Tech companies, governments, and international agencies have all announced measures to help contain the spread of the COVID-19 virus.Many of those measures are based on extraordinary powers, only to be used temporarily in emergencies.
It doesn’t equip law enforcement agencies with resources to investigate claims of child exploitation or training in how to use online platforms to catch perpetrators.
A bipartisan pair of US senators today introduced long-rumored legislation known as the EARN IT Act. Meant to combat child sexual exploitation online, the bill threatens to erode established protections against holding tech companies responsible for what people do and say on their platforms.
Following up on that case, Brave has now come out with criticism and recommendations on how the failure to enact GDPR (General Data Protection Regulation) regulation has allowed Google to seize the advertising market, to the detriment of end users.
The EARN IT Act puts that question front and center by giving the attorney general the ultimate say in setting the “best practices” that will give Section 230 immunity for child exploitation suits.
If companies don’t follow these rules, they could lose some protection under Section 230 of the Communications Decency Act, which largely shields companies from liability over users’ posts.Under the EARN IT Act, though, a committee could require Facebook and other companies to add a backdoor for law enforcement.
Speaking at the Consumer Electronics Show in Las Vegas, Ms Horvath said removing encryption was “not the way we’re solving these issues” but added: “We have started, we are, utilising some technologies to help screen for child sexual abuse material.”.
An unprecedented iPhone hacking operation, which attacked “thousands of users a week” until it was disrupted in January, has been revealed by researchers at Google’s external security team.Google said it had reported the security issues to Apple on 1 February.
Windows 10 supports additional LSA Protection, allowing LSASS to run as a Protected Process, protecting the credentials it stores from malware without a malicious kernel mode component.10.
When a company, university group, or developer wants to test a facial recognition algorithm, it sends that software to NIST, which then uses the full set of photograph collections to determine how well the program performs in terms of accuracy, speed, storage and memory consumption, and resilience.
In this report we take a hard look at the right to privacy and its reality for women, trans and gender diverse people. We hope this report will be read as a call for action: privacy needs to be reclaimed by women, trans and gender diverse people.
Innovations in surveillance and data exploitation present challenges in the fight to protect personal data across the world. It is also important that there is a diversity of organisations joining the global movement for data protection.
The Privacy International Network is working to expose companies that fail to protect their customers’ data, analysing their terms of service and practices, exploring how users perceive social media platforms, and studying how these platforms are being leveraged for intelligence purposes. They researched the existing legal framework on telecommunications and privacy to explore how companies were protecting their customers’ data.
While we were all distracted by the moist dumpster fire of Tumblr announcing its porn ban, Facebook updated its startling, wide-ranging anti-sex policy that is surely making evangelicals and incels cream their jeans (let's just hope they don't post about that).
But now, It is not the laws or taxes that we are trading but the power of choice and thought that is what makes it scary. It is not that these tech giants are all that bad, it is their business model that hinges on the user data exploitation that makes them scary.
The fact that countless companies are tracking millions of people around the web and on their phones is disturbing enough, but what is even more disturbing about my Quantcast data is the extent to which the company relies on data brokers, credit referencing agencies, and even credit card companies in ways that are impossible for the average consumer to know about or escape.
As society heads toward an ever more connected world, the ability for individuals to protect and manage the invisible data that companies and third parties hold about them, becomes increasingly difficult.