"These leaks about a potential Executive Order from the White House are troubling on many levels, from the order's potential to violate the First Amendment, to its apparent disregard for the independence of agencies like the FCC and the FTC, to its intent to unilaterally limit Section 230 which promotes moderated online communities free of hate speech and misinformation," said Chris Lewis, president and CEO of Public Knowledge.
Facebook revealed its plans to transfer content moderation from human-staffed data centres to on-device, AI-powered systems in a presentation at the firm's F8 annual developer conference on May 1, 2019.The proposed concept would appear to see content moderation executed on user messages directly within WhatsApp, prior to their encryption — with the filtering algorithms themselves being regularly updated from a central source.
Since then, I’ve been keeping an eye out for patent filings from Google that used a smartphone camera to look at the expression of a user of that device in order to try to understand the emotions of that person better.
Facebook’s model entirely bypasses the encryption debate by globalizing the current practice of compromising devices by building those encryption bypasses directly into the communications clients themselves and deploying what amounts to machine-based wiretaps to billions of users at once.
FaceApp is also the product of a Russian company that sends photos from your device to its servers, retains rights to use them in perpetuity, and performs artificial intelligence black magic on them.
The settlement comes after an FTC investigation over whether the tech giant sufficiently protected the data of children using the platform, according to a Friday report from The Washington Post citing two people familiar with the matter.
EFF considers the following signs that a messenger is not delivering end-to-end encryption: client-side scanning, law enforcement “ghosts,” and unencrypted backups. But because services like PhotoDNA run on company servers, they cannot be used with an end-to-end encrypted messaging service, leading to the proposal that providers of these services should do this scanning “client-side,” on the device itself.
Facebook and Google denied that potential information collected by their trackers on pornography websites was used for creating marketing profiles intended to advertise to individuals.
When you post or otherwise share User Content on or through our Services, you understand that your User Content and any associated information (such as your [username], location or profile photo) will be visible to the public,” is the subsequent piece of text.
Karan Bhatia , Google vice president of global government affairs and public policy, demurred when pressed by senators to undergo an independent audit of the company’s content management practices, as both Facebook and Twitter have done, saying his company is in a “very different situation.”.
The tool would also allow the FBI to track people based on location, enable persistent keyword monitoring and provide access to personal social media history. The government doesn't have the best track record with regard to social media surveillance.
The company admitted in April that human employees listened to a "small sample" of Alexa audio recordings to transcribe and annotate to help improve the software, one of the several reports that led Coons to issue his request for information to Amazon.
SHANGHAI -- China's cyberspace regulator has blocked access to 26 podcast sharing or voice-based social apps, citing subversive content including "historical nihilism" and pornography. In a statement, Soul said it will work with the CAC to rectify its network.
Which is why when Politico reported that "senior Trump administration officials met on Wednesday [June 26] to discuss whether to seek legislation prohibiting tech companies from using forms of encryption that law enforcement can’t break," it was of real significance, "a provocative step that would reopen a long-running feud between federal authorities and Silicon Valley.".
Microsoft describes Tracking Prevention in Edge in the following way:Websites use trackers (like cookies and scripts) to collect info about how you use their sites and show you content like relevant ads.
As shown by a newly released report from the Brennan Center for Justice at New York University School of Law, the Department of Homeland Security, specifically Customs and Border Protection, can share social media data with federal, state and local government agencies, along with law enforcement and even multilateral governmental organizations and foreign states.
Samsung has reminded owners of its smart TVs that they should be regularly scanning for malware using its built-in virus scanning software.
To understand some of the challenges that South Asian women face online and on their devices, between May 2017 and January 2018, the research team conducted in-person, semi-structured, 1:1 and triad interviews with 199 participants who identified as women in India, Pakistan, and Bangladesh (11 of them identified as queer, lesbian, or transgender male-to-female).Six NGO staff members working on women’s safety and LGBTQ rights were also interviewed.
To create personalized Products that are unique and relevant to you, we use your connections, preferences, interests and activities based on the data we collect and learn from you and others (including any data with special protections you choose to provide); how you use and interact with our Products; and the people, places, or things you're connected to and interested in on and off our Products.
by Gavin O'Malley @mp_gavin, May 23, 2019 Facebook now estimates that 5% of monthly active accounts are fake, according to the social giant’s latest Community Enforcement Report. In the first quarter of 2019, Facebook took down 4 million hate speech posts, according to Rosen.
Under the “How we use your personal information” header, one of the paragraphs now reads (emphasis added):We may also use your personal information for account and network security purposes, including in order to protect our services for the benefit of all our users, and pre-screening or scanning uploaded content for potentially illegal content, including child sexual exploitation material.
In a response to the overwhelming negative feedback, Google is standing firm on Chrome’s ad blocking changes, sharing that current ad blocking capabilities will be restricted to enterprise users.
In response to concerns raised last month by the developers of the EFF's Privacy Badger extension, Simeon Vincent, developer advocate for Chrome extensions at Google, last week published an update on the company's Manifest v3 plan.
Mozilla Firefox has an issue right now that is causing conflicts if multiple extensions are installed that modify CSP headers on visited sites. Mozilla Firefox has an issue right now that is causing conflicts if multiple extensions are installed that modify CSP headers on visited sites.
We need more interactions, more connections between those social platforms to let users be really free. Can we get back our freedom on the internet with a secure data privacy. It’s a decentralized social networking protocol based upon the [ActivityStreams] 2.0 data format.
Jim Steyer, CEO and founder of Common Sense and a children’s advocate, says data on kids, including their activities, hobbies, and social networks, is often for sale from the child’s first years of life.