Overview of Searchable Encryption Technology

Overview of Searchable Encryption Technology

Abstract Searchable encryption technology is a method for protecting user privacy, widely applied in data sharing, cloud computing, and location privacy protection. This article mainly introduces the basic knowledge, implementation methods, security threats, application scenarios, and future development directions of this technology. The article first introduces the concept of searchable encryption, then discusses existing symmetric … Read more

Understanding Tesla’s Data Security Concerns in Connected Cars

Understanding Tesla's Data Security Concerns in Connected Cars

At the 2021 Shanghai Auto Show, a female car owner, wearing a T-shirt that read “Brake Failure,” passionately accused Tesla from the roof of her car. Is there really a brake failure? Without data, we cannot know. However, Tesla’s strong corporate stance has made driving data a luxury for car owners seeking to protect their … Read more

Analysis of Security Risks of Smart Speakers and Development Suggestions

Analysis of Security Risks of Smart Speakers and Development Suggestions

Smart speakers are devices that utilize technologies such as computer networks, the Internet, audio and video to provide users with information and life services, featuring functionalities like voice recognition, voice interaction, natural language understanding, and speech synthesis. Currently, security issues with smart speakers are frequent: In May 2017, Alexa was reported to have eavesdropped on … Read more

Seven Major Data Compliance Challenges in IoT Edge Computing

Seven Major Data Compliance Challenges in IoT Edge Computing

Source: On August 6, 2022, the Global Edge Computing Conference in Shenzhen, organized by the Edge Computing Community, concluded successfully. At the conference, Wang Jie, Executive Director of Kenting (Guangzhou) Law Firm, was invited to give a speech titled “Edge Computing – Seven Major Data Compliance Challenges in IoT Scenarios.” Speaker: Wang Jie, Executive Director … Read more

A Brief Discussion on Security Threats in Edge Computing

A Brief Discussion on Security Threats in Edge Computing

Introduction Abstract Edge computing, as a new computing paradigm following cloud computing, processes part of the data at the terminal, bringing computation closer to users and data sources at the network edge. This effectively avoids problems such as data latency, high data centralization, and network jitter. The unique advantages of low latency, mobility, and cost-effectiveness … Read more

7 IoT Devices That Make Security Experts Cringe

Every day, a large number of IoT devices that have not undergone strict security testing connect to our lives. We must realize that this is a process of gradually accumulating risks. Just as we require vehicles on highways to comply with safety standards and undergo annual inspections to ensure traffic safety, there are no comprehensive … Read more

Safety Risks of Shared Power Banks Using Raspberry Pi

Safety Risks of Shared Power Banks Using Raspberry Pi

Last night, while going out for dinner, I stumbled upon this: This must be the so-called “shared power bank” right? I don’t know how you feel about it, but this thing has been all over my feed in the past few days… Shared bikes, another member of the “sharing family,” have not been doing well … Read more

The Black Hole Behind Smart Home Devices

The Black Hole Behind Smart Home Devices

The complex problems we face often do not stem from the technical level, but from the rules themselves and the users’ acceptance of these rules. Li Jun, Special Contributor to Caijing No one expected that Amazon would be embroiled in a murder case and become the focus of the investigation. On a day in November … Read more

Tor Adds New Layer of Encryption with Selfrando

Tor Adds New Layer of Encryption with Selfrando

Tor is one of the most powerful tools available on the internet to protect your privacy; however, many people still mistakenly believe that Tor is merely an end-to-end encryption tool. In fact, Tor is used for anonymous browsing of websites and sending emails (but not encrypting the content of the emails). Anonymous is freedom, it … Read more

Edge Artificial Intelligence: Bringing AI to Device End

Edge Artificial Intelligence: Bringing AI to Device End

Artificial Intelligence (AI), as a revolutionary technology, is profoundly changing how we live and work. Traditionally, AI primarily relied on cloud computing for large-scale data processing and analysis. However, with the development of edge computing technology, edge artificial intelligence has gradually emerged. Edge AI refers to bringing AI to the device end, enabling data processing … Read more