, Phone Number, And AI Chat Left Zero Trace? Meet Nadanada.me - The "Nothing At All" Privacy Revolution

LNVPN has evolved into a comprehensive privacy infrastructure service offering anonymous eSIM data plans, disposable phone numbers, and AI chat tools.
Privacy technologies
fromTechRepublic
1 hour ago

Chrome Privacy Concerns Rise as Expert Warns of Fingerprinting Risks

Browser fingerprinting poses significant privacy risks in Chrome, with at least thirty techniques currently in use to track users without consent.
Privacy technologies
fromComputerWeekly.com
3 days ago

Privacy, power, and encryption: why end-to-end security matters | Computer Weekly

Privacy is a fundamental human condition, and end-to-end encryption is essential for protecting communications in a surveillance-heavy world.
Privacy technologies
fromBitcoin Magazine
2 weeks ago

What If Your VPN, Phone Number, And AI Chat Left Zero Trace? Meet Nadanada.me - The "Nothing At All" Privacy Revolution

LNVPN has evolved into a comprehensive privacy infrastructure service offering anonymous eSIM data plans, disposable phone numbers, and AI chat tools.
fromThe New Yorker
9 hours ago

When Your Digital Life Vanishes

A broken phone or corrupted drive can mean the loss of work, evidence, art, or the last traces of the dead. But sometimes data-recovery experts can summon lost files from the void.
Digital life
fromwww.housingwire.com
3 days ago

Disconnected systems fueling title, wire fraud risks

Disconnected systems, inconsistent definitions of data, and the manual nature of data movement create ongoing challenges in the title industry, according to FundingShield President Adam Chaudhary.
Real estate
NYC startup
fromTechCrunch
2 days ago

Sam Altman's project World looks to scale its human verification empire. First stop: Tinder. | TechCrunch

World project integrates verification tech into various sectors, starting with dating apps, to distinguish human users from AI.
Relationships
fromFortune
3 days ago

Teen boys are dating their AI chatbots-and experts warn opting out of real relationships could hurt their careers in the future | Fortune

Gen Alpha prefers AI relationships for control and ease, risking essential social skills needed for real-life interactions and future careers.
#bluesky
fromNature
6 days ago

Researchers: here's how to audit your fragmented digital identity

A search for 'Guo Wei' in ORCID returned 616 profiles, none affiliated with the Jiangsu University of Science and Technology, highlighting the difficulty in verifying academic identities.
Higher education
fromElectronic Frontier Foundation
5 days ago

Digital Hopes, Real Power: The Rise of Network Shutdowns

In 2024 alone, authorities imposed 304 internet shutdowns across 54 countries - the highest number ever recorded. This reflects a growing trend of governments treating connectivity as a weapon.
World politics
fromBitcoin Magazine
5 days ago

Relics Of A Revolution, Part III: The Suit, The Songs, The System

Afroman's response to the botched raid was not just a legal victory; it was protest art in the modern age—raw, low-budget, absurdist, and deeply American.
Social justice
Marketing tech
fromThe Cool Down
6 days ago

AI chatbots are subtly trying to make you buy more stuff - here's how to protect yourself

AI can influence consumer purchasing decisions without their awareness, often through subtle persuasion methods.
#cryptocurrency
Cryptocurrency
fromnews.bitcoin.com
1 day ago

Bitcoin Rebounds, But Crypto's Security Crisis Intensifies Week in Review

Bitcoin and major cryptocurrencies rose, indicating risk appetite despite ongoing geopolitical and economic uncertainties.
fromnews.bitcoin.com
2 weeks ago
Cryptocurrency

Human Error, Not Hacking, Cited as Top Cause for Crypto Access Loss

Human error is the leading cause of cryptocurrency access loss, affecting 35% of holders, primarily due to forgotten passwords and lost seed phrases.
Cryptocurrency
fromnews.bitcoin.com
1 day ago

Bitcoin Rebounds, But Crypto's Security Crisis Intensifies Week in Review

Bitcoin and major cryptocurrencies rose, indicating risk appetite despite ongoing geopolitical and economic uncertainties.
Cryptocurrency
fromnews.bitcoin.com
2 weeks ago

Human Error, Not Hacking, Cited as Top Cause for Crypto Access Loss

Human error is the leading cause of cryptocurrency access loss, affecting 35% of holders, primarily due to forgotten passwords and lost seed phrases.
EU data protection
fromwww.independent.co.uk
3 days ago

