#verification-and-transparency

[ follow ]
fromNature
1 day ago

Researchers: here's how to audit your fragmented digital identity

A search for 'Guo Wei' in ORCID returned 616 profiles, none affiliated with the Jiangsu University of Science and Technology, highlighting the difficulty in verifying academic identities.
Higher education
#bitcoin
Cryptocurrency
fromBitcoin Magazine
1 hour ago

Bitcoin Developers Propose Bitcoin Quantum Migration Plan That Would Freeze Legacy Coins

Bitcoin developers are addressing quantum computing risks with BIP-361, proposing a shift to quantum-resistant cryptography to protect the network.
Cryptocurrency
fromnews.bitcoin.com
4 hours ago

Bitcoin Developers Propose Freezing Coins That Skip Quantum-Safe Migration Under BIP-361

BIP-361 proposes a five-year timeline for Bitcoin holders to migrate funds from legacy addresses to avoid permanent freezing due to quantum threats.
Cryptocurrency
fromBitcoin Magazine
4 days ago

Bitcoin Policy Institute Warns Quantum Advances Are Compressing Timeline For Network Upgrades

Recent quantum computing advancements may threaten Bitcoin's cryptography sooner than expected, but developers are actively preparing solutions.
Cryptocurrency
fromBitcoin Magazine
5 days ago

Bitcoin Could Be Quantum-Safe Without Protocol Changes

A new proposal introduces Quantum Safe Bitcoin to protect transactions from quantum attacks without altering Bitcoin's core rules.
Cryptocurrency
fromnews.bitcoin.com
6 days ago

Bitcoin Developer Unveils Quantum-Resistant Wallet Rescue Prototype

A prototype by Lightning Labs enables bitcoin users to recover funds from wallets threatened by quantum computing.
Cryptocurrency
fromBitcoin Magazine
1 hour ago

Bitcoin Developers Propose Bitcoin Quantum Migration Plan That Would Freeze Legacy Coins

Bitcoin developers are addressing quantum computing risks with BIP-361, proposing a shift to quantum-resistant cryptography to protect the network.
Cryptocurrency
fromnews.bitcoin.com
4 hours ago

Bitcoin Developers Propose Freezing Coins That Skip Quantum-Safe Migration Under BIP-361

BIP-361 proposes a five-year timeline for Bitcoin holders to migrate funds from legacy addresses to avoid permanent freezing due to quantum threats.
Cryptocurrency
fromBitcoin Magazine
4 days ago

Bitcoin Policy Institute Warns Quantum Advances Are Compressing Timeline For Network Upgrades

Recent quantum computing advancements may threaten Bitcoin's cryptography sooner than expected, but developers are actively preparing solutions.
Cryptocurrency
fromBitcoin Magazine
5 days ago

Bitcoin Could Be Quantum-Safe Without Protocol Changes

A new proposal introduces Quantum Safe Bitcoin to protect transactions from quantum attacks without altering Bitcoin's core rules.
Cryptocurrency
fromnews.bitcoin.com
6 days ago

Bitcoin Developer Unveils Quantum-Resistant Wallet Rescue Prototype

A prototype by Lightning Labs enables bitcoin users to recover funds from wallets threatened by quantum computing.
Software development
fromZDNET
2 hours ago

'Like handing out the blueprint to a bank vault': Why AI led one company to abandon open source

Cal is shifting from open source to proprietary licensing due to security risks posed by modern AI tools.
#iam
Information security
fromComputerworld
13 hours ago

Curity looks to reinvent IAM with runtime authorization for AI agents

Traditional IAM tools are inadequate for managing agent access, which is ephemeral and complex, requiring a new approach to runtime enforcement.
Information security
fromInfoWorld
13 hours ago

Curity looks to reinvent IAM with runtime authorization for AI agents

Traditional IAM tools are inadequate for managing agent access, which is ephemeral and complex, requiring a new approach to runtime enforcement.
Information security
fromComputerworld
13 hours ago

Curity looks to reinvent IAM with runtime authorization for AI agents

Traditional IAM tools are inadequate for managing agent access, which is ephemeral and complex, requiring a new approach to runtime enforcement.
Information security
fromInfoWorld
13 hours ago

