More about privacy (103)

| Predictive policing systems combine sensor networks, big data and algorithms with the aim to predict and even prevent crime. But this type o...

| Energy efficient, sustainable and empowered citizens, those are the promises of the smart city. But what about ubiquitous data collection an...

| In 2013 the Guardian was ordered to destroy laptops containing the Snowden documents under supervision of GCHQ. The British secret service i...

| Atmel has announced that it will be implementing Intel's Enhanced Privacy ID (EPID) technology on all of its SmartConnect wireless solutions...

| Researchers want to connect the outdoors to the Internet of Things by slapping RFID sensor tags on bridges, buildings and farmland. Rather t...

| Anyone who got the chance to visit the Audeme stand at the Maker Faire Bay Area exhibition in California back in May will be interested to h...

| Of First Person View drone racing and building indoor spray painting quadcopters. As the buzz of quadrotors is becoming an everyday soun...

| Bluetooth LE enabled smartphones and wearables are easy to track and, consequently, so are the people using them, researchers of Context Inf...

| During World War II the Dutch resistance set fire to the Amsterdam municipal register to destroy the personal records of the city's inhabita...

| The fourth Global Conference on Cyberspace is currently taking place in The Netherlands. Hosted by a different government each year the conf...