I recently wrote a series on the often overlooked cyber security tool encryption. Encryption – A Primer | Smart Thinking Solutions But you have to be able to rely on your encryption and you need the vendor to fix issues quickly as another word for encryption with out a working …
In Support of Encryption
The idea for this article on encryption came to me whilst reading Joe Haldeman’s The Hemingway Hoax (see the disclaimer at the end of this article) – written in 1990 it was slightly ahead of the computer revolution. In the book, three people are involved in a fraud to produce …
Who are you texting with?
This may seem to be a strange question but how can you be sure who is actually texting you? Your phone may show you that you are texting with your friend or company IT support but there are ways for hackers to spoof who they appear to be or even …
Just as the Online Safety Bill becomes law – who is going to be safe?
Benjamin Dowling, a lecturer of Cybersecurity at the University of Sheffield has an article on The Conversation looking at the UK Online Safety Bill and who it will protect and who it will harm. The UK just passed an online safety law that could make people less safe (theconversation.com) I …
Continue reading “Just as the Online Safety Bill becomes law – who is going to be safe?”
Apple and End-to-End Encryption
Apple has joined the debate about the UK government’s proposed bill to weaken every UK citizen’s privacy online, by threatening to pull affected Apple services from the UK market. As Apple (and several articles I have posted) state, laws already exist for the authorities to breach the privacy of citizens …