TLDR Digital Safety Checklist
๐ค Who this guide is for
๐ก You use the internet on a day-to-day basis โ for work, social media, financial transactions, etc.
๐ก You feel you could be doing more to ensure your digital safety and privacy, but you're also not in immediate danger. (If you are, seek out an expert for a 1:1 consult.)
๐ก You're comfortable with technology. For example, you're comfortable going into the settings section of your computer/smartphone.
๐ How this guide works
๐ก Recommendations have been sorted in ascending levels of difficulty. Start from level one and work your way up!
๐ก I recommend doing everything in levels one, two and three. I did, and I'm only a mildly technically-competent person.
๐ก Then scan the scenarios to see if any of them apply to you. (They assume that you've done everything in levels 1-3.)
๐ก This guide is a living document โ please feel free to submit a pull request or fork your own version of this guide on GitHub.
๐ Last updated: 23 October 2019
๐๐ผ Read more:
https://hongkonggong.github.io/tldr-digital-security/
๐๐ผ GitHub:
https://github.com/hongkonggong/tldr-digital-security
#digital #safety #checklist #guide
๐ก@cRyPtHoN_INFOSEC_DE
๐ก@cRyPtHoN_INFOSEC_EN
๐ก@cRyPtHoN_INFOSEC_ES
๐ก@FLOSSb0xIN
๐ค Who this guide is for
๐ก You use the internet on a day-to-day basis โ for work, social media, financial transactions, etc.
๐ก You feel you could be doing more to ensure your digital safety and privacy, but you're also not in immediate danger. (If you are, seek out an expert for a 1:1 consult.)
๐ก You're comfortable with technology. For example, you're comfortable going into the settings section of your computer/smartphone.
๐ How this guide works
๐ก Recommendations have been sorted in ascending levels of difficulty. Start from level one and work your way up!
๐ก I recommend doing everything in levels one, two and three. I did, and I'm only a mildly technically-competent person.
๐ก Then scan the scenarios to see if any of them apply to you. (They assume that you've done everything in levels 1-3.)
๐ก This guide is a living document โ please feel free to submit a pull request or fork your own version of this guide on GitHub.
๐ Last updated: 23 October 2019
๐๐ผ Read more:
https://hongkonggong.github.io/tldr-digital-security/
๐๐ผ GitHub:
https://github.com/hongkonggong/tldr-digital-security
#digital #safety #checklist #guide
๐ก@cRyPtHoN_INFOSEC_DE
๐ก@cRyPtHoN_INFOSEC_EN
๐ก@cRyPtHoN_INFOSEC_ES
๐ก@FLOSSb0xIN
GitHub
GitHub - narwhalacademy/zebra-crossing: Zebra Crossing: an easy-to-use digital safety checklist
Zebra Crossing: an easy-to-use digital safety checklist - narwhalacademy/zebra-crossing
This media is not supported in your browser
VIEW IN TELEGRAM
New method makes people invisible for face recognition
Researchers from Facebook's AI research team and Tel-Aviv University have developed a new method to fool facial recognition on videosโค
๐บ https://www.youtube.com/watch?v=cCYnBtni7Wg
๐ก New method tricks facial recognition on videos:
https://t3n.de/news/neue-methode-trickst-videos-1213004/
#facial #recognition #facebook #video #DeIdentification
๐ก@cRyPtHoN_INFOSEC_DE
๐ก@cRyPtHoN_INFOSEC_EN
๐ก@cRyPtHoN_INFOSEC_ES
๐ก@FLOSSb0xIN
Researchers from Facebook's AI research team and Tel-Aviv University have developed a new method to fool facial recognition on videosโค
๐บ https://www.youtube.com/watch?v=cCYnBtni7Wg
๐ก New method tricks facial recognition on videos:
https://t3n.de/news/neue-methode-trickst-videos-1213004/
#facial #recognition #facebook #video #DeIdentification
๐ก@cRyPtHoN_INFOSEC_DE
๐ก@cRyPtHoN_INFOSEC_EN
๐ก@cRyPtHoN_INFOSEC_ES
๐ก@FLOSSb0xIN
GANimal Demo of Few-Shot Unsupervised Image-to-Image Translation
You've always wondered what your pet's smile would look like on another animal? This AI will show it to you.
๐๐ผ Demo:
https://nvidia-research-mingyuliu.com/ganimal
https://arxiv.org/abs/1905.01723
#GANimal #demo #image #translation
๐ก@cRyPtHoN_INFOSEC_DE
๐ก@cRyPtHoN_INFOSEC_EN
๐ก@cRyPtHoN_INFOSEC_ES
๐ก@FLOSSb0xIN
You've always wondered what your pet's smile would look like on another animal? This AI will show it to you.
๐๐ผ Demo:
https://nvidia-research-mingyuliu.com/ganimal
https://arxiv.org/abs/1905.01723
#GANimal #demo #image #translation
๐ก@cRyPtHoN_INFOSEC_DE
๐ก@cRyPtHoN_INFOSEC_EN
๐ก@cRyPtHoN_INFOSEC_ES
๐ก@FLOSSb0xIN
Australia wants to use face-matching to verify people downloading porn
Proving that you're old enough for online porn could get a lot more awkward.
The UK might have ditched plans for an age filter on online porn, but Australia is going all-in with a new proposal that could require internet users to verify their identity in a face-matching database before viewing pornography.
The proposal comes as Australian lawmakers consider new restrictions around age verification for online porn and gambling as part of a bipartisan parliamentary inquiry.
In a submission to the inquiry, first reported by ZDNet, Australia's Department of Home Affairs proposed using its Face Verification Service to verify internet users wanting to look at porn.
"Home Affairs is developing a Face Verification Service which matches a person's photo against images used on one of their evidence of identity documents to help verify their identity," DHA wrote in a submission to the inquiry. "This could assist in age verification, for example by preventing a minor from using their parent's driver licence to circumvent age verification controls."
The first phase of the Face Verification Service launched in 2016 with a database that included citizenship images, accessible by government agencies including the Australian Federal Police. However, the Government has proposed expanding the Service to include drivers' license photos to capture a larger part of the population.
๐๐ผ Read more:
https://www.cnet.com/news/australia-face-verification-service-proposed-for-online-porn-age-filter/
#Australia #facial #verification #online #age #filter #porn
๐ก@cRyPtHoN_INFOSEC_DE
๐ก@cRyPtHoN_INFOSEC_EN
๐ก@cRyPtHoN_INFOSEC_ES
๐ก@FLOSSb0xIN
Proving that you're old enough for online porn could get a lot more awkward.
The UK might have ditched plans for an age filter on online porn, but Australia is going all-in with a new proposal that could require internet users to verify their identity in a face-matching database before viewing pornography.
