Workflow
Data privacy
icon
Search documents
X @Nick Szabo
Nick Szabo· 2025-11-27 06:37
Regulatory Landscape & Policy Changes - The EU Council has removed the requirement for mandatory scanning of end-to-end encrypted messaging services, representing a significant victory against mass surveillance [1] - The EU Council's proposal lays the groundwork for future mass surveillance, indicating ongoing concerns regarding privacy and security [1] - The EU Council's version of Chat Control includes voluntary scanning and vaguely worded legislation that may lead to mandatory ID checks, even for end-to-end encrypted services [3] - The EU Council will reconsider the requirement for mandatory scanning every three years, posing a recurring threat to privacy [3][5] - A new EU center is being established to focus on blocking material, raising concerns about potential censorship and the definition of "illegal" content [3][6] Technological Implications & Surveillance Concerns - The EU Council's Chat Control version introduces AI scanning of conversations, photos, and videos to detect criminal content, potentially leading to numerous false positives and privacy violations [4] - The scanning process involves American companies and could be used to scan for virtually anything, raising concerns about broader surveillance and data access [4] - The EU may require ID checks and ban anonymous use of messaging services and social media, impacting individuals in authoritarian countries, whistleblowers, and journalists [5] Industry Response & Advocacy - The industry urges the European Parliament to demand no mass surveillance without suspicion and a court order, no ID-verification requirements, and no censorship of legal content [2] - The industry views Chat Control as a proposal aimed at introducing mass surveillance, with ongoing attempts to challenge private and secure communication [7]
X @Avi Chawla
Avi Chawla· 2025-11-20 19:20
RT Avi Chawla (@_avichawla)You're in an AI engineer interview at Apple.The interviewer asks:"Siri processes 25B requests/mo.How would you use this data to improve its speech recognition?"You: "Upload all voice notes from devices to iCloud and train a model"Interview over!Here's what you missed:Modern devices (like smartphones) host a ton of data that can be useful for ML models.To get some perspective, consider the number of images you have on your phone right now, the number of keystrokes you press daily, ...
Crypto startup Seismic raises $10 million to help fintechs protect customer data
Yahoo Finance· 2025-11-12 13:00
Core Insights - Seismic aims to address the challenge of protecting sensitive financial data in the public blockchain environment, which is increasingly relevant as fintech companies adopt crypto solutions [1][3] Funding and Financials - Seismic raised $10 million in a funding round led by a16z crypto, bringing its total funding to $17 million [2] - The company’s valuation was not disclosed by its founder and CEO, Lyron Co Ting Keh [2] Company Mission and Strategy - The name "Seismic" reflects the company's goal to be deeply connected with customer needs and to achieve significant impact in the crypto space [3] - Seismic partners with Brookwell to provide private blockchain solutions for stablecoin transactions, ensuring customer data remains confidential [4] Competitive Landscape - Seismic competes with Tempo, a blockchain startup valued at $5 billion, but believes there is room for multiple players in the market [5] - The company differentiates itself by offering holistic solutions and actively engaging with clients to understand their broader needs beyond specific products [5]
X @Chainlink
Chainlink· 2025-11-04 18:00
Chainlink Confidential Compute was made possible by fundamental architectural innovations that differentiate it from existing blockchain privacy solutions.This includes two new systems: Chainlink Distributed Key Generation (DKG) and the Vault Decentralized Oracle Network (DON).• Decentralized Secrets Management via Chainlink DKG and the Vault DON:Chainlink Confidential Compute features a decentralized, institutional-grade system for secrets management and long-term storage of confidential data.The Vault DON ...
