#pseudonymity

[ follow ]
fromNature
19 hours ago

Researchers: here's how to audit your fragmented digital identity

A search for 'Guo Wei' in ORCID returned 616 profiles, none affiliated with the Jiangsu University of Science and Technology, highlighting the difficulty in verifying academic identities.
Higher education
Digital life
fromwww.dw.com
7 hours ago

Dangerous Apps In the Web of Data Brokers

Smartphone apps collect detailed location data, often shared with data brokers, posing security risks to users, including soldiers and government officials.
Marketing tech
fromThe Cool Down
12 hours ago

AI chatbots are subtly trying to make you buy more stuff - here's how to protect yourself

AI can influence consumer purchasing decisions without their awareness, often through subtle persuasion methods.
fromWIRED
40 minutes ago

Telegram Is Still Hosting a Sanctioned $21 Billion Crypto Scammer Black Market

Xinbi Guarantee has also hosted a wide variety of other black market offerings, including harassment services that threaten or throw feces at a victim for a fee, and even sex workers as young as 14 who are likely trafficking victims.
UK news
Privacy professionals
fromSecurityWeek
1 day ago

BrowserGate: Claims of LinkedIn 'Spying' Clash With Security Research Findings

LinkedIn allegedly scans users' computers to collect data on browser extensions, raising concerns about corporate espionage.
Social media marketing
fromTechRepublic
1 hour ago

X Cuts Clickbait Payouts and Exposes a Creator Program Problem - TechRepublic

X is reducing payouts for clickbait content, penalizing creators while maintaining the problematic structure that incentivizes such behavior.
#meta
fromEngadget
8 hours ago
Artificial intelligence

The Morning After: Meta is reportedly working on an AI model of Mark Zuckerberg

fromFuturism
23 hours ago
Privacy professionals

Huge Group of Experts Warns Meta That Its Pervert Glasses Will Enable Terrible Crimes

fromTechCrunch
4 days ago
Social media marketing

PSA: If you use the Meta AI app, your friends will find out and it will be embarrassing | TechCrunch

Artificial intelligence
fromEngadget
8 hours ago

The Morning After: Meta is reportedly working on an AI model of Mark Zuckerberg

Meta is developing an AI character based on Mark Zuckerberg to interact with employees, raising concerns about privacy and ethical implications.
Privacy professionals
fromFuturism
23 hours ago

Huge Group of Experts Warns Meta That Its Pervert Glasses Will Enable Terrible Crimes

Meta's Ray-Ban AI glasses face backlash for privacy violations and plans for facial recognition technology, prompting outrage from civil rights groups.
Social media marketing
fromTechCrunch
4 days ago

PSA: If you use the Meta AI app, your friends will find out and it will be embarrassing | TechCrunch

Meta's Muse Spark AI model aims to revitalize its AI efforts amid concerns over past investments like the metaverse.
Artificial intelligence
fromArs Technica
1 day ago

Meta spins up AI version of Mark Zuckerberg to engage with employees

Meta launched an AI assistant and chatbots based on celebrities, allowing users to create their own AI characters amid concerns over child safety.
Cryptocurrency
fromnews.bitcoin.com
6 hours ago

Tether Launches Consumer Wallet App With Human-Readable Addresses and No Gas Tokens

Tether launched tether.wallet, a self-custodial digital wallet, on April 14, 2026, for 570 million users to access USDT, XAUT, and bitcoin.
EU data protection
fromComputerWeekly.com
20 hours ago

UK reliance on US big tech companies is 'national security risk', claims report | Computer Weekly

The UK is at risk due to over-reliance on US tech companies for critical infrastructure, impacting national security.
#ice
US politics
fromTNW | Government-Policy
1 day ago

A grand jury is trying to force Reddit to unmask a user who criticised ICE

Federal prosecutors are seeking to unmask a Reddit user who criticized an ICE officer involved in a fatal shooting.
US politics
fromTNW | Government-Policy
1 day ago

A grand jury is trying to force Reddit to unmask a user who criticised ICE

Federal prosecutors are seeking to unmask a Reddit user who criticized an ICE officer involved in a fatal shooting.
Europe politics
fromTheregister
1 day ago

Digital sovereignty isn't just a buzzword - it's the future

European governments and companies are prioritizing digital sovereignty due to concerns over US control and dependency.
#privacy
Psychology
fromSilicon Canals
1 day ago