The proposal comes as Australian lawmakers consider new restrictions around age verification for online porn and gambling as part of a bipartisan parliamentary inquiry.
In a submission to the inquiry, first reported by ZDNet, Australia's Department of Home Affairs proposed using its Face Verification Service to verify internet users wanting to look at porn.
"Home Affairs is developing a Face Verification Service which matches a person's photo against images used on one of their evidence of identity documents to help verify their identity," DHA wrote in a submission to the inquiry. "This could assist in age verification, for example by preventing a minor from using their parent's driver licence to circumvent age verification controls."
The first phase of the Face Verification Service launched in 2016 with a database that included citizenship images, accessible by government agencies including the Australian Federal Police. However, the Government has proposed expanding the Service to include drivers' license photos to capture a larger part of the population.
๐๐ผ Read more:
https://www.cnet.com/news/australia-face-verification-service-proposed-for-online-porn-age-filter/
#Australia #facial #verification #online #age #filter #porn
๐ก@cRyPtHoN_INFOSEC_DE
๐ก@cRyPtHoN_INFOSEC_EN
๐ก@cRyPtHoN_INFOSEC_ES
๐ก@FLOSSb0xIN
Facebook Sues Israeli NSO Spyware Firm For Hacking WhatsApp Users
Finally, for the very first time, an encrypted messaging service provider is taking legal action against a private entity that has carried out malicious attacks against its users.
Facebook filed a lawsuit against Israeli mobile surveillance firm NSO Group on Tuesday, alleging that the company was actively involved in hacking users of its end-to-end encrypted WhatsApp messaging service.
Earlier this year, it was discovered that WhatsApp had a critical vulnerability that attackers were found exploiting in the wild to remotely install Pegasus spyware on targeted Android and iOS devices.
The flaw (CVE-2019-3568) successfully allowed attackers to silently install the spyware app on targeted phones by merely placing a WhatsApp video call with specially crafted requests, even when the call was not answered.
Developed by NSO Group, Pegasus allows access to an incredible amount of data from victims' smartphones remotely, including their text messages, emails, WhatsApp chats, contact details, calls records, location, microphone, and camera.
Pegasus is NSO's signature product that has previously been used against several human rights activists and journalists, from Mexico to the United Arab Emirates two years ago, and Amnesty International staffers in Saudi Arabia and another Saudi human rights defender based abroad earlier last year.
Though NSO Group always claims it legally sells its spyware only to governments with no direct involvement, WhatsApp head Will Cathcart says the company has evidence of NSO Group's direct involvement in the recent attacks against WhatsApp users.
๐๐ผ Read more:
https://thehackernews.com/2019/10/whatsapp-nso-group-malware.html
๐๐ผ PDF:
https://www.scribd.com/document/432594561/WhatsApp-Sues-NSO-Group-for-WhatsApp-Hack
#Facebook #Israel #NSO #Spyware #Pegasus #WhatsApp #Malware #pdf
๐ก@cRyPtHoN_INFOSEC_DE
๐ก@cRyPtHoN_INFOSEC_EN
๐ก@cRyPtHoN_INFOSEC_ES
๐ก@FLOSSb0xIN
Finally, for the very first time, an encrypted messaging service provider is taking legal action against a private entity that has carried out malicious attacks against its users.
Facebook filed a lawsuit against Israeli mobile surveillance firm NSO Group on Tuesday, alleging that the company was actively involved in hacking users of its end-to-end encrypted WhatsApp messaging service.
Earlier this year, it was discovered that WhatsApp had a critical vulnerability that attackers were found exploiting in the wild to remotely install Pegasus spyware on targeted Android and iOS devices.
The flaw (CVE-2019-3568) successfully allowed attackers to silently install the spyware app on targeted phones by merely placing a WhatsApp video call with specially crafted requests, even when the call was not answered.
Developed by NSO Group, Pegasus allows access to an incredible amount of data from victims' smartphones remotely, including their text messages, emails, WhatsApp chats, contact details, calls records, location, microphone, and camera.
Pegasus is NSO's signature product that has previously been used against several human rights activists and journalists, from Mexico to the United Arab Emirates two years ago, and Amnesty International staffers in Saudi Arabia and another Saudi human rights defender based abroad earlier last year.
Though NSO Group always claims it legally sells its spyware only to governments with no direct involvement, WhatsApp head Will Cathcart says the company has evidence of NSO Group's direct involvement in the recent attacks against WhatsApp users.
๐๐ผ Read more:
https://thehackernews.com/2019/10/whatsapp-nso-group-malware.html
๐๐ผ PDF:
https://www.scribd.com/document/432594561/WhatsApp-Sues-NSO-Group-for-WhatsApp-Hack
#Facebook #Israel #NSO #Spyware #Pegasus #WhatsApp #Malware #pdf
๐ก@cRyPtHoN_INFOSEC_DE
๐ก@cRyPtHoN_INFOSEC_EN
๐ก@cRyPtHoN_INFOSEC_ES
๐ก@FLOSSb0xIN
๐1
This media is not supported in your browser
VIEW IN TELEGRAM
Startpage sold to System1 ๐
๐ก https://www.startpage.com/blog/company-updates/startpage-and-privacy-one-group/
๐ก https://www.kuketz-blog.de/ist-die-suchmaschine-startpage-noch-empfehlenswert/
๐บ https://www.youtube.com/watch?v=aAwtQvt1P_c
#startpage #system1
๐ก@cRyPtHoN_INFOSEC_DE
๐ก@cRyPtHoN_INFOSEC_EN
๐ก@cRyPtHoN_INFOSEC_ES
๐ก@FLOSSb0xIN
๐ก https://www.startpage.com/blog/company-updates/startpage-and-privacy-one-group/
๐ก https://www.kuketz-blog.de/ist-die-suchmaschine-startpage-noch-empfehlenswert/
๐บ https://www.youtube.com/watch?v=aAwtQvt1P_c
#startpage #system1
๐ก@cRyPtHoN_INFOSEC_DE
๐ก@cRyPtHoN_INFOSEC_EN
๐ก@cRyPtHoN_INFOSEC_ES
๐ก@FLOSSb0xIN
Facebook agrees to pay Cambridge Analytica fine to UK
Facebook has agreed to pay a ยฃ500,000 fine imposed by the UK's data protection watchdog for its role in the Cambridge Analytica scandal.
It had originally appealed the penalty, causing the Information Commissioner's Office to pursue its own counter-appeal.
As part of the agreement, Facebook has made no admission of liability.
The US firm said it "wished it had done more to investigate Cambridge Analytica" earlier.
James Dipple-Johnstone, deputy commissioner of the ICO said: "The ICO's main concern was that UK citizen data was exposed to a serious risk of harm. Protection of personal information and personal privacy is of fundamental importance, not only for the rights of individuals, but also as we now know, for the preservation of a strong democracy."
