Savvy Content Creators have the power to device the YouTube content you see in your suggested feed. YouTube algorithms are a gold mine for manipulation and trending misleading content. Content Creators are now deciding publishers due to algorithmic weaknesses.
Cloud Services provide us with much needed convenience for sure. However, does this same convenience mean reducing our ownership rights, and our ability to make decisions about our data once it’s on the cloud platforms? It is time we stand firm and ask that laws are put in place to give us back our digital freedoms and control.
Apple have for a very long time been lying to the world about how they encrypt your data. Apple claims only you have access to your encrypted data but this has NEVER been true. Apple openly release your encrypted data along with your encryption key when requested.
eBay have long been seen as a goto market place for online scammers. However, what happens when eBay implements a new feature that assists online scammers in taking your money from you? eBay Checkout Basket Price Hike Scams.
Online scammers target anybody and everybody they can. We rely on our payment processors such as PayPal to provide us with the required protections. However, what if your payment provider terms and conditions help facilitate the scammers actions? PayPal has a section of terms called ‘PayPal Buyer Protection’. This article aims to demonstrate PayPal Buyer Protection terms are supporting Chinese Scammers in 2021.
OneDrive is a popular service for providing both personal and business cloud storage availability. However, do you really know if your data is safe from being deleted? Does OneDrive truly provide a full back-up service? Does OneDrive truly have a restore feature for your data? Read on to find out how I lost over 70… Continue reading OneDrive: Busting the Backups & Restore Myth
The topic covered here within this essay is far from being ‘Drop Dead Simple‘. I am currently reading a well written book by an author called Cal Newport. The title of this insightful book is called ‘Deep Work’. The book centers around the reader developing an ability to recognise what is and how to perform… Continue reading Drop Dead Simple: Liberation or Captivity #UKEdChat
After reading a few articles I came across some interesting data freely available in cyberspace. It came to my attention that the public perception of cyber security is somewhat skewed. The larger companies are not disclosing their most serious security breaches. We all know that many people tend to shop online. This is because of… Continue reading #Cyber #Security Online: Our new Frontline of Defence
You might think: Why on earth are you writing about this subject? Given my extensive background in Information Technology, and my keen interest in privacy and security, I would like to share my thoughts on the matter in order to highlight a misconception (in my opinion) within the general public eye. I say this with… Continue reading The Tor Network: The Eyes Hidden Within #technology #security #privacy
I don’t remember ever attempting to join in with my peers at the time Facebook was released to the general public way back in 2006 (Facebook, 2006). I do however remember my limited number of friends telling me all about this great new network that allowed them to communicate with long-lost friends and relatives. I… Continue reading Facebook: Why I do not socialise on it #technology