Digital Smash and Grabs Ahead ! , Digital Hackers Ready to Jump all over Digital Id and CBDC
To watch full show go here - https://rumble.com/v45f192-mike-in-the-night-e541-next-weeks-news-today-headline-news-call-ins-disinfo.html
Buy Mike A Coffee - https://donorbox.org/buy-me-a-coffee-53
Link to the Most Powerful Glutathione in the World - https://mikeinthenight.neumi.com/home
#mikeinthenight #mikemartins
Digital Prison Series:
The discussion revolves around the concept of a digital prison, which has been a recurring topic in the "Mike of the Night" series.
Digital ID Rollout:
Governments and corporations globally are actively implementing or planning to implement digital IDs.
The rollout is often presented to citizens as a means of convenience and enhanced data security.
Privacy Concerns and Hacker Attacks:
Opponents argue against the claims that digital IDs enhance data security and highlight serious privacy implications.
Cybersecurity firm Re Security's report indicates that hackers love digital IDs, and personal information is becoming a prime target.
Data Dumps on the Dark Web:
After Christmas, data dumps, referred to as "leakas" or Christmas leaks, containing personal identifiable information surfaced on the dark web.
Hackers express their love for digital IDs by focusing on these data dumps.
Digital Smash and Grabs:
The term "digital smash and grabs" is introduced to describe the stealing of personal information in large quantities.
A staggering 15 million records containing personal identifiable information were found on the dark web.
Telecommunications Company Hack:
Re Security reports that 22 million records were stolen from a telecommunications company in Peru, including DNIs (National IDs).
The DNI is a crucial ID document recognized by Peruvian authorities for various transactions and activities.
Global Impact:
The repercussions of the hack extend beyond Peru, affecting countries such as the Philippines, the US, France, and Vietnam.
European Digital ID Rollout:
Europe is set to be the first to roll out the digital ID, utilizing certificate authority transport and layered security.
The digital ID creation involves root certificates, which will be bonded and audited to prevent fakes.
Concerns About Putting All Eggs in One Basket:
The speaker expresses concerns about the potential risks of relying solely on digital IDs, citing a real-life example of a customer unable to make a purchase without tap functionality on her phone.
Ongoing Monitoring and Updates:
The talk concludes with a commitment to keeping viewers informed about developments in the digital ID space, especially as it relates to security issues and hacker activities.
DigitalPrison, DigitalID, PrivacyConcerns, HackerAttacks, DataSecurity, Leakas, DarkWeb, SmashAndGrabs, TelecommunicationsHack, NationalID, GlobalImpact, EuropeanIDRollout, CertificateAuthority, LayeredSecurity, RootCertificates, Auditing, Cybersecurity, ReSecurityReport, PersonalData, PrivacyImplications, Convenience, DataDumps, CyberThreats, InformationSecurity, IdentityTheft, TechSecurity, DataProtection, DigitalMarket, BlackMarket, TechnologyRisks, EmergencyPreparedness, DataBreach.
-
3:37
JavierTech
3 months agoCIA Triad
8 -
2:54:44
R.C. Davis
5 months ago"Safeguarding Americans' Communications: Strengthening Cybersecurity in a Digital Era" - January 11, 2024
193 -
3:02
Cyber Safety Academy
2 months agoMastering Password Security: Your Digital Fort Knox | Cyber Safety Academy:
64 -
2:28
Cyber Safety Academy
2 months agoNavigating the Dark Web Safely
76 -
14:33
kevnowledgy
3 months agoDigital Heist: The 2014 JPMorgan Chase Cyberattack | A Cyberstory
9 -
10:31
Kitco NEWS
3 months agoThe Drive for Digital IDs and CBDCs: Navigating a Dystopian Control Agenda - Seamus Bruner
4997 -
9:24
kevnowledgy
3 months agoThe Financial Services meltdown | Cyber Apocalypse
12 -
51:20
cryptovigilante
3 months ago $0.09 earnedThe Crypto Vigilante: Your Gateway to Differential Knowledge and Unprecedented Gains!
176 -
2:47
Cyber Safety Academy
2 months agoAI Guardians: Protecting Our Digital Spaces
65 -
19:02
Books for Success
3 months agoSocial Engineering: The Science of Human Hacking by Christopher Hadnagy. Book Summary
13