Harry Kinmonth, a Facebook lawyer, noted that the social network had made changes to restrict the information app developers could access following the scandal.
"The ICO has stated that it has not discovered evidence that the data of Facebook users in the EU was transferred to Cambridge Analytica," he added.
"However, we look forward to continuing to cooperate with the ICO's wider and ongoing investigation into the use of data analytics for political purposes."
Researcher Dr Aleksandr Kogan and his company GSR used a personality quiz to harvest the Facebook data of up to 87 million people.
Some of this data was shared with London-based Cambridge Analytica.
The ICO argued that Facebook did not do enough to protect users' information.
https://www.bbc.com/news/technology-50234141
#UK #facebook #DeleteFacebook #ICO #fine #dataprotection #CambridgeAnalytica
๐ก@cRyPtHoN_INFOSEC_DE
๐ก@cRyPtHoN_INFOSEC_EN
๐ก@cRyPtHoN_INFOSEC_ES
๐ก@FLOSSb0xIN
Facebook has agreed to pay a ยฃ500,000 fine imposed by the UK's data protection watchdog for its role in the Cambridge Analytica scandal.
It had originally appealed the penalty, causing the Information Commissioner's Office to pursue its own counter-appeal.
As part of the agreement, Facebook has made no admission of liability.
The US firm said it "wished it had done more to investigate Cambridge Analytica" earlier.
James Dipple-Johnstone, deputy commissioner of the ICO said: "The ICO's main concern was that UK citizen data was exposed to a serious risk of harm. Protection of personal information and personal privacy is of fundamental importance, not only for the rights of individuals, but also as we now know, for the preservation of a strong democracy."
Harry Kinmonth, a Facebook lawyer, noted that the social network had made changes to restrict the information app developers could access following the scandal.
"The ICO has stated that it has not discovered evidence that the data of Facebook users in the EU was transferred to Cambridge Analytica," he added.
"However, we look forward to continuing to cooperate with the ICO's wider and ongoing investigation into the use of data analytics for political purposes."
Researcher Dr Aleksandr Kogan and his company GSR used a personality quiz to harvest the Facebook data of up to 87 million people.
Some of this data was shared with London-based Cambridge Analytica.
The ICO argued that Facebook did not do enough to protect users' information.
https://www.bbc.com/news/technology-50234141
#UK #facebook #DeleteFacebook #ICO #fine #dataprotection #CambridgeAnalytica
๐ก@cRyPtHoN_INFOSEC_DE
๐ก@cRyPtHoN_INFOSEC_EN
๐ก@cRyPtHoN_INFOSEC_ES
๐ก@FLOSSb0xIN
Elon Muskโs Quest to Control Computers With Our Thoughtsย
Elon Muskโs Quest to Control Computers With Our Minds
Over the summer, #ElonMusk unveiled the details of his secretive startup #Neuralink. Its goal, he said, is to place electrodes in our brains so we can control a computer with our thoughts. Its experiments have so far been limited to rodents and monkeys, but Neuralink builds on strides already made in medicine, where doctors have successfully placed #implants into human brains to treat a variety of illnesses. This week on #Decrypted, Bloomberg Technologyโs Sarah McBride visits the primate lab thatโs been carrying out Neuralinkโs #research, and meets the doctors and the patients at the forefront of this emerging field.
๐ป https://www.bloomberg.com/news/audio/2019-10-29/elon-musk-s-quest-to-control-computers-with-our-minds-podcast
#podcast #bloomberg
๐ก@cRyPtHoN_INFOSEC_DE
๐ก@cRyPtHoN_INFOSEC_EN
๐ก@cRyPtHoN_INFOSEC_ES
๐ก@FLOSSb0xIN
Over the summer, #ElonMusk unveiled the details of his secretive startup #Neuralink. Its goal, he said, is to place electrodes in our brains so we can control a computer with our thoughts. Its experiments have so far been limited to rodents and monkeys, but Neuralink builds on strides already made in medicine, where doctors have successfully placed #implants into human brains to treat a variety of illnesses. This week on #Decrypted, Bloomberg Technologyโs Sarah McBride visits the primate lab thatโs been carrying out Neuralinkโs #research, and meets the doctors and the patients at the forefront of this emerging field.
๐ป https://www.bloomberg.com/news/audio/2019-10-29/elon-musk-s-quest-to-control-computers-with-our-minds-podcast
#podcast #bloomberg
๐ก@cRyPtHoN_INFOSEC_DE
๐ก@cRyPtHoN_INFOSEC_EN
๐ก@cRyPtHoN_INFOSEC_ES
๐ก@FLOSSb0xIN
Media is too big
VIEW IN TELEGRAM
Usability Lab Overview and how to receive design help for your project
In this talk I will highlight our experience with the Usability Lab program from Open Tech Fund and how FOSS projects can apply and receive design help from this Lab.
This program offers help with Usability Audits, Usability and User Experience (UX) Consultations, Usability Testing, User Research and User Studies, UX Design and Style Guides.
Two successful examples that will be unfolded are our work on the Briar Project and Thunderbird, the difficulties we encountered and how we managed to overcome them.
๐บ https://www.youtube.com/watch?v=IZfmRL_wLOM
#ACEU19 #Lushka #LabOverwiew #FOSS
๐ก@cRyPtHoN_INFOSEC_DE
๐ก@cRyPtHoN_INFOSEC_EN
๐ก@cRyPtHoN_INFOSEC_ES
๐ก@FLOSSb0xIN
In this talk I will highlight our experience with the Usability Lab program from Open Tech Fund and how FOSS projects can apply and receive design help from this Lab.
This program offers help with Usability Audits, Usability and User Experience (UX) Consultations, Usability Testing, User Research and User Studies, UX Design and Style Guides.
Two successful examples that will be unfolded are our work on the Briar Project and Thunderbird, the difficulties we encountered and how we managed to overcome them.
๐บ https://www.youtube.com/watch?v=IZfmRL_wLOM
#ACEU19 #Lushka #LabOverwiew #FOSS
๐ก@cRyPtHoN_INFOSEC_DE
๐ก@cRyPtHoN_INFOSEC_EN
๐ก@cRyPtHoN_INFOSEC_ES
๐ก@FLOSSb0xIN
Exclusive: Government officials around the globe targeted for hacking through WhatsApp
WASHINGTON (Reuters) - Senior government officials in multiple U.S.-allied countries were targeted earlier this year with hacking software that used Facebook Inc's (FB.O) WhatsApp to take over users' phones, according to people familiar with the messaging company's investigation.
Sources familiar with WhatsAppโs internal investigation into the breach said a โsignificantโ portion of the known victims are high-profile government and military officials spread across at least 20 countries on five continents. Many of the nations are U.S. allies, they said.
