The New Frontier of Biocomputing: Power, Ethics and the Perils of Living Machines
Biocomputing is moving from sci-fi to server racks. Using living neurons as processors promises huge energy savings… but raises hard questions about consent, sentience risk, decommissioning and biosecurity. As a cybersecurity professional, I explore how “living machines” demand new ethics, governance and infection-control standards before they ever scale.
How Protecting Children Online Created a Privacy Nightmare for Everyone
The UK's Online Safety Act forces millions to hand over passport photos and selfies to private companies just to access games and social media. These companies have poor security records and often transfer your identity documents overseas without proper safeguards. Recent breaches prove this creates "honeypots" for hackers rather than protecting children, while tech-savvy kids bypass checks with VPNs. The government could solve this with a token system like DVLA share-codes, but refuses to admit their approach is fundamentally flawed.
When Your AI Becomes Your ID
As AI moves from assisting us to authenticating us, our digital identity becomes both more convenient and more vulnerable. This article explores the promise and peril of AI-powered identity providers, and asks: what happens when your digital assistant becomes the only key to your online life?
Data Fines Aren’t Justice — They’re Just High-Stakes Monopoly Money
Despite record-breaking fines against tech giants for data misuse, individuals rarely see justice. This post explores the systemic failure of regulatory enforcement to provide restitution, arguing it's time for compensation schemes, opt-out tools, and support for the real victims of data breaches.
The Face of Empathy — But Who’s Behind the Smile?
AI isn’t the problem — it’s how we’ve rushed to use it. From spiralling costs to silent data leaks and emotionally revealing prompts, this post explores the real price we’re paying for convenience. When innovation ignores privacy, empathy becomes a product… and our deepest thoughts may be repackaged, sold, or profiled. So what comes next — and what do we allow?
How Anonymous is Anonymous?
With the Internet of Things, companies and researchers are finding innovative ways to collect and process data about our habits, thoughts, desires, usage and even what we search for on […]
Touch ID, Great Security Feature or Underlying Privacy Concerns?
TouchID, Great Security Feature or Underlying Privacy Concerns? As Apple announced the launch of their latest iPhone, it got me thinking about the fingerprint scanning feature that’s been included. Fingerprint scanning […]
Challenge and Response
As we are becoming more aware of the importance of data privacy, it strikes me as odd that organisations are not doing as much as they should to help protect […]
