The incident shows the variety of ways data can be used to hurt people, and raises questions about how and if certain data should be retained at all.
published by | Benjamin Powers |
---|---|
in blog | CoinDesk |
original entry | From SIM Swaps to Home-Invasion Threats, Ledger Leak Has Cascading Consequences |
business cybersecurity data hack ledger people policy & regulation privacy tech
The incident shows the variety of ways data can be used to hurt people, and raises questions about how and if certain data should be retained at all.