Malaysia in pocket of big business: Passes Bill to Imprison Illegal Streaming (even devices!) for 20 years

Laws that forbid the illegal uploading and downloading of copyrighted content are common around the world but the rise of streaming has sometimes exposed gaps in legislation.

Piracy-equipped Kodi devices, illegal streaming apps, and similar tools have led legal specialists to attempt to apply laws that didn’t envision the technology. In Malaysia, for example, it took a decision by the High Court last May to determine that the sale and distribution of streaming devices configured for piracy purposes does indeed constitute infringement under the Copyright Act.

But Malaysia was far from done. After previously informing the United States Patent and Trademark Office (USPTO) that the economic harm being caused to broadcasters and rightsholders in the country was a “serious problem”, Malaysia said it had amendments on the table to more directly tackle the illegal uploading, provision, and sharing of access to copyright works.

House of Representatives Passes Copyright Amendment Bill

This week Malaysia’s Dewan Rakyat (House of Representatives) passed the Copyright (Amendment) Bill 2021 which, among other things, will more directly address the challenges of illegal streaming.

“Act 332 is amended to ensure copyright laws implemented will provide more efficient and effective protection in line with current demands and to fulfill the needs of the business community and stakeholders,” said Domestic Trade and Consumer Affairs Minister Datuk Seri Alexander Nanta Linggi.

The amendments are focused on those involved in the provision or facilitation of illegal streams. The term “streaming technology” is repeatedly referenced and for the purposes of the act this includes computer programs (apps and other software tools), devices (streaming hardware of all kinds) that, in whole or in part, are used to infringe copyright in a protected work.

How the amendments will be used in practice remains to be seen but the scope appears to be intentionally broad and could result in significant punishments for those found to be in breach of the law.

Punishments for Illegal Streaming Facilitators

The first section of the amendment deals with those who “commit or facilitate infringement” of copyright by manufacturing a streaming technology for sale or hire, importing a streaming technology, selling or letting for hire (including offering, exposing or advertising for sale or hire), and/or possessing or distributing a streaming technology in the course of a business.

It expands to include distributing or offering to the public an infringing streaming technology or service other than in the course of a business, to such an extent “as to affect prejudicially the owner of the copyright.”

Anyone who contravenes these amendments will be guilty of an offense and upon conviction shall be liable to a fine of not less than 10 thousand ringgit (US$2,377) but not more than two hundred thousand ringgit (US$47,545). In addition to the possibility of fines, there are also custodial sentences that could reach a staggering 20 years imprisonment in the most serious of cases.

Those hoping to use a corporate structure as a shield are also put on notice. When any offenses are committed by a corporate body or by a person who is a partner in a firm, everyone from directors to managers will be deemed guilty of the offense and may be charged severally or jointly, unless they can show they had no knowledge and conducted due diligence to prevent the offense.

The details of the amendments can be found here (pdf)

Source: Malaysia Passes Bill to Imprison Illegal Streaming Pirates For Up To 20 Years * TorrentFreak

Considering the broadness of this law, it looks like selling a mobile phone, PC or laptop – which are all capable of streaming illegal content – could become punishable.

How China Uses Western Influencers As Pawns In Its Propaganda War

According to the New York Times, China is recruiting YouTubers to report on the country in a positive light and counter the West’s increasingly negative perceptions. “The videos have a casual, homespun feel. But on the other side of the camera often stands a large apparatus of government organizers, state-controlled news media and other official amplifiers — all part of the Chinese government’s widening attempts to spread pro-Beijing messages around the planet,” the report says. “State-run news outlets and local governments have organized and funded pro-Beijing influencers’ travel, according to government documents and the creators themselves. They have paid or offered to pay the creators. They have generated lucrative traffic for the influencers by sharing videos with millions of followers on YouTube, Twitter and Facebook.” An anonymous reader shares an excerpt from Techdirt, which summarizes the Times’ findings: Typically, the Chinese government support comes in the form of free organized trips around China, particularly in Xinjiang. By showing the influencers a carefully sanitized image of life in the country, the authorities don’t need to worry about negative stories. They simply make it easy for the YouTubers to present images of jolly peasants and happy city-dwellers, because that’s all they are allowed to see. One of the authors of the New York Times piece, Paul Mozur, noted on Twitter another important way that the authorities are able to help their influencer guests. Once produced, the China-friendly videos are boosted massively by state media and diplomatic Facebook and Twitter accounts: “One video by Israeli influencer Raz Gal-Or portraying Xinjiang as ‘totally normal’ was shared by 35 government connected accounts with a total of 400 million followers. Many were Chinese embassy Facebook accounts, which posted about the video in numerous languages.”

A new report from the Australian Strategic Policy Institute, “Borrowing mouths to speak on Xinjiang,” has some more statistics on this practice: “Our data collection has found that, between January 2020 and August 2021, 156 Chinese state-controlled accounts on US-based social media platforms have published at least 546 Facebook posts, Twitter posts and shared articles from [China Global Television Network], Global Times, Xinhua or China Daily websites that have amplified Xinjiang-related social media content from 13 influencer accounts. More than 50% of that activity occurred on Facebook.” Mozur says that the use of Western influencers in this way also allows employees of Beijing-controlled media, like the journalist Li Jingjing, to present themselves as independent YouTubers. On Twitter, however, she is labeled as “China state-affiliated media.” The Australian Strategic Policy Institute sees this as part of a larger problem (pdf): “labelling schemes adopted by some video-sharing and social media platforms to identify state-affiliated accounts are inconsistently applied to media outlets and journalists working for those outlets. In addition, few platforms appear to have clear policies on content from online influencers or vloggers whose content may be facilitated by state-affiliated media, through sponsored trips, for example.”

According to Mozur, China’s state broadcaster is actively looking for more influencers, offering bonuses and publicity for those who sign up. In the US, China’s consulate general is paying $300,000 to a firm to recruit influencers for the Winter Olympics, ranging from Celebrity Influencers with millions of Instagram or TikTok followers, to Nano Influencers, with merely a few thousand. The ultimate goal of deploying these alternative voices is not to disprove negative stories appearing in Western media, but something arguably worse, as the New York Times report explains: “China is the new super-abuser that has arrived in global social media,” said Eric Liu, a former content moderator for Chinese social media. “The goal is not to win, but to cause chaos and suspicion until there is no real truth.”

