Tagged articles
250 articles
Page 2 of 3
AntTech
AntTech
Dec 22, 2023 · Information Security

2023 Security and Trustworthy Computing Research Summary – 14 Papers Accepted at Top International Conferences

In late 2023, Ant Group and academic partners reported fourteen security‑focused research papers accepted at top venues such as USENIX Security, ACM CCS, and USENIX ATC, covering privacy‑preserving computation, secure two‑party GBDT training, macOS kernel fuzzing, privacy‑preserving ML frameworks, Rust OOM handling, and more.

MPCSystemscryptography
0 likes · 18 min read
2023 Security and Trustworthy Computing Research Summary – 14 Papers Accepted at Top International Conferences
php Courses
php Courses
Nov 30, 2023 · Information Security

ChatGPT Repeat Prompt Vulnerability Exposes Sensitive Personal Information

Researchers discovered that prompting ChatGPT with repeated words can cause the model to leak private data such as phone numbers and email addresses, highlighting a serious repeat‑prompt vulnerability that reveals substantial personally identifiable information from its training corpus.

ChatGPTPIIarXiv
0 likes · 3 min read
ChatGPT Repeat Prompt Vulnerability Exposes Sensitive Personal Information
21CTO
21CTO
Nov 12, 2023 · Artificial Intelligence

How AI Agents Will Revolutionize Computing and Everyday Life

Bill Gates predicts that AI agents will soon replace separate applications, enabling users to command devices with natural language, transforming software, productivity, healthcare, education, and entertainment, while raising significant technical, privacy, and societal challenges that could spark the biggest computer revolution since the graphical user interface.

AI agentsfuture of AIprivacy
0 likes · 18 min read
How AI Agents Will Revolutionize Computing and Everyday Life
php Courses
php Courses
Nov 10, 2023 · Artificial Intelligence

OpenAI Announces Data Partnership Program for Public and Private Training Datasets

OpenAI revealed a new data partnership initiative to collect large‑scale public and private datasets across multiple modalities, aiming to improve AI model safety and usefulness by incorporating diverse, hard‑to‑access human‑generated content while respecting privacy and intent.

AI training dataData PartnershipOpenAI
0 likes · 3 min read
OpenAI Announces Data Partnership Program for Public and Private Training Datasets
IT Services Circle
IT Services Circle
Oct 26, 2023 · Information Security

Weibo Introduces Front‑Page Real‑Name Display and Visitor Record Feature: Privacy Implications

Weibo has begun testing a front‑page real‑name system for high‑follower accounts and a visitor‑record function limited to premium members, sparking user backlash over privacy concerns, debates about platform monetisation, and discussions of the broader impact on social media behaviour.

Weiboprivacyreal-name verification
0 likes · 6 min read
Weibo Introduces Front‑Page Real‑Name Display and Visitor Record Feature: Privacy Implications
macrozheng
macrozheng
Oct 19, 2023 · Information Security

How to Perform Fuzzy Search on Encrypted Phone Numbers in MySQL

This article explores multiple strategies for enabling fuzzy search on encrypted phone numbers, including in‑memory caching, database decryption functions, segment‑wise storage, and dedicated fuzzy‑search fields, comparing their trade‑offs in performance, memory usage, and data consistency.

Backendencryptionfuzzy-search
0 likes · 10 min read
How to Perform Fuzzy Search on Encrypted Phone Numbers in MySQL
Su San Talks Tech
Su San Talks Tech
Oct 12, 2023 · Information Security

How to Enable Fuzzy Search on Encrypted Phone Numbers in MySQL

This article explores practical methods for performing fuzzy searches on encrypted phone numbers, covering in‑memory caching, database decryption functions, segment‑based storage, and adding dedicated fuzzy‑search fields to balance security, performance, and scalability.

Database designencryptionfuzzy-search
0 likes · 10 min read
How to Enable Fuzzy Search on Encrypted Phone Numbers in MySQL
Open Source Linux
Open Source Linux
Sep 27, 2023 · Information Security

How Companies Spy on Your WeChat Chats and How to Defend Your Privacy

Despite modern privacy expectations, many companies in 2023 still monitor employees' chat records using root‑level management software and network interception, exposing personal WeChat conversations; this article explains the surveillance methods, real‑world examples, and practical steps employees can take to protect their privacy.

WeChatcompany policiesdesktop surveillance
0 likes · 5 min read
How Companies Spy on Your WeChat Chats and How to Defend Your Privacy
AntTech
AntTech
Sep 6, 2023 · Cloud Computing

Ant Group's Edge‑Cloud Collaborative Risk Control: Architecture, Algorithms, and Privacy Protection

The article presents Ant Group’s edge‑cloud collaborative risk‑control solution, detailing its evolution from pure cloud to edge‑cloud and edge‑cloud‑edge models, the challenges of precise, low‑latency detection, privacy protection, and the core AI algorithms such as personalized models, federated learning, and differential privacy.

Edge Computingartificial intelligencecloud
0 likes · 11 min read
Ant Group's Edge‑Cloud Collaborative Risk Control: Architecture, Algorithms, and Privacy Protection
AntTech
AntTech
Sep 2, 2023 · Information Security

Innovative Cryptographic Technologies and Applications Forum – Session Summaries and Speaker Information

The announcement details a September 7 forum hosted by the China Cryptology Society, featuring eight technical talks on cutting‑edge cryptographic and data‑security technologies—including hardware security, secure GPT inference, volume‑hiding encrypted multi‑maps, end‑to‑same‑end encryption, fully homomorphic encryption databases, dishonest‑majority MPC, active privacy computing, and the Bicoptor protocol—along with speaker biographies and abstracts.

