Remove tag australia
Remove Data Remove Encryption Remove Examples Remove Security
article thumbnail

Is India's Aadhaar System Really "Hack-Proof"? Assessing a Publicly Observable Security Posture

Troy Hunt

billion locals' data. It's operating in an era of increasingly large repositories of personal data held by both private companies and governments alike. Sooner or later, big repositories of data will be abused. India's Aadhaar implementation is the largest biometric system in the world, holding about 1.2

Security 111
article thumbnail

Facebook Wants You to Send Them Your Naked Pictures to Prevent Revenge Porn. I’m Not Kidding: Data Privacy Trends

eDiscovery Daily

In the article Facebook: upload your nudes to stop revenge porn , written by Lisa Vaas on the aptly named site Naked Security (what else?), A hash of your most intimate picture is no more revealing than this example provided in the article: 48008908c31b9c8f8ba6bf2a4a283f29c15309b1. It may not be crazy as it sounds.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

The Hacker Mind Podcast: Hacking the Art of Invisibility

ForAllSecure

SO I only mention Ross Ulbricht in talks because I use him as an example of an Operation Security, or OpSec failure. Operational Security is typically a military process. It's a process of protecting critical information through encryption and being aware of the potential for eavesdropping on conversations. Don't do that.

Privacy 52
article thumbnail

The Hacker Mind Podcast: Reverse Engineering Smart Meters

ForAllSecure

For example, in 2009, the Obama administration provided financial incentives to utilities in the United States. Similar initiatives were undertaken in Australia, India and Japan, all with the intent to roll these devices out within a relatively short amount of time. But we all know how security by obscurity works in the end.