What are EU digital identity wallets? The benefits and risks explained

The Independent provides accessible journalism on critical issues like reproductive rights and digital identity, emphasizing the importance of on-the-ground reporting.
Artificial intelligence
fromArs Technica
3 days ago

Mozilla launches Thunderbolt AI client with focus on self-hosted infrastructure

Thunderbolt client by Mozilla supports various AI interfaces and is available for multiple platforms, with enterprise deployment options under development.
Social media marketing
fromWIRED
5 days ago

X's Big Bot Purge Wiped Out a Lot of People's Secret Porn Feeds

X's crackdown on bots has led to the suspension of many human accounts, including those used for private content curation.
Digital life
fromwww.dw.com
6 days ago

Dangerous Apps In the Web of Data Brokers

Smartphone apps collect detailed location data, often shared with data brokers, posing security risks to users, including soldiers and government officials.
Deliverability
fromnews.bitcoin.com
2 weeks ago

Dmail Network to Cease Operations Following Five Years of Service

Dmail Network will permanently shut down its services on May 15, 2026, due to unsustainable infrastructure costs and a failed economic model.
Privacy professionals
fromFast Company
2 days ago

How to hide your sensitive info (for real) when using ChatGPT and other AI chatbots

Chatbots can be useful for summarizing complex information, but sensitive data must be properly redacted to ensure privacy.
#bitcoin
Cryptocurrency
fromBitcoin Magazine
2 days ago

When Quantum Computers Come For Your Bitcoin: What Classical Property Law Says Happens Next

Bitcoin's future is challenged by quantum computing, raising questions about ownership and legality of coins accessed through quantum-derived keys.
Cryptocurrency
fromnews.bitcoin.com
5 days ago

Bitcoin Developers Propose Freezing Coins That Skip Quantum-Safe Migration Under BIP-361

BIP-361 proposes a five-year timeline for Bitcoin holders to migrate funds from legacy addresses to avoid permanent freezing due to quantum threats.
Cryptocurrency
fromBitcoin Magazine
5 days ago

Presidio Bitcoin Releases Quantum Readiness Paper

Presidio Bitcoin launched a GitHub repository to track research on Bitcoin's quantum vulnerability and potential mitigation strategies.
Cryptocurrency
fromBitcoin Magazine
2 days ago

When Quantum Computers Come For Your Bitcoin: What Classical Property Law Says Happens Next

Bitcoin's future is challenged by quantum computing, raising questions about ownership and legality of coins accessed through quantum-derived keys.
Cryptocurrency
fromnews.bitcoin.com
4 days ago

Cardano Founder Hoskinson: Bitcoin's Quantum Fix Is a Hard Fork in Disguise

Charles Hoskinson criticizes BIP 361 for misclassifying a hard fork as a soft fork, highlighting Bitcoin's vulnerability to quantum computing.
Cryptocurrency
fromBusiness Matters
5 days ago

Finding Satoshi: The Code, the Mystery, and the People Who Spent Four Years Unraveling Both

The documentary 'Finding Satoshi' investigates the identity of Bitcoin's creator through a rigorous four-year forensic analysis.
Cryptocurrency
fromBitcoin Magazine
5 days ago

Bitcoin Developers Propose Bitcoin Quantum Migration Plan That Would Freeze Legacy Coins

Bitcoin developers are addressing quantum computing risks with BIP-361, proposing a shift to quantum-resistant cryptography to protect the network.
Cryptocurrency
fromnews.bitcoin.com
5 days ago

Bitcoin Developers Propose Freezing Coins That Skip Quantum-Safe Migration Under BIP-361

BIP-361 proposes a five-year timeline for Bitcoin holders to migrate funds from legacy addresses to avoid permanent freezing due to quantum threats.
Cryptocurrency
fromBitcoin Magazine
5 days ago

Presidio Bitcoin Releases Quantum Readiness Paper

Presidio Bitcoin launched a GitHub repository to track research on Bitcoin's quantum vulnerability and potential mitigation strategies.
#age-verification
EU data protection
fromWIRED
4 days ago

Europe's Online Age Verification App Is Here

The European online age verification app ensures anonymous age verification using ID cards or passports, protecting children from harmful content.
Privacy technologies
fromThe Verge
4 days ago

