hachyderm.io is one of the many independent Mastodon servers you can use to participate in the fediverse.
Hachyderm is a safe space, LGBTQIA+ and BLM, primarily comprised of tech industry professionals world wide. Note that many non-user account types have restrictions - please see our About page.

Administered by:

Server stats:

9.4K
active users

#dataencryption

0 posts0 participants0 posts today
Neuronus Computing<p><a href="https://mastodon.social/tags/QuantumComputing" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>QuantumComputing</span></a> 🚀 by harnessing quantum mechanics to process information at unprecedented speeds, is driving advancements in encryption 🔐, machine learning 🤖, and solving complex problems 🌐.</p><p>🔍 Dive into how quantum computing is set to reshape the future of IT &amp; AI, unlocking new possibilities and efficiencies.</p><p>Read our blog for in-depth insights! 📖👇 </p><p><a href="https://neuronus.net/en/blog/quantum-computing-a-revolution-in-it-and-ai" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">neuronus.net/en/blog/quantum-c</span><span class="invisible">omputing-a-revolution-in-it-and-ai</span></a></p><p><a href="https://mastodon.social/tags/AI" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>AI</span></a> <a href="https://mastodon.social/tags/Cybersecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Cybersecurity</span></a> <a href="https://mastodon.social/tags/MachineLearning" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>MachineLearning</span></a> <a href="https://mastodon.social/tags/TechInnovation" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>TechInnovation</span></a> <a href="https://mastodon.social/tags/FutureOfTech" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>FutureOfTech</span></a> <a href="https://mastodon.social/tags/DataEncryption" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>DataEncryption</span></a> <a href="https://mastodon.social/tags/QuantumMechanics" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>QuantumMechanics</span></a> <a href="https://mastodon.social/tags/IT" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>IT</span></a> <a href="https://mastodon.social/tags/Neuronus" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Neuronus</span></a></p>
Pure Acetone<p>**DEX Exchange: What It Is and How to Get Started**<br>Decentralization is one of the key principles of the crypto industry, so it's no surprise that the popularity of De-Fi and decentralized exchanges (DEX) has been growing for several years. In this article, Trustee specialists will explain what decentralized cryptocurrency exchanges are, how they are regulated, how they differ from centralized exchanges, and how to start using them. Read on for an overview of their advantages and disadvantages, predicted future prospects, and a ranking of the best decentralized exchanges!<br>### What Is a DEX Exchange?<br>A decentralized exchange (DEX) is a platform for exchanging digital assets that operates based on decentralization—without central governance by an individual or group of people and without a central node or server.<br>Essentially, a DEX is a blockchain-based platform that facilitates peer-to-peer (P2P) transactions without intermediaries. It does not store user personal data or their financial information on its servers. Users exchange assets through smart contracts and algorithms based on a distributed ledger.<br>Many exchanges that call themselves decentralized actually store trading data and user order information on their servers, even though they do not hold private keys. The first efforts to create cryptocurrency DEXs emerged in 2014, but significant development only started in 2018.<br>### Regulation of DEXs<br>Governments have mixed opinions on financial-technology platforms that are governed solely by their user communities, with no central entity accountable for transactions.<br>As with cryptocurrency in general, authorities in different countries have not reached a consensus. For example, Singapore’s regulator seeks to develop a regulatory framework specifically for DEXs, while the U.S. attempts to apply existing laws.<br>In most countries, decentralized exchanges remain unregulated as they are not tied to any legal entities. This means that in case of violations, there is no single entity to hold accountable or to send official requests.<br>### How DEXs Work<br>Orders are executed on the blockchain using smart contracts. User funds remain on their own devices. While decentralized exchanges operate on various blockchains, the most popular ones use Tron, Ethereum, and Binance Chain.<br>A DEX serves as a marketplace for matching buy and sell orders. Once orders are matched, trading occurs directly between users.<br>### Pros and Cons of DEXs<br>**Advantages** | **Disadvantages**<br>--- | ---<br>No central governing authority; operates automatically or with community governance | No official customer support<br>Completely anonymous transactions | Difficulties converting fiat currencies<br>Secure data storage | Complex user interface, challenging for beginners<br>No need for user identification (KYC/AML) | No data recovery options for users<br>Fair pricing with no market manipulation | Trading limited to tokens that support smart contracts<br>Regulators cannot freeze accounts | Smaller liquidity pools compared to centralized exchanges<br>Transparent transactions | Limited functionality (e.g., no margin trading, stop-loss orders, leverage)<br>No counterparty risks | Potential smart contract vulnerabilities<br>Ability to trade tokens not listed on centralized exchanges | Slower trading speeds compared to centralized exchanges<br>No single point of failure | <br>### Differences Between Decentralized and Centralized Exchanges<br>The main difference is the absence of a central governing entity that controls user data and exchange operations. In DEXs, governance is automated or semi-automated, with community involvement in decision-making.