Robots spotted “intimate content” and banned Mary McIntyre from Twitter and robots handled the appeal processes upholding the ban. Now Mary has a choice – admit she broke the rules and shared “intimate content”, when she obviously has not, to get access to her account or, well there is no …
26 words written in 1995 that shape the Internet
No provider or user of an interactive computer service shall be treated as thepublisher or speaker of any information provided by another information content provider. Jeff Kosseff. Cybersecurity Law Professor at the United StatesNaval Academy This means, that unlike a newspaper or magazine who would be legally responsible for what …
Continue reading “26 words written in 1995 that shape the Internet”
User’s not understanding what secure configurations are, is the first step towards a cyber security incident. UPDATED
This original post was made on 23 August 2022 Update 21 October 2022 There has been another “mis-configuration story this week – Microsoft exposed thousands of client records when they mis-configured a server. Following a report in the summer of patient information leaking from a health care company because of …
UKGDPR is a good thing… mostly
I have listened to many businesses complain about the UKGDPR legislation – particularly web designers and marketing companies – many citing that users do not like it (of course it has nothing to do with how they now have to look after personally identifiable information properly and justify their use …
End to End Encryption – one of my favourite things
Facebook is testing E2EE for Messenger: Facebook testing end-to-end encryption as a default on Messenger – The Record by Recorded Future What is E2EE? End-to-end encryption – Wikipedia