The IoT Cybersecurity Act - passed both houses, awaiting presidential signature - is pretty good. It deputizes @NIST to come up with standards that any IoT device purchased by the federal government must adhere to.
NIST is charged with coming up with guidelines for "secure code, identity management, patching and configuration management" and the GSA has to coordinate vulnerability reporting and response across federal agencies.
But for me, the most interesting part is the lever that the act pulls on to achieve its policy ends: procurement. Uncle Sam buys a LOT of stuff, and when the USG refuses to buy substandard stuff, it puts bad vendors at a serious commercial disadvantage.
3/
That means that bad vendors who want government contracts have to clean up their acts and make better products: not because the law requires them to, but because the government won't spend public money on lemons.
4/
Imagine what administrative agencies (or Congress) can do with this: "No federal agency shall buy a vehicle unless it complies with a suite of comprehensive right-to-repair rules."
5/
Or: "No DoE-funded school will buy ed-tech unless administrators can side-load apps and limit data-collection."
Or: "No US Agency shall communicate with the public on a social media platform unless that platform adheres to meaningful, opt-in consent for data collection."
6/
This is the approach that many US states took after @AjitPaiFCC used a blatantly fraudulent process to dismantle Net Neutrality rules: passed state laws banning state agencies from buying internet service from non-neutral ISPs.
7/
None of this is about telling companies what to do: it's about getting the best possible deal for the public. It's the government living up to its responsibility to spend public money wisely.
eof/
• • •
Missing some Tweet in this thread? You can try to
force a refresh
In most of the world, the lockdown has destroyed small businesses while increasing the profits of Big Tech intermediaries like Amazon, who control access to customers on one side, and access to merchants on the other.
1/
The government of Argentina is trying to avert this fate. Their postal service is launching a "state-owned Amazon" called Correo Compras, which will offer low-cost ecommerce listings to businesses, and do fulfilment through postal workers.
Correo Compras competes directly with Mercadolibre, a latinamerican ecommerce titan with a well-deserved reputation for squeezing suppliers and workers - its deliveries are made by precarious gig economy drivers.
The Shitty Tech Adoption Curve describes the process by which oppressive technology is normalized and distributed through all levels of society. The more privilege someone has, the harder it is to coerce them to use dehumanizing tech, so it starts with marginalized people.
1/
Asylum seekers, prisoners and overseas sweatshop workers get the first version. Its roughest edges are sanded off against their tenderest places, and once it's been normalized a little, we inflict it on students, mental patients, and blue collar workers.
2/
Lather, rinse, repeat: before long, everyone's been ropted in. If your meals were observed by a remote-monitored CCTV 20 years ago, it was because you were in a supermax prison. Today, it's because you bought a home video surveillance system from Google/Apple/Amazon.
3/
Today in the final instalment of the Attack Surface Lectures (panels exploring themes from the third Little Brother book, hosted by @torbooks and 8 indie bookstores): Tech in SF, with @Annaleen and @kyliu99 recorded on Oct 20 at @interabangbooks.
1/
You can watch it without Youtube's surveillance courtesy of the @internetarchive:
Inside: Sci-Fi Genre; Saudi Aramco is gushing debt; Emailifaction is digital carcinization; Cheap Chinese routers riddled with backdoors; Talking interop on EFF's podcast; and more!
How to Fix the Internet is @EFF's amazing new podcast: nuanced discussions of tech law and ethics with incredible experts, interviewed and contextualized by EFF executive director Cindy Cohn and strategy director @mala.
Our discussion is about the role interoperability plays in helping technology users exercise self-determination, giving them alternatives to bad moderation, abusive lock-in, and poor security choices.
3/