Facebook has been branded 'hopelessly naive' over plans to encrypt its messaging apps, as MPs warned the move will make it 'even easier' for paedophiles to share child abuse images.
July 1 (Reuters) - U.S. legislation aimed at stopping online child sexual abuse material is likely to be amended to address concerns of platforms like Google and Facebook that the proposed law goes too far to weaken privacy protections for ordinary users, according to a draft of the bill seen by Reuters.
Privacy concerns in Europe have led to some of the world’s toughest restrictions on companies like Facebook and Google and the ways they monitor people online.It would also restrict the use of software that scans for child sexual abuse imagery and so-called grooming by online predators.
"The temporary pause for ads about politics and social issues in the U.S. continues to be in place as part of our ongoing efforts to protect the election," the social media giant said in update to a blogpost.
Admins running servers in particular jurisdictions then have the option to enforce whatever rules they need on their servers (e.g. they might want to subscribe to reputation feeds from a trusted source such as the IWF, identifying child sexual abuse content, and use it to block it from their server).This isn’t just about combating abuse - but the same system can also be used to empower users to filter out spam, propaganda, unwanted NSFW content, etc on their own terms.
The NCA believes there are at least 300,000 people in the UK who pose a sexual threat to children, with 86,832 UK-related referrals to NCMEC last year, including 52% from Facebook and 11% from Instagram.
That may already be happening — the FBI reportedly used the All Writs Act, the same controversial measure it tried to use to force Apple to hand over iPhone data, to request Kher’s information.The data isn’t very useful during the pandemic, but it could be problematic whenever normal travel resumes.
Outline of the Lawful Access to Encrypted Data Act. Senators Graham, Blackburn, and Cotton call the Lawful Access to Encrypted Data Act (press release): "a bill to bolster national security interests and better protect communities across the country by ending the use of “warrant-proof” encrypted technology by terrorists and other bad actors to conceal illicit behavior".
Two more bases include when processing is of “vital interest” to you (i.e. you were in an accident and your doctor needs to share your info) and when there is a “public interest” (which generally covers the collection of data by government agencies for research purposes).The last legal basis is “legitimate interest.” Legitimate interest is a legal basis one company would use with another company to request your private information.
And though the exposed data included limited "personally identifying information," like real names, birthdays, or email addresses, the researchers warn that a motivated hacker could have used the photos and other miscellaneous information available to identify many users.
SAN FRANCISCO (Reuters) - Tech companies including Facebook, Google and Microsoft on Thursday pledged to improve and standardise annual disclosures around online child exploitation, as they fight off moves to limit encryption.
Cho Joo-bin, a 24-year-old man, hosted online rooms on encrypted messaging app Telegram, where users paid to see young girls perform demeaning sexual acts carried out under coercion, according to South Korean police.
The report makes four recommendations for action the government should take to tackle online abuse: Requiring industry to pre‐screen material before it is uploaded to the internet to prevent access to known indecent images of children.
As the New York Times article explained, these phenomena had a common cause: women’s abusers were controlling Internet-connected devices in homes, using everyday apps on their smartphones.
Concerns over the potential for abuse have driven all of this, and that is also what has motivated 40 groups headed by the Electronic Privacy Information Center (EPIC) to draft a letter recommending that federal agencies suspend the use of facial recognition surveillance systems.
EFF’s “Street-Level Surveillance” project shines light on the advanced surveillance technologies that law enforcement agencies routinely deploy in our communities.Every day, the threats to our rights expand as police use surveillance technologies to compile enormous databases filled with our personal information.
Speaking at the Consumer Electronics Show in Las Vegas, Ms Horvath said removing encryption was “not the way we’re solving these issues” but added: “We have started, we are, utilising some technologies to help screen for child sexual abuse material.”.
Virtually every tech expert and privacy advocate under the sun has warned virtually every government official in the world that "back doors" that let police bypass encryption has the potential to cause huge harms and actually makes citizens even more vulnerable to crime.
But earlier this week, in the case of grandmother Rhonda Mengert who was strip searched by TSA without suspicion and in blatant violation of TSA policy, the TSA added it all up and argued that because of all of these immunities, there actually doesn’t need to be a way to sue screeners for checkpoint abuse, no matter how egregious, at all.
Projects like Wikipedia, OpenStreetMap and the world of open source software are the kinds of constructive tools that I hoped would flow from the web.
Here’s the background: Google has announced that they will soon start changing the way users are connected to websites through its Chrome browser, using a new protocol called DNS over HTTPS (DoH).
In the wake of data abuse scandals and several instances of malware app being discovered on the Play Store, Google today expanded its bug bounty program to beef up the security of Android apps and Chrome extensions distributed through its platform.
It aspires to be a central outlet for the study of all manner of internet abuse, assembling for visiting researchers the necessary machine learning tools, big data analysts, and perhaps most importantly, access to major tech platforms' user data—a key to the project that may hinge on which tech firms cooperate, and to what degree.
New Home Secretary Priti Patel, pictured last week in London, is having discussions with Britain's Five Eyes intelligence allies about combating cyber threats and having better access to encrypted messages.
Anti-virus software researchers report that thousands of people, mostly women, have “stalkerware” apps hidden on their phones — surreptitiously installed by their partners — that give the stalker access to the victim’s email, location, SMS, social media messages and even live feeds from their device cameras or microphones.
Victims of image-based sexual abuse – such as upskirting, revenge porn and fake porn – are having their lives shattered amid outdated and ineffective laws and police inaction, a report reveals.
While the tool was originally designed to help moderate the platform and allow MySpace to comply with law enforcement requests, multiple sources said the tool was used for illegitimate purposes by employees who accessed Myspace user data without authorization to do so.
To understand some of the challenges that South Asian women face online and on their devices, between May 2017 and January 2018, the research team conducted in-person, semi-structured, 1:1 and triad interviews with 199 participants who identified as women in India, Pakistan, and Bangladesh (11 of them identified as queer, lesbian, or transgender male-to-female).Six NGO staff members working on women’s safety and LGBTQ rights were also interviewed.