Filter posts by:
No card, No Phone, No problem! Alipay: Pay with your face,  A balance between convenience, security and privacy

No card, No Phone, No problem! Alipay: Pay with your face, A balance between convenience, security and privacy

Can you imagine that you are able to pay without mobile phones, bank cards, and cash? Alipay made it happen in 2017, and it provides the facial recognition payment that lets people make payments by scanning their faces. In...
“De Sleepwet”: Why five students are trying to protect the privacy of Dutch citizens

“De Sleepwet”: Why five students are trying to protect the privacy of Dutch citizens

A revised version of the Dutch law on intelligence and security is challenged by five students, because it violates the right to privacy. They started a campaign with the goal to enable a referendum, in an effort to protect...

“All I need is your face”: Issues of privacy and security as Apple introduces FaceID.

Apple revealed its latest tech miracle, Iphone X, and alongside came a (not-so) new feature: FaceID. Apple suggests that biometric technology is the solution to security issues and personal identification. But in a data-based economy, more often than not,...
In the name of privacy

In the name of privacy

As technologies get more and more advanced in tracking, monitoring, and data analysis, the issue of privacy has become a very relevant topic and a much discussed debate. The digital footprint is one of the key terms that is...
Could Snapchat’s new feature challenge Facebook’s dominance in terms of trust and privacy?

Could Snapchat’s new feature challenge Facebook’s dominance in terms of trust and privacy?

What’s the next Facebook or is there one? Ask many, including John D. Sutter (2012), who suggests that this question is not only wishful thinking, but an increasingly likely reality. Jamie Turner argues that although Facebook is still “king...
Are your nude pictures save in the cloud?

Are your nude pictures save in the cloud?

How safe are the files you keep in your cloud? We live in a world where more and more things are being saved at distance servers, and we can access them only thru an internet access. How can we...
Hacking the Digital: Fingerprint Secured Touch ID from Apple

Hacking the Digital: Fingerprint Secured Touch ID from Apple

The iPhone 5S is a revised version of its predecessor, the iPhone 5, and was unveiled to the general public last month on September 20th. Aside from various improvements and new available features, Apple’s new fingerprint-based identity sensor, Touch...
Watch Me If You Can (1 of 3): Anonymous and Secure Browsing

Watch Me If You Can (1 of 3): Anonymous and Secure Browsing

This is the first post in a short series on how to remain secure and anonymous online. Part one will cover internet browsing, part two will cover communicating online, and part three will cover file transferring and downloading. Parts...
Book Review: The Googlization of Everything (And Why We Should Worry) by Siva Vaidhyanathan

Book Review: The Googlization of Everything (And Why We Should Worry) by Siva Vaidhyanathan

I’m a so-called Google poweruser. Not only do I use the world’s biggest search engine for my daily queries like millions of ‘normal’ mortals do, I also use Google for my pictures (Picasa), my agenda (Google Agenda), video’s (YouTube),...