article thumbnail

TikTok Editorial Analysis

Schneier on Security

This is a serious analysis, and the methodology looks sound.) Future research should aim towards a more comprehensive analysis to determine the potential influence of TikTok on popular public narratives. TikTok seems to be skewing things in the interests of the Chinese Communist Party.

article thumbnail

Cognitive Technologies White Paper

National Archives Records Express

We are pleased to announce the release of a white paper on the records management implications of: Internet of Things (IoT) Robotic Process Automation (RPA) Machine Learning (ML) Artificial Intelligence (AI). This post is written by Sharmila Bhatia and Markus Most. If you have any questions, please leave a comment below.

Paper 133
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Security Analysis of Threema

Schneier on Security

A group of Swiss researchers have published an impressive security analysis of Threema. We provide an extensive cryptographic analysis of Threema, a Swiss-based encrypted messaging application with more than 10 million users and 7000 corporate customers. It also said the researchers were overselling their findings.

Security 119
article thumbnail

Security Analysis of a Thirteenth-Century Venetian Election Protocol

Schneier on Security

Interesting analysis : This paper discusses the protocol used for electing the Doge of Venice between 1268 and the end of the Republic in 1797. I like that this paper has been accepted at a cybersecurity conference. And, for the record, I have written about the positive aspects of security theater.

Security 105
article thumbnail

5 Early Indicators Your Embedded Analytics Will Fail

In this White Paper, Logi Analytics has identified 5 tell-tale signs your project is moving from “nice to have” to “needed yesterday.". Many application teams leave embedded analytics to languish until something—an unhappy customer, plummeting revenue, a spike in customer churn—demands change. But by then, it may be too late.

article thumbnail

Security Analysis of Apple’s “Find My…” Protocol

Schneier on Security

This paper presents the first comprehensive security and privacy analysis of OF. While OF is not the first system of its kind, it is the first to commit to strong privacy goals. In particular, OF aims to ensure finder anonymity, untrackability of owner devices, and confidentiality of location reports.

Security 142
article thumbnail

UK: Information Commissioner publishes response to new AI White Paper

DLA Piper Privacy Matters

Authors: Coran Darling and Rachel De Souza On 29 March 2023, the UK Government (“ Government ”) published its long-awaited white paper (“ Paper ”), setting out the Government’s proposals to govern and regulate artificial Intelligence (“ AI ”). Further details of the Paper can be found in DLA Piper’s earlier analysis of the proposals.

Paper 52