How do companies collect, use, analyze, locate your device, and share your personal data?

2023-08-15T17:56:38-06:00August 8th, 2023|Tags: , , , , , , , , , , , |

Most people just are not that interested in the "Privacy Policies" of the Online Tools they use. Many will be surprised to learn that these are just some of the ways their personal data is found and shared and their [...]

Apple sues NSO Group to curb the abuse of state-sponsored spyware

2021-11-24T14:56:23-07:00November 23rd, 2021|Tags: , , , , , , , , , |

Apple today filed a lawsuit against NSO Group and its parent company to hold it accountable for the surveillance and targeting of Apple users. The complaint provides new information on how NSO Group infected victims’ devices with its Pegasus spyware. To prevent [...]

Your 35-Character Password is Weak

2019-06-03T14:50:59-06:00June 3rd, 2019|Tags: , , |

According to Frank Gifford this 35-character password, FI7CTQsBDvsMwbQNyY6qxV2FunWIUpXpcZm, is surprisingly weak. Java’s util.Random class uses a pseudo-random number generator (PRNG) which creates a deterministic sequence of numbers. When one needs statistically random numbers, such as for Monte Carlo simulations, this is a [...]

Go to Top