SAN FRANCISCO – Cryptography is at the heart of security, especially here at this week’s RSAC 2020. And during the event’s annual Cryptographer’s Panel, industry leaders broke down their top crypto-concerns, including privacy regulations, election security and blockchain. Privacy is clearly a top application for cryptography as more and more data is collected and sent to various stakeholders in the digital economy. Arvind Narayanan, associate professor of computer science at Princeton University, brought up the fact that it’s not just the basic invasion of privacy that people should be concerned about. After using the example of China using facial recognition to “name and shame” jaywalkers in Shenzhen to illustrate one aspect of the misuse of data collection, he pointed out that increasingly, personal information can be used for a range of civil liberties violations. “It’s about discrimination and fairness,” he said. “Think about genetic privacy for instance – a potential employer might deny me a job, law enforcement could misuse it, insurance companies could use it for enable discriminatory pricing.” [For Threatpost’s complete RSA Conference 2020 reporting, please visit our special coverage section, available here.] Tal Rabin, head of research at the Algorand Foundation, added that regulations like the General Data Protection Regulation (GDPR) and the California Consumer Privacy Act (CCPA) that are meant to protect citizens against data falling into the wrong hands offers…
0 0 govanguard https://govanguard.com/wp-content/uploads/2018/04/Header_Logo.png govanguard2020-02-25 15:39:002020-02-25 15:39:00RSAC 2020: Blockchain is 'Garbage In', Voting Needs Paper Ballots
Our Standard Office Hours
Monday – Friday: 8:00AM – 5:00PM EDT
Saturday – Sunday: Closed
Where to Find Us
Data Privacy Notice
- – All product names, logos, and brands are property of their respective owners.
- – The use of these names, logos, and brands is for identification purposes only and does not imply endorsement.
- – Content syndication and aggregation of public information is solely for the purpose of identifying information security trends, all syndicated content contains source links to the content creator website. All content is owned by it’s respective content creators.
- – If you are an owner of some content and want it to be removed, please email email@example.com