DATA BREACH ALERT: Edelson Lechtzin LLP is Investigating Claims on Behalf of Conduent Business Services, LLC Customers Whose Data May Have Been Compromised
Globenewswire· 2025-10-30 20:43
Core Points - Conduent Business Services, LLC experienced a data breach that was discovered on January 13, 2025, affecting its network operations [3] - An unauthorized third party accessed Conduent's network between October 21, 2024, and January 13, 2025, potentially obtaining sensitive personal information [3] - The law firm Edelson Lechtzin LLP is investigating claims related to the data breach and is considering a class action lawsuit for affected individuals [4] Company Overview - Conduent provides digital process solutions to enhance operations for businesses and government agencies [2] Incident Details - The cybersecurity incident led to disruptions in Conduent's network, prompting immediate security measures and an investigation [3] - The compromised files may have included personal information such as names, Social Security numbers, medical information, and health insurance details [3] Legal Actions - Edelson Lechtzin LLP is actively investigating the situation and seeking legal remedies for individuals whose data may have been compromised [4]
Digital Afterlife: Who Owns ur Data When ur Gone? | Suresh Sankaran Srinivasan | TEDxAsia Pacific U
TEDx Talks· 2025-10-29 16:47
Digital Afterlife & Data Privacy Concerns - The digital realm has become an integral part of human life, existing alongside the physical realm [4][5] - Individuals are increasingly concerned about the fate of their digital selves after death, including social media accounts and online data [5][15] - Digital platforms are evolving to monetize grief, such as creating chatbots of deceased individuals [17] - Technology is designed to remember rather than forget, raising concerns about the persistence of digital data [18] Internet Structure & Data Exposure - The internet consists of three layers: the surface web (emails, apps, social media), the deep web (browser cache, metadata, API data), and the dark web (traded personal information) [7][10][12] - Users often grant extensive permissions to applications on their phones without fully understanding the implications [11][12] - A significant amount of personal data is stored online, including credit card subscriptions and application permissions, often without users' full awareness [9][11] Risks & Implications - The continued existence of digital data after death poses cyber risks, including fraud and identity theft [18][19] - There is a lack of legal frameworks to allow loved ones to manage or remove a person's digital presence after death [20] - Ethical concerns arise regarding the use of personal memories and data without consent after death [21] - Philosophical questions are raised about closure and dignity in the digital realm [21][22] Call to Action & Policy Recommendations - There is a need to acknowledge and address the problem of digital afterlife and data management [22] - Discussions about digital wills and data management should occur in families, boardrooms, and policy-making settings [23] - Increased awareness is needed regarding the data collection practices of apps and online platforms [23] - Policy ecosystems and legal frameworks are required to enable individuals to control their digital legacy and allow for the removal of data after death [24]
How we fix what’s wrong with AI | Katharine Wooller | TEDxSt Albans
TEDx Talks· 2025-10-27 16:01
[Music] AI is it the pinnacle of human achievement or will it end us all. Certainly, it is likely to be the greatest change that any of us in this room see in our lifetimes. Perhaps it can cure cancer.Maybe it can end financial and educational inequality. Economically, it's expected to add 4.4% trillion US to the world economy this year. To put that into context, that's greater than the entire economic output of the UK today.If in the next 5 years, as expected, it becomes a $15 trillion market, if it were a ...
X @CoinDesk
CoinDesk· 2025-10-17 14:00
Decentralized Trust & Digital Identity - Explores the potential of decentralized trust to address issues with digital identities [1] - Highlights the importance of rewarding users for their data [1] - Emphasizes the need for educating developers to build transparent, privacy-first technology [1] Rethinking the Internet - Suggests a re-evaluation of the current internet structure [1]
X @Starknet (BTCFi arc)
Starknet 🐺🐱· 2025-10-17 11:47
Privacy & Encryption - StarkWare highlights crypto's role in restoring privacy in the digital age [1] - Arcium explains how encryption enables private and productive data usage [1] - The future of computing is confidential, emphasizing the importance of data protection [1]
X @CoinDesk
CoinDesk· 2025-10-15 20:50
Decentralized Trust & Digital Identity - Explores the potential of decentralized trust in addressing issues with digital identities [1] - Highlights the importance of rewarding users for their data [1] - Emphasizes the need for educating developers to build transparent, privacy-first technology [1] Rethinking the Internet - Questions whether it's time to rethink the internet [1]