Not everyone who keeps their personal life private is guarded. Some people tried sharing openly once, watched it become currency in someone else's conversation, and simply adjusted the distribution list permanently. - Silicon Canals

Privacy often emerges as a response to the violation of trust and openness, not as an inherent trait of individuals.
fromBitcoin Magazine
1 week ago
Privacy technologies

What If Your VPN, Phone Number, And AI Chat Left Zero Trace? Meet Nadanada.me - The "Nothing At All" Privacy Revolution

Psychology
fromSilicon Canals
1 day ago

Not everyone who keeps their personal life private is guarded. Some people tried sharing openly once, watched it become currency in someone else's conversation, and simply adjusted the distribution list permanently. - Silicon Canals

Privacy often emerges as a response to the violation of trust and openness, not as an inherent trait of individuals.
Privacy technologies
fromBitcoin Magazine
1 week ago

What If Your VPN, Phone Number, And AI Chat Left Zero Trace? Meet Nadanada.me - The "Nothing At All" Privacy Revolution

LNVPN has evolved into a comprehensive privacy infrastructure service offering anonymous eSIM data plans, disposable phone numbers, and AI chat tools.
Software development
fromZDNET
1 day ago

This Linux distro offers an easy DNS switcher - but there's more to it that I like

iDealOS is a new MXLinux-based distribution offering two editions, emphasizing choice and the potential for paid Linux models.
fromBitcoin Magazine
2 days ago

Relics Of A Revolution, Part II: False Profits And Freedom

Revolutions leave behind artifacts - not always weapons or flags, but the quieter objects that carried a message before anyone knew how far it would travel. A wheat-pasted broadside on a Los Angeles overpass. A hand-lettered cardboard sign held up in the snow outside a Tokyo office building.
Arts
Marketing
fromInc
3 days ago

The Biggest Missed Opportunity in Social Media Has Nothing to Do With Marketing

Brands must transition from social listening to social doing to leverage insights for transformative action.
Mobile UX
fromEngadget
3 days ago

X's messaging app, XChat, may be available soon

XChat is a new messaging app for X users, featuring end-to-end encryption and various privacy options, available for download on April 17.
Media industry
fromWIRED
3 days ago

How the Internet Broke Everyone's Bullshit Detectors

Synthetic media is reshaping information warfare, prioritizing speed and virality over accuracy in online content.
Health
fromWIRED
4 days ago

Meta's New AI Asked for My Raw Health Data-and Gave Me Terrible Advice

Medical experts express concerns about uploading personal health data to AI models due to privacy and control issues.
UX design
fromEntrepreneur
1 week ago

The Hidden Risk Behind Every 'Frictionless' Digital Experience

Digital experiences should prioritize human agency over pressure tactics to foster trust and informed decision-making.
Mental health
fromwww.theguardian.com
1 week ago

I felt ashamed and scared': how an online friendship became a sextortion nightmare

Online friendships can lead to severe risks, including sextortion, which can have devastating emotional consequences.
#kraken
Information security
fromFinbold
7 hours ago

Kraken insider extortion reveals remote work security blind spot

Kraken experienced an insider security breach affecting 2,000 client accounts, highlighting vulnerabilities in remote-first working models.
Cryptocurrency
fromnews.bitcoin.com
1 day ago

Kraken Targeted by Extortion Group Threatening to Leak Internal Support Videos

Kraken will not pay ransom demanded by a criminal group threatening to release internal support videos.
Information security
fromFinbold
7 hours ago

Kraken insider extortion reveals remote work security blind spot

Kraken experienced an insider security breach affecting 2,000 client accounts, highlighting vulnerabilities in remote-first working models.
Cryptocurrency
fromnews.bitcoin.com
1 day ago

Kraken Targeted by Extortion Group Threatening to Leak Internal Support Videos

Kraken will not pay ransom demanded by a criminal group threatening to release internal support videos.
Privacy professionals
from404 Media
6 hours ago

Google, Microsoft, Meta All Tracking You Even When You Opt Out, According to an Independent Audit

Microsoft, Meta, and Google may be violating California privacy laws by failing to honor user opt-out requests for ad cookies.
#ai-development
Social media marketing
fromTNW | Meta
12 hours ago

Meta is building an AI version of Mark Zuckerberg

Meta is developing a photorealistic AI version of Mark Zuckerberg to interact with employees, reflecting his increased involvement in AI projects.
Social media marketing
fromTNW | Meta
12 hours ago

Meta is building an AI version of Mark Zuckerberg

Meta is developing a photorealistic AI version of Mark Zuckerberg to interact with employees, reflecting his increased involvement in AI projects.
Marketing tech
fromBloomberglaw
11 hours ago

Meta Cases Put Social Media Platforms at Securities Fraud Risk

Social media platforms face new legal challenges regarding their role in facilitating fraudulent securities schemes.
#social-media
Digital life
fromwww.dw.com
2 days ago

Does age verification for social media help protect kids?

