• 0 Posts
  • 18 Comments
Joined 1Y ago
cake
Cake day: Jul 02, 2023

help-circle
rss

Your examples are clear indication that you know jack shit about actual police work. Admittedly in civilised countries where there are checks and due process. Cops aren’t getting access freely to comms. A magistrate can depending on circumstances. And there’s plenty of red tape everywhere. Even telco operators will refuse to respond to a request if not absolutely justified. And typically that’s not when timmy sold some shit to his neighbour. Organised crime, murders, rapts… instances of those with actual victims are not threats, they are shits that happen and needs to be sorted.


Lemme be the judge of that… grow a bit and put your argument on the table.



Call interception, retro and all methods of investigation relying on télécommunications are, and need to remain, a tool available for police forces when the crimes they are investigating are greatly impacting society. Having a prosecutor request those within acceptable limits is a net positive. Not the same as having dragnets spying on everyone in the hope of hitting keywords mind.

But criminality is using more and more complex tools at their disposition and there’s just no way of policing like in medieval times anymore.


They are active in whistleblowing, not privacy leak management…


Nha they publish metadata describing the leaked data. If you’re a data subject concerned by the incident you then request a copy of yr information which requires proper identification.

Why would they share the data itself….


At this point they are somewhat catching up on what traditional banks are doing it seems…


Typically llm are rather ressource intensive - you need beefy hardware to run those at speed. Especially if you intend to train them with your data to improve their relevance. I don’t think mobile phones or run to the mill laptops are going to be enough for any non-trivial implementations. I might be skewed by experiences on non-personal projects though.


I haven’t mentioned IT security at all have I?

A lot of businesses (including my current employer) seem to enjoy the integrated ecosystem offered by ms from the office suite to sharepoints to mail indeed with a sprinkle of power bi and the form thingy.

You can replicate all that but it is absolutely not trivial. And the end user also typically will find it less easy to interact with all the pieces.


« Perfectly possible » but at what cost and with what compromises though ? Not specifically looking at Microsoft - the same would apply to similar products. Also a lot of the blame is on the commission itself and the lack of controls over its data - which also has nothing to do with where it’s being processed. Even if you do 100% in EU with open source software you can still fail many of the controls if you don’t track your data, have appropriate documentation to demonstrate it, did the required assessments… and those expectations are what bit them in the ass I think. And likely it will bit a lot of other actors that aren’t putting much effort in the same.


There goes my week and prolly the whole year… I look forward the internal assessment at my job but chances are local authorities will follow on this and the implications are crazy. At first read it puts the bars sooooo high on several principles that basically no existing IT intensive business will have a chance to survive similar audit.


It’s absolutely not based on common law indeed but you can be sure that precedents are still a big thing especially for such regulations… we are watching like awks what’s happening everywhere because we know there will be a lot of consistency both on decisions but also on the topics being pursued.


As long as they process data of European citizens it’s applicable. See all gdpr fines imposed…. Now the execution / collection would be a bitch but I could imagine à order to stop processing the data imposed to European instances…

I mean pretty crazy things can happen. See the various adequacy decisions / appeals by Mr Schrems; I cannot give guidance with a life expectancy of more than 1 year given the instability of the application of the regulation.

Not that I’m complaining ; it feeds me :)


Yeaahhhh I don’t know about that… likely all instances are processors. And the on he subscribe to would be controller. Somewhat because to my knowledge no one really decides of particular treatment of the user data (it’s all rather communist architecturally). So maybe every instance would be join controller…

And in the end up to the (join) controller to cascade the request. That’s part of why it’s a thing of beauty to watch it happen on the feddiverse 😅


Sometimes establishing a precedent with a weaker party is a good strategy though. It even went as far as litigating known parties for piracy issues. Anything is fair game to some actors.

Thought for GDPR most actors are legit and the actions have merits. Shoutout to Mr Schrems for example.


Technically he must still comply especially with data subject rights / request for deletion.

Now I wonder how that would work in practice, considering the underlying technology which is akin to what I manage (telco / isp) and where a lot of principles are still vague to implement.

Like when we get request to delete personal data sometimes some has been transmitted by nature of the service and a lot of actors have legitimate interest in processing / keeping the data for a while.

But generally it’s not about the content of a transmission but more the attached metadata used for billing and such.

Anyway it’s very interesting to watch, preferably from a distance.


Tells a lot about the business of personal data in adtech ;-)