Posts Tagged ‘identification’
Privacy and Mobile ID
![]() |
Privacy and Mobile ID
SecureIDNews | Researchers test privacy and mobile ID
App enables relying parties to see only relevant data Gina Jordan, contributing editor, Avisian Publications With the emergence of Google Wallet and the slow migration toward mobile payment transactio…
|
![]() |
Written by Daniël W. Crompton (webhat)
July 9, 2012 at 3:58 pm
Posted in Uncategorized
Tagged with id, identification, identity, mobile, privacy
6 Months of Security Links #2011

I’m a regular curator of daily links, and like to give overviews of my collection of curated links and posts. This is partly as there are some good sources and articles in here and as I am working on a research project which I started based on a number of books I read.
I’m sure you’ll find something interesting in the items below – there are some gems in the list – and I dare to hazard the guess you might learn something you wanted to know. 🙂
Written by Daniël W. Crompton (webhat)
July 15, 2011 at 4:10 pm
Posted in tagging
Tagged with 2010, 4chan, 802.11, aclu, advertising, airplane, airport, algorithm, analysis, audio, audit, authentication, authority, authorization, availability, backbone, bandwidth, bias, biases, biometrics, bluetooth, botnet, browser, bruceschneier, ca, camera, certificate, certificates, china, cia, communication, computer, copyright, cpu, crime, cryptography, cybersecurity, data, database, datagathering, datamining, db, dead, death, defcon, descriptor, detection, disk, diy, drive, drm, drone, economics, embedded, encryption, erase, eu, europe, experiment, facebook, fbi, file, filter, fingerprint, fingerprinting, flying, forensics, freedom, gcc, geolocation, google, government, gprs, gsm, hack, hacking, hardware, hdd, health, hibernate, identification, identity, india, insurance, intelligence, internet, isp, java, javascript, jboss, kerberos, latency, law, learning, lifehacks, linux, livecd, mac, malware, marketing, microsoft, mobile, monitoring, music, mythology, nagog, network, networking, ntlm, oauth, openid, osx, outsourcing, paper, passwd, password, peering, penetration, pentest, performance, pki, plane, police, politics, privacy, quora, ra, recovery, refresher, reload, repair, report, risk, robotics, router, routing, scam, schneier, science, security, seo, socialmedia, socialnetworking, software, solidstate, specialbrands, ssd, ssl, sso, surveillance, system:filetype:pdf, system:media:document, technology, terror, terrorism, testing, theft, threats, tls, toblog, tor, toread, tracking, traffic, travel, tsa, uav, uk, umts, usa, video, visualization, vodafone, vulnerability, wasp, watermarking, web, webapp, webpage, windows, wireless, youtube