Source: How China Uses Western Influencers As Pawns In Its Propaganda War – Slashdot

Banks, ISPs Increasingly Embrace ‘Voice Print’ Authentication Despite Growing Security Risk

While it’s certainly possible to sometimes do biometrics well, a long line of companies frequently… don’t. Voice print authentication is particularly shaky, especially given the rise of inexpensive voice deepfake technology. But, much like the continued use of text-message two-factor authentication (which is increasingly shown to not be secure), it apparently doesn’t matter to a long list of companies.

Banks and telecom giants alike have started embracing voice authentication tech at significant scale despite the added threat to user privacy and security. And they’re increasingly collecting user “voice print” data without any way to opt out:

“despite multiple high-profile cases of scammers successfully stealing money by impersonating people via deepfake audio, big banks and ISPs are rolling out voice-based authentication at scale. The worst offender that I could find is Chase. There is no “opt in”. There doesn’t even appear to be a formal way to “opt out”! There is literally no way for me to call my bank without my voice being “fingerprinted” without my consent.”

[…]

Source: Banks, ISPs Increasingly Embrace ‘Voice Print’ Authentication Despite Growing Security Risk | Techdirt

Why our electronics break: what we can learn from nearly 10 years of repairs over 50k broken items

We now have data on over 21,000 broken items and what was done to fix them. This information comes from volunteers at our own events and others who use our community repair platform, restarters.net.

Thanks to our partners in the Open Repair Alliance who also collect this kind of data, we were able to include extra data from other networks around the world.

Together, this brought the total to nearly 50,000 broken items.

Want to see this data for yourself? Download the full dataset here
(Note: Links to the datasets that contain fault types are further down this page)

That’s a lot of data. So to analyse it, we focused on three types of products that the European Commission would be investigating:

  • Printers
  • Tablets
  • The batteries that power many of our gadgets.

[…]

Thanks to this collective effort, we were able to identify the most common reasons printers, tablets and batteries become unusable.

A diagram showing the most common tablet problems
These findings are based on the analysis of problems in 647 tablets brought to community repair events, but don’t include 131 tablets with poor data quality, making it impossible to confirm the main fault.

In addition, many of the items we looked at were fairly old, demonstrating that people really want to keep using their devices for longer.

But we also found that there are lots of barriers to repair that make this tricky. Some of the biggest are the lack of spare parts and repair documentation as well as designs that make opening the product difficult without causing extra damage.

You can see our full results and download the data for yourself here:

[…]

We want rules that make products easier to fix. And we’re already using data to push for a real Right to Repair. Just recently, we used previous findings to undermine an industry lobbyist’s anti-repair arguments in an EU policy meeting about upcoming regulations for smartphone and tablet repairability.

As a follow up, we also contributed our findings on common fault types in tablets, making the case for the need for better access to spare parts and repair information for this product category as well.

Next, we hope to increase the pressure on European policymakers for regulating printer repairability and battery-related issues in consumer products. For printers, the European Commission is considering rejecting a “voluntary agreement” proposed by industry, which ignores repairability for consumer printers.

And as for batteries, European institutions are working towards a Batteries Regulation, which must prioritise user-replaceability as well as the availability of spare parts.

[…]

Source: Why our electronics break: what we can learn from nearly 10 years of repairs – The Restart Project

Apple Removes All References to Controversial CSAM Scanning Feature – where they would scan all the pictures you took

Apple has quietly nixed all mentions of CSAM from its Child Safety webpage, suggesting its controversial plan to detect child sexual abuse images on iPhones and iPads may hang in the balance following significant criticism of its methods.

Apple in August announced a planned suite of new child safety features, including scanning users’ iCloud Photos libraries for Child Sexual Abuse Material (CSAM), Communication Safety to warn children and their parents when receiving or sending sexually explicit photos, and expanded CSAM guidance in Siri and Search.

Following their announcement, the features were criticized by a wide range of individuals and organizations, including security researchers, the privacy whistleblower Edward Snowden, the Electronic Frontier Foundation (EFF), Facebook’s former security chief, politicians, policy groups, university researchers, and even some Apple employees.

The majority of criticism was leveled at Apple’s planned on-device CSAM detection, which was lambasted by researchers for relying on dangerous technology that bordered on surveillance, and derided for being ineffective at identifying images of child sexual abuse.

[…]

Source: Apple Removes All References to Controversial CSAM Scanning Feature From Its Child Safety Webpage [Updated] – MacRumors

Scott Morrison urged to end ‘lunacy’ and push UK and US for Julian Assange’s release by Australian PMs

Australian parliamentarians have demanded the prime minister, Scott Morrison, intervene in the case of Julian Assange, an Australian citizen, after the United States won a crucial appeal in its fight to extradite the WikiLeaks founder on espionage charges.

“The prime minister must get Assange home,” the Australian Greens leader, Adam Bandt, told Guardian Australia on Saturday.

“An Australian citizen is being prosecuted for publishing details of war crimes, yet our government sits on its hands and does nothing.”

WikiLeaks founder Julian Assange.
WikiLeaks founder Julian Assange. Photograph: Daniel Leal-Olivas/AFP/Getty Images

The independent MP Andrew Wilkie called on Morrison to “end this lunacy” and demand the US and UK release Assange.

[…]

Source: Scott Morrison urged to end ‘lunacy’ and push UK and US for Julian Assange’s release | Australian politics | The Guardian

The European Commission is making its software open source to benefit society – considering it was paid for by the tax payers it’s the least they could do and should have done this years ago

The European Commission has announced that it’s adopting new rules around open source software which will see it release software under open source licenses. The decision follows a Commission study that found investment in open source software leads on average to four times higher returns. There has also been a push for this type of action from the Public Money, Public Code campaign.

If you’re wondering what sort of code the EC could offer to the world, it gave two examples. First, there’s its eSignature, a set of free standards, tools, and services that can speed up the creation and verification of electronic signatures that are legally valid inside the EU. Another example is LEOS (Legislation Editing Open Software) which is used to draft legal texts.

[…]

Source: The European Commission is making its software open source to benefit society – Neowin

Julian Assange can be extradited to the US, court rules, changes mind because US tells judge to.

Wikileaks founder Julian Assange can be extradited from the UK to the US, the High Court has ruled.

The US won its appeal against a January UK court ruling that he could not be extradited due to concerns over his mental health.

Judges were reassured by US promises to reduce the risk of suicide. His fiancee said they intended to appeal.

Mr Assange is wanted in the US over the publication of thousands of classified documents in 2010 and 2011.

Senior judges found the lower judge had based her decision in January on the risk of Mr Assange being held in highly restrictive prison conditions if extradited.

