Welcome Guest | Sign In
ECTNews.com
E-Commerce Times TechNewsWorld CRM Buyer LinuxInsider
Discussions

TechNewsWorld Talkback

 
ECT News Community   »   TechNewsWorld Talkback   »   Re: How to Stay Safe on the Internet, Part 2: Take Canaries Into the Data Mine



See Full Story

More than any other factor, it is our asset that determines the kind of adversary we face. For most of us, our asset is the corpus of sensitive personal details consequent to online transactions. This all comes down to how much data an adversary can glean from you, and how thoroughly it can analyze it. If your data passes through some software or hardware, its developer or maintainer enjoys some measure of control. The reality of the Internet's infrastructure is that we can not vet every device or code that interacts with our data.


I was responsible for computer security in a law enforcement agency for decades and taught information security. I believe that this series of articles is the most valuable that I have ever read on TechNewsWorld.

Thank you. I am truly flattered that you think so highly of this series. Equipping people with the kind of knowledge I impart in these pieces is why I started writing about tech in the first place, so it's always good to see that I'm headed in the right direction.
Jump to:
Which Big Tech CEO that testified at the Congressional Antitrust Hearing on July 29 is the most trustworthy?
Jeff Bezos of Amazon
Mark Zuckerberg of Facebook
Sundar Pichai of Google
Tim Cook of Apple
All of them are equally trustworthy to some extent.
None of them are trustworthy whatsoever.