MPCcryptographydata security
0 likes · 15 min read
Innovative Cryptographic Technologies and Applications Forum – Session Summaries and Speaker Information
DataFunSummit
DataFunSummit
Aug 27, 2023 · Artificial Intelligence

Privacy-Preserving Gradient Boosting Decision Trees via Multi-Party Computation and the Squirrel Framework

This article introduces a privacy-preserving gradient boosting decision tree (GBDT) solution built on multi‑party computation, detailing its background, training steps, the MPC tools used, and the Squirrel framework’s workflow, while discussing performance challenges and experimental results demonstrating scalability to millions of samples.

GBDTMPCSquirrel Framework
0 likes · 9 min read
Privacy-Preserving Gradient Boosting Decision Trees via Multi-Party Computation and the Squirrel Framework
vivo Internet Technology
vivo Internet Technology
Aug 23, 2023 · Artificial Intelligence

Federated Learning: Privacy-Preserving Collaborative AI Across Data Islands

Federated learning enables multiple organizations to jointly train high‑performing AI models without sharing raw data, using techniques such as secure multi‑party computation, differential privacy, and homomorphic encryption, thereby overcoming data‑island and regulatory constraints and supporting applications in mobile edge AI, finance, retail, and healthcare.

Data IslandFederated LearningHomomorphic Encryption
0 likes · 19 min read
Federated Learning: Privacy-Preserving Collaborative AI Across Data Islands
Weimob Technology Center
Weimob Technology Center
Jul 25, 2023 · Information Security

How to Secure Data: Practical Guide to Masking and Encryption Strategies

This comprehensive guide explains why modern enterprises must shift from network‑centric protection to data‑centric security, detailing practical approaches for data masking and storage encryption, evaluating regulatory requirements, outlining solution selection, and providing step‑by‑step implementation practices to safeguard sensitive information.

compliancedata maskingdata security
0 likes · 29 min read
How to Secure Data: Practical Guide to Masking and Encryption Strategies
Network Intelligence Research Center (NIRC)
Network Intelligence Research Center (NIRC)
Jul 24, 2023 · Artificial Intelligence

NetShare: An End-to-End System for GAN-Based IP Header Trace Packet Generation

This article presents NetShare, an end-to-end framework that uses time‑series GANs combined with domain‑specific encoding to synthesize privacy‑preserving IP header and flow traces, achieving up to 46% higher accuracy than prior generative baselines while improving the fidelity‑privacy trade‑off.

GANIP Header TracingNetShare
0 likes · 7 min read
NetShare: An End-to-End System for GAN-Based IP Header Trace Packet Generation
Network Intelligence Research Center (NIRC)
Network Intelligence Research Center (NIRC)
Jul 4, 2023 · Artificial Intelligence

FedMRL: Federated Meta Reinforcement Learning for Cold-Start Slice Resource Management

FedMRL tackles the cold‑start problem of network‑slice resource orchestration by combining federated learning with meta‑reinforcement learning, using a two‑loop training process that preserves SP data privacy and consistently outperforms TUNE, TDSC, and IOSP across diverse 6G network conditions.

6GFederated LearningMAML
0 likes · 6 min read
FedMRL: Federated Meta Reinforcement Learning for Cold-Start Slice Resource Management
IT Services Circle
IT Services Circle
Jun 15, 2023 · Information Security

Microsoft Edge Image Super-Resolution Feature Raises Privacy Concerns and How to Disable It

Microsoft Edge's newly enabled image super‑resolution feature automatically enhances picture clarity but sends image URLs to Microsoft servers, prompting privacy concerns; the article explains the feature, its local processing claim, and provides step‑by‑step instructions to disable it in both stable and Canary builds.

Browser SettingsMicrosoft Edgeimage super-resolution
0 likes · 3 min read
Microsoft Edge Image Super-Resolution Feature Raises Privacy Concerns and How to Disable It
ITPUB
ITPUB
Jun 9, 2023 · Information Security

The 70 Largest Data Breaches in History: Impact, Details, and Lessons Learned

This comprehensive list chronicles the 70 biggest data breach incidents ever recorded, detailing dates, affected records, compromised data types, and the security failures that exposed personal information for companies ranging from social networks to financial institutions.

cybersecuritydata breachinformation security
0 likes · 43 min read
The 70 Largest Data Breaches in History: Impact, Details, and Lessons Learned
Programmer DD
Programmer DD
May 29, 2023 · Information Security

Why Firefox’s Full‑Screen VPN Ads Spark Outrage and How to Block Them

Recent users reported that Firefox displays intrusive full‑screen VPN ads that freeze the browser, violate Mozilla’s privacy principles, and sparked community backlash, leading to a bug‑tracking saga and eventual removal of the ads with suggested ad‑blocking workarounds.

FirefoxVPNad blocking
0 likes · 5 min read
Why Firefox’s Full‑Screen VPN Ads Spark Outrage and How to Block Them
58UXD
58UXD
May 5, 2023 · Artificial Intelligence

Can AI-Generated Art Be Protected? Exploring Copyright and Privacy Risks

This article examines the rise of AI‑generated artworks, the high‑profile NFT sale that sparked copyright disputes, legal frameworks in the EU and China, and the privacy challenges posed by AI models, offering practical guidance for creators to navigate these emerging risks.

AI copyrightAI ethicsAIGC
0 likes · 6 min read
Can AI-Generated Art Be Protected? Exploring Copyright and Privacy Risks
AntTech
AntTech
May 4, 2023 · Artificial Intelligence

Privacy Risks and Differentially Private Defense for Federated Knowledge Graph Representation Learning

This paper investigates the privacy leakage risks of federated knowledge graph representation learning, designs three membership inference attacks to quantify the threats, and proposes DP‑Flames, a differential‑privacy‑based defense that leverages gradient sparsity to achieve a favorable privacy‑utility trade‑off.