Governments are implementing age limits on social media to protect minors, but experts question the effectiveness of such measures.
Social media marketing
fromHer Campus
5 days ago

They Knew, They Didn't Care, & We Are All Paying For It

Social media platforms like Instagram have been found liable for mental health damage to young users, with internal documents revealing harmful strategies targeting teens.
Social media marketing
fromSilicon Canals
5 days ago

Psychology says people who never post on social media but check it every day aren't passive - they opted out of the performance while keeping the window, and keeping the window without paying the price is the most rational position available and the one the platform was specifically designed to make feel antisocial - Silicon Canals

Silent scrollers on social media actively choose to observe rather than post, demonstrating discipline and self-control contrary to common perceptions.
Privacy technologies
fromFox News
2 weeks ago

5 simple tech tips to take back control of your social media

Social media platforms collect extensive data, but users can regain control through privacy settings and limiting data sharing.
Digital life
fromwww.dw.com
2 days ago

Does age verification for social media help protect kids?

Governments are implementing age limits on social media to protect minors, but experts question the effectiveness of such measures.
Social media marketing
fromHer Campus
5 days ago

They Knew, They Didn't Care, & We Are All Paying For It

Social media platforms like Instagram have been found liable for mental health damage to young users, with internal documents revealing harmful strategies targeting teens.
Social media marketing
fromSilicon Canals
5 days ago

Psychology says people who never post on social media but check it every day aren't passive - they opted out of the performance while keeping the window, and keeping the window without paying the price is the most rational position available and the one the platform was specifically designed to make feel antisocial - Silicon Canals

Silent scrollers on social media actively choose to observe rather than post, demonstrating discipline and self-control contrary to common perceptions.
Privacy technologies
fromFox News
2 weeks ago

5 simple tech tips to take back control of your social media

Social media platforms collect extensive data, but users can regain control through privacy settings and limiting data sharing.
#cybersecurity
Information security
fromWIRED
4 days ago

Anthropic's Mythos Will Force a Cybersecurity Reckoning-Just Not the One You Think

Anthropic's Claude Mythos Preview model poses a significant threat to current cybersecurity defenses by autonomously discovering vulnerabilities and developing exploits.
Privacy technologies
fromYahoo Tech
4 days ago

Hackers Are Using Your Home Router to Spy on Microsoft 365 Users

Russian spies exploited consumer routers to steal Microsoft 365 credentials from thousands of users, turning home devices into espionage tools.
Information security
fromWIRED
4 days ago

Anthropic's Mythos Will Force a Cybersecurity Reckoning-Just Not the One You Think

Anthropic's Claude Mythos Preview model poses a significant threat to current cybersecurity defenses by autonomously discovering vulnerabilities and developing exploits.
Media industry
fromTechCrunch
4 days ago

EFF is the latest organization to leave X | TechCrunch

X's declining engagement has led the EFF to leave the platform after nearly 20 years due to significantly reduced post visibility.
#google
Privacy professionals
fromThe Verge
1 hour ago

Privacy advocates want Google to stop handing consumer data over to ICE

Google is being investigated for allegedly failing to notify users before disclosing their data to law enforcement.
Privacy professionals
fromThe Verge
1 hour ago

Privacy advocates want Google to stop handing consumer data over to ICE

Google is being investigated for allegedly failing to notify users before disclosing their data to law enforcement.
Social media marketing
fromwww.theguardian.com
1 day ago

Social media was once a great global conversation. Now it's just individuals locked into their own private worlds | Tom Whyman

Twitter once felt like a global conversation platform that shaped personal relationships and values, but usage has significantly declined over time.
#ai
Artificial intelligence
fromFuturism
1 day ago

Meta Secretly Building a Photorealistic AI Clone of Mark Zuckerberg so No Employee Can Ever Escape His Watchful Eye

