DaveKSecure

166 Followers
9 Following
50 Posts
Google security/privacy: Android, Google Play, Made-by-Google. Opinions my own.
Bloghttps://davek.substack.com
LinkedInhttps://www.linkedin.com/in/davekleidermacher/
Twitterhttps://twitter.com/DaveKSecure

RT @LatinasinCyber
Latinas in Tech Summit 2023 ๐Ÿ–ฅ๏ธ May 19th Virtual

Until April 30th, LAIC is hosting a social media competition to qualify for a COMPLIMENTARY pass.

All you have to do is engage with our posts for your chance to win.

#LiTSummit2023 #LatinasInTech #LatinasInTechSummit

moar #protectedcomputing!

RT @[email protected]

๐ŸŽ A gift for you: New ways to provide a safer online experience for everyone!

From an #opensource #ML tool that instantly blurs objects to enhanced data encryption, we're committed to continue designing technology that protects your privacy โ†’ http://goo.gle/3YJXBfB

๐Ÿฆ๐Ÿ”—: https://twitter.com/googledevs/status/1605942494662901771

New privacy-enhancing technology for everyone

Today weโ€™re sharing several recent PET developments that will provide the broader developer community new ways to deploy and enhance privacy features.

So true.

RT @[email protected]

The Uncanny Valley of Security - Security Incidents

When you bring transparency to find and fix issues you can look worse that those who donโ€™t even try. Even though your risk, in the end, is less than theirs.

https://www.philvenables.com/post/the-uncanny-valley-of-security-updated

๐Ÿฆ๐Ÿ”—: https://twitter.com/philvenables/status/1601939864538095616

The Uncanny Valley of Security - Updated

Since I first wrote this post 2 years ago I keep seeing it reinforced. The basic premise is that, sometimes, advanced levels of security can look like poor security. Recently Dino Dai Zovi tweeted something which serves to illustrate this: Specifically, on the face of it, the number of 0-days found and resolved can be naively interpreted as a bad thing, in the sense that there are vulnerabilities and theyโ€™ve been exploited. But looking at it another way (many of us would argue the correct way) t

Risk and Cyber