However, the US authorities later gave assurances that he would not face those strictest measures unless he committed an act in the future that merited them.

Giving the judgement, Lord Chief Justice Lord Burnett said: “That risk is in our judgement excluded by the assurances which are offered.

“It follows that we are satisfied that, if the assurances had been before the judge, she would have answered the relevant question differently.”

Mr Assange’s fiancee Stella Moris called the ruling “dangerous and misguided”, adding that the US assurances were “inherently unreliable”.

[…]

Wikileaks editor-in-chief Kristinn Hrafnsson said in a statement: “Julian’s life is once more under grave threat, and so is the right of journalists to publish material that governments and corporations find inconvenient.

“This is about the right of a free press to publish without being threatened by a bullying superpower.”

Amnesty International described the ruling as a “travesty of justice” and the US assurances as “deeply flawed”.

Nils Muiznieks, the human rights organisation’s Europe director, said it “poses a grave threat to press freedom both in the Unites States and abroad”.

Judges ordered the case must return to Westminster Magistrates’ Court for a district judge to send it formally to Home Secretary Priti Patel.

Mr Assange’s legal team – Birnberg Peirce Solicitors – said any appeal to the Supreme Court would relate to the question of assurances, rather than on issues such as free speech or “the political motivation of the US extradition request”.

Source: Julian Assange can be extradited to the US, court rules – BBC News

Report: VPNs Are Often a Mixed Bag for Privacy

[…] Consumer Reports, which recently published a 48-page white paper on VPNs that looks into the privacy and security policies of 16 prominent VPN providers. Researchers initially looked into some 51 different companies but ultimately honed in on the most prominent, high-quality providers. The results are decidedly mixed, with the report highlighting a lot of the long offered criticisms of the industry—namely, it’s lack of transparency, its PR bullshit, and its not always stellar security practices. On the flip side, a small coterie of VPNs actually seem pretty good.

[…]

. Consumers may often believe that by using a VPN they are able to become completely invisible online, as companies promise stuff like “unrivaled internet anonymity,” and the ability to “keep your browsing private and protect yourself from hackers and online tracking,” and so on and so forth.

In reality, there are still a whole variety of ways that companies and advertisers can track you across the internet—even if your IP address is hidden behind a virtual veil.

[…]

via a tool developed by a group of University of Michigan researchers, dubbed the “VPNalyzer” test suite, which was able to look at various security issues with VPN connections. The research team found that “malicious and deceptive behaviors by VPN providers such as traffic interception and manipulation are not widespread but are not nonexistent. In total, the VPNalyzer team filed more than 29 responsible disclosures, 19 of which were for VPNs also studied in this report, and is awaiting responses regarding its findings.”

The CR’s own analysis found “little evidence” of VPNs “manipulating users’ networking traffic when testing for evidence of TLS interception,” though they did occasionally run into examples of data leakage.

And, as should hopefully go without saying, any VPN with the word “free” near it should be avoided at all costs, lest you accidentally download some sort of Trojan onto your device and casually commit digital hari-kari.

[…]

According to CR’s review, four VPN providers rose to the top of the list in terms of their privacy and security practices. They were:

Apparently in that order.

These companies stood out mostly by not over-promising what they could deliver, while also scoring high on scales of transparency and security

[…]

Source: Report: VPNs Are Often a Mixed Bag for Privacy

Prisons snoop on inmates’ phone calls with speech-to-text AI

Prisons around the US are installing AI speech-to-text models to automatically transcribe conversations with inmates during their phone calls.

A series of contracts and emails from eight different states revealed how Verus, an AI application developed by LEO Technologies and based on a speech-to-text system offered by Amazon, was used to eavesdrop on prisoners’ phone calls.

In a sales pitch, LEO’s CEO James Sexton told officials working for a jail in Cook County, Illinois, that one of its customers in Calhoun County, Alabama, uses the software to protect prisons from getting sued, according to an investigation by the Thomson Reuters Foundation.

“(The) sheriff believes (the calls) will help him fend off pending liability via civil action from inmates and activists,” Sexton said. Verus transcribes phone calls and finds certain keywords discussing issues like COVID-19 outbreaks or other complaints about jail conditions.

Prisoners, however, said the tool was used to catch crime. In one case, it allegedly found one inmate illegally collecting unemployment benefits. But privacy advocates aren’t impressed. “T​​he ability to surveil and listen at scale in this rapid way – it is incredibly scary and chilling,” said Julie Mao, deputy director at Just Futures Law, an immigration legal group.

[…]

Source: Prisons snoop on inmates’ phone calls with speech-to-text AI • The Register

Executive at Swiss Tech Company Said to Operate Secret Surveillance Operation

The co-founder of a company that has been trusted by technology giants including Google and Twitter to deliver sensitive passwords to millions of their customers also operated a service that ultimately helped governments secretly surveil and track mobile phones, Bloomberg reported Monday, citing former employees and clients. From the report: Since it started in 2013, Mitto AG has established itself as a provider of automated text messages for such things as sales promotions, appointment reminders and security codes needed to log in to online accounts, telling customers that text messages are more likely to be read and engaged with than emails as part of their marketing efforts. Mitto, a closely held company with headquarters in Zug, Switzerland, has grown its business by establishing relationships with telecom operators in more than 100 countries. It has brokered deals that gave it the ability to deliver text messages to billions of phones in most corners of the world, including countries that are otherwise difficult for Western companies to penetrate, such as Iran and Afghanistan. Mitto has attracted major technology giants as customers, including Google, Twitter, WhatsApp, Microsoft’s LinkedIn and messaging app Telegram, in addition to China’s TikTok, Tencent and Alibaba, according to Mitto documents and former employees.

But a Bloomberg News investigation, carried out in collaboration with the London-based Bureau of Investigative Journalism, indicates that the company’s co-founder and chief operating officer, Ilja Gorelik, was also providing another service: selling access to Mitto’s networks to secretly locate people via their mobile phones. That Mitto’s networks were also being used for surveillance work wasn’t shared with the company’s technology clients or the mobile operators Mitto works with to spread its text messages and other communications, according to four former Mitto employees. The existence of the alternate service was known only to a small number of people within the company, these people said. Gorelik sold the service to surveillance-technology companies which in turn contracted with government agencies, according to the employees.

Source: Executive at Swiss Tech Company Said to Operate Secret Surveillance Operation – Slashdot

Life360 Reportedly Sells Location Data of Families and Kids

Life360, a popular tracking app that bills itself as “the world’s leading family safety service,” is purportedly selling location data on the 31 million families and kids that use it to data brokers. The chilling revelation may make users of the Tile Bluetooth tracker, which is being bought by Life360, think twice before continuing to use the device.

