Tagged articles
250 articles
Page 3 of 3
21CTO
21CTO
Dec 25, 2020 · Information Security

Why GitHub Dropped Cookies: Implications for Web Privacy and GDPR

GitHub announced the removal of unnecessary cookies, reflecting GDPR-driven privacy shifts and showing how modern web platforms can reduce data collection while still tracking essential performance metrics without third‑party trackers.

Data ProtectionGDPRGitHub
0 likes · 5 min read
Why GitHub Dropped Cookies: Implications for Web Privacy and GDPR
DataFunTalk
DataFunTalk
Dec 18, 2020 · Artificial Intelligence

Federated Learning and Secure Multi‑Party Computation: Concepts, Security Challenges, and Practical Solutions

This article explains the evolution of federated learning, contrasts Google’s cross‑device horizontal approach with China’s cross‑silo vertical implementations, analyzes their security vulnerabilities, and demonstrates how secure multi‑party computation—including differential privacy, secure aggregation, and secret‑sharing techniques—can address these challenges while highlighting performance trade‑offs.

Federated LearningSecure Aggregationcross-silo
0 likes · 18 min read
Federated Learning and Secure Multi‑Party Computation: Concepts, Security Challenges, and Practical Solutions
DataFunSummit
DataFunSummit
Dec 16, 2020 · Artificial Intelligence

Federated Learning vs Secure Multi‑Party Computation: Concepts, Challenges, and Alibaba’s Solutions

This article explains the fundamentals of federated learning and secure multi‑party computation, compares their security and performance trade‑offs, discusses the differences between Google’s cross‑device FL and China’s cross‑silo FL, and presents Alibaba’s recent advances and practical solutions for privacy‑preserving collaborative modeling.

cross-silodifferential privacyinformation security
0 likes · 18 min read
Federated Learning vs Secure Multi‑Party Computation: Concepts, Challenges, and Alibaba’s Solutions
Beike Product & Technology
Beike Product & Technology
Oct 16, 2020 · Mobile Development

iOS 14 Privacy Permissions: Photo Library, Camera & Microphone, Location, Local Network, Wi‑Fi Address, IDFA, and Clipboard Adaptation

This article explains the new iOS 14 privacy permission model and provides detailed adaptation guidance for photo‑library limited access, camera/microphone usage indicators, precise location handling, local‑network authorization, Wi‑Fi address randomisation, IDFA tracking restrictions, and clipboard access notifications.

CameraLocal NetworkMobile Development
0 likes · 12 min read
iOS 14 Privacy Permissions: Photo Library, Camera & Microphone, Location, Local Network, Wi‑Fi Address, IDFA, and Clipboard Adaptation
JD Tech Talk
JD Tech Talk
Sep 30, 2020 · Artificial Intelligence

Secure Training Methods for Federated Transfer Learning

This article reviews the model structure of federated transfer learning and details three secure training approaches—additive homomorphic encryption, ABY, and SPDZ—combined with polynomial approximation, explaining their protocols, steps, and the role of federated transfer learning within the broader federated learning landscape.

Homomorphic Encryptionprivacysecure computation
0 likes · 11 min read
Secure Training Methods for Federated Transfer Learning
Programmer DD
Programmer DD
Sep 25, 2020 · Information Security

Misconfigured ElasticSearch Server Exposes Millions of Bing Mobile Users' Data

A misconfigured ElasticSearch server owned by Microsoft leaked millions of Bing mobile app search queries, location data, device IDs and other details, exposing users worldwide to phishing, ransomware and even robbery risks, while Microsoft claims the breach affected only a small amount of non‑identifiable data.

bing mobiledata breachelastic search
0 likes · 6 min read
Misconfigured ElasticSearch Server Exposes Millions of Bing Mobile Users' Data
JD Tech Talk
JD Tech Talk
Sep 17, 2020 · Artificial Intelligence

Federated Transfer Learning: Concepts, Examples, and Model Structures

This article introduces the fundamentals of transfer learning and federated transfer learning, explains domain adaptation for sentiment analysis, presents two illustrative examples—mid-level image feature transfer and text-to-image transfer—and outlines the model architecture and loss functions of federated transfer learning frameworks.

