Online Harms: Encryption under attack | Open Rights Group - 0 views
-
"Service providers, including many ORG members, will be required to do this through the imposition of a "duty of care" - a concept awkwardly borrowed from health & safety - which will require them to monitor the integrity of their services not by objective technical standards, but by subjective "codes of practice" on both illegal and legal content. Although the framework has been drawn up with large American social media platforms in mind, it would apply to any site or service with UK users which hosts user-generated content. A blog with comments will be fair game. An app with user reviews will be fair game. "
'So vague, it invites abuse': Twitter reviews controversial new privacy policy | Twitte... - 0 views
-
"Activists swiftly warned that the policy as it was published would backfire. The policy was vague and had been put together without much input from the communities most vulnerable to harassment and doxxing, the activists argued. They had little faith in Twitter's reporting and appeals process, which they described as unreliable, automated and allowing for little discussion about the enforcement of policies."
TechScape: How police use location and search data to find suspects - and not always th... - 0 views
-
""We know [geofence warrants] are a ubiquitous policing tool, and as long as companies make it possible to comply with these sorts of court orders, they're putting their users at risk," Fox Cahn said. "Whether it's Google or Uber or Lyft or payment companies, by segregating their user data in a way which prevents the aggregated location searches, you can keep that data while preventing compliance with a geofence warrant.""
Encryption services are sending the right message to the quantum codebreakers | John Na... - 0 views
-
"The folks at Signal are taking one of the four post-quantum cryptography algorithms that have been chosen by the US National Institute of Standards and Technology to withstand attacks by quantum computers, but instead of using it to replace their existing public-key encryption system, they are layering the new algorithm on top of what they already have. "We are augmenting our existing cryptosystems," they say, "such that an attacker must break both systems in order to compute the keys protecting people's communications." And they will be rolling out this augmented system to all users in the next few months."
The Spanish firm that uses dubious methods to 'erase your past' from the internet | Spa... - 0 views
-
""We erase your past" declares the company's tagline. Eliminalia, which has offices in several cities including Barcelona and Kyiv, is part of a growing industry that will clean up your online profile. Officially the company performs "a deep search across the internet for all information - whether it be an article, a blog, social media posts or even a mistaken identity". It then endeavours, on behalf of its clients, to get any negative information removed."
Transforming global health supply chains through data visibility | McKinsey - 0 views
-
Data visibility is an important aspect to achieve the highest potential of the healthcare system for all. Right now most countries are still stuck with a decentralised set of data or no digitalisation at all. This leads to harder distribution and stocking of resources, using supply-chains and making decisions, this also includes every form of system with a high population and research. There are 4 factors in achieving data visibility. Stakeholder commitment, road map to digitalisation, data capability and interoperability.
Digital technology new source of discrimination against women: Guterres | UN News - 3 views
-
gender-based violence.
-
“Many of the challenges we face today – from conflicts to climate chaos and the cost-of-living crisis – are the result of what is a male-dominated world with a male-dominated culture, taking the key decisions that guide our world,”
-
gender digital divide
- ...1 more annotation...
Privacy Without Monopoly: Data Protection and Interoperability | Electronic Frontier Fo... - 0 views
-
"A new regime of interoperability can revitalize competition in the space, encourage innovation, and give users more agency over their data; it may also create new risks to user privacy and data security. This paper considers those risks and argues that they are outweighed by the benefits. New interoperability, done correctly, will not just foster competition, it can be a net benefit for user privacy rights."
Why Migrants Need Digital Sanctuary | Open Rights Group - 0 views
-
"When individuals migrate, their data migrates with them. When people leave their countries to travel and live in different places whether as migrants, refugees, or asylum seekers, they are not only seeking physical safety, they also need to be sure that their digital identity and information will be safe. However, if they are not careful or protected, their data could unwittingly leave a trail of their movements, potentially exposing them to various threats. Whether they are fleeing war, authoritarian regimes, or other adversaries, this data could inadvertently connect their identities to their pursuers."
« First
‹ Previous
161 - 173 of 173
Showing 20▼ items per page