The hacking of a wider group of top government officials' smartphones than previously reported suggests the WhatsApp cyber intrusion could have broad political and diplomatic consequences.
WhatsApp filed a lawsuit on Tuesday against Israeli hacking tool developer NSO Group. The Facebook-owned software giant alleges that NSO Group built and sold a hacking platform that exploited a flaw in WhatsApp-owned servers to help clients hack into the cellphones of at least 1,400 users between April 29, 2019, and May 10, 2019.
The total number of WhatsApp users hacked could be even higher. A London-based human rights lawyer, who was among the targets, sent Reuters photographs showing attempts to break into his phone dating back to April 1.
While it is not clear who used the software to hack officials' phones, NSO has said it sells its spyware exclusively to government customers.
๐๐ผ Read more:
https://uk.mobile.reuters.com/article/amp/idUKKBN1XA27N
#WhatsApp #Hack #government #military
๐ก@cRyPtHoN_INFOSEC_DE
๐ก@cRyPtHoN_INFOSEC_EN
๐ก@cRyPtHoN_INFOSEC_ES
๐ก@FLOSSb0xIN
WASHINGTON (Reuters) - Senior government officials in multiple U.S.-allied countries were targeted earlier this year with hacking software that used Facebook Inc's (FB.O) WhatsApp to take over users' phones, according to people familiar with the messaging company's investigation.
Sources familiar with WhatsAppโs internal investigation into the breach said a โsignificantโ portion of the known victims are high-profile government and military officials spread across at least 20 countries on five continents. Many of the nations are U.S. allies, they said.
The hacking of a wider group of top government officials' smartphones than previously reported suggests the WhatsApp cyber intrusion could have broad political and diplomatic consequences.
WhatsApp filed a lawsuit on Tuesday against Israeli hacking tool developer NSO Group. The Facebook-owned software giant alleges that NSO Group built and sold a hacking platform that exploited a flaw in WhatsApp-owned servers to help clients hack into the cellphones of at least 1,400 users between April 29, 2019, and May 10, 2019.
The total number of WhatsApp users hacked could be even higher. A London-based human rights lawyer, who was among the targets, sent Reuters photographs showing attempts to break into his phone dating back to April 1.
While it is not clear who used the software to hack officials' phones, NSO has said it sells its spyware exclusively to government customers.
๐๐ผ Read more:
https://uk.mobile.reuters.com/article/amp/idUKKBN1XA27N
#WhatsApp #Hack #government #military
๐ก@cRyPtHoN_INFOSEC_DE
๐ก@cRyPtHoN_INFOSEC_EN
๐ก@cRyPtHoN_INFOSEC_ES
๐ก@FLOSSb0xIN
Emails about Russiaโs 2018 World Cup bid appear to be for sale online
Anonymous Telegram account indicates emails for sale after reports emerge of dossier on how to bribe Fifa officials
An anonymously run Telegram account has indicated that it wants to sell a tranche of emails relating to Russiaโs 2018 World Cup bid, after reports that they contain a dossier compiled by Russian officials on how to bribe Fifa executive council members.
The existence of the emails was first reported by the investigative website the Insider. According to the Insider, an aide to the former footballer Franz Beckenbauer promised to deliver his vote in exchange for โgenerous compensation for his consulting servicesโ, later specified as at least โฌ3m.
A Cypriot Fifa executiveโs vote could be bought for โฌ1.5m, and the former Fifa vice-president Jack Warner would vote for โwhoever offers him the mostโ, the Insider report says.
The dossier also reportedly contains extensive background information about the council members, and even includes psychological profiles. It reportedly said the British football executive Geoff Thompson could be swayed through โdiplomatic channels [and] expensive gifts to his wife, who has a strong influence on himโ.
There is no suggestion that the Russian officials acted on the dossier, nor of any wrongdoing by those named. Thompson, who was at the time the head of Englandโs rival World Cup bid, has denied his wife was offered any gifts.
Warner has been banned for life by Fifaโs ethics committee, and Sepp Blatter and the former France captain Michel Platini, who are both profiled in the dossier, each received an eight-year ban from football in 2011.
The emails purportedly come from the account of Sergei Kapkov, a Russian politician and former head of the countryโs national football academy, and are in the possession of an anonymously run Telegram channel called BlackMirror.
๐๐ผ Read more:
https://www.theguardian.com/world/2019/nov/01/emails-about-russia-2018-world-cup-bid-being-offered-online
#BlackMirror #emails #russia #worldcup #fifa
๐ก@cRyPtHoN_INFOSEC_DE
๐ก@cRyPtHoN_INFOSEC_EN
๐ก@cRyPtHoN_INFOSEC_ES
๐ก@FLOSSb0xIN
Anonymous Telegram account indicates emails for sale after reports emerge of dossier on how to bribe Fifa officials
An anonymously run Telegram account has indicated that it wants to sell a tranche of emails relating to Russiaโs 2018 World Cup bid, after reports that they contain a dossier compiled by Russian officials on how to bribe Fifa executive council members.
The existence of the emails was first reported by the investigative website the Insider. According to the Insider, an aide to the former footballer Franz Beckenbauer promised to deliver his vote in exchange for โgenerous compensation for his consulting servicesโ, later specified as at least โฌ3m.
A Cypriot Fifa executiveโs vote could be bought for โฌ1.5m, and the former Fifa vice-president Jack Warner would vote for โwhoever offers him the mostโ, the Insider report says.
The dossier also reportedly contains extensive background information about the council members, and even includes psychological profiles. It reportedly said the British football executive Geoff Thompson could be swayed through โdiplomatic channels [and] expensive gifts to his wife, who has a strong influence on himโ.
There is no suggestion that the Russian officials acted on the dossier, nor of any wrongdoing by those named. Thompson, who was at the time the head of Englandโs rival World Cup bid, has denied his wife was offered any gifts.
Warner has been banned for life by Fifaโs ethics committee, and Sepp Blatter and the former France captain Michel Platini, who are both profiled in the dossier, each received an eight-year ban from football in 2011.
The emails purportedly come from the account of Sergei Kapkov, a Russian politician and former head of the countryโs national football academy, and are in the possession of an anonymously run Telegram channel called BlackMirror.