<br>DEXs are more suitable for experienced traders. Users manage their own funds and trades without access to customer support or fund recovery options. While this ensures full control, it also places sole responsibility on the user. However, all transactions are fully transparent, as all activity can be tracked on the blockchain.<br>Centralized exchanges (CEXs) have tools for market manipulation and can freeze user accounts at any time due to "suspicious" activity. Additionally, since CEXs have legal addresses, government authorities in some jurisdictions can seize their assets, confiscate servers, and freeze user accounts. These actions are not possible on DEXs because their servers are distributed across various locations, placing them in a legal gray area.<br>### Examples of Decentralized Exchanges<br>The number of DEX platforms has significantly increased in recent years. Below are some of the most popular and highly rated decentralized cryptocurrency exchanges.<br>- **JustSwap** – A decentralized trading protocol on TRON for automated liquidity provision.<br>- **IDEX** – A real-time DEX for ERC-20 tokens on Ethereum with hardware wallet support and the ability to cancel orders without fees.<br>- **Waves DEX** – A cross-platform exchange built on the Waves blockchain that allows trading token pairs without needing an intermediary currency.<br>- **PancakeSwap** – A DEX on Binance Smart Chain (BSC) that supports BEP-20 token trading, liquidity rewards, and features NFT collections and lotteries.<br>- **Bancor Network** – A decentralized exchange with automatic pricing and no price difference between buy and sell orders.<br>- **Binance DEX** – A decentralized counterpart to Binance’s main exchange.<br>- **Uniswap** – A decentralized exchange on Ethereum featuring an automated liquidity protocol.<br>Decentralized exchanges are a cornerstone of the DeFi movement, offering enhanced security, transparency, and user control. However, they also present usability challenges and require users to take full responsibility for their funds. Understanding how DEXs operate and their key differences from centralized exchanges is essential for making informed decisions in crypto trading.</p><p>Here are 23 hashtags that you can use depending on the context or content you are sharing:<br><a href="https://qoto.org/tags/technology" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>technology</span></a><br><a href="https://qoto.org/tags/security" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>security</span></a><br><a href="https://qoto.org/tags/cryptocurrency" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cryptocurrency</span></a><br><a href="https://qoto.org/tags/privacy" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>privacy</span></a><br><a href="https://qoto.org/tags/AI" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>AI</span></a><br><a href="https://qoto.org/tags/machinelearning" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>machinelearning</span></a><br><a href="https://qoto.org/tags/innovation" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>innovation</span></a><br><a href="https://qoto.org/tags/websecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>websecurity</span></a><br><a href="https://qoto.org/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cybersecurity</span></a><br><a href="https://qoto.org/tags/digitalprivacy" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>digitalprivacy</span></a><br><a href="https://qoto.org/tags/virtualmachines" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>virtualmachines</span></a><br><a href="https://qoto.org/tags/linux" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>linux</span></a><br><a href="https://qoto.org/tags/wordpress" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>wordpress</span></a><br><a href="https://qoto.org/tags/cloudhosting" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cloudhosting</span></a><br><a href="https://qoto.org/tags/internetofthings" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>internetofthings</span></a><br><a href="https://qoto.org/tags/networking" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>networking</span></a><br><a href="https://qoto.org/tags/open" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>open</span></a>-source<br><a href="https://qoto.org/tags/cyberattack" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cyberattack</span></a><br><a href="https://qoto.org/tags/blockchain" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>blockchain</span></a><br><a href="https://qoto.org/tags/cryptotrading" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cryptotrading</span></a><br><a href="https://qoto.org/tags/anonymity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>anonymity</span></a><br><a href="https://qoto.org/tags/dataencryption" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>dataencryption</span></a><br><a href="https://qoto.org/tags/futuretech" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>futuretech</span></a><br>Let me know if you have a specific theme, and I can tailor the hashtags accordingly!</p><p><a href="https://bit.ly/4jEC3v5" rel="nofollow noopener noreferrer" target="_blank"><span class="invisible">https://</span><span class="">bit.ly/4jEC3v5</span><span class="invisible"></span></a></p><p><a href="https://bastyon.com/post?s=f5979725b73c57d3b959921d9506093a4026bb83165fd568498d5b8e3a58b094&amp;ref=PDQmXtWJfd8f6fMtwaxzCuqvLpoN3KbS4o" rel="nofollow noopener noreferrer" target="_blank"><span class="invisible">https://</span><span class="ellipsis">bastyon.com/post?s=f5979725b73</span><span class="invisible">c57d3b959921d9506093a4026bb83165fd568498d5b8e3a58b094&amp;ref=PDQmXtWJfd8f6fMtwaxzCuqvLpoN3KbS4o</span></a></p>
