- Nov 2020
- artificial intelligence
- digital security
- malicious uses
- physical security
- political securty
URLvia3.hypothes.is/proxy/static/https://inst-fs-iad-prod.inscloudgate.net/files/53cfa3cf-67fb-4102-a552-1fe38c6021ff/Future of Humanity Insitute Malicious Use of Artificial Intelligence.pdf
- May 2020
They don't have to host the extension on their website, but it's absolutely and utterly unacceptable for them to interfere with me choosing to come to github and install it.
- empowering individual users
- allowing security constraints to be bypassed by users
- digital rights
- the owner of a device/computer should have freedom to use it however they wish
- software freedom
- Jan 2017
Almost half of eight- to 11-year-olds have agreed impenetrable terms and conditions to give social media giants such as Facebook and Instagram control over their data, without any accountability, according to the commissioner’s Growing Up Digital taskforce. The year-long study found children regularly signed up to terms including waiving privacy rights and allowing the content they posted to be sold around the world, without reading or understanding their implications.
- Sep 2016
A recent Hewlett-Packard printer software update changed the printers so they would not work with third-party ink cartridges. Worse, the change was made as part of a security update.
https://act.eff.org/action/tell-hp-say-no-to-drm Petition HP to fix this wrongdoing, and promise not to repeat it. They are also being asked to promise not to invoke the DMCA against security researchers who find vulnerabilities in their products.