๐๐ผ Read more:
https://www.theguardian.com/world/2019/nov/01/emails-about-russia-2018-world-cup-bid-being-offered-online
#BlackMirror #emails #russia #worldcup #fifa
๐ก@cRyPtHoN_INFOSEC_DE
๐ก@cRyPtHoN_INFOSEC_EN
๐ก@cRyPtHoN_INFOSEC_ES
๐ก@FLOSSb0xIN
LEOPOLD-BUZZFEED-NEWS-FBI-Mueller-302s-FOIA.pdf
78 MB
The Mueller Reportโs Secret Memos
BuzzFeed News sued the US government to see all the work that Muellerโs team kept secret. We have published the first installment, with revelations about the Ukraine conspiracy theory
๐ PDF:
https://assets.documentcloud.org/documents/6537542/LEOPOLD-BUZZFEED-NEWS-FBI-Mueller-302s-FOIA.pdf
๐๐ผ Read more:
https://www.buzzfeednews.com/article/jasonleopold/mueller-report-secret-memos-1
#FBI #Mueller #report #pdf
๐ก@cRyPtHoN_INFOSEC_DE
๐ก@cRyPtHoN_INFOSEC_EN
๐ก@cRyPtHoN_INFOSEC_ES
๐ก@FLOSSb0xIN
BuzzFeed News sued the US government to see all the work that Muellerโs team kept secret. We have published the first installment, with revelations about the Ukraine conspiracy theory
๐ PDF:
https://assets.documentcloud.org/documents/6537542/LEOPOLD-BUZZFEED-NEWS-FBI-Mueller-302s-FOIA.pdf
๐๐ผ Read more:
https://www.buzzfeednews.com/article/jasonleopold/mueller-report-secret-memos-1
#FBI #Mueller #report #pdf
๐ก@cRyPtHoN_INFOSEC_DE
๐ก@cRyPtHoN_INFOSEC_EN
๐ก@cRyPtHoN_INFOSEC_ES
๐ก@FLOSSb0xIN
A network of โcamgirlโ sites exposed millions of users and sex workers
A number of popular โcamgirlโ sites have exposed millions of sex workers and users after the company running the sites left the back-end database unprotected.
The sites, run by Barcelona-based VTS Media, include amateur.tv, webcampornoxxx.net, and placercams.com. Most of the sitesโ users are based in Spain and Europe, but we found evidence of users across the world, including the United States.
According to Alexa traffic rankings, amateur.tv is one of the most popular in Spain.
The database, containing months-worth of daily logs of the site activities, was left without a password for weeks. Those logs included detailed records of when users logged in โ including usernames and sometimes their user-agents and IP addresses, which can be used to identify users. The logs also included usersโ private chat messages with other users, as well as promotional emails they were receiving from the various sites. The logs even included failed login attempts, storing usernames and passwords in plaintext. We did not test the credentials as doing so would be unlawful.
The exposed data also revealed which videos users were watching and renting, exposing kinks and private sexual preferences.
In all, the logs were detailed enough to see which users were logging in, from where, and often their email addresses or other identifiable information โ which in some cases we could match to real-world identities.
Not only were users affected, the โcamgirlsโ โ who broadcast sexual content to viewers โ also had some of their account information exposed.
The database was shut off last week, allowing us to publish our findings.
๐๐ผ Read more:
https://techcrunch.com/2019/11/03/camgirl-network-exposed-millions-users
#leak #spain #sexcam #network #exposed
๐ก@cRyPtHoN_INFOSEC_DE
๐ก@cRyPtHoN_INFOSEC_EN
๐ก@cRyPtHoN_INFOSEC_ES
๐ก@FLOSSb0xIN
A number of popular โcamgirlโ sites have exposed millions of sex workers and users after the company running the sites left the back-end database unprotected.
The sites, run by Barcelona-based VTS Media, include amateur.tv, webcampornoxxx.net, and placercams.com. Most of the sitesโ users are based in Spain and Europe, but we found evidence of users across the world, including the United States.
According to Alexa traffic rankings, amateur.tv is one of the most popular in Spain.
The database, containing months-worth of daily logs of the site activities, was left without a password for weeks. Those logs included detailed records of when users logged in โ including usernames and sometimes their user-agents and IP addresses, which can be used to identify users. The logs also included usersโ private chat messages with other users, as well as promotional emails they were receiving from the various sites. The logs even included failed login attempts, storing usernames and passwords in plaintext. We did not test the credentials as doing so would be unlawful.
The exposed data also revealed which videos users were watching and renting, exposing kinks and private sexual preferences.
In all, the logs were detailed enough to see which users were logging in, from where, and often their email addresses or other identifiable information โ which in some cases we could match to real-world identities.
Not only were users affected, the โcamgirlsโ โ who broadcast sexual content to viewers โ also had some of their account information exposed.
The database was shut off last week, allowing us to publish our findings.
๐๐ผ Read more:
https://techcrunch.com/2019/11/03/camgirl-network-exposed-millions-users
#leak #spain #sexcam #network #exposed
๐ก@cRyPtHoN_INFOSEC_DE
๐ก@cRyPtHoN_INFOSEC_EN
๐ก@cRyPtHoN_INFOSEC_ES
๐ก@FLOSSb0xIN
Nebulo โ DNS over HTTPS/TLS: Our Interview with the Developer
Nebulo โ DNS over HTTPS/TLS is a small but neat Android app to make the internet a little bit safer for us. But for users who just want less advertising on their devices, Nebulo is an interesting option. Many interesting questions have come together thanks to the help of our readers.
Nebulo โ DNS over HTTPS/TLS ๐
As mentioned before, Nebulo comes with a few features that can be quite practical for us in everyday life.
๐ก one-time configuration at the beginning, after that you donโt have to worry about anything anymore
๐ก the provider promises: no advertising and no tracking!
๐ก own servers can be specified
๐ก comparatively low battery consumption, which is important for smartphone users
๐ก also works without root.
If you like, you have the possibility to participate actively in the Nebulo Telegram support group. In the support group, you can always find the latest app version to download, or of course you can report bugs and make suggestions. Nebulo can also be found in the Google Play Store, on F-Droid or in the Aurora Droid as well as on GitLab.
Daniel Wolf and the Nebulo DNS App: our interview with the developer
Tarnkappe.info: Daniel, why do you concentrate on Android? Because itโs the better mobile OS? Or because it was easier to develop the DNS changer app for it, or get it approved by the app store operator?
Daniel Wolf: Thatโs a quick question to answer. Before I made Android apps, I programmed with Java. I also had an Android mobile phone, so the choice was obvious.
DNS Changer itself was created because I needed it myself.
๐๐ผ Read more:
https://tarnkappe.info/nebulo-dns-over-https-tls-our-interview-with-the-developer/
#Nebulo #App #DNS #changer #interview
๐ก@cRyPtHoN_INFOSEC_DE
๐ก@cRyPtHoN_INFOSEC_EN
๐ก@cRyPtHoN_INFOSEC_ES
๐ก@FLOSSb0xIN
Nebulo โ DNS over HTTPS/TLS is a small but neat Android app to make the internet a little bit safer for us. But for users who just want less advertising on their devices, Nebulo is an interesting option. Many interesting questions have come together thanks to the help of our readers.
Nebulo โ DNS over HTTPS/TLS ๐
As mentioned before, Nebulo comes with a few features that can be quite practical for us in everyday life.
