Tweetovi

Blokirali ste korisnika/cu @sidnext2none

Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @sidnext2none

  1. proslijedio/la je Tweet
    2. velj

    My slides for today’s talk on protocol security are posted on my website: Thanks to everyone who attended and for all the great feedback I got so far!Enjoy the rest of the con!

    Poništi
  2. proslijedio/la je Tweet
    28. sij

    🔒 How can the be used to support the work of civil society? In recognition of , explore our data protection reflection stories:

    Poništi
  3. proslijedio/la je Tweet
    28. sij

    Incredibly practical framework for anyone looking to apply machine learning applications to complex social problems.

    Poništi
  4. proslijedio/la je Tweet
    20. sij

    Or they could just use 's artificial unintelligence tool to anticipate what CCIA is going to say - the result is likely to be very similar...

    Poništi
  5. 16. sij
    Prikaži ovu nit
    Poništi
  6. 16. sij
    Prikaži ovu nit
    Poništi
  7. 16. sij

    You can find the PDF version here: We wrote a blog post about it as well: Thanks to this awesome bunch of contributors

    Prikaži ovu nit
    Poništi
  8. 16. sij

    Web development could be easy. But, web development is NOT! Especially without community-vetted guidelines. We've covered a wide range of topics, from to to , in this handy & usable guide. Plz let the world know.

    Prikaži ovu nit
    Poništi
  9. 13. sij
    Poništi
  10. 10. sij

    The low-end Android-based smartphones are ported with such malware, or firmware as they call, that transmits: - SMS (matching remotely defined keywords) - contact list - call history - IMSI and IMEI are

    Prikaži ovu nit
    Poništi
  11. 10. sij

    Adpus telco family was found in 2017. It seems to be back now. Assurance Wireless (part of the Virgin Mobile group) runs a government program that subsidizes phones and services for low-income Americans.

    Prikaži ovu nit
    Poništi
  12. proslijedio/la je Tweet
    9. sij

    From hiding incriminating HTML to purchasing Google Ads for marital spying, spyware vendors clearly market their technologies for purposes that many would find dangerous. Read our full report on the marketing, technical, & legal aspects of the industry.

    Poništi
  13. proslijedio/la je Tweet
    10. pro 2019.

    Why it's vital that litigators and technologists work together to dismantle the drivers of surveillance-based business models, and hold those applying harmful tech to account. Blog by Mozilla Open Web Fellow

    Poništi
  14. proslijedio/la je Tweet
    4. sij

    Wow solid December from the signal team. Great blogpost by and really neat use of raft with sgx The essential idea of secure key recovery is applicable in so many scenarios!

    Poništi
  15. proslijedio/la je Tweet
    28. pro 2019.
    Poništi
  16. proslijedio/la je Tweet

    I used to think the EU's Right to be Forgotten was too vague, easily abused, and didn't do much for privacy. Now Google has released a detailed paper on 5 years of RTBF requests. Despite the paper's mild spin, the data suggests RTBF is working pretty well!

    Prikaži ovu nit
    Poništi
  17. proslijedio/la je Tweet
    21. pro 2019.
    Poništi
  18. proslijedio/la je Tweet
    19. pro 2019.

    Twelve Million Phones, One Dataset, Zero Privacy

    Prikaži ovu nit
    Poništi
  19. proslijedio/la je Tweet

    🗺️ In collaboration with , we developed a decision tree + set of case studies earlier this year to contextualise their guidelines on the ethical use of geo-located data in crisis situations:

    Poništi
  20. 14. pro 2019.
    Odgovor korisnicima

    I remember mentioning that to Linus.

    Poništi

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.

    Možda bi vam se svidjelo i ovo:

    ·