Healthcare, Technology

How Privacy And Security Concerns Are Impacting Coronavirus Contact-tracing

Image by Gerd Altmann from Pixabay The world expects the telecoms to play a vital role in the control of coronavirus through contact-tracing apps that should be used to mitigate its spread, this is, however, proving to be a tough nut to crack. Contact-tracing, as seen by a lot of people, is fraught with privacy and security issues which may undermine this much-needed avenue of fighting COVID-19. We need right now to put in everything we have got scientifically into mitigating the spread of coronavirus as a body. We shouldn’t be divided, but is that really possible?   Without any doubt, telecommunications has a great role to play in contact-tracing especially where we deploy apps that can monitor the spread of the virus. However, this can only be feasible where nations, corporations, and individuals are on the same page. Incidentally, that is not what we have on the ground now. While we believe that contact-tracing will go a long way in redeeming the situation we have at hand, there are concerns from varying quarters as regards the privacy and security of the people. Fighting the coronavirus pandemic in Asia  A vivid example of the use of contact-tracing in the fight against the spread of…

Continue Reading

Technology

How Technology Can Help While The World Battles Coronavirus

Image by Gerd Altmann from Pixabay The continuing global spread of the coronavirus scourge is seriously putting businesses on the bad spot and it means that without any appreciable effort at terminating the spread, businesses will have to come up with out-of-the-box ideas to stay functional. The major concern everybody is facing is if the level of global advancement in technology has prepared the business world for such mammoth upheaval in the way and manner we conduct our day-to-day businesses.  Technology has to come in to help tame the spread unless we either want to all die off. This will be the case if we lack basic amenities that we need from our companies for our daily living due to closure of businesses or if we have to dare the consequences and go on as if nothing has happened in order to ensure the amenities are there.  There is no need to overemphasize the fact that businesses are in for the very real probability that urging employees to go into the office, is all we need to heighten the risk of spreading coronavirus. This is where all the latest advancements in technology will come to the front burner as the world grapples with…

Continue Reading

Technology

Backdoor Encryption, An assault on Privacy

Facebook has certainly had its fair share of problems over the years, right from the Cambridge Analytica scandals to a host of other privacy issue related problems, which led to a lot of people deleting their accounts from the platform. Now that they have come up with a beautiful one, the end-to-end encryption that everybody should applaud, it’s a huge surprise that there is a concerted effort to stab privacy in the back through backdoor encryption. Salvos have been coming from all corners at end-to-end encryption. The surprising aspect of the whole thing is that these reactions are coming from largely unexpected quarters, that is those you thought would be very happy to fight cybercrime to a standstill.  The U.S. Attorney General William Barr in a reaction to the technology world says, “If the cops and Feds can’t read people’s encrypted messages, you will install backdoors for us, regardless of the security hit.” FBI head honcho Christopher Wray is not left out in the call for a backdoor, saying that the cops and Feds should be able to spy on end-to-end encrypted chats and the like. Also noteworthy is the fact that UK home secretary Priti Patel, US attorney general…

Continue Reading

Technology

Facial Recognition Could be The Next Access Point For Hackers

Facial recognition, a form of biometric technology is a biological measurement — or physical characteristic — that can be used to identify individuals. Researchers claim the shape of an ear, the way someone sits and walks, unique body odors, the veins in one’s hands, and even facial contortions are other unique identifiers. Because physical characteristics are relatively fixed and individualized — even in the case of twins — they are being used to replace or at least augment password systems for computers, phones, and restricted access rooms and buildings. Biometrics scanners are becoming increasingly sophisticated. For example, Apple’s iPhone X  which operates on the facial recognition technology incidents 30,000 infrared dots onto a user’s face in order to create a sequence of reflections which produce information about the 3D shape of the face, substantiating the user by pattern matching. The chance of mistaken identity is one in a million, according to Apple. This technological advancement should be a thing of joy as it’s supposed to go a long way in easing us of the constant worries of having to remember our passwords and also being very careful not to mistakenly drop them for cybercriminals. It is on record that in…

Continue Reading