What’s the Big Problem with Using Your Personal Identity Online?

Identity is an important part of what it means to be human. People commonly believe they have a single, consistent, and unique identity that makes them who they are. They each have different values and experiences that they believe defines them.  In reality, identity is much more dynamic. People tailor their identity to different contexts, […]


Why We Need Decentralized Identity?

Decentralized identity is a new approach to user identity on the Internet. It is a set of emerging technologies, standards, and protocols for giving users back their privacy. It is alternatively known as ‘self-sovereign identity’ or ‘self-owned identity’—and is the future for privacy and security online. Given the alarming statistics, current methods for managing identity […]


What Constitutes Personally Identifiable Information or PII?

If you’re trying to protect something, it’s important to understand exactly what it is you’re trying to protect.  This is true of personally identifiable information or PII. PII is any data that can be used to identify a person. It’s the personal information we’re trying to protect with data privacy and cybersafety technologies, because it’s […]


How We Apply the 7 Principles of Privacy by Design

Achieving great privacy outcomes does not happen by chance. It requires thoughtful, informed design. Most importantly, privacy management demands an interdisciplinary, systems engineering approach because it spans: the entire data lifecycle—acquisition, use, storage, retention and disposal multiple teams with differing objectives (e.g. product management and engineering, user support, sales and marketing finance, risk and compliance) multiple control […]


Fight the Fatigue: Data Privacy Really Does Matter

Do you have privacy fatigue? It’s the stress that comes from feeling you can’t protect your privacy online.  Latest statistics say one in three Americans are experiencing privacy fatigue. More than half of respondents (56%) in a recent global privacy report said they feel it’s impossible to keep their information completely private online. Other research says most Americans feel a lack […]


What’s Your Privacy and Cyber Safety Budget?

CPAs – apologies in advance, look away now… We’re all familiar with the concept of budgeting – operating within our means within a myriad of possibilities. A financial budget is the quintessential budget, but we have other budgets in our personal lives – emotional budgets that influence where we sit at family or social gatherings; […]


Why Compartmentalization is the Most Powerful Data Privacy Strategy

Compartmentalization is widely regarded as the most powerful way to protect personal information


What’s Your Privacy Blind Spot?

Each of us has biases based on the unique circumstances of our lives. Carrying bias is part of being human. Our individual biases are influenced by our life experiences and the context in which we live. That, in turn, gives each of us a unique perspective to evaluate any situation. We may have great insight […]


Anonyome’s Minimalist Approach to MySudo Usage Analysis

“Data is the pollution problem of the information age, and protecting privacy is the environmental challenge.” – Bruce Schneier Today it is difficult to do just about anything online without a company, or two or more knowing who you are, where you are, and where you have been. We live in a time where digital […]


Cyberattacks: What They Are and Common Types

A cyberattack is an attack on a website from an outside source who wishes to do harm. There are many forms of cyberattacks that can lead to the breach of a business’s website and cause problems for their customers.


4 Key Lessons I Learned as an Intern Software Engineer at Anonyome Labs

It has been a very impactful last few months at Anonyome Labs – I’ve learned a lot. I want to share some of  key observations from my experience that I think can help people starting a new career. 1. No one is expecting you to be perfect right away This is an extremely important point. The […]


Quality Takes Time

When I started swimming competitively, my coach would have been the first to tell you that he thought I was going to drown. He thought that I was never going to go very far, my technique was horrible, I could barely make it across the pool before I got winded, and I was far from […]


What Is Encryption and Why is it Important?

Encryption is the act of encoding data to render it unintelligible to someone who doesn’t have the authorization to access the data. Once data is encrypted, only authorized parties who have a “key” can read it or use it. That is, if the encryption method is effective, it should completely protect data from unauthorized access.  […]


The 6 Largest Data Breaches of All Time

In July of 2019, Equifax announced they would be paying the largest data breach settlement in history for compromising the personal information of 148 million people in 2017. Riding on the heels of this announcement was Capital One, who reported a massive theft of data of more than 100 million individuals of their own. Although the Capital One assailant […]