Model architectureSentiment Analysisdomain adaptation
0 likes · 14 min read
Federated Transfer Learning: Concepts, Examples, and Model Structures
AntTech
AntTech
Jul 17, 2020 · Artificial Intelligence

Privacy-Preserving Shared Intelligence: Secure AI Techniques for Financial Services

This article outlines how Ant Group’s shared‑intelligence platform combines differential privacy, trusted execution environments, and secure multi‑party computation to enable privacy‑preserving AI and data collaboration across financial scenarios, addressing regulatory demands, technical challenges, and real‑world deployment cases.

data sharingdifferential privacyprivacy
0 likes · 19 min read
Privacy-Preserving Shared Intelligence: Secure AI Techniques for Financial Services
Programmer DD
Programmer DD
Jun 13, 2020 · Artificial Intelligence

How AI Deepfakes Threaten Privacy and What Law Is Doing About It

The article examines the rise of AI‑generated deepfake media, its legal treatment under China's new Civil Code and other regulations, the technical ease of creating such content, and the combined efforts of detection technology, ethical education, and legislation to curb its harmful impact.

AIDetectionEthics
0 likes · 14 min read
How AI Deepfakes Threaten Privacy and What Law Is Doing About It
DataFunTalk
DataFunTalk
Jun 4, 2020 · Artificial Intelligence

Exploring Federated Recommendation Algorithms and Their Applications

This article introduces the challenges of traditional centralized recommendation systems, explains the principles and implementations of federated recommendation algorithms—including vertical and horizontal federated matrix factorization and factorization machines—using WeBank’s open-source FATE platform, and discusses cloud services, practical use cases, and performance benefits.

AIFATEFederated Learning
0 likes · 13 min read
Exploring Federated Recommendation Algorithms and Their Applications
Full-Stack Internet Architecture
Full-Stack Internet Architecture
Mar 25, 2020 · Information Security

Understanding Weibo Data Breaches: Credential Stuffing, Database Dumping, and Data Laundering

The article explains the recent Weibo data breach, describing how attackers used credential‑stuffing (撞库), data leakage (漏水), database dumping (拖库) and data laundering (洗库) to obtain millions of user records, the technical steps involved, and the security implications for both users and platforms.

Weibocredential stuffingdata breach
0 likes · 6 min read
Understanding Weibo Data Breaches: Credential Stuffing, Database Dumping, and Data Laundering
21CTO
21CTO
Feb 21, 2020 · Mobile Development

What’s New in Android 11 Developer Preview? Key Features Explained

Google’s surprise early release of the Android 11 Developer Preview brings Pixel‑only support, a detailed rollout schedule, and six major enhancements—including 5G‑ready connectivity, native cut‑out and waterfall screen APIs, chat bubbles, upgraded privacy controls, screen recording, and Pixel 4 motion‑sense gestures.

Android 11Developer PreviewGoogle Pixel
0 likes · 4 min read
What’s New in Android 11 Developer Preview? Key Features Explained
ITPUB
ITPUB
Feb 7, 2020 · Information Security

Why Signal Messenger Is the Ultimate Privacy‑First Alternative to WhatsApp

This guide reviews Signal Messenger’s privacy‑focused features—including disappearing messages, screen security, safety numbers, and locked notifications—explains how to install the desktop client on Ubuntu/Linux via terminal commands, and offers a brief personal assessment of its usability compared to WhatsApp and Telegram.

Linux InstallationSecure Messagingprivacy
0 likes · 6 min read
Why Signal Messenger Is the Ultimate Privacy‑First Alternative to WhatsApp
21CTO
21CTO
Jan 16, 2020 · Frontend Development

Why Microsoft’s New Chromium‑Based Edge Is a Game‑Changer for Users and Developers

Microsoft’s January 2020 launch of the Chromium‑based Edge browser brings cross‑platform support, Chrome extension compatibility, enhanced privacy controls, and a new design, while also addressing early language‑pack issues and signaling a strategic shift toward embracing Chromium across Windows devices.

