If you've got Nothing to Hide
Article URL: https://jacquesmattheij.com/if-you-have-nothing-to-hide/ Comments URL: https://news.ycombinator.com/item?id=46897620 Points: 7 Comments: 5...
Article URL: https://jacquesmattheij.com/if-you-have-nothing-to-hide/ Comments URL: https://news.ycombinator.com/item?id=46897620 Points: 7 Comments: 5...
Overview mask-email is a tiny, dependency‑free TypeScript utility that masks email addresses to help you avoid leaking personal data in logs, UI, or analytics....
After the FBI raided a Washington Post reporter’s home and seized multiple devices, Lockdown Mode prevented them from accessing her iPhone. Here are the details...
Sen. Markey: Database of peaceful protesters, if it exists, should be shut down....
The Invisible Leak “Localhost is like a fortress. ‘It’s just on my machine. It’s safe.’” But how did the data get there? You copied it. The Clipboard Reality -...
Five years ago, I started working on json‑tool out of necessity. I needed a JSON‑formatting tool I could trust with sensitive data—one that wouldn't send my inf...
Article URL: https://nikolak.com/gdpr-failure/ Comments URL: https://news.ycombinator.com/item?id=46874345 Points: 60 Comments: 20...
Article URL: https://www.wired.com/story/how-data-brokers-can-fuel-violence-against-public-servants/ Comments URL: https://news.ycombinator.com/item?id=46872190...
India's top court is investigating WhatsApp’s data-sharing model, monopoly power, and user consent....
Both the founders of WhatsApp and current owner Meta state that the app uses end-to-end encryption, meaning that nobody outside the chat can access the content....
Why raw user data is a compliance risk If your app sends user data to an AI model, you may be sharing personally identifiable information PII without realizing...
Microsoft gives the FBI the ability to decrypt BitLocker in response to court orders: about twenty times per year. It’s possible for users to store those keys o...