![]() Misogyny, radicalisation and hate speech. Make available to social scientists studying violent online political extremism, What parts of the disclosureĮcosystem work, and which are broken? ( blog)Ĭollected of more than 50m posts to underground extremist forums, and which we Vulnerability, which broke almost all NLP models. Which broke almost all computer languages, and the related Bad Characters Learned from trying to get industry to fix the Trojan Source vulnerability, It will be complexity on steroids ( blog Register Schneier). ![]() This will vastly increase the attack surface at every level in the stack – from the cryptography up through usability to commercial incentives and the opportunities for government interference. One Protocol to Rule Them All? On Securing Interoperable Messaging analyses the EU DMA mandate for messaging systems interoperability. If Parliament really cares about child safety and terrorism, what should it do instead? ( blog evidence video) Their arguments are used to support the government's Online Safety Bill which would give Ofcom a lot of powers it shouldn't have, including the power to mandate snooping software in your phone. ![]() ![]() Chat Control or Child Protection analyses the arguments used by GCHQ that we should circumvent the end-to-end crypto in messenger apps "to protect children" and shows that they are not consistent with the evidence. ![]()
0 Comments
Leave a Reply. |
Details
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |