Twitter | Search | |
Search Refresh
Debra Nelms, MBA May 21
New bill could bring a long-overdue update to child laws:
Reply Retweet Like
πŸ†ƒπŸ…·πŸ…ΈπŸ…½πŸ…ΊπŸ…΄πŸ† 6h
Samsung artificial intelligence lab develops talking head models from just one single photo. goodbye
Reply Retweet Like
Andrea Leonardi 12h
The applications for a member of the Italian Board of the Authority for the Protection of Personal data received by the Italian Chamber of Deputies and the Senate of the Republic have been published. For me it is a great honor to have been included in this list.
Reply Retweet Like
Apollonia-Jo πŸ’₯πŸ”₯πŸš€ May 23
πŸ“’ HISTORIC NEWS FOR THE WORLD OF CRYPTO ‼️ Real banks will be using a Crypto with features for the first time - Apollo Currency ❗️ What's next ?? Could Apollo be heading for adoption as a national currency ?? πŸ’₯πŸ”₯πŸ’₯πŸ”₯πŸ’₯πŸ”₯πŸ’₯πŸ”₯
Reply Retweet Like
Jayson Garret May 21
Reply Retweet Like
Ghostnodes Are Your Friend May 23
RT : NIX Platform is the only cryptocurrency running BTC Core 0.17 with LPoS & POS Consensus, functional , and Sigma system.
Reply Retweet Like
The Privacy Pirate 19h
Reply Retweet Like
Terry Langston 12h
"...one of only two publicly-known members of its seven-person core developer team..." & in a store of value should not be mutually exclusive. Monero Richlist?
Reply Retweet Like
David Swatosh, CPA 12h
7 settings you should revisit right now:
Reply Retweet Like
Consentua 10h
Our partnership with Adaptant puts drivers in control of their data -
Reply Retweet Like
James Pierce May 24
I'm against breaking up , but not because of China. Would rather press and legislators spend time on concerns.
Reply Retweet Like
Burt Samuels 14h
OSINT is currently be used widely on a daily basis for both internal and also external investigations. These kinds of activity’s are now being used to examine a childs social media, private sector individuals and or course, internet research just to name a few.
Reply Retweet Like
Omer Tene 5h
HBD ! We ❀️ you. (But will ❀️ CCPA next year!)
Reply Retweet Like
CIL CONSULTING byTNP May 21
Millions of Instagram influencers had their private contact data scraped and exposed via
Reply Retweet Like
Jenn Suh 1h
Talked about 8 heuristics that influence people’s decisions on social network sites
Reply Retweet Like
NIX May 24
The Ghost Protocol is a unique, complex and fluid arrangement of sub-protocols including Sigma, Commitment Key Packs, Zero-Knowledge Proofs, Tor, and Dandelion.
Reply Retweet Like
ECLA May 24
'Be a standard maker, not a standard taker' Viviane Reding sharing some insight on open internet and data standards across the world at our Annual Conference
Reply Retweet Like
Terri Nakamura 7h
Google keeps a running list of the things you buy. You can't turn it off, but here's how to stop Google from using your shopping history.
Reply Retweet Like
The Hacker News May 23
πŸŽ‰ Woohoo! Great news for -focused users. Tor Browser for released β€” First stable version has arrived on Google Play Store for anyone to download for free. -by
Reply Retweet Like
Ryan Tharp May 24
Why is important to you?
Reply Retweet Like