Life360’s data selling practices were revealed in a damning report published by the Markup on Monday. The report claims that Life360 sells location data on its users to roughly a dozen data brokers, some of which have sold data to U.S. government contractors. The data brokers then proceed to sell the location data to “virtually anyone who wants to buy it.” Life360 is purportedly one of the largest sources of data for the industry, the outlet found.

While selling location data on families and kids is already alarming, what’s even more frightening is that Life360 is purportedly failing to take steps to protect the privacy of the data it sells. This could potentially allow the location data, which the company says is anonymized, to be linked back to the people it belongs to.

[…]

Source: Life360 Reportedly Sells Location Data of Families and Kids

Documents Shows Just How Much The FBI Can Obtain From Encrypted Communication Services

There is no “going dark.” Consecutive FBI heads may insist there is, but a document created by their own agency contradicts their dire claims that end-to-end encryption lets the criminals and terrorists win.

Andy Kroll has the document and the details for Rolling Stone:

[I]n a previously unreported FBI document obtained by Rolling Stone, the bureau claims that it’s particularly easy to harvest data from Facebook’s WhatsApp and Apple’s iMessage services, as long as the FBI has a warrant or subpoena. Judging by this document, “the most popular encrypted messaging apps iMessage and WhatsApp are also the most permissive,” according to Mallory Knodel, the chief technology officer at the Center for Democracy and Technology.

The document [PDF] shows what can be obtained from which messaging service, with the FBI noting WhatsApp has plenty of information investigators can obtain, including almost real time collection of communications metadata.

WhatsApp will produce certain user metadata, though not actual message content, every 15 minutes in response to a pen register, the FBI says. The FBI guide explains that most messaging services do not or cannot do this and instead provide data with a lag and not in anything close to real time: “Return data provided by the companies listed below, with the exception of WhatsApp, are actually logs of latent data that are provided to law enforcement in a non-real-time manner and may impact investigations due to delivery delays.”

The FBI can obtain this info with a pen register order — the legal request used for years to obtain ongoing call data on targeted numbers, including numbers called and length of conversations. With a warrant, the FBI can get even more information. A surprising amount, actually. According to the document, WhatsApp turns over address book contacts for targeted users as well as other WhatsApp users who happen to have the targeted person in their address books.

Combine this form of contact chaining with a few pen register orders, and the FBI can basically eavesdrop on hundreds of conversations in near-real time. The caveat, of course, is that the FBI has no access to the content of the conversations. That remains locked up by WhatsApp’s encryption. Communications remain “warrant-proof,” to use a phrase bandied about by FBI directors. But is it really?

If investigators are able to access the contents of a phone (by seizing the phone or receiving permission from someone to view their end of conversations), encryption is no longer a problem. That’s one way to get past the going darkness. Then there’s stuff stored in the cloud, which can give law enforcement access to communications despite the presence of end-to-end encryption. Backups of messages might not be encrypted and — as the document points out — a warrant will put those in the hands of law enforcement.

If target is using an iPhone and iCloud backups enabled, iCloud returns may contain WhatsApp data, to include message content.

[…]

Source: Documents Shows Just How Much The FBI Can Obtain From Encrypted Communication Services | Techdirt

U.S. Indicts Two Men for Running a $20 Million YouTube Content ID Scam – after 4 years of warnings

Two men have been indicted by a grand jury for running a massive YouTube Content ID scam that netted the pair more than $20m. Webster Batista Fernandez and Jose Teran managed to convince a YouTube partner that the pair owned the rights to 50,000+ tracks and then illegally monetized user uploads over a period of four years.

[…]

YouTube previously said that it paid $5.5 billion in ad revenue to rightsholders from content claimed and monetized through Content ID but the system doesn’t always work exactly as planned.

Over the years, countless YouTube users have complained that their videos have been claimed and monetized by entities that apparently have no right to do so but, fearful of what a complaint might do to the status of their accounts, many opted to withdraw from battles they feared they might lose.

[…]

Complaints are not hard to find. Large numbers of YouTube videos uploaded by victims of the scam dating back years litter the platform, while a dedicated Twitter account and a popular hashtag have been complaining about MediaMuv since 2018.

 

Mediamuv
 

As early as 2017, complaints were being made on YouTube/Google’s support forums, with just one receiving more than 150 replies.

“I want to make a claim through this place, since a few days ago a said company called MEDIAMUV IS STEALING CONTENT FROM MY CHANNEL AND FROM OTHER USERS, does anyone know something about said company?” one reads.

“[I] investigated and there is nothing in this respect. I only found a channel saying that several users are being robbed and that when they come to upload their own songs, MEDIAMUV detects the videos as theirs.”

[…]

Source: U.S. Indicts Two Men for Running a $20 Million YouTube Content ID Scam * TorrentFreak

Qualcomm’s new always-on smartphone camera is always looking out for you

“Your phone’s front camera is always securely looking for your face, even if you don’t touch it or raise to wake it.” That’s how Qualcomm Technologies vice president of product management Judd Heape introduced the company’s new always-on camera capabilities in the Snapdragon 8 Gen 1 processor set to arrive in top-shelf Android phones early next year.

[…]

But for those of us with any sense of how modern technology is used to violate our privacy, a camera on our phone that’s always capturing images even when we’re not using it sounds like the stuff of nightmares and has a cost to our privacy that far outweighs any potential convenience benefits.

Qualcomm’s main pitch for this feature is for unlocking your phone any time you glance at it, even if it’s just sitting on a table or propped up on a stand. You don’t need to pick it up or tap the screen or say a voice command — it just unlocks when it sees your face. I can see this being useful if your hands are messy or otherwise occupied (in its presentation, Qualcomm used the example of using it while cooking a recipe to check the next steps). Maybe you’ve got your phone mounted in your car, and you can just glance over at it to see driving directions without having to take your hands off the steering wheel or leave the screen on the entire time.

[…]

Qualcomm is framing the always-on camera as similar to the always-on microphones that have been in our phones for years. Those are used to listen for voice commands like “Hey Siri” or “Hey Google” (or lol, “Hi Bixby”) and then wake up the phone and provide a response, all without you having to touch or pick up the phone. But the difference is that they are listening for specific wake words and are often limited with what they can do until you do actually pick up your phone and unlock it.

It feels a bit different when it’s a camera that’s always scanning for a likeness.