Curity looks to reinvent IAM with runtime authorization for AI agents

Traditional IAM tools are inadequate for managing agent access, which is ephemeral and complex, requiring a new approach to runtime enforcement.
Privacy professionals
from404 Media
1 day ago

Google, Microsoft, Meta All Tracking You Even When You Opt Out, According to an Independent Audit

Microsoft, Meta, and Google may be violating California privacy laws by failing to honor user opt-out requests for ad cookies.
Social media marketing
fromWIRED
7 hours ago

X's Big Bot Purge Wiped Out a Lot of People's Secret Porn Feeds

X's crackdown on bots has led to the suspension of many human accounts, including those used for private content curation.
Digital life
fromwww.dw.com
1 day ago

Dangerous Apps In the Web of Data Brokers

Smartphone apps collect detailed location data, often shared with data brokers, posing security risks to users, including soldiers and government officials.
fromBitcoin Magazine
22 hours ago

Relics Of A Revolution, Part III: The Suit, The Songs, The System

Afroman's response to the botched raid was not just a legal victory; it was protest art in the modern age—raw, low-budget, absurdist, and deeply American.
Social justice
UK politics
fromnews.bitcoin.com
1 day ago

UK Opposition Urges Watchdog to Probe Nigel Farage's Crypto Dealings

Liberal Democrats requested FCA to investigate Nigel Farage's cryptocurrency activities, citing potential market abuse and conflicts of interest.
Europe politics
fromTheregister
2 days ago

Digital sovereignty isn't just a buzzword - it's the future

European governments and companies are prioritizing digital sovereignty due to concerns over US control and dependency.
Marketing tech
fromBloomberglaw
1 day ago

Meta Cases Put Social Media Platforms at Securities Fraud Risk

Social media platforms face new legal challenges regarding their role in facilitating fraudulent securities schemes.
#ai-governance
fromComputerWeekly.com
1 week ago
EU data protection

AI-driven identity must exist in a robust compliance framework | Computer Weekly

Governance must precede AI adoption to avoid compliance failures and ethical risks in identity verification systems.
Silicon Valley
fromThe Nation
2 days ago

The Death of an AI Whistleblower

Suchir Balaji, a whistleblower against OpenAI, claimed the company violated copyright laws by using vast amounts of internet data for its AI models.
fromBitcoin Magazine
3 days ago

Relics Of A Revolution, Part II: False Profits And Freedom

Revolutions leave behind artifacts - not always weapons or flags, but the quieter objects that carried a message before anyone knew how far it would travel. A wheat-pasted broadside on a Los Angeles overpass. A hand-lettered cardboard sign held up in the snow outside a Tokyo office building.
Arts
#ai
Privacy technologies
fromComputerWeekly.com
1 week ago

Identity and AI: Questions of data security, trust and control | Computer Weekly

AI-driven identity solutions improve access control but raise compliance, privacy, and ethical concerns that organizations must address.
fromTechzine Global
1 day ago
Information security

Runtime security becomes critical as AI accelerates threats

Artificial intelligence accelerates innovation and cyber threats, necessitating a focus on runtime security for effective enterprise protection.
fromFast Company
4 days ago
Artificial intelligence

Is Mythos a blessing or a curse for cybersecurity? It depends on whom you ask

Claude Mythos AI model may enhance cybersecurity defenses but also poses risks for hackers due to its ability to identify vulnerabilities and create exploits.
Privacy technologies
fromComputerWeekly.com
1 week ago

Identity and AI: Questions of data security, trust and control | Computer Weekly

AI-driven identity solutions improve access control but raise compliance, privacy, and ethical concerns that organizations must address.
Information security
fromTechzine Global
1 day ago

Runtime security becomes critical as AI accelerates threats

Artificial intelligence accelerates innovation and cyber threats, necessitating a focus on runtime security for effective enterprise protection.
Artificial intelligence
fromFast Company
4 days ago

Is Mythos a blessing or a curse for cybersecurity? It depends on whom you ask

Claude Mythos AI model may enhance cybersecurity defenses but also poses risks for hackers due to its ability to identify vulnerabilities and create exploits.
fromThe Verge
4 days ago

Google says Polymarket bets showing up in News was an 'error'

Google News is designed to show sources that create content about current issues, events, and important topics, and we have policies for sites to be eligible to appear.
Media industry
SF politics
fromNextgov.com
4 days ago