Meta CEO Mark Zuckerberg is using AI to create a 3D avatar of himself for employee interaction and feedback.
Information security
fromFortune
4 days ago

Anthropic's Mythos is a wake up call, but experts say the era of AI-driven hacking is already here | Fortune

Anthropic's Mythos AI model is too dangerous to release widely due to its ability to exploit software vulnerabilities.
Privacy technologies
fromComputerWeekly.com
1 week ago

Identity and AI: Questions of data security, trust and control | Computer Weekly

AI-driven identity solutions improve access control but raise compliance, privacy, and ethical concerns that organizations must address.
Artificial intelligence
fromFuturism
1 day ago

Meta Secretly Building a Photorealistic AI Clone of Mark Zuckerberg so No Employee Can Ever Escape His Watchful Eye

Meta CEO Mark Zuckerberg is using AI to create a 3D avatar of himself for employee interaction and feedback.
Information security
fromFortune
4 days ago

Anthropic's Mythos is a wake up call, but experts say the era of AI-driven hacking is already here | Fortune

Anthropic's Mythos AI model is too dangerous to release widely due to its ability to exploit software vulnerabilities.
Artificial intelligence
fromFast Company
3 days ago

Is Mythos a blessing or a curse for cybersecurity? It depends on whom you ask

Claude Mythos AI model may enhance cybersecurity defenses but also poses risks for hackers due to its ability to identify vulnerabilities and create exploits.
Privacy technologies
fromComputerWeekly.com
1 week ago

Identity and AI: Questions of data security, trust and control | Computer Weekly

AI-driven identity solutions improve access control but raise compliance, privacy, and ethical concerns that organizations must address.
Marketing tech
fromForbes
1 day ago

How AI Interfaces Are Reshaping Discovery, Trust And Decision Making

The traditional home page is losing its significance as AI assistants reshape how users interact with brands online.
#satoshi-nakamoto
Cryptocurrency
fromFortune
1 day ago

What the latest search for Satoshi means for the crypto industry | Fortune

The New York Times incorrectly identified Satoshi Nakamoto, raising concerns about the implications of unmasking anonymity in the crypto world.
fromFortune
6 days ago
Cryptocurrency

The New York Times says it found Satoshi Nakamoto, the inventor of Bitcoin. Not so fast. | Fortune

fromTechCrunch
6 days ago
Cryptocurrency

British cryptographer Adam Back denies NYT report that he is Bitcoin creator Satoshi Nakamoto | TechCrunch

Cryptocurrency
fromFortune
1 day ago

What the latest search for Satoshi means for the crypto industry | Fortune

The New York Times incorrectly identified Satoshi Nakamoto, raising concerns about the implications of unmasking anonymity in the crypto world.
fromFortune
6 days ago
Cryptocurrency

The New York Times says it found Satoshi Nakamoto, the inventor of Bitcoin. Not so fast. | Fortune

fromTechCrunch
6 days ago
Cryptocurrency

British cryptographer Adam Back denies NYT report that he is Bitcoin creator Satoshi Nakamoto | TechCrunch

#data-privacy
Privacy technologies
fromArs Technica
6 days ago

How our digital devices are putting our right to privacy at risk

Digital convenience comes at the cost of personal data privacy, raising concerns about its potential use against individuals by law enforcement.
Privacy technologies
fromArs Technica
6 days ago

How our digital devices are putting our right to privacy at risk

Digital convenience comes at the cost of personal data privacy, raising concerns about its potential use against individuals by law enforcement.
Privacy professionals
fromFuturism
5 hours ago

Woman Sues OpenAI, Saying ChatGPT Unleashed a Vicious Stalker Against Her and Did Nothing When She Begged for Help

A woman sued OpenAI, claiming ChatGPT exacerbated her stalker's delusions and that the company failed to intervene despite her pleas for help.
Information security
fromTechzine Global
1 day ago

Anthropic's Mythos preview: why the human layer matters more, not less

Anthropic's Mythos Preview autonomously discovers and exploits high-severity vulnerabilities, achieving a 72.4% success rate in exploit chaining.
fromwww.theguardian.com
1 day ago

Elon Musk's X cuts payments to users who post clickbait

Nikita Bier stated that aggregators had their payouts reduced by 60% and that total will be reduced by a further 20%. He emphasized that flooding the timeline with 100 stolen reposts and clickbait every day crowded out real creators and hurt new author growth.
Social media marketing
#bitcoin
Cryptocurrency
fromBitcoin Magazine
3 days ago