DP-FlamesFederated Learningdifferential privacy
0 likes · 15 min read
Privacy Risks and Differentially Private Defense for Federated Knowledge Graph Representation Learning
IT Services Circle
IT Services Circle
Apr 17, 2023 · Mobile Development

Android 14 Beta 1 Released with New Features and Privacy Enhancements

Google has launched Android 14 Beta 1 for general users, allowing Pixel devices to upgrade while warning of potential installation errors, and introduces a series of incremental improvements such as enhanced PIN privacy, a transparent navigation bar, restored volume controls, BLE audio settings, and updated photo/video permissions.

AndroidBetaMobile Development
0 likes · 4 min read
Android 14 Beta 1 Released with New Features and Privacy Enhancements
NetEase Cloud Music Tech Team
NetEase Cloud Music Tech Team
Apr 3, 2023 · Mobile Development

Implementing System-wide Screen Recording with ReplayKit on iOS

The article explains how to implement iOS system‑wide screen recording using ReplayKit, covering its evolution, extension setup, sample‑buffer handling, communication between host app and extension, user‑friendly activation via RPSystemBroadcastPickerView, privacy‑mode safeguards, memory‑limit management, and practical tips for robust live streaming.

Broadcast ExtensionReplayKitScreen Recording
0 likes · 15 min read
Implementing System-wide Screen Recording with ReplayKit on iOS
Python Programming Learning Circle
Python Programming Learning Circle
Mar 21, 2023 · Mobile Development

Overview of Android 13 New Features and Improvements

This article provides a comprehensive overview of Android 13, covering supported devices, design and UI changes, new functionalities such as automatic theme icons, enhanced media controls, privacy and security updates, as well as internal optimizations and power‑management improvements.

Android13MobilePowerOptimization
0 likes · 9 min read
Overview of Android 13 New Features and Improvements
vivo Internet Technology
vivo Internet Technology
Dec 7, 2022 · Databases

vivo's Database Operations Platform: Challenges and Solutions in the Cloud-Native Era

Vivo’s Database‑as‑a‑Service platform tackles cloud‑native challenges by automating massive instance management with self‑service work orders and self‑healing, enabling elastic scaling through mixed‑deployment and multi‑threaded Redis tools, optimizing costs via automatic package shrinkage, and safeguarding personal data with full‑chain encryption, while outlining a roadmap toward AI‑driven fault handling, container‑based resources, and advanced privacy governance.

DaaSOperationscloud-native
0 likes · 14 min read
vivo's Database Operations Platform: Challenges and Solutions in the Cloud-Native Era
DaTaobao Tech
DaTaobao Tech
Nov 21, 2022 · Mobile Development

Modular iOS Photo Album Architecture and Implementation

The article describes a modular iOS photo‑album solution that isolates the album as an independent, reusable SDK through a three‑layer architecture—interface, view‑customization, and logic management—implementing reading and change chains, handling iOS 14 privacy, iCloud assets, and multithreaded PhotoKit operations to reduce coupling and maintenance costs.

MVVMPhotoKitiOS
0 likes · 13 min read
Modular iOS Photo Album Architecture and Implementation
Programmer DD
Programmer DD
Nov 11, 2022 · Information Security

How a Twitter Engineer Cut Mobile Bandwidth by 40% and Faced a Privacy Dilemma

In 2015‑2016, Twitter engineer Steve Krenzel reduced mobile bandwidth consumption by about 40% through gzip‑compressed request logging, only to confront an ethical clash when a telecom client demanded identifiable user location data, leading him to reject the request and eventually leave the company.

Data EthicsTwitterbandwidth optimization
0 likes · 8 min read
How a Twitter Engineer Cut Mobile Bandwidth by 40% and Faced a Privacy Dilemma
Java Architect Essentials
Java Architect Essentials
Oct 23, 2022 · Information Security

Dutch Employee Wins €75,000 Compensation After Being Fired for Refusing Webcam Monitoring

A Dutch employee was awarded €75,000 (≈ ¥520,000) after a Dutch court ruled that his dismissal for refusing to keep his webcam on during remote work violated his privacy rights, highlighting legal limits on employer surveillance and prompting broader debate on remote‑work monitoring practices.

Data Protectionemployee monitoringlegal case
0 likes · 7 min read
Dutch Employee Wins €75,000 Compensation After Being Fired for Refusing Webcam Monitoring
AntTech
AntTech
Sep 29, 2022 · Artificial Intelligence

Privacy-Preserving Vertical Federated Graph Neural Network for Node Classification

This article presents VFGNN, a privacy‑preserving vertical federated graph neural network designed for node classification, detailing its architecture, differential‑privacy enhancements, and experimental results that demonstrate superior accuracy over single‑party baselines across multiple graph datasets.

Federated LearningVertical Partitiondifferential privacy
0 likes · 14 min read
Privacy-Preserving Vertical Federated Graph Neural Network for Node Classification
Zhixing ZXD Design Center
Zhixing ZXD Design Center
Sep 28, 2022 · Product Management

8 Real-World UI/UX Cases That Boost User Experience

This article analyzes eight practical UI/UX case studies—from empathetic map navigation and smarter text input to privacy‑focused designs, motion‑enhanced feedback, IP interaction, and streamlined flows—showing how thoughtful design can dramatically improve user satisfaction across mobile apps.

Case StudyInteraction DesignProduct Design
0 likes · 8 min read
8 Real-World UI/UX Cases That Boost User Experience
Java Architect Essentials
Java Architect Essentials
Sep 25, 2022 · Information Security

Hidden Camera Threats and Practical Prevention Tips

The article warns about the widespread use of hidden cameras in hotels, gyms, bathrooms and other private spaces, describes real incidents, explains how perpetrators conceal devices, and offers practical detection methods and legal advice to protect personal privacy from illicit surveillance.

anti‑spyhidden cameraslegal advice
0 likes · 6 min read
Hidden Camera Threats and Practical Prevention Tips
Meituan Technology Team
Meituan Technology Team
Sep 22, 2022 · Information Security

Tokenization for Data Security: Design, Implementation, and Engineering Practices

The article explains how tokenization transforms data security into a built‑in attribute that automatically scales with data growth, detailing its design principles, generation methods, architectural layers, security safeguards, and practical engineering experiences to address exposure risks in modern digital businesses.

