What is your internetcookies main hightlight of the 2010s decade? Feel free to comment! Is it the Facebook’s Cambridge Analytica scandal of March 2017? Becoming awareness of the impact of social media on daily live? Cookies will follow you every click on your digital journey also in the 2020s.
Cloud service security and privacy depends on all layers and protocols your files are transmitted by. Hence a fully privacy and security is of paramount importance.
What makes X Cloud different? In X Cloud you are really the owner of your files, they encrypt your documents and fragment them into several pieces and thanks to their use of Blockchain technology each piece of your file goes to different nodes completely encrypted and only you know the password to open them since they don’t have access to it.
Did you know even the “From:” field in an email, so the sender email address itself, can be compromised in standard email?
Regular email has no class protection.
Class 1 protection declares that the sender is the owner of the “From:” email address in the sense that the sender can receive email sent to that address, and so merely proves that an email received really did come from the “From:” address given.
Class 2 protection provides a more in-depth identity verification process, and this involves making inquiries about the would-be certificate holder.
S/MIME provides the following cryptographic security services for electronic messaging applications:
Non-Repudiation of origin (using digital signatures)
E-mail by default is infringing your privacy. No law for privacy applies, like there is with regular (non-digital) mail.
Exchange provides an environment to support a degree of privacy on an iPhone or iPad: “In iOS 13.4 and later, when you reply or forward a message, the encryption state of your message will match the state of the incoming message rather than your system default setting.“
Authy is a free mobile / desktop app for two factor authentication, as well as security partner and SMS delivery service of many websites that want to make two-factor authentication work better for their users.
How often do you use this app? Feel free to answer and comment.
Extra verification, many websites depend on reCAPTCHA. In 2009 this services is acquired by Google. Wikipedia states:
In my opinion this service should be open-source software code. Not used by tracking companies to restrict acces to a website if not used. So no gstatic.com no google.com no googleapis.com. In the above screenshot the reCAPTCHA can only be submitted if allowed to use: