recentpopularlog in

trust

« earlier   
Apna Ghar, Inc. (Our Home) - HOME
Domestic violence support and services for women who recently immigrated
domestic  violence  women  shelter  organization  empowerment  drivetotrust  trust  services  immigration  culture 
yesterday by csrollyson
Family Rescue Inc.
Domestic violence support and services for women and children
domestic  violence  women  shelter  organization  empowerment  drivetotrust  trust  services  family  children 
yesterday by csrollyson
About Circling Europe | Circling Europe
Integrated practices that empower practitioners to be more present with themselves so they can relate to others more honestly and fully
awareness  psychology  relationship  trust  methodology  europe  philosophy  group  interaction  honesty  responsibility 
yesterday by csrollyson
iOS Trustjacking: How Attackers Can Hijack Your iPhone | The Mac Security Blog
Have you ever plugged in your iPhone to a USB port and tapped "Trust" on your screen? You might have unknowingly given an attacker permanent access to your device—even wirelessly, and potentially even remotely.
On Wednesday morning at RSA Conference 2018, two security researchers gave a presentation that has massive security and privacy implications for users of all devices that run Apple's iOS operating system: iPhone, iPad, and iPod touch.
security  privacy  trust  hack  iphone 
yesterday by rgl7194
Kirkville - iOS Trustjacking: How Attackers Can Hijack Your iPhone – The Mac Security Blog
This is fascinating stuff. You “trust” a computer when you connect an iOS device; this is a security feature that ensures that when you connect a device to a computer, you have to choose whether it has access to the data on your device. This notably allows you to connect your iPhone or iPad to any computer to charge it without worrying about the computer and iTunes wiping the device. But the downside is that people may see the dialog and think they have to trust a computer to charge, if they do this, which opens up the device to access even via wi-fi.
Source: iOS Trustjacking: How Attackers Can Hijack Your iPhone | The Mac Security Blog
iphone  privacy  security  trust  hack 
yesterday by rgl7194
Brokers May Have to Put Customers First - Bloomberg
We deal with the unresolvable conflict by telling her to resolve it in the client's best interests, and looking very stern and serious when we tell her that. 

if you say "hey from now on we will expect used-car dealers to look out for their customers' best interests" -- then people might not find it wholly credible.

Manipulation is fundamentally an issue of intent, and the way you prove intent is by (1) noticing unusual trading and then (2) finding the dumb chat where a trader says "I intend to manipulate, hope it works!"
levine  trust  capitalism 
4 days ago by elrob
Wouldn’t it be nice…if you could trust your device? | Internet Society
Wouldn’t it be nice…if you could trust your device? | Internet Society *Steve Olshansky of…
policy  iot  security  trust 
4 days ago by thewavingcat
Twitter
The of a knows no limit! Even if it means to jump out of a plane!
trust  dog  from twitter_favs
5 days ago by stevechic
High performing teams know more about trust
"Delivering something on-time is key to building trust. But customers can distrust people who want to limit scope in order to achieve early deliverables. Previous disappointments (they never got the functionality they wanted) mean they assume the first release will be the only one. So they include everything in a gold plated wish-list through lack of trust."
trust  delivery  teams  dopost 
6 days ago by niksilver

Copy this bookmark:





to read