Data GovernancePIISecurity Architecture
0 likes · 24 min read
Tokenization for Data Security: Design, Implementation, and Engineering Practices
37 Interactive Technology Team
37 Interactive Technology Team
Sep 15, 2022 · Information Security

Apple Privacy Evolution: Photo Library Access, App Tracking Transparency, SKAdNetwork, and Security Features

Since the 2018 Facebook scandal, Apple has tightened privacy by introducing limited photo library access, App Tracking Transparency, SKAdNetwork 2.0/3.0 attribution, Private Click Measurement, differential‑privacy analytics, granular app permissions, Lockdown Mode, and password‑less Passkeys, balancing developer openness with strong user security.

App Tracking TransparencyAppleSKAdNetwork
0 likes · 20 min read
Apple Privacy Evolution: Photo Library Access, App Tracking Transparency, SKAdNetwork, and Security Features
DataFunSummit
DataFunSummit
Sep 11, 2022 · Information Security

Privacy and Reliability in Big Data Collaboration: Trusted Execution Environments and Blockchain Coordination

This article presents a technical overview of the security challenges in multi‑party big‑data collaboration and explains how Trusted Execution Environments (TEE) and blockchain can be combined to protect data privacy, ensure computation integrity, and enable traceable data usage in distributed systems.

BlockchainTEEprivacy
0 likes · 12 min read
Privacy and Reliability in Big Data Collaboration: Trusted Execution Environments and Blockchain Coordination
AntTech
AntTech
Aug 22, 2022 · Information Security

Intelligent Risk Control Enters the 10‑Millisecond Era

In a 2022 IDC China Digital Finance Forum speech, Ant Group's security chief outlines the shift from explicit to implicit online risks, identifies three major challenges for risk control, and presents Ant's AI‑driven IMAGE framework that achieves sub‑10 ms detection across privacy‑preserving, multi‑party, and graph‑based technologies.

AIReal-Timefraud detection
0 likes · 9 min read
Intelligent Risk Control Enters the 10‑Millisecond Era
Baidu MEUX
Baidu MEUX
Aug 3, 2022 · Product Management

How to Design for the Metaverse: Key Concepts, Tools, and Best Practices

Metaverse design blends immersive AR/VR technology, user experience principles, and interdisciplinary tools—from storyboarding and 3D modeling to sociological research—guiding designers to create usable, privacy‑aware virtual spaces, digital goods, and interaction standards while navigating challenges like motion sickness, decentralized payments, and ad intrusion.

AR/VRDesignDigital Goods
0 likes · 14 min read
How to Design for the Metaverse: Key Concepts, Tools, and Best Practices
DevOps
DevOps
Aug 3, 2022 · Information Security

Secure Design in DevSecOps: Principles, Threat Modeling, and Huawei Cloud Practices

This article explains how integrating secure‑by‑design principles into DevSecOps accelerates software delivery while reducing risk, outlines key security architecture concepts such as the CIA triad and design principles, describes threat‑modeling methods, and showcases Huawei Cloud’s practical security design, data protection, and privacy solutions.

DevSecOpsHuawei CloudSecure Design
0 likes · 12 min read
Secure Design in DevSecOps: Principles, Threat Modeling, and Huawei Cloud Practices
DataFunTalk
DataFunTalk
Jul 22, 2022 · Artificial Intelligence

Federated Learning, Secure Multiparty Computation, and Data Privacy: Challenges, Legal Context, and Technical Solutions

This article provides a comprehensive overview of federated learning as an emerging AI technology, discussing data‑security incidents, relevant regulations such as GDPR and China’s Data Security Law, the core challenges of learning, privacy, communication and security, and presenting cryptographic solutions including homomorphic encryption, secret sharing and Google PAM.

artificial intelligencedata securityprivacy
0 likes · 17 min read
Federated Learning, Secure Multiparty Computation, and Data Privacy: Challenges, Legal Context, and Technical Solutions
Alibaba Terminal Technology
Alibaba Terminal Technology
Jun 21, 2022 · Mobile Development

How to Upgrade Android Target SDK from 28 to 31: Challenges, Solutions & Best Practices

This article explains why Android Target SDK versions act as a bridge between apps and the system, details Gaode Map's migration from Target 28 to 31, outlines the technical and privacy challenges involved, and provides concrete adaptation steps for storage, Bluetooth, location, package visibility, and other compliance requirements.

AndroidPermissionsTarget SDK
0 likes · 24 min read
How to Upgrade Android Target SDK from 28 to 31: Challenges, Solutions & Best Practices
21CTO
21CTO
Jun 20, 2022 · Information Security

How an iCloud Hacker Stole Thousands of Nude Photos and Got 9 Years in Prison

A U.S. hacker known as "icloudripper4you" infiltrated thousands of iCloud accounts, stole massive amounts of nude photos and videos, and was sentenced to nine years in prison, highlighting the severe impact of cyber‑crime and the FBI's commitment to prosecuting such offenses.

cybercrimedata breachiCloud hack
0 likes · 4 min read
How an iCloud Hacker Stole Thousands of Nude Photos and Got 9 Years in Prison
IEG Growth Platform Technology Team
IEG Growth Platform Technology Team
May 23, 2022 · Information Security

Android 12 Security and Privacy Settings Overview

This article provides a comprehensive overview of Android 12's new security and privacy features, including the Privacy Information Center, location accuracy levels, package visibility filtering, deprecation of system‑dialog closing intents, app hibernation, permission group queries, microphone and camera toggles, and numerous other system‑level changes that affect app behavior and user experience.