Appeals court removes limits on DOGE access to SSA data despite 'alarming' revelations

A federal appeals court reversed restrictions on the Department of Government Efficiency's access to sensitive Social Security Administration data.
Law
fromIndependent
4 days ago

Computer engineer claims he was penalised for flagging Israeli links of firm given 'bananas' server access at top Irish cybersecurity company

A cyber-security firm reprimanded an engineer for discriminatory comments regarding an Israeli company's access to its servers amid concerns about Palestinian genocide.
DevOps
fromTheregister
6 days ago

AWS: Agents shouldn't be secret, so we built a registry

AWS Agent Registry enhances visibility and control over AI agents in corporate environments.
France news
fromnews.bitcoin.com
5 days ago

France Advances Law Mandating Self Custody Funds' Disclosure

The French National Assembly passed a bill requiring disclosure of self-custody wallets holding over 5,000 euros.
#artificial-intelligence
Artificial intelligence
fromFortune
21 hours ago

From Molotov cocktails to data center shutdowns, the AI backlash is turning revolutionary | Fortune

Recent violent incidents against AI leaders highlight escalating tensions surrounding artificial intelligence and its perceived threats to humanity.
Artificial intelligence
fromFortune
21 hours ago

From Molotov cocktails to data center shutdowns, the AI backlash is turning revolutionary | Fortune

Recent violent incidents against AI leaders highlight escalating tensions surrounding artificial intelligence and its perceived threats to humanity.
#data-privacy
Privacy professionals
fromZDNET
16 hours ago

A data removal service helped me reclaim my privacy - see if you need one, too

Personal data is collected and sold by brokers, making removal services essential for protecting sensitive information.
Privacy professionals
fromZDNET
16 hours ago

A data removal service helped me reclaim my privacy - see if you need one, too

Personal data is collected and sold by brokers, making removal services essential for protecting sensitive information.
#fraud-prevention
Non-profit organizations
fromNextgov.com
1 week ago

The war against fraud should be a war for tech modernization

A new task force aims to combat fraud in public benefits programs by ensuring adequate anti-fraud controls and addressing data sharing challenges.
Non-profit organizations
fromNextgov.com
1 week ago

The war against fraud should be a war for tech modernization

A new task force aims to combat fraud in public benefits programs by ensuring adequate anti-fraud controls and addressing data sharing challenges.
#data-integrity
Marketing tech
fromAdExchanger
2 days ago

AI Is Nothing Without Data Fidelity. Here's A Four-Step Approach to Protect It | AdExchanger

Data integrity is crucial for effective AI in advertising, as flawed data leads to poor outcomes.
Marketing tech
fromAdExchanger
2 days ago

AI Is Nothing Without Data Fidelity. Here's A Four-Step Approach to Protect It | AdExchanger

Data integrity is crucial for effective AI in advertising, as flawed data leads to poor outcomes.
#social-media
Digital life
fromwww.dw.com
3 days ago

Does age verification for social media help protect kids?

Governments are implementing age limits on social media to protect minors, but experts question the effectiveness of such measures.
Social media marketing
fromHer Campus
6 days ago

They Knew, They Didn't Care, & We Are All Paying For It

Social media platforms like Instagram have been found liable for mental health damage to young users, with internal documents revealing harmful strategies targeting teens.
Digital life
fromwww.dw.com
3 days ago

Does age verification for social media help protect kids?

Governments are implementing age limits on social media to protect minors, but experts question the effectiveness of such measures.
Social media marketing
fromHer Campus
6 days ago

They Knew, They Didn't Care, & We Are All Paying For It

Social media platforms like Instagram have been found liable for mental health damage to young users, with internal documents revealing harmful strategies targeting teens.
Cryptocurrency
fromnews.bitcoin.com
19 hours ago

Ethereum Foundation Funds $1M Audit Program for Smart Contract Developers

The Ethereum Foundation launched a $1 million subsidy program for smart contract security audits on April 14, 2026.
Marketing tech
fromForbes
2 days ago

How AI Interfaces Are Reshaping Discovery, Trust And Decision Making

The traditional home page is losing its significance as AI assistants reshape how users interact with brands online.
Privacy professionals
fromSecurityWeek
2 days ago

