This is probably worth paying attention to:
Continue reading TikTok Can Now Collect Biometric Data
The person behind the Bitcoin Fog was identified and arrested. Bitcoin Fog was an anonymization service: for a fee, it mixed a bunch of people’s bitcoins up so that it was hard to figure out where any individual coins came from. It ran for ten years.
Identifying the person behind Bitcoin Fog serves as an illustrative example of how hard it is to be anonymous online in the face of a competent police investigation:
Most remarkable, however, is the IRS’s account of tracking down Sterlingov using the very same sort of blockchain analysis that his own service was meant to defeat. The complaint outlines how Sterlingov allegedly paid for the server hosting of Bitcoin Fog at one point in 2011 using the now-defunct digital currency Liberty Reserve. It goes on to show the blockchain evidence that identifies Sterlingov’s purchase of that Liberty Reserve currency with bitcoins: He first exchanged euros for the bitcoins on the early cryptocurrency exchange Mt. Gox, then moved those bitcoins through several subsequent addresses, and finally traded them on another currency exchange for the Liberty Reserve funds he’d use to set up Bitcoin Fog’s domain…
Continue reading Identifying the Person Behind Bitcoin Fog
Just like our fingerprints, the shape and pattern of each dog’s nose is unique to that animal. Bearing this in mind, pet food company Iams has launched a “nose-centric” app for identifying lost dogs – appropriately enough, it’s called NOSEiD.Continue R… Continue reading Biometric ID app knows lost dogs by their noses
A mafia fugitive hiding out in the Dominican Republic was arrested when investigators found his YouTube cooking channel and identified him by his distinctive arm tattoos.
Continue reading Fugitive Identified on YouTube By His Distinctive Tattoos
Although an increasing number of countries are switching to sturdier, harder-to-copy polymer banknotes, the things still are being counterfeited. A new technology could help weed those fakes out, by taking their fingerprints.Continue ReadingCategory: G… Continue reading Unique banknote “fingerprints” could be used to spot fakes
While it is obvious that an attack surface is the sum of all ways the system can be compromised or attack vectors (please correct me if I am wrong here or am not taking something into account), it is not that obvious if an exposed username… Continue reading Does an exposed username increase the attack surface?
Currently there is this design of two apps that work together:
Proof app: On customers phone, takes in a textcode and creates a QR code
Scanner app: On hosts phone, Scans the QR code and displays some information like birthday, initial an… Continue reading Can we prevent users from generating a QR code with edited information
Although facial ID verification tech may seem pretty impressive, it can be thwarted. An experimental new system is claimed to be more foolproof, by requiring users to make specific facial movements.Continue ReadingCategory: Good Thinking, LifestyleTags… Continue reading More secure two-factor ID system requires users to make faces
Recently I’ve had two nonprofit organizations ask me to email them a photo of my driver’s license. No money is changing hands, and both of these are legitimate and well-known nonprofits.
Organization A wanted me to sign a document with a n… Continue reading Nonprofit organizations asking me to email them a photo of my driver’s license
I am looking to build an app for a messaging platform that acts as a form of data loss prevention (DLP). Now, DLP covering huge aspects, I want to exclude things like network or endpoint related areas but strictly focus on analyzing messag… Continue reading Open source Data loss protection tools for data identification