AndroidAndroid12Permissions
0 likes · 21 min read
Android 12 Security and Privacy Settings Overview
Python Programming Learning Circle
Python Programming Learning Circle
May 16, 2022 · Information Security

How IP Geolocation Works and Its Privacy Implications

This article explains the technical principles behind IP‑based geolocation, describing how autonomous systems map IP addresses to approximate locations, the limits of accuracy, and the privacy concerns arising from both network operators and large‑scale data services.

Autonomous SystemIP geolocationinformation security
0 likes · 7 min read
How IP Geolocation Works and Its Privacy Implications
IT Services Circle
IT Services Circle
May 16, 2022 · Information Security

How IP Addresses Reveal Geographic Locations and Their Privacy Implications

The article explains the technical principles behind IP geolocation using autonomous systems, describes how IP addresses can be mapped to regions and organizations, discusses the limits of precision, and highlights privacy concerns and potential misuse of location data in the modern digital era.

Autonomous SystemIP geolocationnetwork fundamentals
0 likes · 8 min read
How IP Addresses Reveal Geographic Locations and Their Privacy Implications
Liangxu Linux
Liangxu Linux
May 15, 2022 · Fundamentals

How Does Your IP Reveal Your Location? The Tech Behind IP Geolocation

This article explains how IP addresses are linked to geographic locations through Autonomous Systems and ASN mappings, discusses the accuracy limits, and highlights privacy implications and real‑world applications of IP geolocation in modern internet services.

ASNAutonomous SystemIP geolocation
0 likes · 7 min read
How Does Your IP Reveal Your Location? The Tech Behind IP Geolocation
Java Captain
Java Captain
Apr 30, 2022 · Information Security

Understanding Chat Application Security: Encryption, Network Monitoring, and Potential Vulnerabilities

The article explains how modern chat applications protect communication with asymmetric and symmetric encryption, why network eavesdropping alone cannot reveal messages, and how installed monitoring software or system vulnerabilities can still expose chat records, emphasizing the need for regular updates and careful device usage.

Network Monitoringchat securityencryption
0 likes · 9 min read
Understanding Chat Application Security: Encryption, Network Monitoring, and Potential Vulnerabilities
Alibaba Terminal Technology
Alibaba Terminal Technology
Apr 27, 2022 · Frontend Development

How Chrome 101’s Priority Hints and FedCM Can Boost Web Performance and Privacy

Chrome 101 introduces Priority Hints for fine‑grained resource loading control and the Federated Credentials Management API for cookie‑less third‑party login, but both features are still experimental, lack cross‑browser support, and raise practical challenges for developers seeking performance gains and privacy improvements.

ChromeFederated Credential ManagementPriority Hints
0 likes · 14 min read
How Chrome 101’s Priority Hints and FedCM Can Boost Web Performance and Privacy
JD Tech
JD Tech
Apr 20, 2022 · Information Security

Privacy Compliance Governance Practices in JD Finance Mobile App

This article details JD Finance's comprehensive privacy compliance governance for its mobile app, covering regulatory background, scope definition, key risk areas, policy and permission management, data encryption, sensitive API handling, third‑party SDK control, tooling such as Pandora Kit and Lancet, and the Utrust platform for automated detection and remediation.

SDKcompliancedata encryption
0 likes · 25 min read
Privacy Compliance Governance Practices in JD Finance Mobile App
MaGe Linux Operations
MaGe Linux Operations
Feb 27, 2022 · Frontend Development

Top 10 Lightweight Linux Browsers You Should Try

Discover a curated list of ten lightweight Linux browsers—ranging from privacy‑focused Viper and keyboard‑centric Nyxt to classic terminal Lynx and feature‑rich SeaMonkey—each evaluated for resource usage, extension support, and unique capabilities to help you choose the ideal tool for low‑spec systems.

Web Browsinglightweight browsersopen source
0 likes · 7 min read
Top 10 Lightweight Linux Browsers You Should Try
Java Backend Technology
Java Backend Technology
Feb 6, 2022 · Information Security

How Camera Hacking Threatens Privacy and How to Protect Yourself

Recent incidents of illegal camera hacking—ranging from public surveillance footage posted on Bilibili to a livestreamed gynecological surgery—highlight severe privacy violations, prompting platform bans, police action, and expert advice on securing cameras against unauthorized access.

Bilibilicamera securityonline surveillance
0 likes · 5 min read
How Camera Hacking Threatens Privacy and How to Protect Yourself
DataFunSummit
DataFunSummit
Jan 15, 2022 · Information Security

Data Security Governance: Concepts, Goals, Tools, and Practices

This article explains data security fundamentals, the full data lifecycle, the 4A/5A security model, trust‑level goals, and a comprehensive tool framework covering identity authentication, permission control, asset protection, and governance strategies to protect data throughout its lifecycle.

access controlinformation securityprivacy
0 likes · 14 min read
Data Security Governance: Concepts, Goals, Tools, and Practices
WeDoctor Frontend Technology
WeDoctor Frontend Technology
Jan 12, 2022 · Frontend Development

Unpacking Cookies: From Basics to Future Front‑End Management

This article explores HTTP cookies in depth, covering their definition, attributes, security settings, tracking mechanisms, third‑party usage, front‑end management practices, emerging standards like SameSite and SameParty, and future trends such as Chrome’s privacy sandbox and the Cookie Store API.

Web Securitycookiesfrontend
0 likes · 26 min read
Unpacking Cookies: From Basics to Future Front‑End Management
Code Ape Tech Column
Code Ape Tech Column
Jan 11, 2022 · Information Security

Data Masking (Desensitization) Techniques: Static and Dynamic Approaches

This article explains data masking, its importance for protecting sensitive information, and details both static and dynamic masking methods—including nullification, randomization, substitution, symmetric encryption, mean value, and offset rounding—along with practical examples and implementation considerations.