BrowserGate: Claims of LinkedIn 'Spying' Clash With Security Research Findings

LinkedIn allegedly scans users' computers to collect data on browser extensions, raising concerns about corporate espionage.
Marketing tech
fromAcast
6 days ago

AI Governance Isn't a Barrier: It's Marketing's Growth Engine | Adspeak

AI is transforming marketing by enabling innovation through governance, clean data, and balancing automation with human creativity.
#kraken
Information security
fromFinbold
1 day ago

Kraken insider extortion reveals remote work security blind spot

Kraken experienced an insider security breach affecting 2,000 client accounts, highlighting vulnerabilities in remote-first working models.
Information security
fromBitcoin Magazine
2 days ago

Crypto Exchange Kraken Faces Extortion Attempt After Insider Access Incidents Involving Support Staff

Kraken experienced two insider-related security incidents but confirmed no systems were breached and no client funds were at risk.
Information security
fromFinbold
1 day ago

Kraken insider extortion reveals remote work security blind spot

Kraken experienced an insider security breach affecting 2,000 client accounts, highlighting vulnerabilities in remote-first working models.
Information security
fromBitcoin Magazine
2 days ago

Crypto Exchange Kraken Faces Extortion Attempt After Insider Access Incidents Involving Support Staff

Kraken experienced two insider-related security incidents but confirmed no systems were breached and no client funds were at risk.
fromArs Technica
1 day ago

Your tech support company runs scams. Stop-or disguise with more fraud?

Tech Live Connect processed fraudulent charges using real customer data, including names and addresses, to make the charges appear legitimate and maintain a low chargeback ratio.
Privacy professionals
Cryptocurrency
fromnews.bitcoin.com
5 hours ago

Atlas Goes Live on Rootstock With Support for BTC, ETH, USDC, and More

Rootstocklabs launched Atlas, a user-friendly interface for bridging Bitcoin and assets into the Rootstock network.
Information security
fromArs Technica
23 hours ago

UK gov's Mythos AI tests help separate cybersecurity threat from hype

Mythos outperformed previous models in TLO tests, showing capability in attacking vulnerable systems but still facing limitations in complex scenarios.
Privacy professionals
fromRoute Fifty
2 days ago

Getting privacy policy right in a competitive digital economy

State and local leaders aim to balance privacy protection with economic competitiveness, as inconsistent privacy laws can hinder business operations and consumer trust.
#sec
Cryptocurrency
fromnews.bitcoin.com
2 days ago

New SEC Guidance Targets DeFi Interfaces, Self-Custodial Wallets, and Execution Routing Disclosures

Crypto trading interface operators can avoid broker-dealer registration if they meet 12 specific conditions outlined by the SEC.
Cryptocurrency
fromnews.bitcoin.com
1 day ago

SEC Commissioner Calls for Permanent Broker Rule Overhaul Reflecting Modern Crypto Market Realities

SEC Commissioner Hester Peirce advocates for clear, permanent regulatory definitions for crypto interfaces to foster innovation and protect investor access.
Cryptocurrency
fromnews.bitcoin.com
2 days ago

New SEC Guidance Targets DeFi Interfaces, Self-Custodial Wallets, and Execution Routing Disclosures

Crypto trading interface operators can avoid broker-dealer registration if they meet 12 specific conditions outlined by the SEC.
Cryptocurrency
fromnews.bitcoin.com
1 day ago

SEC Commissioner Calls for Permanent Broker Rule Overhaul Reflecting Modern Crypto Market Realities

SEC Commissioner Hester Peirce advocates for clear, permanent regulatory definitions for crypto interfaces to foster innovation and protect investor access.
#openai
Information security
fromTechCrunch
2 days ago

Hack at Anodot leaves over a dozen breached companies facing extortion | TechCrunch

Hackers stole data from multiple companies after breaching Anodot, exposing customers to extortion and potential data publication.
Privacy technologies
fromNextgov.com
3 weeks ago

New methods for assuring digital identity and authenticity

Generative AI is transforming content creation, increasing the need for reliable identity verification and authenticity in digital media.
#cybersecurity
Information security
fromWIRED
5 days ago

Anthropic's Mythos Will Force a Cybersecurity Reckoning-Just Not the One You Think

Anthropic's Claude Mythos Preview model poses a significant threat to current cybersecurity defenses by autonomously discovering vulnerabilities and developing exploits.
fromNextgov.com
5 days ago
Information security

