
2025-09-17 06:30:54
The UK has ramped up the use of facial recognition, AI, and internet regulation to address crime and other issues, stoking concerns of surveillance overreach (New York Times)
https://www.nytimes.com/2025/09/17/t…
The UK has ramped up the use of facial recognition, AI, and internet regulation to address crime and other issues, stoking concerns of surveillance overreach (New York Times)
https://www.nytimes.com/2025/09/17/t…
Swiss government looks to undercut privacy tech, stoking fears of mass surveillance
The Swiss government could soon require service providers with more than 5,000 users to collect government-issued identification, retain subscriber data for six months and, in many cases, disable encryption.
🇨🇭 https://
Across China, tens of thousands of people tagged as troublemakers are trapped in a digital cage,
barred from leaving their province and sometimes even their homes
by the world’s largest digital surveillance apparatus.
Most of this technology came from companies in a country that has long claimed to support freedoms worldwide -- the United States.
⚠️ Over the past quarter century, American tech companies to a large degree designed and built China’s surveillance state,…
https://apnews.com/article/chinese-surveillance-silicon-valley-uyghurs-tech-xinjiang-8e000601dadb6aea230f18170ed54e88
“Over the past quarter century, American tech companies to a large degree designed and built …
Switzerland proposes regulations forcing service providers to collect user IDs and disable encryption, threatening its status as a haven for privacy tech firms (Suzanne Smalley/The Record)
https://therecord.media/switzerland-digital-privacy-law-proton-priv…
I would have thought that someone like Epstein didn't set up a Yahoo Mail account to coordinate illegal activities, but would have paid someone to set up his own email server.
That's a stark reminder to all the people saying "just setup your own Mastodon server" or similar things about personal digital autonomy.
Swiss government looks to undercut privacy tech, stoking fears of mass surveillance https://therecord.media/switzerland-digital-privacy-law-proton-privacy-surveillance
Digital ID – The New Chains of Capitalist Surveillance
[…] From passports to colonial passbooks, from welfare cards to border regimes, the apparatus of identification has always been tied to domination. Digital ID is simply the latest iteration of this long history, but with a scale and sophistication that makes its dangers even more profound. […]
👷
Next week, on the 14th of October, the EU will attempt to push through a new law called "Chat Control." They claim this law is necessary to protect children from harmful individuals—and let’s be clear, protecting children is crucial. But here’s what’s really happening: the EU wants to scan every phone, tablet, and computer. This includes your photos, files, and every message you’ve sent or will send. 448 million people will be under 24/7 surveillance.
You might say, "I ha…
Fascism is once again rising across the world, creeping in through surveillance capitalism, mass data harvesting, chat control laws, UK-style age verification, and endless new tools of digital censorship presented as safety.
Freedoms vanish piece by piece through biometric borders, predictive policing, restrictions on protest, voter suppression, book bans, and the relentless spread of authoritarian policies disguised as order. What seemed impossible a decade ago is now routine.
T…
If you are a citizen of the EU and are concerned about government surveillance of our private chats, photographs and documents, it is important to take action before October. This tool: https://fightchatcontrol.eu/ will easily enable you to draft an email to send to your MEPs.
Specifically,
Investigation: IBM, Dell, Cisco, Oracle, Microsoft, Intel, Nvidia, and other US tech companies helped design and build China's vast digital surveillance state (Associated Press)
https://apnews.com/article/chinese-surve…
Validating Terrain Models in Digital Twins for Trustworthy sUAS Operations
Arturo Miguel Russell Bernal, Maureen Petterson, Pedro Antonio Alarcon Granadeno, Michael Murphy, James Mason, Jane Cleland-Huang
https://arxiv.org/abs/2508.16104
Protecting Persona Biometric Data: The Case of Facial Privacy
Lambert Hogenhout, Rinzin Wangmo
https://arxiv.org/abs/2510.03035 https://arxiv.org/pdf/2510.…
VisAug: Facilitating Speech-Rich Web Video Navigation and Engagement with Auto-Generated Visual Augmentations
Baoquan Zhao, Xiaofan Ma, Qianshi Pang, Ruomei Wang, Fan Zhou, Shujin Lin
https://arxiv.org/abs/2508.03410
Strategic Analysis of Dissent and Self-Censorship
Joshua J. Daymude, Robert Axelrod, Stephanie Forrest
https://arxiv.org/abs/2509.03731 https://arxiv.org/p…
Cyber security of Mega Events: A Case Study of Securing the Digital Infrastructure for MahaKumbh 2025 -- A 45 days Mega Event of 600 Million Footfalls
Rohit Negi, Amit Negi, Manish Sharma, S. Venkatesan, Prem Kumar, Sandeep K. Shukla
https://arxiv.org/abs/2507.15660