ChromiumCross‑PlatformMicrosoft Edge
0 likes · 7 min read
Why Microsoft’s New Chromium‑Based Edge Is a Game‑Changer for Users and Developers
Liangxu Linux
Liangxu Linux
Oct 21, 2019 · Information Security

How Everything’s HTTP Server Exposes Your Files and How to Secure It

The popular Windows file‑search tool Everything includes an HTTP server that, when left unsecured, lets anyone who knows your IP and port browse and download every file on your computer, exposing personal data that can even be indexed by search engines, but simple configuration changes can close the leak.

File SearchHTTP serverdata leakage
0 likes · 7 min read
How Everything’s HTTP Server Exposes Your Files and How to Secure It
dbaplus Community
dbaplus Community
Oct 20, 2019 · Blockchain

Can Blockchain Solve Privacy Risks? From GDPR to Zero‑Knowledge Proofs

The talk outlines how recent privacy regulations like GDPR expose data sovereignty, jurisdiction, and fines, then explains how blockchain’s distributed ledger, consensus, smart contracts, and cryptographic techniques—including homomorphic encryption and zero‑knowledge proofs—address trust gaps and privacy challenges, illustrated with real‑world financial use cases and a telecom‑backed BaaS platform.

BaaSFinancial ServicesGDPR
0 likes · 23 min read
Can Blockchain Solve Privacy Risks? From GDPR to Zero‑Knowledge Proofs
DataFunTalk
DataFunTalk
Sep 9, 2019 · Artificial Intelligence

Federated Learning: Background, Techniques, Applications, and the FATE Open‑Source Platform

This article presents a comprehensive overview of federated learning, covering its motivation, vertical and horizontal variants, privacy‑preserving technologies, real‑world use cases, and the industrial‑grade open‑source platform FATE that enables secure cross‑organization machine learning.

Data CollaborationFATEFederated Learning
0 likes · 16 min read
Federated Learning: Background, Techniques, Applications, and the FATE Open‑Source Platform
AntTech
AntTech
Aug 17, 2019 · Artificial Intelligence

Shared Machine Learning: Tackling Data Islands with Trusted Execution Environments and Multi‑Party Computation

The article explains how data islands and privacy concerns hinder AI development and describes Ant Financial's shared machine learning approach, which combines Trusted Execution Environments (TEE) and Multi‑Party Computation (MPC) to enable secure, privacy‑preserving data sharing and collaborative model training across organizations.

AIAnt Financialdata sharing
0 likes · 15 min read
Shared Machine Learning: Tackling Data Islands with Trusted Execution Environments and Multi‑Party Computation
ITPUB
ITPUB
Jul 9, 2019 · Information Security

How Android Apps, Zoom, and Didi Expose Major Security and Privacy Gaps

Recent reports reveal that many Android apps secretly collect location and identifier data despite denied permissions, a zero‑day Zoom flaw lets any website hijack Mac cameras, and Didi adjusts its pricing, while a man released after splashing water on Baidu's CEO highlights broader tech‑related news.

AndroidDidiSecurity
0 likes · 4 min read
How Android Apps, Zoom, and Didi Expose Major Security and Privacy Gaps
Xianyu Technology
Xianyu Technology
May 15, 2019 · Product Management

Insights from Facebook F8 2023 Conference: Product Strategy, Privacy, and Technical Directions

At F8 2023, Facebook unveiled a “Private Vision” emphasizing encrypted data and limited content visibility, introduced a “secret crush” dating tool, rolled out the ultra‑lightweight Lightspeed Messenger, highlighted community‑centric Groups and cross‑app integration, and signaled major AR/VR/AI investments while showcasing research on user well‑being and new business‑enablement capabilities for developers.

