Monthly Archives: February 2016

Anonymity and identity

Following on from my post about posts across the web on identity, James Davis, Jisc’s Information Security Manager provided the following blog post which expands on the topic. With increased awareness of state surveillance schemes, people are looking towards cryptographic technologies such as tor and bitcoin as a perceived means to regain a degree of … Read more