Normalizing Surveillance

Apple has repeatedly supported user privacy through past technical implementations and policy initiatives. However, Apple took a large and very public step in the opposite direction on Aug. 5. The company provided a technical solution that it believes would simultaneously continue to protect the privacy of peoples’ communications and devices while allowing the company to track those who share child sexual abuse material (CSAM). But in a conflict of two social goods—providing privacy and security of communications and stored data, and preventing harm to children—Apple has made a gamble that normalizes surveillance.

…Apple’s new definition of end-to-end encryption (E2E) means that Apple tools could have access to any decrypted contents. Read More

#surveillance

Machine learning’s crumbling foundations

Technological debt is insidious, a kind of socio-infrastructural subprime crisis that’s unfolding around us in slow motion. Our digital infrastructure is built atop layers and layers and layers of code that’s insecure due to a combination of bad practices and bad frameworks.

Even people who write secure code import insecure libraries, or plug it into insecure authorization systems or databases. Like asbestos in the walls, this cruft has been fragmenting, drifting into our air a crumb at a time.

We ignored these, treating them as containable, little breaches and now the walls are rupturing and choking clouds of toxic waste are everywhere. Read More

#devops