Charts
DataOn-chain
VIP
Market Cap
API
Rankings
CoinOSNew
CoinClaw🦞
Language
  • 简体中文
  • 繁体中文
  • English
Leader in global market data applications, committed to providing valuable information more efficiently.

Features

  • Real-time Data
  • Special Features
  • AI Grid

Services

  • News
  • Open Data(API)
  • Institutional Services

Downloads

  • Desktop
  • Android
  • iOS

Contact Us

  • Chat Room
  • Business Email
  • Official Email
  • Official Verification

Join Community

  • Telegram
  • Twitter
  • Discord

© Copyright 2013-2026. All rights reserved.

简体繁體English
|Legacy
BTCBTC
💲70430.49
-
1.23%
ETHETH
💲2073.77
-
1.05%
SOLSOL
💲87.13
-
1.67%
TRUMPTRUMP
💲4.03
+
19.23%
USDCUSDC
💲0.9998
-
0.02%
DOGEDOGE
💲0.09449
-
2.05%

PANews
PANews|Sep 28, 2025 05:43
**[Analysis: UK's New Digital Identity Program May Become a "Target for Hackers"]** According to Decrypt, UK Prime Minister Sir Keir Starmer announced a mandatory digital identity program this week, requiring workers in the UK to carry digital identification on their mobile phones, with full implementation expected before the parliamentary recess in 2029. This move has sparked division among tech experts, with privacy advocates expressing concerns about mission creep and security risks. Rob Jardin, Chief Digital Officer of NymVPN, stated that centralized systems for identity, biometrics, and service access permissions could become larger targets for hackers. If the system is breached, everyone would face risks, and biometric data, once leaked, cannot be changed. He also warned that digital identity could quietly expand from identification purposes to tracking movements and controlling access to services. However, some experts believe that a well-designed system could be more secure. Cindy van Niekerk, CEO of Umazi, argued that advanced encryption and continuous monitoring can build resilient infrastructure. Digital identities can use encrypted credentials to verify identity, allowing citizens to control the sharing of their information. Additionally, systems that integrate verification with decentralized storage can reduce the risk of data breaches, and decentralized architectures can enhance resistance to quantum computing threats.
Mentioned
|
APP
Windows
Mac
Share To

X

Telegram

Facebook

Reddit

CopyLink

|
APP
Windows
Mac
Share To

X

Telegram

Facebook

Reddit

CopyLink

Timeline

Sep 27, 07:22Decentralized exchanges are essentially still centralized.

HotFlash

|
APP
Windows
Mac
Share To

X

Telegram

Facebook

Reddit

CopyLink

APP
Windows
Mac

X

Telegram

Facebook

Reddit

CopyLink

Hot Reads