Pen Test Partners<p>How can we protect the integrity and confidentiality of the footage from body-worn cameras in law enforcement and public safety?</p><p><span class="h-card" translate="no"><a href="https://infosec.exchange/@alexlomas" class="u-url mention" rel="nofollow noopener noreferrer" target="_blank">@<span>alexlomas</span></a></span> has outlined how encryption, integrity verification, and security measures can protect these devices so that the footage remains reliable: <a href="https://www.pentestpartners.com/security-blog/how-to-secure-body-worn-cameras-and-protect-footage-from-cyber-threats/" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">pentestpartners.com/security-b</span><span class="invisible">log/how-to-secure-body-worn-cameras-and-protect-footage-from-cyber-threats/</span></a></p><p><a href="https://infosec.exchange/tags/Cybersecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Cybersecurity</span></a> <a href="https://infosec.exchange/tags/BodyWornCameras" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>BodyWornCameras</span></a> <a href="https://infosec.exchange/tags/DataEncryption" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>DataEncryption</span></a> <a href="https://infosec.exchange/tags/PublicSafety" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>PublicSafety</span></a> <a href="https://infosec.exchange/tags/IoTSecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>IoTSecurity</span></a></p>
LavX News<p>Secure Your Secrets: Unveiling the Power of dotfile-locker for Sensitive Configuration Management</p><p>In a world where data privacy is paramount, managing sensitive configuration files has become a crucial task for developers and professionals alike. Enter dotfile-locker, a revolutionary tool that sim...</p><p><a href="https://news.lavx.hu/article/secure-your-secrets-unveiling-the-power-of-dotfile-locker-for-sensitive-configuration-management" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">news.lavx.hu/article/secure-yo</span><span class="invisible">ur-secrets-unveiling-the-power-of-dotfile-locker-for-sensitive-configuration-management</span></a></p><p><a href="https://mastodon.social/tags/news" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>news</span></a> <a href="https://mastodon.social/tags/tech" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>tech</span></a> <a href="https://mastodon.social/tags/DotfileManagement" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>DotfileManagement</span></a> <a href="https://mastodon.social/tags/DataEncryption" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>DataEncryption</span></a> <a href="https://mastodon.social/tags/GPG" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>GPG</span></a></p>
Cryptomator<p>🌐 Celebrating the International Day of Computer Science! 🎉</p><p>From pioneers like Grace Hopper to modern advancements in data security, computer science shapes our world. 💻</p><p>At Cryptomator, we enable secure cloud encryption to protect privacy and empower the digital future.</p><p>How has computer science impacted your life? Let us know!</p><p><a href="https://mastodon.online/tags/ComputerScienceDay" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ComputerScienceDay</span></a> <a href="https://mastodon.online/tags/Cybersecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Cybersecurity</span></a> <a href="https://mastodon.online/tags/DataEncryption" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>DataEncryption</span></a> <a href="https://mastodon.online/tags/GraceHopper" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>GraceHopper</span></a> <a href="https://mastodon.online/tags/Cryptomator" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Cryptomator</span></a></p>
Acin on .art<p>This seems like a good time to repost my list of online file storage services. I haven't tried all of these, but even for what I have, reviews are welcome.</p><p>• Sync </p><p> Nextcloud</p><p> Proton Drive</p><p> Nordlocker (not offered for Linux)</p><p> Koofr</p><p><a href="https://mastodon.art/tags/privacy" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>privacy</span></a> <a href="https://mastodon.art/tags/digitalBackupStorage" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>digitalBackupStorage</span></a> <a href="https://mastodon.art/tags/dataEncryption" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>dataEncryption</span></a> <a href="https://mastodon.art/tags/cloudServices" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cloudServices</span></a></p>