AR/VRBusiness GrowthF8 Conference
0 likes · 7 min read
Insights from Facebook F8 2023 Conference: Product Strategy, Privacy, and Technical Directions
360 Quality & Efficiency
360 Quality & Efficiency
Mar 15, 2019 · Mobile Development

Introducing Android Q: New Privacy, Connectivity, Media, and Performance Features

Android Q brings a comprehensive set of enhancements—including stronger privacy controls, refined location permissions, shared shortcuts, a settings panel API, dynamic depth imaging, new audio/video codecs, native MIDI support, and ART performance improvements—designed to empower developers and improve user experience across a wide range of modern mobile devices.

APIandroid-qmedia
0 likes · 11 min read
Introducing Android Q: New Privacy, Connectivity, Media, and Performance Features
21CTO
21CTO
Aug 28, 2018 · Information Security

500 Million Hotel Records Exposed: How the Massive Data Leak Impacts Your Privacy

A recent dark‑web sale revealed that over 500 million records from dozens of Huazhu hotel brands—including personal IDs, booking details, and login credentials—were compromised, prompting urgent security advice and highlighting the growing risks of large‑scale data breaches.

cybercrimedata breachhotel security
0 likes · 6 min read
500 Million Hotel Records Exposed: How the Massive Data Leak Impacts Your Privacy
UCloud Tech
UCloud Tech
May 25, 2018 · Information Security

How Blockchain and Advanced Cryptography Secure Data Flow: A Deep Dive

An in‑depth overview explains how blockchain, homomorphic encryption, zero‑knowledge proofs, group and ring signatures, and differential privacy collectively secure data flow, enabling trusted sharing while preserving ownership and privacy across providers, consumers, and algorithm services.

BlockchainData FlowHomomorphic Encryption
0 likes · 11 min read
How Blockchain and Advanced Cryptography Secure Data Flow: A Deep Dive
Meituan Technology Team
Meituan Technology Team
May 24, 2018 · Information Security

Data Security: Full Lifecycle Construction and Best Practices

The article outlines a comprehensive, layered data‑security lifecycle—from secure traffic and authentication through encrypted storage, role‑based access, audit logging, and safe production‑to‑test data handling—emphasizing privacy‑compliant practices, anti‑scraping measures, secure deletion, and incremental ROI‑driven adoption for enterprises.

access controlcloud infrastructureinformation security
0 likes · 24 min read
Data Security: Full Lifecycle Construction and Best Practices
21CTO
21CTO
Apr 26, 2018 · Information Security

How Cookies, Beacons & Fingerprints Track You Online

This article explains the fundamentals of web tracking, distinguishing first- and third-party trackers, detailing technical mechanisms such as cookies, browser fingerprinting, and web beacons, and offers practical tools like Lightbeam to detect and visualize trackers, highlighting privacy implications for users and operators.

Browser Fingerprintingcookiesprivacy
0 likes · 8 min read
How Cookies, Beacons & Fingerprints Track You Online
21CTO
21CTO
Mar 24, 2018 · Information Security

Inside the Facebook‑Cambridge Analytica Scandal: What Went Wrong and Why It Matters

The Facebook‑Cambridge Analytica scandal exposed the illicit harvesting of 50 million users' data, political manipulation allegations, multiple investigations, a sharp stock plunge, executive resignations, and heightened global scrutiny of data‑privacy practices.

Cambridge AnalyticaFacebookdata breach
0 likes · 17 min read
Inside the Facebook‑Cambridge Analytica Scandal: What Went Wrong and Why It Matters
Java Backend Technology
Java Backend Technology
Feb 23, 2018 · Frontend Development

How Chrome Teams and Web Developers Can Co‑Create a Faster, Safer Web

The article explores the collaborative relationship between Chrome teams and the web development community, outlining high‑level goals for accessibility, performance, security, privacy, overall platform openness, and calls for transparent cooperation, best‑practice guides, and shared tools to build a faster, more reliable web for everyone.