Dynamic Maskinginformation securityprivacy
0 likes · 8 min read
Data Masking (Desensitization) Techniques: Static and Dynamic Approaches
JD Tech Talk
JD Tech Talk
Dec 31, 2021 · Information Security

Design and Implementation of JD Tech Mobile App Privacy Compliance Detection System

This article presents the background, industry challenges, design principles, architecture, core capabilities, and implementation details of JD Tech's privacy compliance detection system for mobile applications, highlighting both static and dynamic analysis techniques to identify and remediate personal data risks.

Dynamic analysisJD Techcompliance
0 likes · 14 min read
Design and Implementation of JD Tech Mobile App Privacy Compliance Detection System
Zhongtong Tech
Zhongtong Tech
Dec 17, 2021 · Operations

How Digitalization Is Revolutionizing China's Logistics Industry

At the WISE2021 China Digital Innovation Summit, Zhongtong Express CTO Zhu Jingxi detailed the company's digital transformation journey, highlighting the impact of electronic waybills, data-driven operations, AI routing, and privacy security on reshaping the logistics supply chain and boosting efficiency.

@DataAILogistics
0 likes · 11 min read
How Digitalization Is Revolutionizing China's Logistics Industry
Programmer DD
Programmer DD
Dec 13, 2021 · Information Security

Can Meta’s New Hash‑Based Tool Really Stop Revenge Porn?

Meta’s latest privacy tool lets users pre‑upload intimate images to generate a unique digital fingerprint that platforms match and delete if re‑uploaded, but its reliance on exact‑match hashing, similar to PhotoDNA, raises questions about effectiveness, privacy, and the broader challenges of end‑to‑end encryption delays at the company.

Metadigital fingerprintimage hashing
0 likes · 8 min read
Can Meta’s New Hash‑Based Tool Really Stop Revenge Porn?
Java Architect Essentials
Java Architect Essentials
Dec 11, 2021 · Information Security

Protecting Mobile Privacy in the Big Data Era: Risks of Data Leakage and How to Stay Safe

In today's big‑data era, excessive stress leads many to seek relief through risky online activities, but unauthorized app permissions and visits to dubious sites can expose personal information, so users must stay vigilant, limit permissions, avoid harmful sites, and use security tools to protect their mobile privacy.

Big DataMobile Securitydata leakage
0 likes · 6 min read
Protecting Mobile Privacy in the Big Data Era: Risks of Data Leakage and How to Stay Safe
21CTO
21CTO
Dec 3, 2021 · Frontend Development

Chrome vs Chromium: Which Browser Should You Choose and Why?

This article compares Google Chrome and the open‑source Chromium browser, covering UI nuances, open‑source versus proprietary code, feature gaps such as sign‑in and media codecs, installation quirks across platforms, privacy implications, benchmark performance, and guidance on which browser best fits different user priorities.

ChromeChromiumbrowser comparison
0 likes · 8 min read
Chrome vs Chromium: Which Browser Should You Choose and Why?
AntTech
AntTech
Nov 26, 2021 · Information Security

Achieving “Computable but Not Identifiable”: Balancing Personal Data Protection and Industry Development with Trusted Computing

The article examines how the Personal Information Protection Law creates a new authorization framework and introduces the “computable but not identifiable” concept, arguing that trusted‑computing technologies and controlled environments can reconcile strict privacy safeguards with the data‑driven needs of AI and other industries.

Data Governanceartificial intelligencedata anonymization
0 likes · 10 min read
Achieving “Computable but Not Identifiable”: Balancing Personal Data Protection and Industry Development with Trusted Computing
21CTO
21CTO
Nov 24, 2021 · Information Security

How Parents Built an Open‑Source School App to Beat a $117M Failure

Swedish parents, frustrated by the costly and unusable official Skolplattformen app, reverse‑engineered its API and released the open‑source Öppna Skolplattformen, sparking legal battles, privacy debates, and a community‑driven alternative that now serves thousands of families.

Swedeninformation securityprivacy
0 likes · 12 min read
How Parents Built an Open‑Source School App to Beat a $117M Failure
21CTO
21CTO
Oct 13, 2021 · Information Security

Why Foreign Privacy Apps Are Triggering Continuous Location Tracking on Your Phone

Recent reports reveal that foreign privacy‑tracking apps can cause major Chinese services like Meituan, major layoffs at Beike's Shanghai R&D team, and an FSF warning that Windows 11 undermines user freedom, highlighting growing concerns over data privacy, corporate restructuring, and open‑source advocacy.

FSFWindows 11information security
0 likes · 6 min read
Why Foreign Privacy Apps Are Triggering Continuous Location Tracking on Your Phone
dbaplus Community
dbaplus Community
Oct 12, 2021 · Information Security

How d18n Enables Cross‑Platform Data Desensitization for Secure Databases

This article introduces d18n, a Go‑based, cross‑platform data‑desensitization tool that supports multiple databases and file formats, explains common desensitization scenarios, details its sensitive‑data identification techniques—including keyword, regex, and NLP‑based DFA—and outlines six practical masking algorithms with export and import workflows.

Database SecurityGod18n
0 likes · 11 min read
How d18n Enables Cross‑Platform Data Desensitization for Secure Databases
DataFunTalk
DataFunTalk
Oct 2, 2021 · Artificial Intelligence

Baidu Data Federation Platform: Architecture, Applications, Federated Learning, and Explainability

This article presents an in‑depth overview of Baidu's Data Federation Platform, detailing its layered architecture, core technical capabilities, privacy‑preserving collaborative research on epidemic prediction and shared vehicle optimization, and explores federated learning types, PaddleFL implementations, and model explainability techniques.