Etibarn<p>The Quantum Enigma: How Unbreakable Code and Lightning Speed Will Change Everything <a href="https://mastodon.social/tags/quantumcomputing" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>quantumcomputing</span></a> <a href="https://mastodon.social/tags/dataencryption" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>dataencryption</span></a> <a href="https://mastodon.social/tags/dataprocessing" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>dataprocessing</span></a> <a href="https://mastodon.social/tags/technology" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>technology</span></a> <a href="https://mastodon.social/tags/science" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>science</span></a> <a href="https://mastodon.social/tags/quantumsupremacy" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>quantumsupremacy</span></a> <a href="https://mastodon.social/tags/quantumcryptography" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>quantumcryptography</span></a> <a href="https://mastodon.social/tags/QKD" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>QKD</span></a> <a href="https://mastodon.social/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cybersecurity</span></a> <a href="https://mastodon.social/tags/futureofcomputing" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>futureofcomputing</span></a></p><p><a href="http://etibarn.com/2024/03/04/the-quantum-enigma-how-unbreakable-code-and-lightning-speed-will-change-everything/" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">http://</span><span class="ellipsis">etibarn.com/2024/03/04/the-qua</span><span class="invisible">ntum-enigma-how-unbreakable-code-and-lightning-speed-will-change-everything/</span></a></p>
A.L. Blacklyn<p>Online file storage is popular but not without privacy and safety risks, including civil rights violations.</p><p><a href="https://constitutioncenter.org/news-debate/special-projects/digital-privacy/policing-and-the-cloud" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">constitutioncenter.org/news-de</span><span class="invisible">bate/special-projects/digital-privacy/policing-and-the-cloud</span></a></p><p>If you would like to avoid <a href="https://wandering.shop/tags/Dropbox" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Dropbox</span></a>, Microsoft's <a href="https://wandering.shop/tags/OneDrive" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>OneDrive</span></a>, and Amazon or Google Drives because of their previous misuses of power and their current partnerships, you might consider:</p><p>• Nextcloud, <a href="https://nextcloud.com/" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="">nextcloud.com/</span><span class="invisible"></span></a><br>• NordLocker, <a href="https://nordlocker.com/" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="">nordlocker.com/</span><span class="invisible"></span></a><br>• pCloud, <a href="https://www.pcloud.com/" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="">pcloud.com/</span><span class="invisible"></span></a><br>• Proton Drive, <a href="https://drive.proton.me/" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="">drive.proton.me/</span><span class="invisible"></span></a></p><p><a href="https://wandering.shop/tags/cloudStorage" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cloudStorage</span></a> <a href="https://wandering.shop/tags/dataEncryption" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>dataEncryption</span></a></p>
🛡 H3lium@infosec.exchange/:~# :blinking_cursor:​<p>"⏰ 3AM Ransomware: When LockBit Fails, Darkness Rises! ⏰"</p><p>In recent cyberattacks, when the deployment of the LockBit ransomware failed, attackers resorted to a new ransomware strain named "3AM." This new strain was discovered after hackers used it in an attack that failed to deploy LockBit ransomware on a target network. The 3AM ransomware has been used in a limited manner and was the backup option for attackers when defense mechanisms blocked LockBit. <br>Symantec's Threat Hunter Team reported that 3AM ransomware attacks are rare, with only a few known instances. The 3AM ransomware encrypts data and leaves a ransom note threatening to sell the stolen data unless a ransom is paid. The ransom note references "3 am" as a mystical time, suggesting that all files have been encrypted and backups have disappeared. The 3AM ransomware is written in Rust and is distinct from other known ransomware families. </p><p>Before encrypting files, 3AM tries to halt several services on the infected system related to security and backup products. Once encrypted, files have the ".THREEAMTIME" extension. The malware also tries to delete Volume Shadow copies that could be used for data recovery. Symantec's research indicates that the 3AM ransomware was only partially successful in the attack they studied. The threat actor managed to deploy the malware on three machines, but it was blocked on two of them.</p><p>Source:</p><ol><li><a href="https://www.bleepingcomputer.com/news/security/hackers-use-new-3am-ransomware-to-save-failed-lockbit-attack/" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">bleepingcomputer.com/news/secu</span><span class="invisible">rity/hackers-use-new-3am-ransomware-to-save-failed-lockbit-attack/</span></a></li><li><a href="https://www.darkreading.com/attacks-breaches/when-lockbit-ransomware-fails-attackers-deploy-brand-new-3am" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">darkreading.com/attacks-breach</span><span class="invisible">es/when-lockbit-ransomware-fails-attackers-deploy-brand-new-3am</span></a></li></ol><p>Tags: <a href="https://infosec.exchange/tags/Ransomware" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Ransomware</span></a> <a href="https://infosec.exchange/tags/3AM" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>3AM</span></a> <a