Dangerous Phone IDs Destroying privacy
Today we talk about the man who was locked out of his some home because Amazon suspended his account. What lessons can be learn from this?
Today we talk about the man who was locked out of his some home because Amazon suspended his account. What lessons can be learn from this?
The whole idea of the internet is encryption via RSA certificates and then the order put forth by Trusted Certificate Authorities. This is called the PKI. Let me go beyond the last video and show you how the idea that this is a trusted infrastructure is ludicrous. We are so zucked with our security and we don’t even know it.
The intent to scan content to counter end-to-end encryption is no longer theoretical with the passing of the UK Online Safety Bill.
How would the OS makers then build in client-side scanning? Let’s tackle a theoretical project to do this on your favorite operating system (Windows, MacOS, iOS, Android).
This would be how I would do it.
Our basic expectation of private conversations using End-to-End Encryption is under attack. The UK just passed the Online Safety Bill and the intent is to zuck us by bypassing encryption via client side scanning.
But we can fight back with Linux. Let me explain how.
Around the world, regular tradeshows sell surveillance equipment to both corporate and government buyers. What are they selling? What tools are being used to spy on people? This is an unrestricted market and this tech can be bought by anyone with the money to spend.
There’s an actual battle between privacy oriented people and the data scientists at big tech. They want to act like Santa Claus by putting each of us in a naughty or nice list. Because the opposition is made of smart scientists, some quick solution is not possible.
End of content
End of content