How could I make the results of a yes/no vote inaccessible unless it’s unanimous in the affirmative, without a trusted third party?

A family of N people (where N >= 3) are members of a cult. A suggestion is floated anonymously among them to leave the cult. If, in fact, every single person secretly harbors the desire to leave, it would be best if the family knew abou… Continue reading How could I make the results of a yes/no vote inaccessible unless it’s unanimous in the affirmative, without a trusted third party?

Why, with such insanely powerful computers, are no efforts to speak of spent on security? [closed]

The only technology “news” I ever hear about go on about “performance this” and “performance that”. I haven’t felt that my computer was “slow” since the 1990s. 20 years ago. Yet this is the only thing I ever hear anyone talk about.

Why, f… Continue reading Why, with such insanely powerful computers, are no efforts to speak of spent on security? [closed]

Off-Facebook Activity Tool, Ring App Third-Party Trackers, Wawa Credit Card Breach

In episode 106 for February 3rd 2020: What you need to know about Facebook’s new off-Facebook activity tool, details about the Ring Android app sending user data to third party trackers, and new developments in the Wawa credit card breach. ** Sho… Continue reading Off-Facebook Activity Tool, Ring App Third-Party Trackers, Wawa Credit Card Breach

Why Third-Party Security is Critically Important in 2020

The new year has only just begun, and many CISOs and compliance professionals are making third-party risk management a priority. Similar to how those who never received flu shots may suddenly decide to vaccinate during a particularly bad flu seaso… Continue reading Why Third-Party Security is Critically Important in 2020

The 5 Most Essential Third-Party Cyber Risk Assessment Tools

Cybersecurity and compliance professionals agree that third-party cyber risk management is vital to organizations. Without having the right security policies and procedures in place, your organization could be vulnerable to a third-party cyberatta… Continue reading The 5 Most Essential Third-Party Cyber Risk Assessment Tools