Welcome to WordPress. This is your first post. Edit or delete it, then start writing!
Author: admin
Hacking A Double-Edged Sword
Hacking is no longer simply a term used to describe technical curiosity and problem-solving behaviors, but rather has since transformed into an inherently dichotomic phenomenon. […]
Your digital footprint is yours The right to privacy
Long defined as a fundamental human right that protects individuals from unwarranted interference into their personal lives, the subject of privacy continues to trigger serious […]
Pseudonymization — Towards Privacy
Pseudonymization is a privacy technique that replaces personal data with artificial identifiers known as pseudonyms. By doing this, it will help with the ability to […]
Digitization Your Right to Anonymity
The removal of personal-related data from the contents is known as Anonymization. It includes the methods that prevent or hard to find an individual in […]
Public-Key Encryption Secure Online Communication In Action
Public-key cryptography, or asymmetric cryptography is a cryptographic system that uses two keys: a public key which can be known by everyone and an associated […]
Behavioral Tracking
Essentially, behavioral tracking refers to the tracking and analyzing user behavior so identify what users prefer, how often they do something or where patterns emerge. […]
Mobile Tracking The Unseen Eye on My Pocket
Mobile tracking is a term that refers to the practice using of mobile positioning for one or multiple purposes conducting physical devices. This technology has […]
Web Browser Tracking A Quiet Observer
Browser tracking is a pervasive practice where websites and online services monitor your browsing lifestyle. Important information may comprise the browsing history, search queries through […]
That Darn User Tracking and The Digital Footprint You Leave Behind
What is User Tracking (user monitoring or user behavior analysis) This information can be your browsing history, search requests, clicks and purchases. On one hand, […]