It’s true that smart home products already have features like this. Google’s Nest Hub Max uses its camera to recognize your face when you walk up to it and greet you with personal information like your calendar. Home security cameras and video doorbells are constantly on, looking for activity or even specific faces. But those devices are in your home, not always carried with you everywhere you go, and generally don’t have your most private information stored on them, like your phone does. They also frequently have features like physical shutters to block the camera or intelligent modes to disable recording when you’re home and only resume it when you aren’t. It’s hard to imagine any phone manufacturer putting a physical shutter on the front of their slim and sleek flagship smartphone.

Lastly, there have been many reports of security breaches and social engineering hacks to enable smart home cameras when they aren’t supposed to be on and then send that feed to remote servers, all without the knowledge of the homeowner. Modern smartphone operating systems now do a good job of telling you when an app is accessing your camera or microphone while you’re using the device, but it’s not clear how they’d be able to inform you of a rogue app tapping into the always-on camera.

To be honest, these things are also pretty damn scary! I understand that Americans have been habituated to ubiquitous surveillance, but here in the EU we still value our privacy and don’t like it much at all.

Ultimately, it comes down to a level of trust — do you trust that Qualcomm has set up the system in a way that prevents the always-on camera from being used for other purposes than intended? Do you trust that the OEM using Qualcomm’s chips won’t do things to interfere with the system, either for their own profit or to satisfy the demands of a government entity?

Even if you do have that trust, there’s a certain level of comfort with an always-on camera on your most personal device that goes beyond where we are currently.

Maybe we’ll just start having to put tape on our smartphone cameras like we already do with laptop webcams.

Source: Qualcomm’s new always-on smartphone camera is a potential privacy nightmare – The Verge

WhatsApp privacy policy tweaked in Europe after record fine

Following an investigation, the Irish data protection watchdog issued a €225m (£190m) fine – the second-largest in history over GDPR – and ordered WhatsApp to change its policies.

WhatsApp is appealing against the fine, but is amending its policy documents in Europe and the UK to comply.

However, it insists that nothing about its actual service is changing.

Instead, the tweaks are designed to “add additional detail around our existing practices”, and will only appear in the European version of the privacy policy, which is already different from the version that applies in the rest of the world.

“There are no changes to our processes or contractual agreements with users, and users will not be required to agree to anything or to take any action in order to continue using WhatsApp,” the company said, announcing the change.

The new policy takes effect immediately.

User revolt

In January, WhatsApp users complained about an update to the company’s terms that many believed would result in data being shared with parent company Facebook, which is now called Meta.

Many thought refusing to agree to the new terms and conditions would result in their accounts being blocked.

In reality, very little had changed. However, WhatsApp was forced to delay its changes and spend months fighting the public perception to the contrary.

During the confusion, millions of users downloaded WhatsApp competitors such as Signal.

[…]

The new privacy policy contains substantially more information about what exactly is done with users’ information, and how WhatsApp works with Meta, the parent company for WhatsApp, Facebook and Instagram.

Source: WhatsApp privacy policy tweaked in Europe after record fine – BBC News

The Amazon lobbyists who kill U.S. consumer privacy protections

In recent years, Amazon.com Inc has killed or undermined privacy protections in more than three dozen bills across 25 states, as the e-commerce giant amassed a lucrative trove of personal data on millions of American consumers.

Amazon executives and staffers detail these lobbying victories in confidential documents reviewed by Reuters.

In Virginia, the company boosted political donations tenfold over four years before persuading lawmakers this year to pass an industry-friendly privacy bill that Amazon itself drafted. In California, the company stifled proposed restrictions on the industry’s collection and sharing of consumer voice recordings gathered by tech devices. And in its home state of Washington, Amazon won so many exemptions and amendments to a bill regulating biometric data, such as voice recordings or facial scans, that the resulting 2017 law had “little, if any” impact on its practices, according to an internal Amazon document.

[…]

Source: The Amazon lobbyists who kill U.S. consumer privacy protections

This is a detailed and creepy look at how Amazon undermines protections in the US and the amount and scope of data they collect.

South Korea Is Giving Millions of Photos of all foreign travelers since 2019 to Facial Recognition Researchers

The South Korean Ministry of Justice has provided more than 100 million photos of foreign nationals who travelled through the country’s airports to facial recognition companies without their consent, according to attorneys with the non-governmental organization Lawyers for a Democratic Society.

While the use of facial recognition technology has become common for governments across the world, advocates in South Korea are calling the practice a “human rights disaster” that is relatively unprecedented.

“It’s unheard-of for state organizations—whose duty it is to manage and control facial recognition technology—to hand over biometric information collected for public purposes to a private-sector company for the development of technology,” six civic groups said during a press conference last week.

The revelation, first reported in the South Korean newspaper The Hankyoreh, came to light after National Assembly member Park Joo-min requested and received documents from the Ministry of Justice related to a April 2019 project titled Artificial Intelligence and Tracking System Construction Project. The documents show private companies secretly used biometric data to research and develop an advanced immigration screening system that would utilize artificial intelligence to automatically identify airport users’ identities through CCTV surveillance cameras and detect dangerous situations in real time.

Shortly after the discovery, civil liberty groups announced plans to represent both foreign and domestic victims in a lawsuit.

[…]

Despite this pushback, the use of the technology is increasingly used in commercial spaces and airports. This holiday season, Delta Airlines will be piloting a facial recognition boarding program in Atlanta, following similar moves by JetBlue. US Customs and Border Protection is already relying on facial recognition technology in dozens of locations.

While the South Korean government’s collaboration with the private sector is unprecedented in its scale, it  is not the only collaboration of its kind. In 2019, a Motherboard investigation revealed the Departments of Motor Vehicles in numerous states had been selling names, addresses and other personal data to insurance or tow companies and to private investigators.

Source: South Korea Is Giving Millions of Photos to Facial Recognition Researchers

Which governments censor the tech giants the most?

Note: these numbers do not take into account the amount of secret removal requests from governments, which are probably most in the US (also see https://www.linkielist.com/global-domination/us-judge-rules-twitter-cant-be-transparent-about-amount-of-surveillance-requests-processed-per-year-due-to-national-security-of-the-4th-reich/)

In 2009, Google started recording the number of content removal requests it received from courts and government agencies all over the world, disclosing the figures on a six-month basis. Soon after, several other companies followed suit, including Twitter, Facebook, Microsoft, and Wikimedia.

