Categories
datacappy dsdefender oliverwjones

Blockchain in Three Minutes.

Blockchain has become a household name and a pop-culture staple. And yet, for many, it’s still a mystery.

In its simplest form, blockchain is a digital ledger. It keeps track of transactions and creates a permanent record of digital activity, leaving no dispute as to who owns something or to whom ownership has been transferred in the past. But blockchain isn’t the item, but it is an essential part of the package because it acts as a certificate of authenticity. Are you understanding blockchain yet? Stick with us.

Blockchain is in its relative infancy, but it’s risen to prominence in popular culture because of its association with cryptocurrency and NFTs. In these technologies, blockchain is the system through which ownership history is documented. But blockchain has applications beyond crypto and nifties. Blockchain can be used to document the history and ownership of any digital asset, including applications that don’t currently exist. For example, if the nature of digital music distribution changes in the future, blockchain might have a role to play.

While blockchain is often spoken about in rosy terms in the media, the reality is less clear. The ability to document digital assets is necessary, especially as the world becomes more digital than ever, but convenience comes at a cost. Free isn’t free, after all. It’s undeniable that blockchain is a major drain on energy, largely because of the massive power consumption of bitcoin and other cryptocurrencies. Additionally, blockchain possesses a significant privacy risk. Though it’s clear that nothing on the Internet is ever truly private, unalterable ledgers like blockchain make it impossible to erase mistakes or regrettable purchases. The applications for this level of tracking may spill over into areas of online record keeping beyond blockchain.

Another concern with blockchain is its security. Despite the reputation of blockchain records being unalterable, the popularity of blockchain makes it a popular target for hackers. This is done through conventional hacking techniques such as phishing, but also through threats that are less well-known. Routing attacks involve intercepting data in real-time. In this scenario, hackers intercept data as it’s being transferred, giving them access to private data without the blockchain knowing it’s been hacked. In another type of attack, a group that is able to obtain more than 50% of a blockchain’s mining power essentially takes control of that blockchain, giving that group the ability to manipulate the ledger as it sees fit.

In spite of the valid concerns that are associated with blockchain, the popularity of digital assets like NFTs and cryptocurrency means that blockchain is here to stay. Understanding blockchain, therefore, is a wise move. Those who invest in digital assets, including those who aren’t generally associated with blockchain, need to understand the security issues, permanence and energy usage associated with blockchain. Parents should also consider how blockchain’s record keeping could negatively impact family members. Blockchain aims to be a positive part of the Internet by bringing order and reliability to digital transactions, but it does come with some strings attached.

Categories
datacappy dsdefender

Talking Digital Insecurity and Surveillance Capitalism With Datacappy.

Listen to our very own Marco Bellin, the engineer behind the Datacappy VPN (built on the open-source WireGuard) and the author of PrivacyParent.com on the Tech Talks Daily podcast with Neil C. Hughes.

https://podcasts.apple.com/us/podcast/taking-digital-insecurity-and-surveillance-capitalism/id1018727913?i=1000548634932

Categories
datacappy dsdefender oliverwjones

The American Innovation and Choice Online Act.

Marco Bellin, CEO and founder of Datacappy, weighs in here on The American Innovation and Choice Online Act in MarketWatch’s latest feature on the bipartisan bill aimed at curtailing Big Tech’s massive power.

Categories
datacappy dsdefender

Free WiFi comes at a cost: your privacy.

You’re waiting on an oil change at the car dealer, and it’s easy and “free” to connect your tablet to the public WiFi so your child can play an online game. Once you click “Accept & Agree,” you’ve gained access to the free WiFi and digitally told the business that you agree to their terms for using this service. Unfortunately, there are hidden costs of using that free public WiFi.

The term “free” is something most people, especially parents on a budget, appreciate. We enjoy free samples at the grocery store, BOGO deals, and free WiFi when at a cafe, hotel, airport, or other public place. However, have you thought about what really happens when you or your children take advantage of that “free” WiFi? You’re risking personal privacy and safety.

Whether you’re supervising your child’s tablet use while waiting on an oil change or your teen is posting to social media at the movies with friends, the hidden costs of free WiFi usage apply. There are many ways our personal data is compromised and used via public WiFi and popular appsHackers steal passwords, putting your money, identity, and safety at risk. Your phone and email contacts as well as call logs and calendar data can be read and stolen, too. Businesses and even non-profit organizations may track your personal history online, often as a means for target advertising, but still invasive. In some cases, even real-time personal location is tracked.

Criminals use personal data to steal money and identities. Child identity theft has risen significantly in the last several years and often isn’t discovered until the child applies for a driver’s license or credit card. Privacy also is invaded when permissions are unwittingly given (clicking that “Accept & Agree” box). Your personal data may be used to see the websites you’re visiting as well as browsing history. Data collected is given to third parties, other companies that store and use data to target potential consumers.

Parenting is hard enough without the constant worry of online safety. We live in a digital era, but we can take charge of our online safety. Here are some easy-to-follow tips:

  1. Turn off Bluetooth features in public spaces.
  2. Turn off the device feature that allows for auto-connect to WiFi hotspots.
  3. Always check the privacy settings of devices to opt out of data collection.
  4. Check that any website used is secured with HTTPS protocol and not just HTTP (Read: “How Secure Is HTTPS?”).
  5. Look for the “Secure” and little lock symbol before HTTPS in the website address bar.
  6. Consider using a VPN (try Datacappy!) when accessing public WiFi.

Categories
datacappy dsdefender

NY Times: You Are Now Remotely Controlled

Surveillance capitalists control the science and the scientists, the secrets and the truth.

The debate on privacy and law at the Federal Trade Commission was unusually heated that day. Tech industry executives “argued that they were capable of regulating themselves and that government intervention would be costly and counterproductive.” Civil libertarians warned that the companies’ data capabilities posed “an unprecedented threat to individual freedom.” One observed, “We have to decide what human beings are in the electronic age. Are we just going to be chattel for commerce?” A commissioner asked, ‘‘Where should we draw the line?” The year was 1997.

The line was never drawn, and the executives got their way. Twenty-three years later…

See original article from The New York Times HERE.

Photo by Immo Wegmann on Unsplash