Right out of the box, we encourage you to keep reading even if you are of the mindset, “I have nothing to hide.” That’s true of most people in the world. It is not about being anonymous because you are intent on criminal or underhanded acts, it is to protect your personal information from being used to set you up for such acts.
Everyone has an opinion about the validity of cryptocurrencies as a financial instrument. Many traditionalists in the world of fiat currencies and highly regulated institutions see crypto as fraudulent and a passing fad. Others want to rein it in and put regulatory controls in place, removing the decentralization of the cryptocurrency that is a huge part of its appeal.
In a move supported by both major political parties in Australia, a bill named the “Telecommunications Assistance and Access Bill 2018,” has passed the House of Representatives and is headed to the upper House for a vote. Given its bi-partisan support and the position of PM Michael Turnbull regarding encryption, passage into law seems certain.
If you are part of the crypto circuit, you will be more than familiar with the term ‘ICO’ (initial coin offering) as this has been the most popular way of raising funds for Startup Blockchain projects. ICOs have been the vehicle used to raise over $5 billion dollars in the first half of 2018 alone. The purpose of an ICO is to allow companies to raise capital without giving away any of their equity or control. In exchange, a digital asset (tokens) is created that can be traded, an asset which may or may not go up in value.
Do you know where your smartphone is? Its makers do, and lots about you, too.
There was an ad campaign years ago with thetagline, “Do you know where your children are?” The campaign was designed to get parents to take an interest in their children and their activities to get better outcomes for the kids.
One day recently, an interesting article from ZDNet popped up on the radar with this title, “What is malware? Everything you need to know about viruses, Trojans, and malicious software.” It sounded like a great topic for you, our readers, to further add to your understanding of life’s digital dangers.