22 Matching Annotations
  1. Last 7 days
  2. Jul 2020
  3. Jun 2020
    1. It is as though the Big Bad Wolf, after years of unsuccessfully trying to blow the brick house down, has instead introduced a legal framework that allows him to hold the three little pigs criminally responsible for being delicious and destroy the house anyway. When he is asked about this behavior, the Big Bad Wolf can credibly claim that nothing in the bill mentions “huffing” or “puffing” or “the application of forceful breath to a brick-based domicile” at all, but the end goal is still pretty clear to any outside observer.
    2. For a political body that devotes a lot of attention to national security, the implicit threat of revoking Section 230 protection from organizations that implement end-to-end encryption is both troubling and confusing. Signal is recommended by the United States military. It is routinely used by senators and their staff. American allies in the EU Commission are Signal users too. End-to-end encryption is fundamental to the safety, security, and privacy of conversations worldwide.
    3. At a time when more people than ever are benefiting from these protections, the EARN IT bill proposed by the Senate Judiciary Committee threatens to put them at risk.
    1. Despite its opposition, EARN-IT is the clearest threat yet to end-to-end encryption, given this clever twist in pushing the onus onto the platforms to avoid transmitting illegal content, rather than mandating a lawful interception approach.
    2. Putting that risk more simply, the EARN-IT bill is cleverly leaving it to the tech platforms to keep themselves safe—there would be little option other than some form of access to encrypted content, even though it would not be specified in law. Sophos describes this as “the backdoor virus that law enforcement agencies have been trying to inflict on encryption for years.”
    3. On the encryption front, HRW echoes others that have argued vehemently against the proposals—that weakened encryption will “endanger all people who rely on encryption for safety and security—once one government enjoys special access, so too will rights-abusing governments and criminal hackers.” Universal access to encryption “enables everyone, from children attending school online to journalists and whistleblowers, to exercise their rights without fear of retribution.”
    4. the encryption debate continues to rage in the U.S., with proposed new legislation representing the clearest threat yet to the security underpinning WhatsApp and iMessage, as well as Signal, Telegram and Wickr
  4. May 2020
  5. Jan 2019
    1. Who would have thought crypto investors would be U.S. securities law experts by the end of 2018

      <big>评:</big><br/><br/>《金瓶梅》第四十八回有曰:「常言:『兵来将挡,水来土掩』。事到其间,道在人为,少不的你我打点礼物,早差人上东京,央及老爷那里去」。人生如戏,每个人顾及的都是如何演好自己的戏份。好在如今已不是投机倒把等同犯罪的年代,嗅觉灵敏的市场玩家们逢场作戏也无可厚非,但是谁来「打点礼物」制造惊喜呢?2018年,玩家们反倒收获了不少惊恐。<br/><br/>专业的投资者和政客总是能在自己的地盘上长袖善舞,但是在这个野蛮生长的年代,恐怕他们也得多向口译员们学习快速熟悉陌生领域的技能——共情、抗压、不服输,或许称之为「人格特质」更加合适。

  6. Apr 2018
    1. To prohibit the Federal Communications Commission from reclassifying broadband Internet access service as a telecommunications service and from posing certain regulations on providers of such service.

    Tags

    Annotators

  7. Mar 2018
    1. Mention has been made of the new environmental body. Strictly speaking, under this clause as it currently stands, the Government would be able to establish, under secondary legislation, the kind of body that the noble Lord, Lord Krebs, who is no longer in his place, was arguing for earlier—a body so powerful it could sanction other public bodies, including the Government, if it was able to reproduce the powers that presently rest with the European Commission. That is an enormous power, which this House would not allow the Executive arm of government on its own without primary legislation conducted through the two Houses.

      interesting point

  8. May 2017
    1. loopholes proliferated, and the tax code grew more complex

      correlated? causative?

      complexity in law, leads to more logic to parse and process - therefore more potential ambiguity in human-processing.

      does software engineering practices about code complexity (or lack thereof) have fruitful applications here?

  9. Jan 2016
    1. State legislators in New York and California have introduced bills that would require smartphone vendors to be able to decrypt users' phones.

    1. from Hawaii to Alabama to New Hampshire, a diverse, bipartisan coalition of state legislators will simultaneously announce state legislative proposals that, although varied, are all aimed at empowering their constituents to #TakeCTRL of their personal privacy. These bills would go far in ensuring students, employees, and everyone else has more of a say over who can know their whereabouts, track their activities online, and view information they share with friends.
  10. Jan 2014
    1. The academic publisher Elsevier has contributed to many U.S. Congressional representatives, pushing the Elsevier-supported Research Works Act, which among other things would have forbidden any effort by any federal agency to ensure taxpayer access to work financed by the federal government without permission of the publisher.

      What other legislation has Elsevier pushed?