Big DataFederated Learningexplainability
0 likes · 22 min read
Baidu Data Federation Platform: Architecture, Applications, Federated Learning, and Explainability
Programmer DD
Programmer DD
Aug 29, 2021 · Artificial Intelligence

When AI Code Assistants Leak Fake IDs: What GitHub Copilot’s Slip Reveals

GitHub Copilot, powered by the Codex model, recently generated a seemingly real Chinese ID number for Bilibili CEO Chen Rui, sparking concerns about privacy leaks, model training data, and the broader risks of AI code assistants inadvertently exposing personal information.

AI code generationGitHub Copilotlarge language models
0 likes · 6 min read
When AI Code Assistants Leak Fake IDs: What GitHub Copilot’s Slip Reveals
DataFunTalk
DataFunTalk
Aug 24, 2021 · Artificial Intelligence

De‑identification in Federated Learning: Using xID Technology to Protect Sample Intersection Information

This article explains federated learning, its vertical and horizontal variants, the privacy risks of sample intersection in financial scenarios, reviews common de‑identification methods, and introduces the xID technique with generation‑mapping services to securely protect intersecting data while enabling collaborative AI modeling.

Data De-identificationFederated LearningVertical FL
0 likes · 13 min read
De‑identification in Federated Learning: Using xID Technology to Protect Sample Intersection Information
MaGe Linux Operations
MaGe Linux Operations
Aug 16, 2021 · Frontend Development

Why Is Firefox Losing Millions of Users? A Deep Dive into Its Decline

Since 2018, Firefox has lost 46 million monthly active users, dropping from 244 million to 198 million, as users favor Chromium‑based browsers for better performance, default status, and privacy concerns, prompting a call for continued support of Firefox as a vital anti‑monopoly alternative.

BrowserChromiumFirefox
0 likes · 6 min read
Why Is Firefox Losing Millions of Users? A Deep Dive into Its Decline
ByteFE
ByteFE
Aug 11, 2021 · Information Security

Understanding Browser Incognito Mode: Limitations, Detection Techniques, and Fingerprinting

The article explains how browser incognito or private‑browsing modes work, clarifies common misconceptions, details why they do not provide true anonymity, and explores technical detection methods and fingerprinting techniques—including code examples—while offering guidance on protecting personal privacy.

Browser FingerprintingWeb Securityincognito
0 likes · 26 min read
Understanding Browser Incognito Mode: Limitations, Detection Techniques, and Fingerprinting
Aotu Lab
Aotu Lab
Jul 29, 2021 · Frontend Development

Master Modern Development: JS Algorithms, Privacy Techniques, and Cutting‑Edge Tools

This article surveys essential front‑end knowledge, covering a comprehensive JavaScript algorithm curriculum, browser‑fingerprinting privacy concerns, collaborative design platforms like Figma, the Markdown‑to‑PPT tool Slidev, and a step‑by‑step guide to implementing the SLIC pixel‑art algorithm.

AlgorithmsFigmaJavaScript
0 likes · 6 min read
Master Modern Development: JS Algorithms, Privacy Techniques, and Cutting‑Edge Tools
JD Retail Technology
JD Retail Technology
Jul 28, 2021 · Mobile Development

Applying Aspect‑Oriented Programming (AOP) for Privacy Compliance and Thread Optimization in Android Apps

This article explains how Aspect‑Oriented Programming is applied in Android development to achieve non‑intrusive privacy compliance checks and thread‑usage optimization, detailing the use of compile‑time ASM bytecode instrumentation and runtime Xposed/epic hooks, along with code examples and measured performance gains.

ASMAndroidMobile Development
0 likes · 14 min read
Applying Aspect‑Oriented Programming (AOP) for Privacy Compliance and Thread Optimization in Android Apps
Architecture Digest
Architecture Digest
Jul 22, 2021 · Artificial Intelligence

The Hidden Risks of Facial Recognition: When Apps Capture More Than Just Your Face

Facial recognition technology, now ubiquitous in payments, transportation and identity verification, often records the entire camera view and forwards full images to human reviewers, raising serious privacy concerns, especially in third‑party apps that may expose users in vulnerable situations.

artificial intelligencedata securityfacial recognition
0 likes · 7 min read
The Hidden Risks of Facial Recognition: When Apps Capture More Than Just Your Face
ByteFE
ByteFE
Jul 13, 2021 · Information Security

Privacy vs. Personalization in Advertising: Technical Foundations and Emerging Solutions

The article examines how increasing privacy regulations—especially after iOS 14—challenge personalized advertising by focusing on the technical core of user identification, the risks of cross‑domain data sharing, and a range of mitigation strategies such as fingerprint protection, third‑party cookie blocking, and privacy‑preserving attribution frameworks like PCM, SKAdNetwork, AEM, and FLoC.

AdvertisingWebinformation security
0 likes · 34 min read
Privacy vs. Personalization in Advertising: Technical Foundations and Emerging Solutions
Java Architect Essentials
Java Architect Essentials
Jun 12, 2021 · Information Security

China's First Nationwide Case of Illegal WeChat Data Harvesting via "Clean Fan" Software

In September 2022, Nantong police uncovered China's first nationwide case of illegal WeChat user data harvesting using a "clean fan" application, leading to the arrest of eight suspects who were convicted for illegally obtaining computer system data and controlling systems, highlighting severe information security risks.

ChinaWeChatcybercrime
0 likes · 7 min read
China's First Nationwide Case of Illegal WeChat Data Harvesting via "Clean Fan" Software
MaGe Linux Operations
MaGe Linux Operations
May 17, 2021 · Information Security

How to Harden Linux: Essential Security Settings and Best Practices

This comprehensive guide walks you through selecting a secure Linux distribution, configuring kernel and sysctl parameters, applying boot‑time hardening, managing network and firewall rules, restricting root access, enabling MAC policies, sandboxing applications, and employing advanced memory and entropy techniques to dramatically improve system privacy and resilience against attacks.

