The idea for this article on encryption came to me whilst reading Joe Haldeman’s The Hemingway Hoax (see the disclaimer at the end of this article) – written in 1990 it was slightly ahead of the computer revolution. In the book, three people are involved in a fraud to produce …
Who are you texting with?
This may seem to be a strange question but how can you be sure who is actually texting you? Your phone may show you that you are texting with your friend or company IT support but there are ways for hackers to spoof who they appear to be or even …
Just as the Online Safety Bill becomes law – who is going to be safe?
Benjamin Dowling, a lecturer of Cybersecurity at the University of Sheffield has an article on The Conversation looking at the UK Online Safety Bill and who it will protect and who it will harm. The UK just passed an online safety law that could make people less safe (theconversation.com) I …
Continue reading “Just as the Online Safety Bill becomes law – who is going to be safe?”
Apple and End-to-End Encryption
Apple has joined the debate about the UK government’s proposed bill to weaken every UK citizen’s privacy online, by threatening to pull affected Apple services from the UK market. As Apple (and several articles I have posted) state, laws already exist for the authorities to breach the privacy of citizens …
Why we all need end-2-end-encryption
Here is a short BBC video explaining why E2EE protects our privacy from prying service companies and hackers: What is end to end encryption and why are police concerned about its rise? – BBC News As with all E2EE articles terrorists and child abusers are mentioned. Law enforcement already has …