[ overboard / sfw / alt / cytube] [ leftypol / b / WRK / hobby / tech / edu / ga / ent / 777 / posad / i / a / R9K / dead ] [ meta ]

/tech/ - Technology

"Technology reveals the active relation of man to nature"
Name
Email
Subject
Comment
Flag
File
Embed
Password (For file deletion.)

Matrix   IRC Chat   Mumble   Telegram   Discord


File: 1713703047440.jpg ( 61.45 KB , 1581x1054 , C__Data_Users_DefApps_AppD….jpg )

 No.13010

This is the place to share articles.

>Leaked Microsoft documents reveal effort to "Gender Transition" young children

https://conservativenerds.locals.com/post/5120067/leaked-microsoft-documents-reveal-effort-to-gender-transition-young-children


>Firefox Money: Investigating the bizarre finances of Mozilla

https://lunduke.locals.com/post/4387539/firefox-money-investigating-the-bizarre-finances-of-mozilla


>IBM / Red Hat whistleblower leaks internal, racist, anti-White presentation.

https://conservativenerds.locals.com/post/4996525/ibm-red-hat-whistleblower-leaks-internal-racist-anti-white-presentation


>Microsoft's growing control of Linux

https://lunduke.substack.com/p/microsofts-growing-control-of-linux


>The EU is getting ready for total control of the digital space

https://norberthaering.de/en/propaganda-censorship/hatedemics-en/


>France is leading Europe on the road to Chinese style population control: QR-Code required to enter certain quarters

https://norberthaering.de/en/power-control/olympia-qr-code-en/


>Ready for brain transparency? Amid the laughter of Davos, the machine is assimilating humans

https://norberthaering.de/en/news/wef-fararhany-brainwaves/
>>

 No.13017

https://arstechnica.com/tech-policy/2024/04/colorado-privacy-law-first-to-safeguard-brain-activity-data/
First brain privacy law, has been enacted.

Although it's not strong enough, brain privacy must be absolute.
Brain-privacy violations should probably be punished with a brain-chip that monitors for anti-privacy-thought-crimes for the sake of Irony.
>>

 No.13018

>>13017
>the state will protect us from the interests of bourgs
>>

 No.13021

https://techcrunch.com/2024/04/22/e2ee-police-chiefs-lawful-access/

They trying to backdoor/weaken end to end encrypted communication again with something called "client side scanning"
Apparently the ECHR has already ruled that weakening or backdooring e2ee isn’t allowed.

Client-side scanning is endlessly creepy it feels like some kind of privacy rape.

I don't understand the dynamic, on the one hand the EU is strengthening privacy rights when it comes to big tech, but then there is this shit.
>>

 No.13022

>>13018
mind-reading technology can be used against "bourgs" as well, they too have an interest in neural privacy
>>

 No.13030

File: 1714412542128-0.png ( 23.24 KB , 520x300 , key.png )

File: 1714412542128-1.jpg ( 43.82 KB , 867x777 , softsensored on HN.jpg )

Here is an interesting argument against the attack on end2end encryption
https://www.mnot.net/blog/2024/04/29/power

No One Should Have That Much Power

>It’s a common spy thriller trope. There’s a special key that can unlock something critical – business records, bank vaults, government secrets, nuclear weapons, maybe all of the above, worldwide.


>Our hero has to stop this key from falling into bad people’s hands, or recover it before it’s too late. Perhaps at one point they utter something like the title of this post. You walk out of the theatre two hours later entertained but wondering why someone would be silly enough to create such a powerful artefact.


>In a surprising move, law enforcement officials are once again calling for such a thing to be created. Repeatedly.


>These authorities and their proxies say that they must have access to encrypted communications to keep us safe. They have been doing so for years – at first bluntly, now in a more subtle way. Encryption backdoors aren’t politically viable, so they take pains to say that they don’t want them while at the same time asking for a level of access that cannot be achieved except through backdooring encryption.


>If you create a way to recover messages sent through a service, that’s a backdoor. If you run some code that evaluates messages on the endpoints and flags them if they meet some criteria, that isn’t an improvement; it’s a backdoor that can be abused in myriad ways. Centralising access to encrypted content creates unavoidable systemic risks.


>This means that any such mechanism has to be handled like weapons-grade nuclear material: losing control is a disaster of epic (or even existential) proportions. The few national governments who have nuclear capability struggle greatly to manage that risk; why would we intentionally entrust something as powerful to every government in the world or potentially even every local police department? Or will it be just a privileged few governments that will have access?


>The current crop of suggestions seem to concede that governments shouldn’t have direct access. Instead, they want services to backdoor themselves and act as gatekeepers to law enforcement. That’s not an improvement; it’s still centralized, and it makes these companies responsible for any misuse of the data that they have access to, requiring everyone on the planet to trust a few big tech companies with our private and most intimate conversations – hardly a direction that society wants to go in in 2024. ‘Trust me, I’m in charge’ is a poor model of governance or security.


>These ‘solutions’ also ignore the reality that the ‘bad guys’ will just use other tools to communicate; information is information. That will leave law abiding people giving up their privacy and security for little societal gain.


>Law enforcement has more power than ever before because of digital technology. They are able to collect, process, summarise and track much more efficiently and at much greater scale. Genuinely new insights and capabilities are possible. So, when they want access to encrypted data because things have ‘gone dark’, it’s reasonable to ask ‘as compared to what?’


>No one should have that much power, because messaging and other encrypted services have become people’s memories, their casual hallway chats, their intimate whispers. Yes, there is longstanding legal precedent for searching someone’s papers and home, but the barriers to doing so are considerable – not just those imposed by law, but also physics. There are few such inherent limits on a key that can trivially enable access to what amounts to anyone’s mind or identify anyone who thinks about a particular topic. Law enforcement struggles to solve real and serious problems, but the power they’re asking for is too vast and too easily misused, and they are failing to appreciate how it would operate on a global Internet.


>One of the assumptions built into these calls is that if the tech community would just nerd harder, a solution could be somehow magically found that preserved privacy and security while letting the ‘good guys’ have access. With all respect to the valuable work that law enforcement does to protect society, it’s equally as valid to as them to just police harder.

Unique IPs: 5

[Return][Catalog][Top][Home][Post a Reply]
Delete Post [ ]
[ overboard / sfw / alt / cytube] [ leftypol / b / WRK / hobby / tech / edu / ga / ent / 777 / posad / i / a / R9K / dead ] [ meta ]
ReturnCatalogTopBottomHome