This year, we’ve extended our study of the above to include Pinterest, Dropbox, Reddit, LinkedIn, TikTok, and Tumblr. Our study looks at the number of content removal requests by platform, which countries have the highest rates of content removal per 100,000 internet users, and how things have changed on a year-by-year basis.

What did we find?

Some governments avidly try to control online data, whether this is on social media, blogs, or both. And not all of the worst offenders may be who you expect.

Top 10 countries by number of content removal requests

According to our findings, the countries with the highest rate of content removal requests per 100,000 internet users are:

  1. Monaco – 341 content removal requests per 100,000 internet users
  2. Russia – 146 content removal requests per 100,000 internet users
  3. Turkey – 138 content removal requests per 100,000 internet users
  4. France – 97 content removal requests per 100,000 internet users
  5. Israel – 91 content removal requests per 100,000 internet users
  6. Liechtenstein – 68 content removal requests per 100,000 internet users
  7. Pakistan – 62 content removal requests per 100,000 internet users
  8. South Korea – 49 content removal requests per 100,000 internet users
  9. Mexico – 49 content removal requests per 100,000 internet users
  10. Japan – 49 content removal requests per 100,000 internet users

With 130 content removal requests to less than 39,000 internet users, Monaco has had the most content removal requests per 100,000 internet users. The majority of these (116) were directed at Facebook with over 98 percent in 2019.

In second and third place are Russia and Turkey with 146 and 138 content removal requests per 100,000 internet users respectively. Russia had 179,013 requests in total with 69 percent of these being directed toward Google. In contrast, Turkey had 90,696 requests in total with the majority of these (55 percent) being directed toward Twitter.

We’ll delve into the whats and whys of these removals below. But which countries submitted the most requests overall?

If we switch the top 10 to be the countries that submitted the highest number of requests overall, things do change slightly:

  1. Russia – 179,013 content removal requests submitted in total. The majority of these (69 percent) were directed toward Google
  2. India – 97,631 content removal requests submitted in total. The majority of these (76 percent) were directed toward Facebook
  3. Turkey – 90,696 content removal requests submitted in total. The majority of these (55 percent) were directed toward Twitter
  4. Japan – 56,861 content removal requests submitted in total. The majority of these (98 percent) were directed toward Twitter
  5. France – 54,627 content removal requests submitted in total. The majority of these (80 percent) were directed toward Facebook
  6. Mexico – 45,671 content removal requests submitted in total. The majority of these (99 percent) were directed toward Facebook
  7. Brazil – 36,151 content removal requests submitted in total. The majority of these (72 percent) were directed toward Facebook
  8. South Korea – 24,658 content removal requests submitted in total. The majority of these (44 percent) were directed toward Twitter
  9. Pakistan – 23,377 content removal requests submitted in total. The majority of these (84 percent) were directed toward Facebook
  10. Germany – 19,040 content removal requests submitted in total. The majority of these (68 percent) were directed toward Facebook

Russia outranked all other countries with a 6-digit figure for government content requests, making 179,765 requests across all platforms. It’s also the highest-ranking country for the number of requests submitted to Google, Reddit, TikTok, and Dropbox.

Interesting, too, is how the United Kingdom and the United States rank in eleventh and twelfth place respectively for the number of content requests submitted. The UK had 17,406 content removal requests in total with 64 percent being submitted to Facebook. Meanwhile, the US had 12,474 in total with 80 percent submitted to Google. In relation to the number of internet users, however, the UK submitted 27 per 100,000 and the US just 4 per 100,000. This places them 16th and 50th in the number of requests per 100,000 internet user rankings respectively.

Highest content removal requests by platform

Now we know which countries have submitted the most requests, which country comes out on top for each platform?

  • Google: Russia accounts for 60 percent of requests – 123,607 of 207,066
  • Facebook: India accounts for 24 percent of requests – 74,674 of 308,434
  • Twitter: Japan accounts for 31 percent of requests – 55,590 of 181,689
  • Microsoft: China accounts for 52 percent of requests – 8,665 of 16,817
  • Pinterest: South Korea accounts for 46 percent of requests – 2,345 of 5,134
  • Tumblr: South Korea accounts for 71 percent of requests – 2,260 of 3,193
  • Wikimedia: United States accounts for 23 percent of requests – 977 of 4,256
  • Dropbox: Russia accounts for 34 percent of requests – 752 of 2,217
  • TikTok: Russia accounts for 24 percent of requests – 150 of 620
  • Reddit: Russia accounts for 29 percent of requests – 143 of 488
  • LinkedIn: China accounts for 71 percent of requests – 72 of 102

What about China’s lower rankings across every category but Microsoft?

China tends not to bother going through content providers and their in-house reporting mechanisms to censor content. It simply blocks entire sites and apps outright, forcing internet service providers to bar access on behalf of the government. China has banned all of the websites we have used in this comparison, except for LinkedIn and some of Microsoft’s services–the two areas where it dominates the content removal requests.

Which tech giant is receiving the highest percentage of removal requests in each country?

If we look at which tech giant is receiving the highest percentage of removal requests in each country, we can see that Google and Facebook tend to receive the vast majority.

Tech giant government content removal requests

Many Central European, South East Asian, and some South American countries submit the majority of their removal requests to Facebook, while many African and Eastern European countries, as well as the US, Canada, and Australia, submit most of theirs to Google. A large number of Middle Eastern countries submit the majority of requests to Twitter.

Biggest years for government content removal requests

Following a slight dip in 2019 (a 2 percent decrease on the number of requests submitted in 2018), removal requests bounced back up by 69 percent from 2019 to 2020. Twitter accounted for the largest percentage of these requests with 80,744 (40 percent) of the 203,698 requests submitted in total. It was closely followed by Facebook (62,314 or 31 percent) and Google (44,065 or 22 percent).

Over the years, these platforms have made the most content removal requests. But, when you take into consideration that all three are the highest used of all the platforms we’ve covered, that’s perhaps no surprise.

However, what the above does show us is how the focus on platforms has changed over the years.

Facebook’s biggest year for content removal requests came in 2015 when 76,395 requests were submitted (25 percent of its overall total). These requests then dropped significantly in 2016 before increasing by 155 and 21 percent from 2016 to 2017 and 2017 to 2018 respectively. Figures then dropped by 34 percent from 2018 to 2019 before almost doubling again from 2019 to 2020.

Google also witnessed a similar drop in 2019 when requests dipped by 30 percent, having been growing by around 10,000 each year from 2016 to 2018. In 2020, the number of requests rose again by 46 percent.

