Encryption

Search documents
X @mert | helius.dev
mert | helius.devΒ· 2025-08-23 22:44
Industry Focus - The industry emphasizes the importance of money being mobile [1] - The industry highlights the need for wealth to be encrypted [1]
US spy chief says UK has dropped its Apple backdoor demand
TechCrunchΒ· 2025-08-19 14:25
Core Points - The U.K. has dropped its demand for Apple to provide a "backdoor" to its cloud systems after negotiations with the Trump administration [1][2][3] - The U.K. government's request was aimed at accessing encrypted data of American citizens, which raised concerns about civil liberties [2][4] - Apple initially responded by removing the Advanced Data Protection feature in the U.K. and challenged the backdoor mandate in court [5][9] Group 1 - The U.K. agreed to drop its mandate for Apple to provide a backdoor, ensuring the protection of Americans' private data and civil liberties [2][3] - The legal demand was made under the U.K.'s Investigatory Powers Act 2016, which sparked global outrage from privacy and security experts [4] - Apple has stated it has never built a backdoor or master key for its products and services [9] Group 2 - The backdoor request was part of a months-long negotiation process involving U.S. officials [3] - Apple initially removed the Advanced Data Protection feature for new users in the U.K. and guided existing users to disable it [5] - The case regarding the backdoor mandate was initially secret but later ruled to be held in public [5]
X @Ivan on Tech π³ππ°
Ivan on Tech π³ππ°Β· 2025-08-10 11:52
Regulatory Landscape - EU considers mandating Apple, Google, and others to scan messages before encryption [1] - Proposed measure, termed "chat control," could significantly alter online communication privacy [1] Technology & Security - Potential impact on end-to-end encryption technologies [1] - Debate centers on the balance between online privacy and safety [1]
βThere Is No Legal Confidentiality When Using Chat GPTβ Facing The AI Privacy Issue
All-In PodcastΒ· 2025-08-07 15:01
AI Privacy Concerns - AI user privacy is becoming a significant issue due to the lack of legal confidentiality when using AI products like ChatGPT [1][2][3] - Current legal treatment of AI chat history is similar to search history, which can be subpoenaed, but AI interactions are more personal and sensitive [4][5][6] - The potential for government intrusion through AI chat history is greater than with search history [6] Potential Solutions & Market Opportunities - A market opportunity exists to create AI models with built-in privacy features, such as default encryption, making user data inaccessible even to the AI provider [11][12] - The industry could explore certifying AI models in fields like law and medicine, granting them the same privileges and responsibilities as human professionals [7][8][9][10] - Encrypting all chat data by default on platforms could be a competitive advantage [11] Ethical & Societal Implications - Granting AI privileged rights raises questions about the overall rights and responsibilities of AI [9][10] - Analyzing user data through AI can reveal surprisingly accurate personality assessments, raising concerns about data privacy and potential misuse [15][16][17]
All about Bitcoin.Crypto Currency, Block Chain | Mohaimin Patwary | TEDxUniversity of Barishal
TEDx TalksΒ· 2025-07-23 15:43
[Music] Today I will be talking about one of the most enigmatic concepts you hear every day. I think most of you have struggled to know what is Bitcoin, what is cryptocurrency, what is blockchain. Okay.So first we will have to understand what is blockchain. So yeah when we hear the word blog what comes to our mind. Ah this is a city right.City block. So uh several apartments so a collection of apartment make one block and several blocks make one area. Right.So block is nothing except this but instead of apa ...
X @TechCrunch
TechCrunchΒ· 2025-07-23 12:51
Product Innovation - Proton's new AI assistant prioritizes privacy by encrypting all chats and maintaining no logs [1] Technology - The article discusses a privacy-focused AI assistant developed by Proton [1]
Can We Build Technology We Actually Trust? | Nia Luckey | TEDxSugar Creek Women
TEDx TalksΒ· 2025-06-16 16:54
Core Argument - The core argument is that trust in technology and teams is not solely a technical issue but a deeply human one, requiring a new approach called the "trust protocol" [2][3][5] - The trust protocol is based on three pillars: authentication, encryption, and resilience, which are crucial for individual, team, and organizational performance [6] Trust Protocol Pillars - Authentication is about proving identity and showing up authentically, reliably, and dependably, which is essential for team performance and preventing system failures [7] - Encryption involves creating safe spaces where personal and professional boundaries are respected, allowing for open conversations about what is broken and how to fix it [10] - Resilience is about preparing for mistakes and bouncing back stronger, preserving trust through inevitable challenges [12] Implications and Examples - A single compromised password, as seen in the Colonial Pipeline attack of 2021, can lead to significant consequences due to broken authentication and a lack of trust in alerts [8] - Technology failures are often caused by a combination of human mistrust and misuse rather than bad coding, with 70% of failures attributed to this combination [11] - Fostering deeper human connections lays the groundwork for the future, step by step, choice by choice, driving progress forward [14][15]
CIA looking into UK's reported backdoor request to Apple encryption
Sky NewsΒ· 2025-02-26 18:48
Group 1 - The UK government has requested Apple to implement a backdoor in their encryption, raising concerns among US intelligence agencies [1][2][4] - Apple has withdrawn some secure storage features from the UK, following the government's request for access to users' protected data [2][9] - The UK government aims to reduce encryption rigor to enhance child protection and crime prevention [2] Group 2 - Tulsi Gabbard, the US director of national intelligence, expressed serious concerns about the implications of the UK's request, citing potential violations of privacy and civil liberties [6][8] - Gabbard has requested insights from multiple US intelligence agencies regarding the public domain implications of the UK's actions [7] - US government lawyers are evaluating the legal implications of the UK's request in relation to the bilateral Cloud Act agreement [8] Group 3 - The UK government's demand is made under the Investigatory Powers Act 2016, also known as the "Snooper's Charter," but specifics have not been disclosed [4] - Politicians in the US have urged a reevaluation of US-UK cybersecurity arrangements if the UK does not change its approach [13]