ChromeSecurityWeb Development
0 likes · 11 min read
How Chrome Teams and Web Developers Can Co‑Create a Faster, Safer Web
Architects Research Society
Architects Research Society
Feb 14, 2018 · Blockchain

What Is Monero? Origin, Privacy Features, and Future Outlook

The article explains Monero’s mysterious origins, its strong privacy technologies that differentiate it from Bitcoin, recent security concerns involving malicious mining, market performance, and upcoming initiatives like the Coral Reef project while also noting competition from other privacy‑focused cryptocurrencies.

Moneroanonymous paymentscryptocurrency
0 likes · 5 min read
What Is Monero? Origin, Privacy Features, and Future Outlook
AntTech
AntTech
Jan 23, 2018 · Artificial Intelligence

Privacy-Preserving Point-of-Interest Recommendation via Decentralized Matrix Factorization

This article summarizes a AAAI 2018 paper that introduces a privacy‑preserving, decentralized matrix‑factorization approach for point‑of‑interest recommendation, detailing its problem definition, model design, random‑walk based user interaction, experimental evaluation on Foursquare and Alipay datasets, and future research directions.

AIdecentralized learningmatrix factorization
0 likes · 10 min read
Privacy-Preserving Point-of-Interest Recommendation via Decentralized Matrix Factorization
ITPUB
ITPUB
Mar 1, 2016 · Fundamentals

Why Open‑Source Software Still Beats Proprietary Alternatives: 9 Compelling Reasons

The article outlines nine practical advantages of open‑source software—zero cost, instant availability, rapid security fixes, higher security, comprehensive community support, user‑centric customization, extended hardware lifespan, enhanced privacy, and superior overall quality—explaining why it remains a strong competitor to proprietary solutions.

CostSecuritycustomization
0 likes · 9 min read
Why Open‑Source Software Still Beats Proprietary Alternatives: 9 Compelling Reasons
ITPUB
ITPUB
Dec 21, 2015 · Information Security

How to Shield Your Personal Data: Cold War Secrets and Modern Privacy Hacks

The article explores historical privacy tactics of the USSR and the United States, offers practical habits for protecting personal information online, explains how to detect leaked data using search engines and social‑media checks, and suggests strategies for mitigating exposure and crafting false identities.

identity protectioninformation securitypersonal data
0 likes · 6 min read
How to Shield Your Personal Data: Cold War Secrets and Modern Privacy Hacks
21CTO
21CTO
Oct 6, 2015 · Information Security

How Pavel Durov Built Telegram: A Security‑First Messaging Platform

The article chronicles Pavel Durov’s journey from creating Russia’s VK social network to founding Telegram, highlighting his libertarian philosophy, clashes with authorities, and the technical design choices—such as the open‑source MTProto protocol, privacy focus, zero‑ads policy, and high performance—that make Telegram a unique secure messaging service.

MTProtoMessaging SecurityPavel Durov
0 likes · 7 min read
How Pavel Durov Built Telegram: A Security‑First Messaging Platform
21CTO
21CTO
Sep 12, 2015 · Information Security

How Browser Fingerprinting Works and How to Defend Against It

This article explains the many data points browsers expose—such as IP, cookies, language, hardware, and HTML5 APIs—that enable device fingerprinting, describes how fingerprinting scripts operate, and outlines practical countermeasures like disabling JavaScript, using privacy extensions, and configuring browser settings.

Browser FingerprintingHTML5 APIsJavaScript
0 likes · 10 min read
How Browser Fingerprinting Works and How to Defend Against It
Baidu Tech Salon
Baidu Tech Salon
Oct 16, 2014 · Information Security

Editor's Note: The websites you visit write Cookies to your browser...

With third‑party cookies dying, Facebook, Google, and Apple are replacing them by leveraging their own login ecosystems—Facebook’s SSO and Atlas platform, Google’s Ad ID across Android and services, and Apple’s IDFA tied to Apple IDs—while third‑party data firms supplement detail, and users can still disable most tracking.

Tech Companiescookiesdata privacy
0 likes · 7 min read
Editor's Note: The websites you visit write Cookies to your browser...