Treasury debuts effort to share cyber threat intel with crypto firms

The Treasury Department will share cyber threat intelligence with cryptocurrency firms to enhance their cybersecurity measures against increasing threats.
fromThe Hacker News
1 week ago
Information security

Why Third-Party Risk Is the Biggest Gap in Your Clients' Security Posture

Third-party risk management is now a critical security challenge and growth opportunity for service providers.
Information security
fromThe Hacker News
2 days ago

Weekly Recap: Fiber Optic Spying, Windows Rootkit, AI Vulnerability Hunting and More

A critical zero-day vulnerability in Adobe Acrobat Reader is actively exploited, alongside state-sponsored cyber threats targeting U.S. infrastructure.
Information security
fromWIRED
5 days ago

Anthropic's Mythos Will Force a Cybersecurity Reckoning-Just Not the One You Think

Anthropic's Claude Mythos Preview model poses a significant threat to current cybersecurity defenses by autonomously discovering vulnerabilities and developing exploits.
Cryptocurrency
fromnews.bitcoin.com
6 days ago

Treasury Launches Cybersecurity Initiative Expanding Threat Intelligence Access for Digital Asset Firms

U.S. Treasury expands cybersecurity coordination with digital asset firms to enhance protections and integrate with traditional finance.
Information security
fromNextgov.com
5 days ago

Treasury debuts effort to share cyber threat intel with crypto firms

The Treasury Department will share cyber threat intelligence with cryptocurrency firms to enhance their cybersecurity measures against increasing threats.
Cryptocurrency
fromBitcoin Magazine
2 days ago

SEC Opens Limited Broker Exemption Path For Crypto Trading Interfaces

Certain user-facing interfaces for crypto trading may not need broker-dealer registration if they meet specific conditions.
Cryptocurrency
fromnews.bitcoin.com
2 days ago

SEC and CFTC Fast-Track US Crypto Oversight Using Interpretive Rules to Bypass Lengthy Rulemaking

U.S. regulators are using interpretive rules for faster crypto oversight, prioritizing clarity and reducing barriers for digital asset expansion.
Privacy technologies
fromArs Technica
4 weeks ago

After Discord fiasco, age-check tech promises privacy by running locally. Does it work?

Age-verification systems using on-device face scans and cross-platform age keys reduce privacy risks, but widespread distrust of vendors and past data breaches undermine user confidence in these technologies.
#quantum-computing
from24/7 Wall St.
3 days ago
Cryptocurrency

Is Ripple (XRP) Quantum-Safe? A Top XRPL Validator Just Published a Full Audit

Quantum computing poses a significant risk to cryptocurrency encryption, with Bitcoin being more vulnerable than XRP.
Cryptocurrency
from24/7 Wall St.
3 days ago

Is Ripple (XRP) Quantum-Safe? A Top XRPL Validator Just Published a Full Audit

Quantum computing poses a significant risk to cryptocurrency encryption, with Bitcoin being more vulnerable than XRP.
Cryptocurrency
fromnews.bitcoin.com
4 days ago

Bitwise Hyperliquid ETF Filing Updated Launch Could Be Near, Analyst Says

Bitwise Asset Management's BHYP ETF for HYPE token is nearing launch, with a 0.67% management fee and significant market interest.
Privacy technologies
fromArs Technica
4 weeks ago

World ID wants you to put a cryptographically unique human identity behind your AI agents

World ID's Agent Kit enables AI agents to prove human authorization through iris-verified identity tokens, allowing websites to distinguish legitimate automated requests from malicious Sybil attacks.
Information security
fromnews.bitcoin.com
1 week ago

Web3 Security Provider Certik Opens AI Auditing Tool Access to Global Developers

Certik launched its AI Auditor, achieving an 88.6% hit rate against security incidents, enhancing proactive defense in Web3.
Privacy professionals
fromTheregister
4 weeks ago

Age verification isn't sage verification inside OSes

California's Digital Age Assurance Act attempts age verification for minors but is vague, incoherent, and creates liability risks without clearly defining compliance requirements or addressing practical implementation across diverse computing devices.
Cryptocurrency
fromnews.bitcoin.com
1 week ago

Circle Announces Quantum-Resistant Roadmap to Secure Future Digital Asset Infrastructure

