Just a few weeks ago, the murder of George Floyd sparked worldwide protests by and in alliance with the black community. Especially here in the US, this has immediately led to a parallel push for systemic change for domestic law enforcement. Simultaneously, this has revived media attention regarding the role of technology in perpetuating racial biases in policing—especially that of facial recognition technology.
Passwords suck.They’re hard to remember, hackers exploit their weaknesses and fixes often bring their own problems. Dashlane, LastPass, 1Password and other password managers generate strong and unique passwords for every account you have, but the software is complex. Services from Google, Facebook and Apple allow you to use your passwords for their services at other sites, but you have to give them even more power over your life online. Two-factor authentication, which requires a second passcode sent by text message or retrieved from a special app each time you log in, boosts security dramatically but can still be defeated.
Passwords suck.
They’re hard to remember, hackers exploit their weaknesses and fixes often bring their own problems. Dashlane, LastPass, 1Password and other password managers generate strong and unique passwords for every account you have, but the software is complex. Services from Google, Facebook and Apple allow you to use your passwords for their services at other sites, but you have to give them even more power over your life online. Two-factor authentication, which requires a second passcode sent by text message or retrieved from a special app each time you log in, boosts security dramatically but can still be defeated.
China’s Data Privacy Balancing Act by One World Identity | June 26, 2020 The New York Times announced last week that China is implementing a mass DNA collection project in order to create a large-scale database that genetically maps the country’s entire male population. This news reignites concern over China’s mass surveillance system, especially as it made…
Biometrics are part of the cutting edge of technology. Put simply, biometrics are any metrics related to human features. The most common examples of a biometric recognition system is the iPhone’s fingerprint and facial recognition technology. As an emerging technology, biometric systems can add great convenience by replacing passwords and helping law enforcement catch criminals. Biometric identifiers also act as access control in secure environments, both physical and digital. But the first question you should ask is: Is my biometric data secure from identity theft?
By 2024, Mercator forecasts that 66% of smartphone owners will use biometrics for authentication. Currently, Mercator estimates that 41% of smartphone owners are using biometrics. Just one year ago, in 2019 only 27% of consumers used biometrics to authenticate.
From Equifax to Capital One, many customers of these companies have learned the hard way that they shouldn’t have trusted these brands to keep their data secure.A data breach like these is completely avoidable, but only if you don’t deny just how important cybersecurity is for your business and its customers. If you don’t want to be the next Capital One but are unsure how to go about enhancing your data security efforts, you’re not alone.
From Equifax to Capital One, many customers of these companies have learned the hard way that they shouldn’t have trusted these brands to keep their data secure.
A data breach like these is completely avoidable, but only if you don’t deny just how important cybersecurity is for your business and its customers. If you don’t want to be the next Capital One but are unsure how to go about enhancing your data security efforts, you’re not alone.
Data is precious. Protecting it and being careful and deliberate with giving access to our data and systems is a critical need. For companies building on Enterprise Ethereum, there is a real need to limit the parties that can participate in your network and be privy to the data, and what types of transactions users can make — sending funds, deploying smart contracts, etc. Enter, permissioning.
We define the permissioning protocol of a blockchain network as the process to determine whether a new node is accepted in the network or not.The LACChain DLT networks will have two different protocols for permissioning new nodes. The first one is named Satellite Permissioning Protocol (SPP) and applies for any new node. The second one is named Core Permissioning Protocol (CPP) and applies only for core nodes. If you are not familiar with our taxonomy, you can read about our core and satellite nodes HERE.
We define the permissioning protocol of a blockchain network as the process to determine whether a new node is accepted in the network or not.
The LACChain DLT networks will have two different protocols for permissioning new nodes. The first one is named Satellite Permissioning Protocol (SPP) and applies for any new node. The second one is named Core Permissioning Protocol (CPP) and applies only for core nodes. If you are not familiar with our taxonomy, you can read about our core and satellite nodes HERE.
The march is on to establish digital identities that fully mirror the real-life identities of individuals. This achievement will unlock more secure, seamless, and reliable interactions online for individuals and organizations alike. While the myriad online activities, multiple social media accounts, and overall immersion of the modern person may make it seem as though identities have completely migrated into the digital ecosystem, the fact is that digital identities remain highly fragmented, context-dependent, and challenging to verify.
This website uses cookies to improve your experience. We'll assume you're ok with this, but you can opt-out if you wish. Privacy Policy