{"id":161,"date":"2019-05-27T15:18:49","date_gmt":"2019-05-27T19:18:49","guid":{"rendered":"http:\/\/usqualities.com\/Blogs\/?p=161"},"modified":"2019-05-28T00:01:50","modified_gmt":"2019-05-28T04:01:50","slug":"privacy-and-it-security-in-app-development","status":"publish","type":"post","link":"https:\/\/usqualities.com\/Blogs\/?p=161","title":{"rendered":"Privacy and IT Security in App Development"},"content":{"rendered":"\n<p>Jesus came and saved\nhumans from destructive nature of hell, but he was a carpenter at the same\ntime. The creative nature of God was evident in him. Sometimes I comment about secular\nworks we do alongside our works of faith. Ministers must all work as the\nApostles and disciples of Christ did. To depend solely on Church for living is\nnot what Christ showed us and not what God had commanded. Genesis 2:9-15, 2\nThessalonians 3:3-16. <\/p>\n\n\n\n<p>Today, I comment on my\ndiscovery that Adobe shared my personal information on the dark web, which they\nhad no permission to do. I also had been suspicious of Adobe cloud technology\nas fascinating products but in a weak system. For instance, I sent someone an\nencrypted file for signature but before I could send the person the key to\ndecrypt it and sign it. He called me to discuss the content of the document. I\nwas confused at first and had to make sure that I did not previously send him\nthe encryption key before asking him how he opened the document. <\/p>\n\n\n\n<p>Once I did that, I\ninquired from the person how he accessed the document. He opened the encrypted document\nand read it on both his phone and computer without password, just like that. No\nencryption key was requested from the document recipient. I went back to my\ncloud storage to access the file, it required the encryption key that I created\nbefore opening it for me. The question then is, how come the recipient who had\nno computer training or hacking skill opened the document without the acrobat\nfile demanding the encryption key before opening? Adobe told me he must have\nhacked into the document. Their response is the same old fashion denial of\nissue instead of acknowledging and solving the problem. <\/p>\n\n\n\n<p>Lots of conversation\nis going on now about China and their stealing of our patents and intellectual\nproperties but more need to be done about protecting it, especially regarding\nits security. We cannot open our front and back doors; creating escape tunnels\nand turn around and complain that thieves have stolen our properties or robbed\nus. <\/p>\n\n\n\n<p>What happened to the\ngood old days? When I was a kid, we used to play car games. Boys loved Mercedes\nBenz because of the ad saying then that the manufacturers guaranteed all\nMercedes Benz by sealing their engines built to last forever and if it ever\nbreaks down, overturns in any speed on the road or failed to protect you and\nyour family from death during accident, you will come and get a new car and\nhuge compensation. Then, BMW was separate from Mercedes Benz and has exact same\npromise. Volvo made the same promise too, like almost their competitors. Then\nthe strength and culture of every company is to build the highest quality that\nanyone can ever build. Competition was never about profit or how cheap it is\nmade. It was about what quality is the product and consumers patronize\nmanufacturers based on their quality standards. It is all gone!<\/p>\n\n\n\n<p>Global commerce has\nplaced the means of production in places where the integrity and standard of\nproduction may not be urgent or important therefore depriving consumers great\nvalue for their money paid and creating many issues like privacy and security\nflaws. If God wanted humans to disregard our privacies, He would have shared\nthe secrets in your heart with the public, hence He knows everything, and\nnothing is hidden from God. Men-of-God with such gift of secret knowledge would\nhave been permitted by God to share such personal and private revelations with\nthe public. Imagine a world where everyone secret is made public. <\/p>\n\n\n\n<p>We should reconsider\nour cultural values and rethink our standard of production of goods and\nservices at a competitive rate and markets. <\/p>\n\n\n\n<p>Greed is not the same\nas profit and that is why God forbids greed. Luke 12:15 and Colossians 3:5\nspeak to this. Whoever engages in honest works or does good is rewarded with\nabundance harvest. 2 Corinthians 9:8. Why cheat is abundance has been promised.\nThat is why such companies do not last. They disappear over time.<\/p>\n\n\n\n<p>In conclusion, It is my\nhope and desire that our U.S. government, especially the United States JAB and\n3 PAO\u2019s through its Cybersecurity Asset Management tools ensures that systems,\nparticularly foreign domiciled ones or persons comply with the risk management\nframework established in NIST standards and FedRAMP requirements and processes.\n<\/p>\n\n\n\n<p>Google, Apple, and\nmany company built its core products and principles by welcoming inputs from\nusers and consumers and letting the technology evolve into the best around\ntheir consumers. Now, we are observing more and more erratic behaviors and\noutright punishment of anyone who provides constructive criticism or\ndisagreement with companies at the core of these technological innovations. <\/p>\n\n\n\n<p>If you disagree with\nany company, they ban you from their community or environment. Such behavior\nwill kill inventions and innovations as the core value of western civilization.\nIn college, we teach people and build our educational systems around robust\nconstructive criticism without which research is useless. Our educational\nsystems and institutions that hold modern civilization together will\ndisintegrate because it will not even be tested for validity, authenticity,\naccuracy, integrity and strength. Without constructive criticism, human reasoning\nand rational will be too flawed to support any progressive society. If everyone\nis right, no one is right.<\/p>\n\n\n\n<p>The public needs the\nprotection of their governments as oversight and eagle eyes watching and\ntesting what people are offering the public. Packaging the same products over\nand over again without any reasonable changes or development to maximize profit\nwhile lying to the public and deceiving unsuspecting people who are ignorant of\nhow these systems work is stone cold greed. It proves the death of humanity\nbecause conscience is entirely absent in such conducts. <\/p>\n\n\n\n<p>Ebelechukwu Elochukwu <\/p>\n","protected":false},"excerpt":{"rendered":"<p>Jesus came and saved humans from destructive nature of hell, but he was a carpenter at the same time. The creative nature of God was evident in him. Sometimes I comment about secular works we do alongside our works of faith. Ministers must all work as the Apostles and disciples of Christ did. To depend &hellip; <a href=\"https:\/\/usqualities.com\/Blogs\/?p=161\" class=\"more-link\">Continue reading<span class=\"screen-reader-text\"> &#8220;Privacy and IT Security in App Development&#8221;<\/span><\/a><\/p>\n","protected":false},"author":1,"featured_media":132,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":[],"categories":[1],"tags":[],"_links":{"self":[{"href":"https:\/\/usqualities.com\/Blogs\/index.php?rest_route=\/wp\/v2\/posts\/161"}],"collection":[{"href":"https:\/\/usqualities.com\/Blogs\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/usqualities.com\/Blogs\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/usqualities.com\/Blogs\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/usqualities.com\/Blogs\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=161"}],"version-history":[{"count":2,"href":"https:\/\/usqualities.com\/Blogs\/index.php?rest_route=\/wp\/v2\/posts\/161\/revisions"}],"predecessor-version":[{"id":163,"href":"https:\/\/usqualities.com\/Blogs\/index.php?rest_route=\/wp\/v2\/posts\/161\/revisions\/163"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/usqualities.com\/Blogs\/index.php?rest_route=\/wp\/v2\/media\/132"}],"wp:attachment":[{"href":"https:\/\/usqualities.com\/Blogs\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=161"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/usqualities.com\/Blogs\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=161"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/usqualities.com\/Blogs\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=161"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}