— Bart Suichies (@bsuichies) January 25, 2018
Absolutely stellar work from @hnldesign.
— Bart Suichies (@bsuichies) January 23, 2018
Privacy engineering, privacy impact assessment and privacy by design all benefit from technical rigorous technical privacy audits/tests. Think of them as „penetration testing” known from security engineering. This should be the standard. #GDPR #ePrivacy https://t.co/qaxu0yRiLv
— Lukasz Olejnik (@lukOlejnik) January 21, 2018
Agree. Tether CEO said at BTC Miami this week they have $1.6B in dollar reserves but hard to believe. And of course he offers no proof. It’s almost like a Central Bank printing fiat currency! As long as there’s no Tether “bank run” nothing will happen though. https://t.co/dHT7GXCBtd
— Marc van der Chijs (@chijs) January 21, 2018
To people interested in zero knowledge protocols I can't recommend Dan Boneh's book enough. https://t.co/Bys9CACB00 chapters 19 and 20. Explains rigorously why concepts like knowledge extraction and zero knowledge make sense and how to prove them using real-world examples.
— Jonas Nick (@n1ckler) January 21, 2018
Because crypto ux is not broken whatsoever..
"Given all of this nonsense lately about people losing their IOTA after having used online seed generators, I have decided to finish up, and share with you my MATLAB script that I use to generate IOTA seeds."https://t.co/V6haFvMEzA
— Bart Suichies (@bsuichies) January 21, 2018
That might be true if banks, landlords, hospitals, schools, telephone & internet companies were prohibited by law from asking for your #Aadhaar number. But any Indian can tell you they're asked for their number by non-government entities––and those companies have databases too. https://t.co/WsKC9wR6sj
— Edward Snowden (@Snowden) January 21, 2018