Circle's Arc platform will launch with post-quantum signature support to secure institutional assets against quantum threats.
#blockchain
Cryptocurrency
fromnews.bitcoin.com
1 week ago

Bitgo CEO Proposes Using a Public Blockchain as the Ultimate Solution for Government Fraud

Mike Belshe proposes using a public blockchain to combat state and federal fraud, potentially addressing losses of up to $521 billion annually.
Cryptocurrency
fromnews.bitcoin.com
1 week ago

REAL and Redstone Collaborate to Enhance Data Integrity for Tokenized Assets

REAL partners with Redstone to enhance data transparency and risk intelligence in its ecosystem for tokenized assets.
Cryptocurrency
fromTNW | Blockchain
2 weeks ago

Multi-Hop Transactions in Crypto. The Compliance Risk Behind Indirect Exposure

Public blockchains present compliance challenges due to multi-hop transactions, complicating the tracking of funds and enforcement of regulations.
Cryptocurrency
fromnews.bitcoin.com
1 week ago

Bitgo CEO Proposes Using a Public Blockchain as the Ultimate Solution for Government Fraud

Mike Belshe proposes using a public blockchain to combat state and federal fraud, potentially addressing losses of up to $521 billion annually.
Cryptocurrency
fromnews.bitcoin.com
1 week ago

REAL and Redstone Collaborate to Enhance Data Integrity for Tokenized Assets

REAL partners with Redstone to enhance data transparency and risk intelligence in its ecosystem for tokenized assets.
Cryptocurrency
fromTNW | Blockchain
2 weeks ago

Multi-Hop Transactions in Crypto. The Compliance Risk Behind Indirect Exposure

Public blockchains present compliance challenges due to multi-hop transactions, complicating the tracking of funds and enforcement of regulations.
#identity-management
fromThe Hacker News
1 week ago
Information security

Shrinking the IAM Attack Surface through Identity Visibility and Intelligence Platforms (IVIP)

Enterprise IAM faces fragmentation, leading to Identity Dark Matter and a significant gap in visibility and security oversight.
Information security
fromThe Hacker News
1 week ago

[Webinar] How to Close Identity Gaps in 2026 Before AI Exploits Enterprise Risk

Identity programs are maturing, yet the risk from disconnected applications and AI agents is increasing for enterprises.
Information security
fromThe Hacker News
1 week ago

Shrinking the IAM Attack Surface through Identity Visibility and Intelligence Platforms (IVIP)

Enterprise IAM faces fragmentation, leading to Identity Dark Matter and a significant gap in visibility and security oversight.
Information security
fromThe Hacker News
1 week ago

[Webinar] How to Close Identity Gaps in 2026 Before AI Exploits Enterprise Risk

Identity programs are maturing, yet the risk from disconnected applications and AI agents is increasing for enterprises.
Cryptocurrency
fromnews.bitcoin.com
1 week ago

Human Error, Not Hacking, Cited as Top Cause for Crypto Access Loss

Human error is the leading cause of cryptocurrency access loss, affecting 35% of holders, primarily due to forgotten passwords and lost seed phrases.
Information security
fromThe Hacker News
1 week ago

The Hidden Cost of Recurring Credential Incidents

Credential incidents cause significant operational costs and disruptions, impacting IT teams and overall business productivity beyond just breach prevention.
Information security
fromInfoWorld
1 week ago

Claude Code leak puts enterprise trust at risk as security, governance concerns mount

Leaks threaten Anthropic's market position and raise security concerns about its AI coding tools.
Cryptocurrency
fromnews.bitcoin.com
2 weeks ago

Trust Wallet Adds AI Transaction Layer to Self-Custody Wallet Infrastructure

Trust Wallet's Agent Kit allows developers to create AI agents for automated crypto transactions with user-defined permissions.
fromSilicon Canals
1 month ago

The global infrastructure of digital ID is being built right now - and nobody voted for it - Silicon Canals

What I walked through wasn't just an immigration gate. It was a node in a rapidly expanding global infrastructure of digital identity, one being constructed at extraordinary speed, across dozens of countries, by a mix of governments, multilateral organizations, and private technology vendors. The people building it believe they are solving real problems: fraud, statelessness, inefficient public services, financial exclusion.
Privacy technologies
[ Load more ]