Data Safety and Information Security

Data Safety and Information Security

676 bookmarks
Custom sorting
What is Browser Fingerprinting & How Does it Work? | SEON
What is Browser Fingerprinting & How Does it Work? | SEON
Browser fingerprinting gathers hundreds of data points about your users' devices and browser configurations. But how does it stop fraud, and is it enough?
·seon.io·
What is Browser Fingerprinting & How Does it Work? | SEON
How to Detect Bot Traffic (Complete Guide) - Ricky Spears
How to Detect Bot Traffic (Complete Guide) - Ricky Spears
Do you own a website and keep getting disturbed by bots? Read the article below to learn how to detect and block bot traffic. Bot traffic, if not contained, can mess up your analytics and even add to your server cost.
·rickyspears.com·
How to Detect Bot Traffic (Complete Guide) - Ricky Spears
Verifiable Credentials Overview
Verifiable Credentials Overview
Credentials are a part of our daily lives; driver's licenses are used to assert that we are capable of operating a motor vehicle, university degrees can be used to assert our level of education, and government-issued passports enable us to travel between countries. The family of W3C Recommendations for Verifiable Credentials, described in this overview document, provides a mechanism to express these sorts of credentials on the Web in a way that is cryptographically secure, privacy respecting, and machine-verifiable.
·w3c.github.io·
Verifiable Credentials Overview
Passkey Developer Resources
Passkey Developer Resources
Hello passkeys, goodbye passwords! passkeys.dev is a collection of resources and insights to help you deploy passkeys, including practical user experiences, device ecosystem support, frequently asked questions, and more.
·passkeys.dev·
Passkey Developer Resources
RFC 9421: HTTP Message Signatures
RFC 9421: HTTP Message Signatures
This document describes a mechanism for creating, encoding, and verifying digital signatures or message authentication codes over components of an HTTP message. This mechanism supports use cases where the full HTTP message may not be known to the signer and where the message may be transformed (e.g., by intermediaries) before reaching the verifier. This document also describes a means for requesting that a signature be applied to a subsequent HTTP message in an ongoing HTTP exchange.
HTTP Message Signatures
·datatracker.ietf.org·
RFC 9421: HTTP Message Signatures
Cloudflare Takes a Stab at a Captcha That Doesn’t Suck
Cloudflare Takes a Stab at a Captcha That Doesn’t Suck
The internet infrastructure company has an alternative tool to check whether you’re human—and it doesn’t force you to pick out buses in tiny boxes.
·wired.com·
Cloudflare Takes a Stab at a Captcha That Doesn’t Suck
Challenge: Private Access Tokens - Discover - Apple Developer
Challenge: Private Access Tokens - Discover - Apple Developer
Private Access Tokens are powerful tools that prove when HTTP requests are coming from legitimate devices without disclosing someone's identity. They are simple to set up and test — and so, on Thursday, we're inviting you to try out Private Access Tokens on your own server.
·developer.apple.com·
Challenge: Private Access Tokens - Discover - Apple Developer
The Pyramid of Pain
The Pyramid of Pain
Update 2014-01-17 I'm updating this post to include a slightly revised version of the Pyramid.  The only real change I made was that I adde...
·detect-respond.blogspot.com·
The Pyramid of Pain
Unified Mobile App Defense, All Android & iOS Apps - Appdome
Unified Mobile App Defense, All Android & iOS Apps - Appdome
Try Appdome's Unified Mobile App Defense platform, continuous mobile app security, anti-fraud, anti-malware, anti-bot, geo compliance, more in Android & iOS apps in CI/CD.
·appdome.com·
Unified Mobile App Defense, All Android & iOS Apps - Appdome
Societal, ethical, and technical impacts of digital identities
Societal, ethical, and technical impacts of digital identities
This blog post introduces an analysis of Digital Identities and their various architectural models. The paper focuses on the impact of identities on the Web and users, particularly on privacy, security, and human rights, the role that Web standardization may play in managing that impact and how collaboration among various stakeholders can mitigate these threats.
·w3.org·
Societal, ethical, and technical impacts of digital identities
Cyber Scarecrow
Cyber Scarecrow
An app for scaring away malware
·cyberscarecrow.com·
Cyber Scarecrow
The technical complexities of decoupled authorization | Cerbos
The technical complexities of decoupled authorization | Cerbos
Decoupling the authorization module can bring about a host of benefits. But what are the complexities of this approach? And how can they be addressed? In this guide, you can familiarize yourself with the important technical aspects of decoupling authorization.
·cerbos.dev·
The technical complexities of decoupled authorization | Cerbos
New security loophole allows spying on internet users visiting websites and watching videos
New security loophole allows spying on internet users visiting websites and watching videos
Internet users leave many traces on websites and online services. Measures such as firewalls, VPN connections and browser privacy modes are in place to ensure a certain level of data protection. However, a newly discovered security loophole allows bypassing all of these protective measures.
·techxplore.com·
New security loophole allows spying on internet users visiting websites and watching videos
We analyzed the entire web and found a cybersecurity threat lurking in plain sight
We analyzed the entire web and found a cybersecurity threat lurking in plain sight
Our latest research has found that clickable links on websites can often be redirected to malicious destinations. We call these "hijackable hyperlinks" and have found them by the millions across the whole of the web, including on trusted websites.
·techxplore.com·
We analyzed the entire web and found a cybersecurity threat lurking in plain sight
Ente - Private cloud storage for your photos, videos and more
Ente - Private cloud storage for your photos, videos and more
Protect your photos and videos with Ente - a secure, cross-platform, open source, encrypted photo storage app. Automatic backups, end-to-end encryption, collaborative albums, family plans, free trial, library-sync, 1-click import, human support, locked photos, live photos, descriptions, private sharing, search and more.
·ente.io·
Ente - Private cloud storage for your photos, videos and more