๐ก one-time configuration at the beginning, after that you donโt have to worry about anything anymore
๐ก the provider promises: no advertising and no tracking!
๐ก own servers can be specified
๐ก comparatively low battery consumption, which is important for smartphone users
๐ก also works without root.
If you like, you have the possibility to participate actively in the Nebulo Telegram support group. In the support group, you can always find the latest app version to download, or of course you can report bugs and make suggestions. Nebulo can also be found in the Google Play Store, on F-Droid or in the Aurora Droid as well as on GitLab.
Daniel Wolf and the Nebulo DNS App: our interview with the developer
Tarnkappe.info: Daniel, why do you concentrate on Android? Because itโs the better mobile OS? Or because it was easier to develop the DNS changer app for it, or get it approved by the app store operator?
Daniel Wolf: Thatโs a quick question to answer. Before I made Android apps, I programmed with Java. I also had an Android mobile phone, so the choice was obvious.
DNS Changer itself was created because I needed it myself.
๐๐ผ Read more:
https://tarnkappe.info/nebulo-dns-over-https-tls-our-interview-with-the-developer/
#Nebulo #App #DNS #changer #interview
๐ก@cRyPtHoN_INFOSEC_DE
๐ก@cRyPtHoN_INFOSEC_EN
๐ก@cRyPtHoN_INFOSEC_ES
๐ก@FLOSSb0xIN
Social media as a gateway for manipulation
Freedom on the Internet has fallen for the ninth consecutive year, a new Freedom House report notes. Unregulated social media are particularly well suited to distorting debates and manipulating elections.
https://www.freedomonthenet.org/report/freedom-on-the-net/2019/the-crisis-of-social-media
#socialmedia #manipulation #report #FreedomHouse #why
๐ก@cRyPtHoN_INFOSEC_DE
๐ก@cRyPtHoN_INFOSEC_EN
๐ก@cRyPtHoN_INFOSEC_ES
๐ก@FLOSSb0xIN
Freedom on the Internet has fallen for the ninth consecutive year, a new Freedom House report notes. Unregulated social media are particularly well suited to distorting debates and manipulating elections.
https://www.freedomonthenet.org/report/freedom-on-the-net/2019/the-crisis-of-social-media
#socialmedia #manipulation #report #FreedomHouse #why
๐ก@cRyPtHoN_INFOSEC_DE
๐ก@cRyPtHoN_INFOSEC_EN
๐ก@cRyPtHoN_INFOSEC_ES
๐ก@FLOSSb0xIN
facebook-sealed-exhibits.pdf
627.5 MB
Facebook fought to keep a trove of thousands of explosive internal documents and emails secret. They were just published online in full.
Thousands of pages of internal Facebook documents were published on Wednesday, shedding new light on how the company profited from user data and grappled with rivals.
๐๐ผ Read more:
https://www.businessinsider.nl/facebook-internal-documents-executive-emails-published-six4three-court-leak-2019-11
#DeleteFacebook #documents #secret #pdf
๐ก@cRyPtHoN_INFOSEC_DE
๐ก@cRyPtHoN_INFOSEC_EN
๐ก@cRyPtHoN_INFOSEC_ES
๐ก@FLOSSb0xIN
Thousands of pages of internal Facebook documents were published on Wednesday, shedding new light on how the company profited from user data and grappled with rivals.
๐๐ผ Read more:
https://www.businessinsider.nl/facebook-internal-documents-executive-emails-published-six4three-court-leak-2019-11
#DeleteFacebook #documents #secret #pdf
๐ก@cRyPtHoN_INFOSEC_DE
๐ก@cRyPtHoN_INFOSEC_EN
๐ก@cRyPtHoN_INFOSEC_ES
๐ก@FLOSSb0xIN
Your DNA Profile is Private? A Florida Judge Just Said Otherwise
Privacy experts say a warrant granted in Florida could set a precedent, opening up all consumer DNA sites to law enforcement agencies across the country.
For police officers around the country, the genetic profiles that 20 million people have uploaded to consumer DNA sites represent a tantalizing resource that could be used to solve cases both new and cold. But for years, the vast majority of the data have been off limits to investigators. The two largest sites, Ancestry.com and 23andMe, have long pledged to keep their usersโ genetic information private, and a smaller one, GEDmatch, severely restricted police access to its records this year.
Last week, however, a Florida detective announced at a police convention that he had obtained a warrant to penetrate GEDmatch and search its full database of nearly one million users. Legal experts said that this appeared to be the first time a judge had approved such a warrant, and that the development could have profound implications for genetic privacy.
โThatโs a huge game-changer,โ said Erin Murphy, a law professor at New York University. โThe company made a decision to keep law enforcement out, and thatโs been overridden by a court. Itโs a signal that no genetic information can be safe.โ
DNA policy experts said the development was likely to encourage other agencies to request similar search warrants from 23andMe, which has 10 million users, and Ancestry.com, which has 15 million. If that comes to pass, the Florida judgeโs decision will affect not only the users of these sites but huge swaths of the population, including those who have never taken a DNA test. Thatโs because this emerging forensic technique makes it possible to identify a DNA profile even through distant family relationships.
๐๐ผ Read more:
https://www.nytimes.com/2019/11/05/business/dna-database-search-warrant.html
#DNA #profile #law #enforcement #database #forensic #search #warrant
๐ก@cRyPtHoN_INFOSEC_DE
๐ก@cRyPtHoN_INFOSEC_EN
๐ก@cRyPtHoN_INFOSEC_ES
๐ก@FLOSSb0xIN
Privacy experts say a warrant granted in Florida could set a precedent, opening up all consumer DNA sites to law enforcement agencies across the country.
For police officers around the country, the genetic profiles that 20 million people have uploaded to consumer DNA sites represent a tantalizing resource that could be used to solve cases both new and cold. But for years, the vast majority of the data have been off limits to investigators. The two largest sites, Ancestry.com and 23andMe, have long pledged to keep their usersโ genetic information private, and a smaller one, GEDmatch, severely restricted police access to its records this year.
Last week, however, a Florida detective announced at a police convention that he had obtained a warrant to penetrate GEDmatch and search its full database of nearly one million users. Legal experts said that this appeared to be the first time a judge had approved such a warrant, and that the development could have profound implications for genetic privacy.
โThatโs a huge game-changer,โ said Erin Murphy, a law professor at New York University. โThe company made a decision to keep law enforcement out, and thatโs been overridden by a court. Itโs a signal that no genetic information can be safe.โ
DNA policy experts said the development was likely to encourage other agencies to request similar search warrants from 23andMe, which has 10 million users, and Ancestry.com, which has 15 million. If that comes to pass, the Florida judgeโs decision will affect not only the users of these sites but huge swaths of the population, including those who have never taken a DNA test. Thatโs because this emerging forensic technique makes it possible to identify a DNA profile even through distant family relationships.