href="https://infosec.exchange/tags/LockBit" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>LockBit</span></a> <a href="https://infosec.exchange/tags/CyberAttack" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>CyberAttack</span></a> <a href="https://infosec.exchange/tags/CyberSecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>CyberSecurity</span></a> <a href="https://infosec.exchange/tags/ThreatHunting" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ThreatHunting</span></a> <a href="https://infosec.exchange/tags/Symantec" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Symantec</span></a> <a href="https://infosec.exchange/tags/DataEncryption" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>DataEncryption</span></a> <a href="https://infosec.exchange/tags/BackupAttack" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>BackupAttack</span></a></p>
Gareth Emslie 🇿🇦 🇪🇦 🇨🇭<p>Encrypting data while in use, not just in transit and at rest, closes one more avenue of cyberattack.. <a href="https://www.darkreading.com/edge-articles/how-confidential-computing-can-change-cybersecurity" target="_blank" rel="nofollow noopener noreferrer" translate="no"><span class="invisible">https://www.</span><span class="ellipsis">darkreading.com/edge-articles/</span><span class="invisible">how-confidential-computing-can-change-cybersecurity</span></a> <a href="https://hachyderm.io/tags/DataEncryption" class="mention hashtag" rel="tag">#<span>DataEncryption</span></a> <a href="https://hachyderm.io/tags/CyberSecurity" class="mention hashtag" rel="tag">#<span>CyberSecurity</span></a></p>
Dr Richard Ramyar :idle:<p>The session was presented at the SRE London Meetup <a href="https://lnkd.in/eXfCwUDF" rel="nofollow noopener noreferrer" target="_blank"><span class="invisible">https://</span><span class="">lnkd.in/eXfCwUDF</span><span class="invisible"></span></a> in <a href="https://fosstodon.org/tags/Wipro" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Wipro</span></a>'s Holborn Offices</p><p><a href="https://fosstodon.org/tags/Cloud" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Cloud</span></a>&nbsp;<a href="https://fosstodon.org/tags/AI" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>AI</span></a>&nbsp;<a href="https://fosstodon.org/tags/ML" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ML</span></a>&nbsp;<a href="https://fosstodon.org/tags/AIML" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>AIML</span></a>&nbsp;<a href="https://fosstodon.org/tags/MachineLearning" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>MachineLearning</span></a>&nbsp;<a href="https://fosstodon.org/tags/ArtificialIntelligence" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ArtificialIntelligence</span></a>&nbsp;<a href="https://fosstodon.org/tags/Kubeflow" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Kubeflow</span></a>&nbsp;<a href="https://fosstodon.org/tags/Privacy" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Privacy</span></a>&nbsp;<a href="https://fosstodon.org/tags/DataSovereignty" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>DataSovereignty</span></a>&nbsp;<a href="https://fosstodon.org/tags/Security" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Security</span></a>&nbsp;<a href="https://fosstodon.org/tags/CyberSecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>CyberSecurity</span></a>&nbsp;<a href="https://fosstodon.org/tags/SecOps" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>SecOps</span></a>&nbsp;<a href="https://fosstodon.org/tags/MemoryEncryption" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>MemoryEncryption</span></a>&nbsp;<a href="https://fosstodon.org/tags/UbiquitousDataEncryption" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>UbiquitousDataEncryption</span></a>&nbsp;<a href="https://fosstodon.org/tags/UDE" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>UDE</span></a>&nbsp;<a href="https://fosstodon.org/tags/EndToEndEncryption" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>EndToEndEncryption</span></a>&nbsp;<a href="https://fosstodon.org/tags/Linux" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Linux</span></a>&nbsp;<a href="https://fosstodon.org/tags/Data" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Data</span></a>&nbsp;<a href="https://fosstodon.org/tags/GoogleCloud" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>GoogleCloud</span></a>&nbsp;<a href="https://fosstodon.org/tags/GoogleCloudPlatform" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>GoogleCloudPlatform</span></a>&nbsp;<a href="https://fosstodon.org/tags/GCP" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>GCP</span></a>&nbsp;<a href="https://fosstodon.org/tags/Encryption" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Encryption</span></a>&nbsp;<a href="https://fosstodon.org/tags/DataEncryption" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>DataEncryption</span></a>&nbsp;<a href="https://fosstodon.org/tags/GPU" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>GPU</span></a>&nbsp;<a href="https://fosstodon.org/tags/TPU" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>TPU</span></a>&nbsp;<a href="https://fosstodon.org/tags/Containerization" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Containerization</span></a>&nbsp;<a href="https://fosstodon.org/tags/Anthos" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Anthos</span></a>&nbsp;<a href="https://fosstodon.org/tags/Istio" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Istio</span></a></p>