Please disable your adblock and script blockers to view this page

Coinbase Sought Neutrino After Losing Control Over Customer Data Being Sold


Coinbase
Neutrino
Cheddar
Neutrino—
|
ShutterstockNeutrino
CRO Marco
Hacking Team
the Hacking Team
the Hacking Team’s
2019Hacking Team’s
Freedom House
REUTERS
the Center for Studies
Media Affairs
the Washington Post’s
the U.S. Drug Enforcement Administration
DEA
Remote Control System
the Assisting Editor
CCN
g.ferowich(at)gmail.com


Christine Sandler
Riccardo Spagni
Coinbase
Giancarlo Russo
CTO Alberto Ornaghi
Crown Prince
Mohammed bin Salman
Adnan AbidiSaud al-Qahtani
David Ignatius
matters.”Qhatani
WashPost



Saudi
Italian

No matching tags

No matching tags


US
Mexico
Oman
Kazakhstan
Uzbekistan
Bahrain
Ethiopia
Nigeria
Sudan
Saudi Arabia
Riyadh
Saudi Arabia’s

No matching tags

Positivity     37.00%   
   Negativity   63.00%
The New York Times
SOURCE: https://www.ccn.com/coinbase-sought-neutrino-after-losing-control-over-customer-data-being-sold
Write a review: Crypto Coins News
Summary

Coinbase’s controversial acquisition of Neutrino was motivated by a desire to ditch its existing tech partners because they ”were actually selling client data to outside sources,” the head of sales at Coinbase said on Saturday.In an interview with Cheddar, Coinbase’s Christine Sandler explained the rationale for buying Neutrino— a blockchain intelligence firm whose founders used to build hacking tools to sell to the police.We are aware of the backgrounds of some of the folks that were involved in Neutrino and we are looking into that. Previously, Neutrino CEO Giancarlo Russo, CTO Alberto Ornaghi, and CRO Marco Valleri used to ply their wares as cyber gurus for a firm known called Hacking Team.On its website, the Hacking Team says:We believe that fighting crime should be easy; we provide effective, easy-to-use offensive technology to the worldwide law enforcement and intelligence communities.On the “Solutions” page of the Hacking Team’s website, the company sheds light on the nature of the tools that are being sold to governments around the world:Criminals and terrorists rely on mobile phones, tablets, lap tops and computers equipped with universal end-to-end encryption to hide their activity.

As said here by Grant Ferowich