Twitter, however, didn’t follow this trend. In 2019, Twitter saw a 97 percent increase in the number of requests submitted (rising from 23,464 in 2018 to 46,291 in 2019). The number of content removals submitted to Twitter continued to rise significantly in 2020, too, when they nearly doubled to 80,744. In fact, of all the platforms we’ve studied, Twitter is the only platform (bar LinkedIn and Reddit which have only recently begun to submit reports) that has noticed an increase in content removal requests each and every year.

Why does Twitter appear to be dominating content removal requests? After all, it doesn’t have the largest number of users (it has around 396.5m users compared to Facebook’s 2.8bn).

The majority of the increase comes from Japan, India, South Korea, and Indonesia. As we’ll see further on, Japan Twitter has recently been under fire for censoring government critics. Other reasons could be increases in scams, misinformation around elections, and general violations of local laws.

Russia accounts for 60 percent of Google’s content removal requests

As mentioned previously, Russia dominates the number of content request removals made to Google, accounting for 123,607 (60 percent) in total. Despite Russia’s requests dropping from over 30,000 in 2018 to just under 20,000 in 2019, they jumped back up to a record-breaking 31,384 in 2020. This dip in 2019 was a worldwide trend, however, with a 30 percent decrease in removal requests in 2019 followed by a 46 percent increase in 2020.

Nearly 34 percent of Russia’s requests come under the reason of national security, closely followed by copyright (26 percent) and regulated goods and services (18 percent).

Russia’s requests are significantly higher than second-place Turkey, which sent just 14,242 requests–7 percent of all requests received. Turkey was closely followed by India (10,138 with 4.89 percent) and the US (9,933 with 4.79 percent). Defamation is the main reason for all of these countries’ requests, accounting for 39 percent of Turkey’s total, 27 percent of India’s total, and 58 percent of the US’s total.

Which of Google’s products are being targeted by these removal requests?

YouTube and web searches are all prime targets for these removal requests. Of all the requests, 50 percent are directed toward YouTube and 30 percent toward web searches.

Examples of Google content removal requests

Some examples of the requests submitted by Russia, Turkey, and India include:

Russia: “Roskomnadzor requested that we block a Russian-language summary of a Financial Times report claiming that the content was “extremist”. The article stated that the real number of coronavirus deaths in Russia is potentially 70% higher than what official statistics report.” – The content wasn’t removed, which was, in part, due to errors in the way the request had been served. This included procedural defects in the way the request was served (Jan-Jun, 2020).

Turkey: “We received a court order to delist 5 URLs from Google Search and to remove 1 Blogger blog post on the basis of “right-to-be-forgotten” legislation, on behalf of a high-ranking official. The news articles reported accusations of organised crime, which allegedly led to a criminal complaint.” – The URLs were not delisted or removed (Jul-Dec, 2020).

Turkey: “We received a court order to remove 2 Google Groups posts, 2 Blogger posts, 1 Blogger image, and an entire Blogger blog publishing political caricatures of a very senior Government official of Turkey.” – The content was not removed (Jul-Dec, 2016).

India: “We received multiple requests from Indian law enforcement for 173 YouTube URLs depicting content related to COVID-19. The reported content ranged from conspiracy theories and religious hate speech related to COVID-19 to news reports and criticism of the authorities’ handling of the pandemic.” 14 URLs were removed for violating YouTube’s community guidelines, 30 URLs were restricted in India based on cited local laws. Further information was requested for 106 URLs, of which 10 URLs were not removed and 13 URLs were already down.

India accounts for 24 percent of Facebook’s content removal requests

Facebook received the largest number of government content requests overall with 308,434 in total. India made up for the vast majority of these, with its 74,674 requests accounting for nearly 25 percent of the total. Most of India’s requests (40 percent) were made in 2015 when 30,126 requests were submitted. Since then, India’s requests have remained much lower, only reaching two or three thousand per year, except for in 2018 when requests spiked again at just over 19,000.

Interestingly, in 2015, the Supreme Court of India struck down section 66A of the Information Technology Act, 2000, which made posting “offensive” comments online a crime that was punishable by jail. Perhaps this led to an influx in offensive comments on mediums like Facebook, or authorities turned to Facebook’s content removal system to try and combat things differently.

In second place for removal requests via Facebook is Mexico with 45,217. Most of these requests (45 percent) were placed in the first half of 2017, shortly after Mexico first started submitting removal requests (its first figures are recorded for the latter part of 2016). Therefore, Mexican officials were perhaps “catching up” on the content that they thought violated local law. Mexico’s removal requests dropped dramatically in 2018 (2,040 submitted in total) before rising in 2019 (by 240 percent to 6,946) and in 2020 (by 93 percent to 13,399).

Mexico was closely followed by France with 43,816 requests. Again, the majority of these requests were submitted years ago (37,695 or 86 percent were submitted in the second half of 2015). But unlike Mexico, France’s requests have continued to decline year on year with just 298 submitted in all of 2020. This dramatic peak in removal requests does coincide with the November 2015 terror attacks in Paris.

Oddly, the US doesn’t feature anywhere near the top for removal requests, ranking 57th for its mere 27 removal requests since reporting began. Facebook’s Transparency Report suggests a country might not make the list either because Facebook’s services aren’t available there or there haven’t been any items of this type to report. The US doesn’t fall into the former, but the latter doesn’t seem likely either, especially when you consider the United States’s removal requests across other platforms. Furthermore, there is a case study (like the ones depicted below) for the US, which suggests:

“We received a request from a county prosecutor’s office to remove a page opposing a county animal control agency, alleging that the page made threatening comments about the director of the agency and violated laws against menacing.” Facebook reviewed the page and found there to be no credible threats so it, therefore, didn’t violate their Community Standards. (Oct 2015)

Examples of Facebook content removal requests

India: “We received a request from law enforcement in India to remove a photo that depicted a sketch of the Prophet Mohammed.” – The content didn’t violate Facebook’s Community Standards but was made unavailable in India where any depiction of Mohammed is forbidden. (Jun 2016)

France: “Following the November 2015 terrorist attacks in Paris, we received a request from L’Office Central de Lutte Contre la Criminalité Liée aux Technologies de l’Information et de la Communication (OCLCTIC), a division of French law enforcement, to remove a number of instances of a photo taken inside the Bataclan concert venue depicting the remains of several victims. The photo was alleged to violate French laws related to protecting human dignity.” – The content didn’t violate Facebook’s Community Standards but 32,100 instances of the photo were restricted in France. It was still available in other countries. (Nov 2015)