Bitcoin Policy Institute Warns Quantum Advances Are Compressing Timeline For Network Upgrades

Recent quantum computing advancements may threaten Bitcoin's cryptography sooner than expected, but developers are actively preparing solutions.
Cryptocurrency
fromBitcoin Magazine
4 days ago

Bitcoin Could Be Quantum-Safe Without Protocol Changes

A new proposal introduces Quantum Safe Bitcoin to protect transactions from quantum attacks without altering Bitcoin's core rules.
Cryptocurrency
fromnews.bitcoin.com
5 days ago

Bitcoin Developer Unveils Quantum-Resistant Wallet Rescue Prototype

A prototype by Lightning Labs enables bitcoin users to recover funds from wallets threatened by quantum computing.
Cryptocurrency
fromnews.bitcoin.com
6 days ago

NYT Claims Bitcoin Creator Satoshi Nakamoto Is British Cryptographer Adam Back

Satoshi Nakamoto remains unidentified; Adam Back is the closest match based on stylometric analysis, but he denies being Satoshi multiple times.
Cryptocurrency
fromBitcoin Magazine
3 days ago

Bitcoin Policy Institute Warns Quantum Advances Are Compressing Timeline For Network Upgrades

Recent quantum computing advancements may threaten Bitcoin's cryptography sooner than expected, but developers are actively preparing solutions.
Cryptocurrency
fromBitcoin Magazine
4 days ago

Bitcoin Could Be Quantum-Safe Without Protocol Changes

A new proposal introduces Quantum Safe Bitcoin to protect transactions from quantum attacks without altering Bitcoin's core rules.
Cryptocurrency
fromnews.bitcoin.com
5 days ago

Bitcoin Developer Unveils Quantum-Resistant Wallet Rescue Prototype

A prototype by Lightning Labs enables bitcoin users to recover funds from wallets threatened by quantum computing.
Cryptocurrency
fromnews.bitcoin.com
6 days ago

NYT Claims Bitcoin Creator Satoshi Nakamoto Is British Cryptographer Adam Back

Satoshi Nakamoto remains unidentified; Adam Back is the closest match based on stylometric analysis, but he denies being Satoshi multiple times.
#digital-privacy
Privacy technologies
fromZDNET
1 month ago

How to delete or hide yourself from the internet - 11 effective ways (and most are free)

Digital privacy requires constant attention as personal data persists online long after deletion, affecting career, reputation, and relationships through old posts, photos, and search history exploitation.
Privacy technologies
fromZDNET
1 month ago

How to delete or hide yourself from the internet - 11 effective ways (and most are free)

Digital privacy requires constant attention as personal data persists online long after deletion, affecting career, reputation, and relationships through old posts, photos, and search history exploitation.
Privacy technologies
fromZDNET
1 month ago

How to delete or hide yourself from the internet - 11 effective ways (and most are free)

Digital privacy requires constant attention as personal data persists online long after deletion, affecting career, reputation, and relationships through old posts, photos, and search history exploitation.
Privacy technologies
fromZDNET
1 month ago

How to delete or hide yourself from the internet - 11 effective ways (and most are free)

Digital privacy requires constant attention as personal data persists online long after deletion, affecting career, reputation, and relationships through old posts, photos, and search history exploitation.
Privacy professionals
fromEngadget
1 day ago

Meta warned by dozens of organizations that facial recognition on its smart glasses would empower predators

Civil rights organizations urge Meta to abandon facial recognition in smart glasses due to risks of empowering stalkers and predators.
#generative-ai
Digital life
fromBig Think
2 weeks ago

3 ways to prove you're human online

Generative AI is rapidly increasing information production, leading to a potential scarcity of human-generated content and a need for new human verification methods.
Privacy technologies
fromNextgov.com
3 weeks ago

New methods for assuring digital identity and authenticity

Generative AI is transforming content creation, increasing the need for reliable identity verification and authenticity in digital media.
Digital life
fromBig Think
2 weeks ago

3 ways to prove you're human online

Generative AI is rapidly increasing information production, leading to a potential scarcity of human-generated content and a need for new human verification methods.
Privacy technologies
fromNextgov.com
3 weeks ago

New methods for assuring digital identity and authenticity

Generative AI is transforming content creation, increasing the need for reliable identity verification and authenticity in digital media.
Privacy professionals
fromRoute Fifty
1 day ago

Getting privacy policy right in a competitive digital economy

State and local leaders aim to balance privacy protection with economic competitiveness, as inconsistent privacy laws can hinder business operations and consumer trust.
Artificial intelligence
fromForbes
1 day ago

The Hottest Debate In Tech: Ads In AI

The debate in AI centers on the introduction of advertising in chatbot interactions and the financial implications of running AI systems.
Tech industry
fromFast Company
1 month ago

Is it even possible to decentralize social networking?

