Data privacy
Search documents
X @Starknet (BTCFi arc) 🥷
Starknet 🐺🐱· 2025-12-11 20:06
Technology & Security Concerns - Centralized fraud detection systems are perceived as surveillance engines due to their reliance on hoarding user data for judgment [1] - The current system operates on a "guilty until proven innocent" premise, raising privacy concerns [1] - Existing systems are seen as invasive "dragnets" rather than mathematically valid systems [3] Proposed Solution: STARKs & Decentralization - STARKs offer an alternative where users run checks locally instead of shipping data to a centralized entity [2] - The inference pipeline shifts to the client, and the alerting service becomes a verifier [3] - Users generate a proof of compliance instead of submitting the actual data [4] - The proposed system aims to make centralized data storage obsolete [1] Benefits of the Proposed System - Validity is ensured mathematically, reducing the need for invasive data collection [3] - User privacy is enhanced as data is not shared with a central authority [4]
Petco Data Breach Claims Investigated by Lynch Carpenter
Globenewswire· 2025-12-08 20:10
Core Points - Petco recently experienced a cybersecurity incident that compromised personal information of an unspecified number of individuals [1][2] - Lynch Carpenter, LLP is investigating claims against Petco related to this data breach, indicating potential legal repercussions for the company [1][3] Data Breach Details - An unauthorized individual accessed Petco's network and may have obtained records containing personally identifiable information (PII), including names, Social Security numbers, driver's license numbers, dates of birth, and financial account information such as account numbers and credit or debit card numbers [2][4] - Individuals whose information was affected may be entitled to compensation, highlighting the potential financial implications for Petco [2] Legal Context - Lynch Carpenter is a national class action law firm with a strong track record in data privacy matters, representing millions of clients over more than a decade [3] - The firm has offices in Pennsylvania, California, and Illinois, indicating a broad geographic reach for potential claims against Petco [3]
India mandates pre-installation of government cyber safety app on all smartphones
Jamaica· 2025-12-04 05:05
India’s telecoms ministry has directed smartphone manufacturers to pre-install a government-run cybersecurity app on all new devices, according to a government order, raising concerns of data privacy and user consent in one of the largest handset markets in the world.The Ministry of Communications’ order issued Monday asked smartphone makers to pre-install the government’s “Sanchar Saathi” app on all new devices within 90 days and to prevent users from deleting it. The order also requires manufacturers to p ...
Selfie-based age checks boom as govts push for online controls
The Economic Times· 2025-11-29 08:42
Core Insights - The technology for AI-powered age verification is gaining traction, particularly in response to regulations like Australia's social media ban for users under 16, effective from December 10 [1][11] - Yoti, a leading startup in this space, has reported significant growth, running approximately one million age checks daily and achieving £20 million ($26 million) in revenue for the year ending March, with a forecasted 50% increase in sales for the current financial year [4][11] Company Performance - Yoti has turned a profit this year, with a revenue of £20 million ($26 million) [4] - The company is experiencing rapid growth, forecasting a 50% increase in sales for the current financial year [4] - Yoti's technology is utilized by major clients including Meta, TikTok, Sony, and Pinterest [11] Industry Outlook - The Age Verification Providers Association (AVPA) projected that the sector could generate nearly $10 billion in annual revenue across OECD countries from 2031 to 2036 [5] - The industry is characterized by rapid technological advancements and regulatory changes, making future predictions challenging [5] Technology and Methodology - The age verification process involves users taking a selfie, with automated decisions made within a minute [2][11] - Yoti's algorithm has improved over time, becoming adept at estimating age based on facial patterns [3][11] - The technology is designed to detect false accessories or makeup that could misrepresent a user's age [9][11] Privacy and Ethical Concerns - There are concerns regarding data privacy and potential biases in age verification algorithms, particularly with non-white faces [5][8] - Experts suggest that the current ecosystem may shift towards better privacy protections in the future [6] - Yoti claims to remove all data immediately after analysis, addressing some privacy concerns [9]
X @Nick Szabo
Nick Szabo· 2025-11-27 06:37
Regulatory Landscape & Policy Changes - The EU Council has removed the requirement for mandatory scanning of end-to-end encrypted messaging services, representing a significant victory against mass surveillance [1] - The EU Council's proposal lays the groundwork for future mass surveillance, indicating ongoing concerns regarding privacy and security [1] - The EU Council's version of Chat Control includes voluntary scanning and vaguely worded legislation that may lead to mandatory ID checks, even for end-to-end encrypted services [3] - The EU Council will reconsider the requirement for mandatory scanning every three years, posing a recurring threat to privacy [3][5] - A new EU center is being established to focus on blocking material, raising concerns about potential censorship and the definition of "illegal" content [3][6] Technological Implications & Surveillance Concerns - The EU Council's Chat Control version introduces AI scanning of conversations, photos, and videos to detect criminal content, potentially leading to numerous false positives and privacy violations [4] - The scanning process involves American companies and could be used to scan for virtually anything, raising concerns about broader surveillance and data access [4] - The EU may require ID checks and ban anonymous use of messaging services and social media, impacting individuals in authoritarian countries, whistleblowers, and journalists [5] Industry Response & Advocacy - The industry urges the European Parliament to demand no mass surveillance without suspicion and a court order, no ID-verification requirements, and no censorship of legal content [2] - The industry views Chat Control as a proposal aimed at introducing mass surveillance, with ongoing attempts to challenge private and secure communication [7]
X @Avi Chawla
Avi Chawla· 2025-11-20 19:20
RT Avi Chawla (@_avichawla)You're in an AI engineer interview at Apple.The interviewer asks:"Siri processes 25B requests/mo.How would you use this data to improve its speech recognition?"You: "Upload all voice notes from devices to iCloud and train a model"Interview over!Here's what you missed:Modern devices (like smartphones) host a ton of data that can be useful for ML models.To get some perspective, consider the number of images you have on your phone right now, the number of keystrokes you press daily, ...