Age verification is a mess but we're doing it anyway

Age verification methods on the internet are flawed, leading to challenges in effectively preventing underage access to inappropriate content.
EU data protection
fromWIRED
4 days ago

Europe's Online Age Verification App Is Here

The European online age verification app ensures anonymous age verification using ID cards or passports, protecting children from harmful content.
Privacy technologies
fromThe Verge
4 days ago

Age verification is a mess but we're doing it anyway

Age verification methods on the internet are flawed, leading to challenges in effectively preventing underage access to inappropriate content.
Privacy professionals
fromGeeky Gadgets
3 days ago

Why ChatGPT is Suddenly Collecting 70% More of Your Personal Data

Data collection by AI chatbots has surged, raising significant privacy concerns as 70% now gather user location data, up from 40% last year.
#meta
fromTechCrunch
1 week ago
Social media marketing

PSA: If you use the Meta AI app, your friends will find out and it will be embarrassing | TechCrunch

fromWIRED
1 month ago
Privacy technologies

The Danger Behind Meta's Decision to Kill End-to-End Encrypted Instagram DMs

Social media marketing
fromTechCrunch
1 week ago

PSA: If you use the Meta AI app, your friends will find out and it will be embarrassing | TechCrunch

Meta's Muse Spark AI model aims to revitalize its AI efforts amid concerns over past investments like the metaverse.
Privacy technologies
fromWIRED
1 month ago

The Danger Behind Meta's Decision to Kill End-to-End Encrypted Instagram DMs

Meta's retreat from end-to-end encryption on Instagram chat raises concerns about user privacy and sets a troubling precedent for big tech.
#whatsapp
Privacy technologies
fromTechRepublic
5 days ago

WhatsApp New Update Lets You Chat Without Sharing Your Phone Number

WhatsApp is introducing usernames, allowing users to chat without sharing phone numbers, enhancing privacy and user experience.
fromTechCrunch
2 months ago
Privacy technologies

WhatsApp is rolling out a new stricter security setting to protect users from cyber attacts | TechCrunch

Privacy technologies
fromTechRepublic
5 days ago

WhatsApp New Update Lets You Chat Without Sharing Your Phone Number

WhatsApp is introducing usernames, allowing users to chat without sharing phone numbers, enhancing privacy and user experience.
fromTechCrunch
2 months ago
Privacy technologies

WhatsApp is rolling out a new stricter security setting to protect users from cyber attacts | TechCrunch

#identity-verification
Privacy professionals
fromEngadget
4 days ago

Anthropic will ask Claude users to verify their identities 'for a few use cases'

Anthropic is implementing identity verification for certain capabilities on Claude, requiring users to provide a government-issued ID and a selfie.
Privacy professionals
fromEngadget
4 days ago

Anthropic will ask Claude users to verify their identities 'for a few use cases'

Anthropic is implementing identity verification for certain capabilities on Claude, requiring users to provide a government-issued ID and a selfie.
Information security
fromnews.bitcoin.com
2 weeks ago

Naoris Protocol Deploys Post-Quantum Mainnet to Secure Global Digital Infrastructure

Naoris Protocol launched its Layer 1 mainnet for decentralized post-quantum security, processing over 106 million transactions to combat quantum computing threats.
Privacy professionals
from404 Media
6 days ago

Google, Microsoft, Meta All Tracking You Even When You Opt Out, According to an Independent Audit

Microsoft, Meta, and Google may be violating California privacy laws by failing to honor user opt-out requests for ad cookies.
Cryptocurrency
fromnews.bitcoin.com
5 days ago

Atlas Goes Live on Rootstock With Support for BTC, ETH, USDC, and More

Rootstocklabs launched Atlas, a user-friendly interface for bridging Bitcoin and assets into the Rootstock network.
Tech industry
fromFast Company
1 month ago

Is it even possible to decentralize social networking?