Jay Graber stepped down as Bluesky CEO to become chief innovation officer, with venture capitalist Toni Schneider taking the interim CEO role to help scale the platform's growth.
#quantum-computing
fromBitcoin Magazine
5 days ago
Cryptocurrency

Adam Back Says Quantum Threat To Bitcoin Is Decades Away

Quantum computing poses no immediate threat to Bitcoin's cryptographic security, but preparation for future risks is essential.
Cryptocurrency
fromBitcoin Magazine
5 days ago

Adam Back Says Quantum Threat To Bitcoin Is Decades Away

Quantum computing poses no immediate threat to Bitcoin's cryptographic security, but preparation for future risks is essential.
Privacy professionals
fromFast Company
3 days ago

This iPhone trick lets you use ChatGPT without the privacy risks

Using AI chatbots poses risks to privacy and data security, but Siri can help mask identity when accessing ChatGPT on iPhones.
Social media marketing
fromPR Daily
5 days ago

A landmark ruling is reshaping social media. Communicators should pay attention. - PR Daily

A court ruling holds social media platforms accountable for addictive designs impacting user mental health.
Cryptocurrency
fromnews.bitcoin.com
1 week ago

Human Error, Not Hacking, Cited as Top Cause for Crypto Access Loss

Human error is the leading cause of cryptocurrency access loss, affecting 35% of holders, primarily due to forgotten passwords and lost seed phrases.
Privacy professionals
fromZDNET
1 week ago

I turned to PrivacyBee to clean up my data - here's how it made me disappear

PrivacyBee is preferred for its comprehensive data removal services and user-friendly management tools.
Privacy technologies
fromArs Technica
3 weeks ago

World ID wants you to put a cryptographically unique human identity behind your AI agents

World ID's Agent Kit enables AI agents to prove human authorization through iris-verified identity tokens, allowing websites to distinguish legitimate automated requests from malicious Sybil attacks.
Privacy technologies
fromenglish.elpais.com
1 month ago

AI ends online anonymity: the ease of unmasking pseudonymous accounts

Artificial intelligence language models can identify 68% of anonymous social media users with 90% precision, fundamentally undermining online anonymity and privacy protections.
Privacy technologies
fromwww.theguardian.com
1 month ago

AI allows hackers to identify anonymous social media accounts, study finds

Large language models enable malicious actors to efficiently de-anonymize social media users by matching anonymous accounts to real identities using publicly available information.
#ai-deanonymization
Privacy technologies
fromFuturism
1 month ago

AI Can Mass-Unmask Pseudonymous Accounts, Research Paper Finds

AI language models can now easily deanonymize pseudonymous internet users at scale, successfully unmasking two-thirds of tested users across multiple platforms.
Privacy technologies
fromThe Verge
1 month ago

AI can unmask your secret accounts

AI systems can effectively deanonymize online accounts by analyzing writing patterns and biographical details at scale, outperforming traditional computational techniques.
Privacy technologies
fromFuturism
1 month ago

AI Can Mass-Unmask Pseudonymous Accounts, Research Paper Finds

AI language models can now easily deanonymize pseudonymous internet users at scale, successfully unmasking two-thirds of tested users across multiple platforms.
Privacy technologies
fromThe Verge
1 month ago

AI can unmask your secret accounts

AI systems can effectively deanonymize online accounts by analyzing writing patterns and biographical details at scale, outperforming traditional computational techniques.
Information security
fromEmptywheel
2 months ago

"Tor Stinks" ... because It Requires Manual (Digital) Tails

Tor resists systematic de-anonymization; NSA can de-anonymize only a very small fraction manually and cannot reliably combine Tor attacks with passive SIGINT.
Privacy technologies
fromTheregister
1 month ago

AI takes a swing at online anonymity

Large language models can efficiently deanonymize internet users across multiple platforms by automating the process of connecting anonymous posts to identify individuals with high precision.
[ Load more ]