$rootHardeningKernel
0 likes · 55 min read
How to Harden Linux: Essential Security Settings and Best Practices
Open Source Linux
Open Source Linux
May 11, 2021 · Information Security

Ultimate Guide to Hardening Linux: Boost Security & Privacy

This comprehensive guide explains how to dramatically improve Linux security and privacy by selecting hardened distributions, configuring kernel and boot parameters, applying sysctl tweaks, disabling unnecessary services, using MAC frameworks, sandboxing applications, hardening memory allocation, and following best‑practice system administration steps.

$rootHardeningKernel
0 likes · 59 min read
Ultimate Guide to Hardening Linux: Boost Security & Privacy
Su San Talks Tech
Su San Talks Tech
Apr 21, 2021 · Information Security

How Data Masking Protects Sensitive Information: Techniques & Best Practices

This article explains what data masking (also called data de‑identification) is, why it is essential for protecting personal data in sectors like finance and healthcare, and details static and dynamic masking methods along with common techniques such as truncation, randomization, replacement, encryption, averaging and offsetting.

DDMSDMdata masking
0 likes · 8 min read
How Data Masking Protects Sensitive Information: Techniques & Best Practices
JD Tech
JD Tech
Apr 8, 2021 · Artificial Intelligence

Federated Learning in E‑commerce Marketing: JD.com’s 9N‑FL Platform Overview and Practices

This article explains how data islands hinder AI progress, introduces federated learning as a privacy‑preserving solution, details JD.com’s 9N‑FL platform—including its architecture, features, classification, privacy‑preserving techniques, and algorithm support—and demonstrates its successful application in e‑commerce advertising that yielded over 15% revenue growth.

AIDistributed SystemsFederated Learning
0 likes · 12 min read
Federated Learning in E‑commerce Marketing: JD.com’s 9N‑FL Platform Overview and Practices
Java Architect Essentials
Java Architect Essentials
Mar 7, 2021 · Information Security

Security Analysis of the “Le Bao” Fake Chat Application Used for Pornographic Promotion

This report investigates the malicious “Le Bao” Android application that masquerades as a WeChat‑like chat tool, detailing its sample characteristics, hidden QR‑code group‑joining mechanism, membership‑based porn livestream access, promotion methods, profit model, and comprehensive traceability of servers, payment channels, and social accounts.

Mobile SecurityNetwork Trafficapp investigation
0 likes · 13 min read
Security Analysis of the “Le Bao” Fake Chat Application Used for Pornographic Promotion
21CTO
21CTO
Mar 3, 2021 · Information Security

9 Real-World Data Breaches Every Developer Should Learn From

This article reviews nine major data breach incidents—from Clearview AI to Yahoo—detailing their scope, compromised data types, and impact, and emphasizes the importance of robust security practices for developers to prevent such losses.

Case Studydata breachinformation security
0 likes · 10 min read
9 Real-World Data Breaches Every Developer Should Learn From
ITPUB
ITPUB
Mar 3, 2021 · Mobile Development

What Android 12’s Leaked UI Changes Reveal About Its New Design and Privacy Features

A leaked early draft of Google’s Android 12 documentation shows a flatter UI with more white space and rounded corners, a redesigned notification panel, new privacy indicators for camera and microphone use, and a small “Conversation” widget that may become mandatory on all devices.

AndroidAndroid12Mobile Development
0 likes · 6 min read
What Android 12’s Leaked UI Changes Reveal About Its New Design and Privacy Features
ITFLY8 Architecture Home
ITFLY8 Architecture Home
Feb 22, 2021 · Information Security

How Meituan-Dianping Secures User Data in the Big Data Era

In the era of big data, Meituan-Dianping implements a comprehensive security management system—including organizational safeguards, deep defense architecture, encryption, and data desensitization—to meet regulatory demands and protect billions of users' privacy and information security.

Meituandata securityinformation security
0 likes · 3 min read
How Meituan-Dianping Secures User Data in the Big Data Era
Top Architect
Top Architect
Feb 13, 2021 · Information Security

Weekly Tech News Digest: Privacy, Security, Cloud, and Development Updates

This week’s roundup covers the Shenzhen court ruling that WeChat friend lists are not personal privacy, Microsoft’s removal of legacy Edge, the formation of the Rust Foundation, a novel supply‑chain attack on 35 tech firms, Linux floppy driver updates, Go generics progress, and other notable industry developments.

DevelopmentRustSecurity
0 likes · 13 min read
Weekly Tech News Digest: Privacy, Security, Cloud, and Development Updates
Qunar Tech Salon
Qunar Tech Salon
Jan 27, 2021 · Mobile Development

Implementing Global SDK Privacy Monitoring and Hooking in Android via ASM Transform and Custom Annotations

This article explains how QuNar’s front‑end team built a comprehensive Android SDK privacy monitoring system using a custom Transform, ASM bytecode manipulation, and annotation‑driven hook configurations, detailing both basic and advanced solutions for globally intercepting sensitive API calls and ensuring extensible, version‑independent protection.

ASMAndroidHook
0 likes · 20 min read
Implementing Global SDK Privacy Monitoring and Hooking in Android via ASM Transform and Custom Annotations
Programmer DD
Programmer DD
Jan 6, 2021 · Artificial Intelligence

When Facial Recognition Fails: Real Misidentification Cases and Their Impact

The article examines how reliance on facial‑recognition technology has led to wrongful arrests of individuals like Jamal Owens and Nijeer Parks in the United States, highlights technical limitations, legal controversies, and privacy concerns, and questions whether the technology should be used at all.

AI ethicsfacial recognitionlaw enforcement
0 likes · 8 min read
When Facial Recognition Fails: Real Misidentification Cases and Their Impact