PII Protection, Privacy Controls, Data Minimization, Consent Management

SampCert: Verified Foundations for Differential Privacy (PLDI 2025)
dl.acm.org·1d·
Discuss: Hacker News
🛡️Privacy Engineering
Flag this post
Who Really Owns All Your Health Data?
lifehacker.com·1d
🛡️Privacy Engineering
Flag this post
Unsecured Corporate Data Found Freely Accessible Through Simple Searches
blogger.com·11h
⚖️AI Governance
Flag this post
Future-Proof Your Marketing by Putting Consumer Privacy First
eyeota.com·23h
🛡️Privacy Engineering
Flag this post
Meta’s ‘Rule of Two’ Is Dangerous: The AI Security Crisis No One’s Admitting
pub.towardsai.net·18h
🔒MLSecOps
Flag this post
Polish court says dentist office address is not personal data
ppc.land·2d
🛡️Privacy Engineering
Flag this post
Two easy digital intentionality practices
lesswrong.com·8h
compliance
Flag this post
Auditing M-LLMs for Privacy Risks: A Synthetic Benchmark and Evaluation Framework
arxiv.org·1d
🛡️Privacy Engineering
Flag this post
Trend Micro ID Protection for Chrome, WhatsApp, and Messenger 39.1.3.137
majorgeeks.com·9h
🛠cybersecurity
Flag this post
PaperJet – privacy-first document processing
getpaperjet.com·10h·
Discuss: Hacker News
🛡️Privacy Engineering
Flag this post
The Secrets of Cyber Security That Experts Don't Share
dev.to·15h·
Discuss: DEV
🛠cybersecurity
Flag this post
The Privacy Manifesto
zac1258019.substack.com·2h·
Discuss: Substack
⚖️AI Governance
Flag this post
How to Write an Internal Policy for the Use of Artificial Intelligence
endoacustica.com·2h
⚖️AI Governance
Flag this post
Workload Identity in a Multi System Environment (Wimse) Architecture
datatracker.ietf.org·1d·
Discuss: Hacker News
🛠cybersecurity
Flag this post
Using CRDTs and Sync as a Database
jackson.dev·19h·
Discuss: Hacker News
🛡️Privacy Engineering
Flag this post
Why people don’t demand data privacy – even as governments and corporations collect more personal information
theconversation.com·2d
🛡️Privacy Engineering
Flag this post
How Tiles Works – Tiles Privacy
blog.tiles.run·1d·
Discuss: Hacker News
🛡️Privacy Engineering
Flag this post
How to implement resource-based authorization (resource-based vs. role-based vs. attribute-based)
cerbos.dev·9h·
Discuss: r/programming
⚖️AI Governance
Flag this post
Why pharma teams are drowning in submissions and what to do about it – Part one
fontoxml.com·11h
⚖️AI Governance
Flag this post
Tuta vs Mailbox.org / which contributes more to privacy in practice?
mailbox.org·1d·
Discuss: r/privacy
compliance
Flag this post