#security-protocols

[ follow ]
fromHackernoon
11 months ago

Inside the TCSC-Based Voting Protocol Powered by Intel SGX | HackerNoon

The TCSC-based voting protocol utilizes Intel SGX to ensure privacy and confidentiality in voting through defined boundaries for trusted and untrusted operations.
Privacy technologies
fromTechCrunch
3 days ago

Former SpaceX manager alleges harassment, retaliation, and security violations in lawsuit | TechCrunch

Collins' alleged harassment extended to other female employees, preventing them from conducting required security work and leading them into non-compliance situations.
Women
fromHackernoon
11 months ago

Four Key Steps to Confidential Smart Contract Execution | HackerNoon

A TCSC can be well qualified for the role of decentralized vote manager in an e-voting system, ensuring confidentiality, neutrality, auditability, and accountability.
Privacy professionals
#trump-administration
US news
fromwww.npr.org
3 months ago

Signal chat fallout, tariff tension and 3 more takeaways from Trump's week

The Trump administration faces serious security questions after sensitive discussions occurred on an unsecure messaging app.
US news
fromwww.npr.org
3 months ago

Signal chat fallout, tariff tension and 3 more takeaways from Trump's week

The Trump administration faces serious security questions after sensitive discussions occurred on an unsecure messaging app.
US politics
fromwww.mediaite.com
2 months ago

Pete Hegseth Reportedly Set Up Signal on Several Pentagon Computers to Circumvent Restrictions

Secretary of Defense Pete Hegseth reportedly circumvented Pentagon's phone ban by installing Signal on government computers to communicate with top officials.
fromComputerworld
2 months ago

Microsoft adds enterprise search and 'digital labor' tools to M365 Copilot

"Agent-ish solutions can solve point problems, but they aren't the 'digital coworkers' that vendors are talking about, at least not yet," Gownder said.
Artificial intelligence
fromHackernoon
1 year ago

How Primary Committee Size Impacts Blockchain Security in Discrepancy Detection Protocols | HackerNoon

The discrepancy detection primary committee's size is crucial for security, chosen randomly to minimize the likelihood of selecting an all-faulty committee, enhancing state verification.
SF politics
fromwww.mediaite.com
3 months ago

Fox's Peter Doocy Mocks Trump Admin Over Cabinet Group Chat: Well, They Did Promise to Be the Most Transparent White House Ever'

"They did promise to be the most transparent White House ever. I guess adding a journalist to a group chat like that would be consistent with that promise."
US news
fromBloomberg
7 months ago

Bloomberg

"The unusual activity detected can be attributed to various factors, such as automated scripts, high traffic volume, or unexpected browser behavior, which can trigger security measures."
Privacy professionals
fromwww.dw.com
9 months ago

US Secret Service admits failings amid Trump rally shooting DW 09/20/2024

The Secret Service's lack of communication and complacency contributed to security failures during an assassination attempt on Trump.
[ Load more ]