Jay Graber stepped down as Bluesky CEO to become chief innovation officer, with venture capitalist Toni Schneider taking the interim CEO role to help scale the platform's growth.
Social media marketing
fromTechCrunch
3 weeks ago

Mastodon is making its decentralized social network easier to use with its latest revamp | TechCrunch

Mastodon is redesigning user profiles to attract mainstream users and simplify the platform's usability.
Cryptocurrency
fromnews.bitcoin.com
6 days ago

Tether Launches Consumer Wallet App With Human-Readable Addresses and No Gas Tokens

Tether launched tether.wallet, a self-custodial digital wallet, on April 14, 2026, for 570 million users to access USDT, XAUT, and bitcoin.
Privacy technologies
fromZDNET
2 weeks ago

Proton Workspace boasts privacy-first alternative to Google, Microsoft

Proton Workspace offers a private alternative to Google and Microsoft productivity suites, focusing on security and data protection.
fromTheregister
2 months ago

Matrix messaging gaining ground in government IT

FOSDEM 2026 Amid growing interest in digital sovereignty and getting data out of the corporate cloud and into organizations' ownership, the Matrix open communication protocol is thriving. The project was co-founded by Matthew Hodgson and Amandine le Pape, and The Reg FOSS desk met both at this year's FOSDEM for a chat about what's happening with Matrix. The Register has covered Matrix and its commercial Element side quite a few times over the years,
Software development
fromThe Drum
2 months ago

The next generation of social networking

Whilst many of the tools of social media - blogs, ugc, forums - are now increasingly brought into new web design and development, there are companies, from British Airways to Lego who view social media as the starting point - not the added feature. Others, such as ruumz.com, are already operating the 'next generation' of social networks with a new blend of online and offline activity.
Miscellaneous
fromenglish.elpais.com
2 months ago

Telegram, the platform favored by cybercriminals and disinformation

Telegram is linked to hoaxes, disinformation, and criminal use while founder Pavel Durov faces serious legal accusations including complicity in child pornography distribution.
Gadgets
fromThe Verge
2 months ago

How to un-Big Tech your online life

Recommendations include a new Mario Tennis Switch game, a wild time-travel movie, Sony's top earbuds, a new AI model, Dot calendar app, and zine discount.
E-Commerce
fromCointelegraph
2 months ago

How a Third-Party Leak Fueled Phishing Against Ledger Users

A breach at an e-commerce partner can expose customers' order and contact details, enabling highly convincing phishing that leverages real purchase context.
Marketing tech
fromExchangewire
1 month ago

AI Slop and Peril for the Open Web

AI-generated content farms (slop) waste 25-30% of open-web ad spend through fraudulent sites, with over 100,000 such sites now existing and 10,000 new ones appearing monthly.
fromReason.com
2 months ago

How to build your own internet in 2026

The internet you experience daily-endless scrolling, algorithmic feeds serving content you didn't ask for, AI-generated slop clogging search results-isn't the only internet available. It's just the one that's easiest to stumble into. You're not stuck with the internet that has evolved alongside the rise of hegemonic platforms. We're 20-plus years into the social internet, and the winners of the last round of audience capture have made clear they're shifting to optimize for social broadcasting instead of networking, to maximize market share and market cap.
Digital life
Privacy technologies
fromWIRED
1 month ago

Signal's Creator Is Helping Encrypt Meta AI

Moxie Marlinspike's privacy platform Confer will integrate its encryption technology into Meta's AI systems to protect user data in AI conversations.
#end-to-end-encryption
Privacy technologies
fromwww.theguardian.com
1 month ago

Instagram to remove end-to-end encryption for private messages in May

Instagram will disable end-to-end encryption on direct messages from May 2026, allowing Meta to access all message contents due to low user adoption of the feature.
fromZDNET
2 months ago
Privacy technologies

Worried about AI privacy? This new tool from Signal's founder adds end-to-end encryption to your chats

Privacy technologies
fromwww.theguardian.com
1 month ago

Instagram to remove end-to-end encryption for private messages in May

Instagram will disable end-to-end encryption on direct messages from May 2026, allowing Meta to access all message contents due to low user adoption of the feature.
fromZDNET
2 months ago
Privacy technologies

Worried about AI privacy? This new tool from Signal's founder adds end-to-end encryption to your chats

Digital life
fromOverreacted
2 months ago

A Social Filesystem - overreacted

Files should remain under user control while standardized file formats act as APIs enabling apps to read, write, and interoperate with those files.
Cryptocurrency
fromBitcoin Magazine
1 month ago

The Core Issue: Your Node Vs. The Digital Wilderness

Bitcoin's peer-to-peer networking layer is its most vulnerable attack surface, requiring Core to prevent denial-of-service vectors while enabling safe node communication in adversarial Internet environments.
Privacy technologies
fromBitcoin Magazine
1 month ago