Crypto startup Seismic raises $10 million to help fintechs protect customer data
Yahoo Finance· 2025-11-12 13:00
As more and more fintech companies use crypto, they face one big challenge: blockchains are public. This creates a risk that customers’ sensitive financial data, like their salaries, or how much they pay for rent, could inadvertently be made public. That’s a problem that a startup called Seismic is aiming to solve. On Wednesday, Seismic announced that it raised $10 million in a funding round led by a16z crypto, with participation from Polychain, Amber Group, TrueBridge, dao5, and LayerZero. In total, the ...
X @Chainlink
Chainlink· 2025-11-04 18:00
Chainlink Confidential Compute was made possible by fundamental architectural innovations that differentiate it from existing blockchain privacy solutions.This includes two new systems: Chainlink Distributed Key Generation (DKG) and the Vault Decentralized Oracle Network (DON).• Decentralized Secrets Management via Chainlink DKG and the Vault DON:Chainlink Confidential Compute features a decentralized, institutional-grade system for secrets management and long-term storage of confidential data.The Vault DON ...
DATA BREACH ALERT: Edelson Lechtzin LLP is Investigating Claims on Behalf of Conduent Business Services, LLC Customers Whose Data May Have Been Compromised
Globenewswire· 2025-10-30 20:43
Core Points - Conduent Business Services, LLC experienced a data breach that was discovered on January 13, 2025, affecting its network operations [3] - An unauthorized third party accessed Conduent's network between October 21, 2024, and January 13, 2025, potentially obtaining sensitive personal information [3] - The law firm Edelson Lechtzin LLP is investigating claims related to the data breach and is considering a class action lawsuit for affected individuals [4] Company Overview - Conduent provides digital process solutions to enhance operations for businesses and government agencies [2] Incident Details - The cybersecurity incident led to disruptions in Conduent's network, prompting immediate security measures and an investigation [3] - The compromised files may have included personal information such as names, Social Security numbers, medical information, and health insurance details [3] Legal Actions - Edelson Lechtzin LLP is actively investigating the situation and seeking legal remedies for individuals whose data may have been compromised [4]
Digital Afterlife: Who Owns ur Data When ur Gone? | Suresh Sankaran Srinivasan | TEDxAsia Pacific U
TEDx Talks· 2025-10-29 16:47
Digital Afterlife & Data Privacy Concerns - The digital realm has become an integral part of human life, existing alongside the physical realm [4][5] - Individuals are increasingly concerned about the fate of their digital selves after death, including social media accounts and online data [5][15] - Digital platforms are evolving to monetize grief, such as creating chatbots of deceased individuals [17] - Technology is designed to remember rather than forget, raising concerns about the persistence of digital data [18] Internet Structure & Data Exposure - The internet consists of three layers: the surface web (emails, apps, social media), the deep web (browser cache, metadata, API data), and the dark web (traded personal information) [7][10][12] - Users often grant extensive permissions to applications on their phones without fully understanding the implications [11][12] - A significant amount of personal data is stored online, including credit card subscriptions and application permissions, often without users' full awareness [9][11] Risks & Implications - The continued existence of digital data after death poses cyber risks, including fraud and identity theft [18][19] - There is a lack of legal frameworks to allow loved ones to manage or remove a person's digital presence after death [20] - Ethical concerns arise regarding the use of personal memories and data without consent after death [21] - Philosophical questions are raised about closure and dignity in the digital realm [21][22] Call to Action & Policy Recommendations - There is a need to acknowledge and address the problem of digital afterlife and data management [22] - Discussions about digital wills and data management should occur in families, boardrooms, and policy-making settings [23] - Increased awareness is needed regarding the data collection practices of apps and online platforms [23] - Policy ecosystems and legal frameworks are required to enable individuals to control their digital legacy and allow for the removal of data after death [24]