Remove tag service-provider
Remove Encryption Remove Examples Remove Exercises Remove Security
article thumbnail

GDPR personal data explained

Collibra

De-identified or encrypted personal data, which can be re-identified to lead to a person, is still personal data. Personal data examples include the following: . Web data including location data, IP address, cookies or RFID tags that can be used to identify individuals. Location data . Advertising identifiers of mobile phone.

article thumbnail

Gab Has Been Breached

Troy Hunt

I want to go back through that thread here, explain the thinking further and then provide some commentary on the actual data that was exposed. For example, when I wrote about the Dropbox hack in 2016 , I was able to verify my own record simply by hashing the password I had stored in 1Password and comparing the output to the one in the breach.

Passwords 145
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

What Is Our Professional Future?

Brandeis Records Manager

Like most people, I prefer to have a reasonable sense of job security, as long as my interest is engaged. A recent futurist reading binge has been an exercise in masochism, or deer-in-the-headlights simulation, or emperor’s new clothes realization. Program Director for University Records Management, Brandeis University.

article thumbnail

The Hacker Mind Podcast: Hacking the Art of Invisibility

ForAllSecure

SO I only mention Ross Ulbricht in talks because I use him as an example of an Operation Security, or OpSec failure. Operational Security is typically a military process. It's a process of protecting critical information through encryption and being aware of the potential for eavesdropping on conversations. Not so easy.

Privacy 52
article thumbnail

The Hacker Mind Podcast: EP 69 Self-Healing Operating Systems

ForAllSecure

Over time, that provided not scale. For example, you’d need several different systems, each running just one program, to accomplish a task. All kinds of security protections, different things. A database to manage all the services and resources. That program, then, handled all the issues of hardware and software.