General Musing

blaze your trail

Posts Tagged ‘privacy

Privacy and Mobile ID

leave a comment »

Privacy and Mobile ID
SecureIDNews | Researchers test privacy and mobile ID

App enables relying parties to see only relevant data Gina Jordan, contributing editor, Avisian Publications With the emergence of Google Wallet and the slow migration toward mobile payment transactio…

View or comment on Daniël Crompton’s post »


Written by Daniël W. Crompton (webhat)

July 9, 2012 at 3:58 pm

FaceBook killing permanent Offline Access

leave a comment »

FaceBook killing permanent Offline Access in October

Finally the perpetual Offline Access for apps will be removed in October, it will be replaced with a short-lived or long-lived access_token depending on the environment. In October all existing offline_access access_tokens will have their expiration time truncated to 60 days.

This means that as long as users visit the app the new access_token is updated to enable the app to access the data in offline mode, if the user doesn’t use the app the access…

View or comment on Daniël Crompton’s post »

Written by Daniël W. Crompton (webhat)

July 6, 2012 at 2:14 pm

Posted in Uncategorized

Tagged with ,

Encrypted Disks #security #privacy

with one comment

Encrypted Disk

I just saw this question: I have an external 3Tb Hard drive formatted as Mac OS Extended (Journaled, Encrypted) with 10.7.1. Just wondering if 10.6 can also access this external hard drive ?

And saw this answer: I strongly recommend against encrypting anything unless you really really really have to. The only one it will ultimately keep away from your data is yourself.


It’s stupid answers like this that allow people to lose their identity when their phone, computer or harddisk is stolen. By encrypting your data you are wisely protecting your data from theft, and ensuring that when you do suffer the loss of a device you don’t compound that loss with your identity or other valuable data. It is in exceptional circumstances that you lose your data due to the encryption, this is not likely to happen.
The first thing I do on my computer is set up an encrypted disk, you should too.
Image source: Sebastian Fritzon 

View or comment on Daniël Crompton’s post »

Written by Daniël W. Crompton (webhat)

June 28, 2012 at 2:53 pm

Privacy Settings

leave a comment »

Privacy Settings

I like many of the apps that show you the importance of having you privacy settings set up right. Personally I would prefer to have most everything public, with a few exception. I just don’t post anything I wouldn’t tell a stranger. 🙂

View or comment on Daniël Crompton’s post »

Written by Daniël W. Crompton (webhat)

June 28, 2012 at 7:32 am

Posted in Uncategorized

Tagged with ,

FaceBook Turns on Address

leave a comment »

FaceBook Turns on

In the last days Facebook turned your mail address into the default one shown on your profile.

You can change it back on the About page of your profile. Wisely they didn’t put it in your Account Settings as it would easily be found there.

View or comment on Daniël Crompton’s post »

Written by Daniël W. Crompton (webhat)

June 26, 2012 at 11:12 pm

Posted in Uncategorized

Tagged with , ,

6 Months of Security Links #2011

leave a comment »

I’m a regular curator of daily links, and like to give overviews of my collection of curated links and posts. This is partly as there are some good sources and articles in here and as I am working on a research project which I started based on a number of books I read.

I’m sure you’ll find something interesting in the items below – there are some gems in the list – and I dare to hazard the guess you might learn something you wanted to know. 🙂

Read the rest of this entry »

Written by Daniël W. Crompton (webhat)

July 15, 2011 at 4:10 pm

Posted in tagging

Tagged with , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , ,

A catalog of this year’s risky articles #2010

leave a comment »

Programming Hands

Risk is something which can be difficult to evaluate for the average person, there is a lot of work which goes in to learning not to do the two things that people usually do when they are confronted with risk:

  1. Ignore
  2. Overreact

It looks like every man and his dog needs to have a Facebook page, even banks…

It has been almost 1.5 weeks since Google’s FeedBurner removed the Frie…

Some days ago I tweeted to Prosper, a personal loan marketplace, whether they…

I don’t really think most people get “it” when it comes to …

Just noticed that Google Translate translates the name of the Dutch social ne…

I find a 400 plus page manual of office policies and job descriptions for eac…

In the last two days I’ve not been posting so much, and focussing on up…

I started playing with Google Scribe and wanted to see if patterns emerged so…

I have my Google account set up with English as the preferred language, my br…

For the last 2 years LinkedIn has been running a bad poor IT management depar…

When I just started I too had trouble with getting all the items I required t…

On August 11th 2007 I exceeded my GMail quota, I blogged about it here. At th…

Brian Szymanski send a reply to me concerning another bank implementing SMS b…

I don’t understand why url expansion after url shortening is such an is…

I just read an article Web Coupons Know Lots About You, and They Tell in the …

This morning/night China’s networks were sending rerouting messages to …

The lack of trained and experienced computer security people working in small…

Last week I saw an episode of a popular Dutch Ombudsman program Kassa, they r…

After seeing a program about a lifecoach trying to find the time to get his p…

Image source Radio Nederland Wereldomroep

%d bloggers like this: