:: The 4th Era ::
139.8K views | +0 today
Follow
:: The 4th Era ::
Impact of the internet age on human culture and K-20 education policy/administration
Curated by Jim Lerman
Your new post is loading...
Your new post is loading...
Rescooped by Jim Lerman from WHY IT MATTERS: Digital Transformation
Scoop.it!

Canada Will Use Blockchain and Biometrics to Establish Digital Borders #Blockchain #Canada #Security

Canada Will Use Blockchain and Biometrics to Establish Digital Borders #Blockchain #Canada #Security | :: The 4th Era :: | Scoop.it

The Canadian government is continuing their experiments with blockchain to see how the new technology can further help the country. The federal government announced that it will pioneer the testing of the Known Traveller Digital Identity system, a new concept that helps to improve the security and flow of travellers across borders. This new program uses biometrics, cryptography and distributed ledger technology to give travellers more control over how and when they share their information with authorities. This can lead to expedited clearance and build more trust and transparency between travellers and authorities as they look to improve risk detection.


Via Farid Mheir
Farid Mheir's curator insight, March 11, 2018 6:02 PM

WHY IT MATTERS: article that explains why and how the blockchain technology will be used to facilitate border crossing in Canada. Yé!

Rescooped by Jim Lerman from Into the Driver's Seat
Scoop.it!

5 Reasons to Avoid Smart Assistants If You Value Your Privacy via Dan Price

5 Reasons to Avoid Smart Assistants If You Value Your Privacy via Dan Price | :: The 4th Era :: | Scoop.it
So, you've bought a new speaker-based smart assistant and it's proudly sitting in the center of your coffee table. But what security risks and privacy problems are you now exposing yourself to?

Via Tom D'Amico (@TDOttawa) , Miloš Bajčetić, Jim Lerman
Rescooped by Jim Lerman from Digital Culture
Scoop.it!

Don't Be a Victim of Content Theft

Don't Be a Victim of Content Theft | :: The 4th Era :: | Scoop.it
Your content may have been used without attribution or your permission. Read here to identify if you are a victim of Content Theft and how to prevent it

Via janlgordon, nukem777
janlgordon's curator insight, January 19, 2017 8:48 PM

I selected this article from Curatti written by Shelly Kramer because it explains how to find out whether your brand's content has been hijacked.

 

Protect your valuable blog posts from piracy.

 

How to Stop Content Theft

 

As a business it's important to know whether your hard work is being used in an unethical manner. I agree that it's important to find out whether your content is being used in order to preserve your brand reputation.

 

Kramer shows how to gather the right information on your blog posts in order to protect them.

 

Here's what caught my attention:

 

  • The Internet makes it easy to steal content in an age of curation. It's okay to do if you get permission and leave an attribution.

 

  • In order to find out whether your articles are being used by someone else you can use some handy tools. Google Alerts and Copyscape are two good ones to start with.

 

  • You can prevent content theft if you are using WordPress with various plugins like Copyright Notice and Yoast SEO. Alternatively you can hire a professional to set up safety measures for you.

 

Selected by Jan Gordon for Curatti covering Curation, Social Business and Beyond

 

Image: Courtesy of 123rf.

 

Read full article here: http://ow.ly/e0lP308aWjW

 

Stay informed on trends, insights, what's happening in the digital world become a Curatti Insider today

Stephen Dale's curator insight, January 22, 2017 6:45 AM
Having been a victim of content theft and plagiarism, this article provides some useful and practical tips on what to do if you are the victim, and how you can potentially prevent it happening to you.
Patryk Kaźmierski's curator insight, January 25, 2017 5:39 AM

Artykuł o tym jak zapobiegać kradzieży contentu. 

Rescooped by Jim Lerman from visual data
Scoop.it!

Infographic: Hackers Create An Amazing, Illegal Portrait Of The Internet

Infographic: Hackers Create An Amazing, Illegal Portrait Of The Internet | :: The 4th Era :: | Scoop.it

It wasn’t malicious. The file itself was the size of a small JPEG. It was given the absolute lowest priority. And it was set to self-destruct if anything went wrong. But this small file allowed one single hacker to measure the Internet activity of nearly half a million connected devices around the world, then share the results with everyone.

How was this even possible? The "hacker" barely hacked anything. In reality, they gained access to all these systems because each had the default "root" set as a password. With this access in hand, they ran several tests focusing on Internet structure and activity. And what they created from all this data is a spectacular map that captures a day in the life of the Internet (and all of its users).


Via Lauren Moss
Annenkov's comment, May 10, 2013 11:24 PM
США и Европа как очаги информатизации
Sakis Koukouvis's comment, May 11, 2013 3:17 AM
Wonderful
Nacho Vega's curator insight, May 11, 2013 12:18 PM

Creative power: hacking at the end of the world!

 

Using "root" as universal key :))