Breez SDK Launches Passkey Login For Seedless Bitcoin Wallets

Breez SDK now enables self-custodial Bitcoin wallets using passkey authentication instead of seed phrases, reducing barriers to self-custody adoption.
Privacy technologies
fromArs Technica
1 month ago

World ID wants you to put a cryptographically unique human identity behind your AI agents

World ID's Agent Kit enables AI agents to prove human authorization through iris-verified identity tokens, allowing websites to distinguish legitimate automated requests from malicious Sybil attacks.
Information security
fromEmptywheel
2 months ago

"Tor Stinks" ... because It Requires Manual (Digital) Tails

Tor resists systematic de-anonymization; NSA can de-anonymize only a very small fraction manually and cannot reliably combine Tor attacks with passive SIGINT.
Privacy technologies
fromTechRepublic
1 month ago

Instagram Users Urged to Save Encrypted DMs Before Feature Disappears

Meta will discontinue end-to-end encrypted messaging for Instagram DMs on May 8, 2026, citing low adoption rates and directing users to download conversations beforehand.
Privacy technologies
fromEngadget
1 month ago

Meta is killing end-to-end encryption in Instagram DMs

Meta is discontinuing end-to-end encryption in Instagram DMs by May 8, 2026, citing low user adoption of the optional feature.
fromCoindesk
2 months ago

Privacy

This Privacy Notice applies to all personal information processed by CoinDesk, including its affiliates and subsidiaries (" CoinDesk," " we," " us," or " our "). It covers the information CoinDesk collects through the websites, mobile applications, electronic devices, all other products and services we provide, any other services that display this Privacy Notice, all of the associated content, functionalities, and advertising, and when you communicate with us by phone, email, or otherwise (collectively, the " Services ").
Privacy professionals
Privacy technologies
fromenglish.elpais.com
1 month ago

AI ends online anonymity: the ease of unmasking pseudonymous accounts

Artificial intelligence language models can identify 68% of anonymous social media users with 90% precision, fundamentally undermining online anonymity and privacy protections.
Privacy professionals
fromFast Company
2 months ago

Discord is asking for your ID. The backlash is about more than privacy

Discord will require ID photos or facial scans for age verification and default users to teen-appropriate settings until verification is completed.
Cryptocurrency
fromBitcoin Magazine
1 month ago

Tired Of Choosing Between Bitcoin Speed And Privacy? Cake Wallet's New Lightning Update Fixes That For Good

Cake Wallet integrates Bitcoin's Lightning Network with advanced privacy features, enabling fast payments while maintaining self-custody and user anonymity through custom Spark implementation.
Privacy technologies
fromBitcoin Magazine
2 months ago

The V2 Transport: Bitcoin P2P Traffic Goes Dark

BIP 324 v2 adds opportunistic encryption to Bitcoin P2P traffic, protecting metadata and preventing passive observers from linking transactions and node identities.
Privacy technologies
fromThe Verge
2 months ago

A community organizer's guide to Signal group chats

Signal's end-to-end encryption and privacy features make it a strong tool for organizing nonviolent community action, but users must enable settings and follow legal limits.
Privacy technologies
fromFast Company
2 months ago

This new privacy-focused phone service is designed to keep your phone from getting hacked

Cape is a US-wide privacy-focused cellphone carrier that prevents SIM swapping and IMSI-catcher surveillance while minimizing customer data collection and encrypting voicemails.
fromBitcoin Magazine
1 month ago

Discord Wants Your Face, Here's Why You Should Say No

Discord presents its move as inevitable. It's not. I know that Discord isn't trying to harm anyone. The company genuinely believes it's protecting users. But good intentions don't prevent the drift. They accelerate it. There's also the risk that the collected data becomes exposed.
Privacy technologies
Privacy technologies
fromTechCrunch
1 month ago

Let's explore the best alternatives to Discord | TechCrunch

Discord's planned age verification requirement by mid-2026 and past security breach prompt users to explore alternative platforms offering better privacy, security, and different communication experiences.
Privacy technologies
fromTheregister
1 month ago

AI takes a swing at online anonymity

Large language models can efficiently deanonymize internet users across multiple platforms by automating the process of connecting anonymous posts to identify individuals with high precision.
[ Load more ]