Nobody sees themselves as a "special interest". They believe they are fighting the good fight against "special interests". That's the attitude shown below.
The people fighting for "privacy" are not working in the public interest. They've given you a popup on every website you visit asking if you want to accept cookies, which is meaningless and stupid.
Privacy invasion is in the public interest. For example, Apple and Google maps can tell you the time to your destination and route your around traffic jams because they get all this information about traffic by monitor phone locations.
This is a "free" benefit that everyone gets in exchange for giving up a little privacy.
Similarly, stores provide discounts in exchange for private information because it benefits their ability to plan.
The major difference between U.S. and asian pandemic response hasn't been mask wearing or vaccines, it's been privacy invasion and contact tracing. This doesn't mean we should live in a police state like China, but it does mean we should recognize the costs of privacy.
The point of this thread is that "public interest lawyers and academics fighting for privacy laws" are not working in your own interest. They are Holy Warriors fighting a crusade that is their own special interest.
The more they demand government regulate industries, the more those industries have to hire people to either combat or comply with regulation. The sinister implication isn't that they are preventing government regulation, but that there's already too much government regulation.
• • •
Missing some Tweet in this thread? You can try to
force a refresh
50 years ago, people didn't know what we know now about climate. There were lots of studies with predictions all over the place, including many predicting cooling. (No, there was no consensus on cooling like today's consensus on warming).
What some people do is go backwards in time and cherry pick those things that agree with modern knowledge and claim "they knew all along" while ignoring all the rest of the stuff where people believed other things.
Victim blaming is to become the basis for cyber policy in Washington. It's easier to punish the victims inside our country than going after the bad actors in other countries. voanews.com/silicon-valley…
Most people believe that cyber victims are guilty of some moral weakness: ignorance, sloth, greed, lust, etc. Thus, whenever cyberattacks happen, they blame the victim for being weak.
That's why you see phrases like "basic cyber hygiene". That's not a thing. There's no standard anywhere that defines this. Ask 10 experts what those steps are and you'll get 12 different answers.
So I looked in this.
Committing crimes like arson won't get your license suspended.
It's ethics violations like lying to the court that gets your license revoked.
The court cited numerous clearly false statements by Giuliani claiming election fraud.
Giuliani's defense is that he didn't know all those election fraud statements were lies. The court doesn't believe him. The breadth of his lies was so huge it wasn't difficult for the court to document them. cnn.com/2021/06/24/pol…
Note that these aren't things that people still disagree about, that some believe are true.
These are statements which the court proves are untrue, which even Giuliani admits were not true.
Companies should support BYOB allowing employees to use personal devices, especially phones and laptops, for work. Only REALLY sensitive things need to be segregated, like admins who can destroy the company with ransomware.
In other words, even from a cybersecurity perspective, companies need to be tolerant of the fact that they cannot control employee devices.
I say this first before pointing out that employees need to keep work and private life separate. It's not for the company's sake, it's for your own sake. Your should have a separate email account (like Gmail.com or Outlook.com) for private stuff.
Microsoft announced Windows 11 will requirement one, so what is it, and why do you need it?
A: A type of cryptographic vault. It stores (and validates) cryptographic keys on an impenetrable* chip. Even if somebody steals your device, they can't recover the keys.
It's roughly the same thing as the chip on your credit card, Historically, credit cards simply used a long number that could be read from the front of the card, or read from the magnetic strip on the back....