Just a sample of the Echomail archive
Cooperative anarchy at its finest, still active today. Darkrealms is the Zone 1 Hub.
|    CONSPRCY    |    How big is your tinfoil hat?    |    2,445 messages    |
[   << oldest   |   < older   |   list   |   newer >   |   newest >>   ]
|    Message 2,159 of 2,445    |
|    Mike Powell to All    |
|    2025 Digital rights revie    |
|    05 Jan 26 10:01:11    |
      TZUTC: -0500       MSGID: 1916.consprcy@1:2320/105 2dc10fb3       PID: Synchronet 3.21a-Linux master/123f2d28a Jul 12 2025 GCC 12.2.0       TID: SBBSecho 3.28-Linux master/123f2d28a Jul 12 2025 GCC 12.2.0       BBSID: CAPCITY2       CHRS: ASCII 1       FORMAT: flowed       2025 Digital rights review: Spyware, AI war & EU regulations              Date:       Mon, 05 Jan 2026 09:52:57 +0000              Description:       We spoke to the digital rights organization Access Now about the most       significant developments of the past 12 months. Here's what they said.              FULL STORY              This year was defined by surveillance, censorship, and shrinking civic space       according to Access Now s executive director, Alejandro Mayoral Baos .               Despite the sobering headlines, the US-based digital rights organization says       theres still hope. Resistance has continued and, as Baos puts it, communities       refused to disappear.               I spoke to members of Access Now about the most pressing developments from        the past 12 months. Heres what they told me.              Spyware continues to proliferate               Four years on from the Pegasus Project revelations , reports suggest that       spyware remains a significant threat to privacy.               This year, Graphite a tool developed by Paragon Solutions was found to have       been used to track journalists and activists in Europe . While an Italian       parliamentary committee report confirmed the government had used the spyware       against human rights activists, it stopped short of admitting to the       monitoring of journalists.              Apple and WhatsApp were unaware of the floors that Paragons products were       exploiting. In other words, the attackers were targeting zero-day       vulnerabilities .               Traditional cybersecurity best practices offer little help against this type       of threat. While a trusted VPN provider protects your data while it is moving       across the internet, spyware targets a device's operating system.               By attacking the device in this way, spyware operators can often gain total       access to your digital life capturing every keystroke, eavesdropping through       your microphone, and even turning on your camera.               Most dangerously, these are often zero-click attacks, meaning that unlike       traditional attacks, the target doesnt have to click a suspicious link or        open a file.               Mercenary spyware continued to prove that it is evolving faster than       safeguards, says Rand Hammoud, Surveillance Campaigns Lead at Access Now.               While WhatsApp and Apple confirmed they had patched the specific       vulnerabilities exploited, the mercenary spyware industry is incredibly       resilient. It continues to source new entry points via the murky        international market for zero-day vulnerabilities.               This secretive global market involves hackers selling unpatched software        flaws to the highest bidder usually governments or private companies that       then use them to break into devices before the manufacturers even know the       vulnerability exists.               Fortunately, there was some progress for digital rights defenders this year.       Most notably, the Pall Mall Process launched a new Code of Practice for        States in April, as Hammound explained.               The Code is a voluntary, non-binding document which pushes for greater       accountability, oversight, and transparency among participating nations.               There was also progress at the EU level, where the blocs export control rules       integrated human rights language. However, Hammoud warns that the dual-use       control list which governs how EU-based companies sell and transfer       surveillance equipment is undermined by weak catch-all clauses and uneven       national practices that leave room for evasion.               Bottom line: 2025 shifted the question from do we need rules? to who will       actually enforce them? because victims cant be protected by principles        alone, Hammoud said.              AI-enabled digital warfare               While spyware is highly targeted, Access Now has also monitored a much larger       shift: the development of AI-driven systems designed for use during active       conflict.               Marwa Fatafta, MENA Policy and Advocacy Director at Access Now, said theres       been a troubling shift in recent years with the rapid militarization of       civilian technologies and personal data. Its a process that has blurred the       lines between the tools we use for daily life and the systems now being used       on the battlefield.               Gaza stands as a stark example of how warfare evolves when mass surveillance       and AI-driven systems are woven into military operations with no restraints       Fatafta said.               The technology is varied but is often used to generate targets at a speed no       human analyst can match. Thats down to a deadly combination of automated       systems, such as Lavender, alongside AI tracking tools that use        mass-collected data. The technologies being used have raised significant       ethical concerns , particularly due to a lack of accountability, control and       accuracy.              Earlier this year, the head of the United Nations called such "killer robots"       politically unacceptable and "morally repugnant." Despite mounting       international pressure, however, there remain few meaningful regulations on       its use.               We can no longer afford to treat digital warfare as a peripheral issue,       Fatafta concludes.              EU rolls back digital rights protections               An organization once expected to introduce meaningful protections the       European Union now seems to be moving in the opposite direction. According        to Access Now, the bloc is failing to live up to its reputation as a       "privacy-first" regulator.               After several years of being at the forefront of regulating digital rights       protections, the European Union seems to be turning its back on the very gold       standards it worked so hard to establish, according to Daniel Leufer,        Emerging Technologies Policy Lead at Access Now.               A wave of regulatory moves over the past 12 months has placed end-to-end       encryption in the crosshairs, including proposals to expand mandatory data       retention and increase the monitoring of private conversations .               The stakes are high: current proposals seek to establish "lawful access" to       encrypted data. This could effectively end the era of truly "no-log" VPN       services in Europe.               These are part of a broader shift, according to Leufer, in which the European       Commission has been bending over backwards to accommodate the most excessive       demands of industry lobbying and undermining key digital rights safeguards.               And the future doesnt look promising. Leufer warns that the policies proposed       in 2025 may only be the beginning. He suggest that digital rights advocates       must now brace for a significant struggle to preserve hard-won protections       across data protection, privacy, and artificial intelligence.              What's next?               As 2026 approaches, significant hurdles remain in the fight to protect       fundamental human rights online. Organizations like Access Now will continue       to push for better regulatory constraints on everything from mercenary        spyware to AI-enabled weapons, alongside a renewed fight for meaningful data       protection around the globe.               Alongside these high-level regulatory efforts, the tech community will       continue to build its own safeguards. Expect new privacy-by-design products       ranging from decentralized, no-log VPNs to messaging apps that offer       post-quantum encryption.               For Access Now, the mission for the coming year is clear. The goal is, says       Baos, not to return to normal, but to build a stronger, fairer, and more       accountable digital rights ecosystem." It's a vision that privacy advocates       around the world will doubtless share.              ======================================================================       Link to news story:       https://www.techradar.com/vpn/vpn-privacy-security/2025-digital-rights-review-       spyware-ai-war-and-eu-regulations              $$       --- SBBSecho 3.28-Linux        * Origin: Capitol City Online (1:2320/105)       SEEN-BY: 105/81 106/201 128/187 129/14 305 153/7715 154/110 218/700       SEEN-BY: 226/30 227/114 229/110 134 206 275 300 307 317 400 426 428       SEEN-BY: 229/470 664 700 705 266/512 291/111 320/219 322/757 342/200       SEEN-BY: 396/45 460/58 633/280 712/848 902/26 2320/0 105 304 3634/12       SEEN-BY: 5075/35       PATH: 2320/105 229/426           |
[   << oldest   |   < older   |   list   |   newer >   |   newest >>   ]
(c) 1994, bbs@darkrealms.ca