๐๐ผ Read more:
https://www.nytimes.com/2019/11/05/business/dna-database-search-warrant.html
#DNA #profile #law #enforcement #database #forensic #search #warrant
๐ก@cRyPtHoN_INFOSEC_DE
๐ก@cRyPtHoN_INFOSEC_EN
๐ก@cRyPtHoN_INFOSEC_ES
๐ก@FLOSSb0xIN
An Infamous Neo-Nazi Forum Just Got Doxxed
A cache of data exposes the logins, emails, and IP addresses of users on IronMarch, a defunct neo-Nazi forum considered the birthplace of several militant organizations.
Itโs no secret that neo-Nazis freely post anonymously all over the internet, every single day. But a recent leak shows that white nationalists online canโt always protect their identities.
The metadata of a now-defunct neo-Nazi message board that is considered the birthplace of several militant organizationsโamong them the U.S.-based terror group Atomwaffen Divisionโwas dumped onto the internet by what appears to be anti-fascist activists.
The site, IronMarch, is widely associated with the rise of the new wave of white supremacist accelerationst groups advocating for armed insurgency against society. The site ran from 2011 to 2017 and garnered more than 150,000 posts while active. The dump of its inner workings includes the login names of its former members and their associated emails and IP addresses.
Although Motherboard could not verify all the contents of the dump, early record searches match names and details of white nationalist militants tracked by Motherboard over the course of a two-year investigation into neo-Nazi terrorism. The dump also matched internal IronMarch data that Motherboard already accessed.
The identity of whoever originally obtained the data isnโt known, but the dump was uploaded to the Internet Archive by a user named โantifa-dataโ on November 6.
๐๐ผ Read more:
https://www.vice.com/en_us/article/a359q8/an-infamous-neo-nazi-forum-just-got-doxxed
๐ก https://www.bellingcat.com/resources/how-tos/2019/11/06/massive-white-supremacist-message-board-leak-how-to-access-and-interpret-the-data/
๐พ Leaked Data (Torrent):
https://www.bthub.me/hash/1d0554862068bfaba9bd2fc6f75cb69fa420c834
#doxxed #nazi #forum #IronMarch #AtomwaffenDivision #leak #breach
๐ก@cRyPtHoN_INFOSEC_DE
๐ก@cRyPtHoN_INFOSEC_EN
๐ก@cRyPtHoN_INFOSEC_ES
A cache of data exposes the logins, emails, and IP addresses of users on IronMarch, a defunct neo-Nazi forum considered the birthplace of several militant organizations.
Itโs no secret that neo-Nazis freely post anonymously all over the internet, every single day. But a recent leak shows that white nationalists online canโt always protect their identities.
The metadata of a now-defunct neo-Nazi message board that is considered the birthplace of several militant organizationsโamong them the U.S.-based terror group Atomwaffen Divisionโwas dumped onto the internet by what appears to be anti-fascist activists.
The site, IronMarch, is widely associated with the rise of the new wave of white supremacist accelerationst groups advocating for armed insurgency against society. The site ran from 2011 to 2017 and garnered more than 150,000 posts while active. The dump of its inner workings includes the login names of its former members and their associated emails and IP addresses.
Although Motherboard could not verify all the contents of the dump, early record searches match names and details of white nationalist militants tracked by Motherboard over the course of a two-year investigation into neo-Nazi terrorism. The dump also matched internal IronMarch data that Motherboard already accessed.
The identity of whoever originally obtained the data isnโt known, but the dump was uploaded to the Internet Archive by a user named โantifa-dataโ on November 6.
๐๐ผ Read more:
https://www.vice.com/en_us/article/a359q8/an-infamous-neo-nazi-forum-just-got-doxxed
๐ก https://www.bellingcat.com/resources/how-tos/2019/11/06/massive-white-supremacist-message-board-leak-how-to-access-and-interpret-the-data/
๐พ Leaked Data (Torrent):
https://www.bthub.me/hash/1d0554862068bfaba9bd2fc6f75cb69fa420c834
#doxxed #nazi #forum #IronMarch #AtomwaffenDivision #leak #breach
๐ก@cRyPtHoN_INFOSEC_DE
๐ก@cRyPtHoN_INFOSEC_EN
๐ก@cRyPtHoN_INFOSEC_ES
Gaggle Knows Everything About Teens And Kids In School
Gaggle monitors the work and communications of almost 5 million students in the US, and schools are paying big money for its services. Hundreds of company documents unveil a sprawling surveillance industrial complex that targets kids who canโt opt out.
For the 1,300 students of Santa Fe High School, participating in school life means producing a digital trail โ homework assignments, essays, emails, pictures, creative writing, songs they've written, and chats with friends and classmates.
All of it is monitored by student surveillance service Gaggle, which promises to keep Santa Fe High School kids free from harm.
Santa Fe High, located in Santa Fe, Texas, is one of more than 1,400 schools that have taken Gaggle up on its promise to โstop tragedies with real-time content analysis." It's understandable why Santa Fe's leaders might want such a service. In 2018, a shooter killed eight students and two teachers at the school. Its student body is now part of the 4.8 million US students that the for-profit "safety management" service monitors.
A college student whose middle school used Gaggle told BuzzFeed News that the tool taught them that they would always be watched. โI feel like now Iโm very desensitized to the threat of my information being looked at by people,โ they said.
Using a combination of in-house artificial intelligence and human content moderators paid about $10 an hour, Gaggle polices schools for suspicious or harmful content and images, which it says can help prevent gun violence and student suicides. It plugs into two of the biggest software suites around, Googleโs G Suite and Microsoft 365, and tracks everything, including notifications that may float in from Twitter, Facebook, and Instagram accounts linked to a school email address.
Gaggle touts itself as a tantalizingly simple solution to a diverse set of horrors. It claims to have saved hundreds of lives from suicide during the 2018โ19 school year. The company, which is based in Bloomington, Illinois, also markets itself as a tool that can detect threats of violence.
๐๐ผ Read more:
https://www.buzzfeednews.com/article/carolinehaskins1/gaggle-school-surveillance-technology-education
#surveillance #school #kids #gaggle #USA #why
๐ก@cRyPtHoN_INFOSEC_DE
๐ก@cRyPtHoN_INFOSEC_EN
๐ก@cRyPtHoN_INFOSEC_ES
๐ก@FLOSSb0xIN
Gaggle monitors the work and communications of almost 5 million students in the US, and schools are paying big money for its services. Hundreds of company documents unveil a sprawling surveillance industrial complex that targets kids who canโt opt out.
For the 1,300 students of Santa Fe High School, participating in school life means producing a digital trail โ homework assignments, essays, emails, pictures, creative writing, songs they've written, and chats with friends and classmates.
All of it is monitored by student surveillance service Gaggle, which promises to keep Santa Fe High School kids free from harm.
Santa Fe High, located in Santa Fe, Texas, is one of more than 1,400 schools that have taken Gaggle up on its promise to โstop tragedies with real-time content analysis." It's understandable why Santa Fe's leaders might want such a service. In 2018, a shooter killed eight students and two teachers at the school. Its student body is now part of the 4.8 million US students that the for-profit "safety management" service monitors.
A college student whose middle school used Gaggle told BuzzFeed News that the tool taught them that they would always be watched. โI feel like now Iโm very desensitized to the threat of my information being looked at by people,โ they said.
Using a combination of in-house artificial intelligence and human content moderators paid about $10 an hour, Gaggle polices schools for suspicious or harmful content and images, which it says can help prevent gun violence and student suicides. It plugs into two of the biggest software suites around, Googleโs G Suite and Microsoft 365, and tracks everything, including notifications that may float in from Twitter, Facebook, and Instagram accounts linked to a school email address.
Gaggle touts itself as a tantalizingly simple solution to a diverse set of horrors. It claims to have saved hundreds of lives from suicide during the 2018โ19 school year. The company, which is based in Bloomington, Illinois, also markets itself as a tool that can detect threats of violence.
๐๐ผ Read more:
https://www.buzzfeednews.com/article/carolinehaskins1/gaggle-school-surveillance-technology-education
#surveillance #school #kids #gaggle #USA #why
๐ก@cRyPtHoN_INFOSEC_DE
๐ก@cRyPtHoN_INFOSEC_EN
๐ก@cRyPtHoN_INFOSEC_ES
๐ก@FLOSSb0xIN
The Politics of Datafication : The influence of lobbyists on the EUโs data protection reform and its consequences for the legitimacy of the General Data Protection Regulation
This study explores how one of the most talked about regulations in the internet policy domain was drafted. The General Data Protection Regulation (GDPR) has been widely regarded as one of the most lobbied pieces of legislation in the history of the European Union (EU). This raises two questions: What policy alternatives were put forth by the EU institutions in the course of the GDPRโs legislative process, and how did they correspond to the ideas, issues and frames promoted by interest representatives?
What does the influence of organized interests and stakeholders in GDPR decision-making reveal about the democratic legitimacy of the process? Drawing on new institutionalism, this research traces the evolution of the GDPR, comparing the different EU institutionsโ iterations of the new law with the positions of interest representatives, and simultaneously situating the GDPR in the history of data protection policy.
The results reveal that business groups dominated the public consultations prior to the Commissionโs draft proposal, but the Commissionโs approach was more closely aligned with the positions of civil society. Members of the European Parliament were, on the contrary, highly susceptible to the influence of business interests, until public salience of information privacy increased owing to Edward Snowdenโs revelations of governmental mass surveillance by the National Security Agency. These revelations made it possible for policy entrepreneurs to push for stronger rules on data protection.
๐๐ผ Read more:
https://helda.helsinki.fi/handle/10138/305981
#lobby #influencer #EU #DataProtection #datafication #GDPR #regulation #surveillance #Snowden #NSA
๐ก@cRyPtHoN_INFOSEC_DE
๐ก@cRyPtHoN_INFOSEC_EN
๐ก@cRyPtHoN_INFOSEC_ES
๐ก@FLOSSb0xIN
This study explores how one of the most talked about regulations in the internet policy domain was drafted. The General Data Protection Regulation (GDPR) has been widely regarded as one of the most lobbied pieces of legislation in the history of the European Union (EU). This raises two questions: What policy alternatives were put forth by the EU institutions in the course of the GDPRโs legislative process, and how did they correspond to the ideas, issues and frames promoted by interest representatives?
What does the influence of organized interests and stakeholders in GDPR decision-making reveal about the democratic legitimacy of the process? Drawing on new institutionalism, this research traces the evolution of the GDPR, comparing the different EU institutionsโ iterations of the new law with the positions of interest representatives, and simultaneously situating the GDPR in the history of data protection policy.
The results reveal that business groups dominated the public consultations prior to the Commissionโs draft proposal, but the Commissionโs approach was more closely aligned with the positions of civil society. Members of the European Parliament were, on the contrary, highly susceptible to the influence of business interests, until public salience of information privacy increased owing to Edward Snowdenโs revelations of governmental mass surveillance by the National Security Agency. These revelations made it possible for policy entrepreneurs to push for stronger rules on data protection.
๐๐ผ Read more:
https://helda.helsinki.fi/handle/10138/305981
#lobby #influencer #EU #DataProtection #datafication #GDPR #regulation #surveillance #Snowden #NSA
๐ก@cRyPtHoN_INFOSEC_DE
๐ก@cRyPtHoN_INFOSEC_EN
๐ก@cRyPtHoN_INFOSEC_ES
๐ก@FLOSSb0xIN
Media is too big
VIEW IN TELEGRAM
Nestle and Unilever โlinked to Indonesian forest fires engulfing southeast Asia in noxious hazeโ
Analysis of supply chain disclosures shows global consumer giants purchasing from producers under investigation for roles in blaze
Household brands such as #Nestle, #Unilever and P&G are buying palm oil from suppliers deemed partly responsible for forest fires currently ravaging #Indonesia and blanketing swathes of southeast #Asia in noxious #haze, according to new research from #Greenpeace.
๐๐ผ Read more:
https://www.independent.co.uk/environment/indonesia-forest-fires-palm-oil-nestle-unilever-pg-desforestation-slash-burn-a9195716.html
#Nestle #DeleteNestle #Unilever #Indonesia #forest #fires #palmoil #video #why #thinkabout
๐ก@cRyPtHoN_INFOSEC_DE
๐ก@cRyPtHoN_INFOSEC_EN
๐ก@cRyPtHoN_INFOSEC_ES
๐ก@FLOSSb0xIN
Analysis of supply chain disclosures shows global consumer giants purchasing from producers under investigation for roles in blaze
Household brands such as #Nestle, #Unilever and P&G are buying palm oil from suppliers deemed partly responsible for forest fires currently ravaging #Indonesia and blanketing swathes of southeast #Asia in noxious #haze, according to new research from #Greenpeace.
๐๐ผ Read more:
https://www.independent.co.uk/environment/indonesia-forest-fires-palm-oil-nestle-unilever-pg-desforestation-slash-burn-a9195716.html
#Nestle #DeleteNestle #Unilever #Indonesia #forest #fires #palmoil #video #why #thinkabout
๐ก@cRyPtHoN_INFOSEC_DE
๐ก@cRyPtHoN_INFOSEC_EN
๐ก@cRyPtHoN_INFOSEC_ES
๐ก@FLOSSb0xIN