Mexico: “We received a request from the Mexican Federal Electoral Court to remove 239 items in connection with two complaints filed by the Partido de la Revolución Democrática (“PRD”) against Governmental Entities in Mexico. The PRD alleged that the content violated Mexico’s election laws.” – The content didn’t violate Facebook’s Community Standards but access to 63 posts were restricted in Mexico as they were deemed unlawful. 159 items were duplicated or had already been removed. (Jan 2020)

Japan accounts for 31 percent of Twitter’s content removal requests Twitter

Japan had the largest number of government content requests on Twitter with 55,590 requests submitted in total. This made up for 31 percent of all of the requests recorded by Twitter. Most of these requests (36,573 or 66 percent) were submitted in 2020. In fact, Japan’s content removal requests to Twitter have increased dramatically in recent years, jumping by 1,916 percent from 2018 to 2019 (from 875 to 17,640) and by 107 percent from 2019 to 2020 (from 17,640 to 36,573).

While the removal requests across Twitter have increased on a yearly basis (worldwide), Japan’s growth exceeds the worldwide average of 97 percent from 2018 to 2019 and 74 percent from 2019 to 2020. This comes amid recent reports that Twitter Japan seems to be suspending government critics. However, Twitter’s official report suggests the majority of the removal requests relate to laws surrounding narcotics and psychotropics, obscenity, or money lending.

In second place was Turkey with 49,525 requests, followed by Russia with 36,787 requests. Although Russia follows Japan’s trend with yearly increases in removal requests (99 percent from 2018 to 2019 and 54 percent from 2019 to 2020), Turkey’s removal requests are in decline (dropping by 20 percent from 2018 to 2019 and by 28 percent from 2019 to 2020).

Examples of Twitter content removal requests

Turkey: “Twitter received a court order from Turkey regarding two Tweets containing insulting language towards a high-level official of a prominent bank in Turkey for violation of personal rights. Twitter withheld both Tweets in Turkey in response to the court order.” (Jul-Dec, 2020)

Russia: “We received the first Periscope removal request from Roskomnadzor concerning a prisoner’s account. Citing Article 82 of the Russian Criminal Executive Code, the reporter asked us to ‘block the account from which the violating broadcast was made’. However, the reported account had no broadcasts, so we did not take any action.” (Jan-Jun 2017)

France: “We withheld one Tweet in response to a legal demand from the Office Central de Lutte contre la Criminalité liée aux Technologies de l’Information et de la Communication (OCLCTIC) for glorification of terrorist attacks.” (Jul-Dec 2017)

China accounts for 52 percent of Microsoft’s content removal requests

As we have already seen, China barely features across all of the aforementioned removal platforms for its content removal requests. This is due to the widespread blocking of these platforms, which removes the need for such requests. However, as some of Microsoft’s products are available in China, it accounts for over half of all the requests submitted to this tech giant.

Unfortunately, Microsoft doesn’t offer any insight into why the content removal requests are submitted. What it does indicate, however, is how many requests result in any action being taken. From July to December 2020, 96 percent of China’s requests were actioned. Russia (the second-highest submitter of requests) had just 41 percent of its requests actioned, while France had 89 percent.

Since the second half of 2018, China has always submitted over 1,000 removal requests every six months to Microsoft. Russia, however, upped its requests significantly in the second half of 2019, submitting nearly 300 percent more than the first half (2,951 compared to 743). But these started to drop off again in 2020, reducing by 45 percent and 58 percent in the first and second half of 2020, respectively.

Content removal requests across other platforms

Google, Facebook, Twitter, and Microsoft account for the vast majority of content removal requests, but the following also show interesting insights into where governments are focusing their online censorship efforts.

Dropbox

Russia submitted 34 percent of all the content removal requests to Dropbox, followed by France with 24 percent and the UK with 21 percent. Russia’s requests peaked in 2017 with 243 of its 752 (32 percent) requests submitted during this time. France’s came in 2018 with 63 percent of its total (331 of 524) submitted then. The UK also submitted the majority of its (41 percent) in 2017.

Since 2017/18, Dropbox’s removal requests have decreased quite significantly, falling by 38 percent from 2018 to 2019 and by 52 percent from 2019 to 2020.

Dropbox doesn’t provide insight into the types of content removal requests that are submitted but does appear to action the majority of requests it receives for most countries. For example, the US submitted 33 requests which affected 45 accounts. All but 2 of these accounts had action taken against them. However, of the 48 requests submitted by Russia in 2020, which affected 13 accounts, only 7 accounts had content blocked on them.

LinkedIn

LinkedIn receives very few content removal requests according to its transparency report and the vast majority of these are submitted by China. 42 out of 50 of the requests in 2020 came from China with only 14 countries having ever submitted one of these reports in the last three years (from 2018 to 2020).

Pinterest

The number of requests submitted to Pinterest has grown significantly within the last two reporting periods, increasing by 500 percent from 2019 to 2020 (from 680 to 4,078). South Korea and Russia account for the majority of these requests, submitting 46 and 43 percent of the total requests respectively.

Most of South Korea’s requests (99 percent) came in 2020 while Russia has been upping its requests since 2018. Russia submitted 102 in 2018, increasing by 376 percent to 486 in 2019 before rising by a further 234 percent to 1,622 in 2020.

Most of the content removal requests submitted to Pinterest are due to violations of community guidelines. For example, in 2020, 90 percent of the requests submitted were due to content that violated Pinterest’s community guidelines. No specific examples are available.

Reddit

Even though government content removal requests for Reddit have increased in recent years, the numbers are still within the low hundreds. Furthermore, as Reddit’s report demonstrates, a lot of the content that is restricted due to these requests is done so in the local area (over 71 percent of the pieces of content flagged by government requests in 2020 was only restricted in the local area).

Russia is, again, the main culprit for these requests, submitting over 29 percent of all the requests. Turkey has submitted the second-highest number of requests (100 or 20 percent) but most of these came in 2018 and 2019. In 2020, South Korea upped its requests with 60 in total (it only submitted 1 in 2019 and none before that).

No further information on the type of requests is available.

Tumblr

Data is only available from mid-2019 for Tumblr so it’s hard to conduct real comparisons on how things have changed on a year-by-year basis here. However, from the second half of 2019 to the first half of 2020, requests jumped by 229 percent (from 224 to 738) before rising by another 202 percent in the second half of 2020 (from 738 to 2,231).

South Korea dominates the requests submitted to this platform, accounting for 71 percent of all requests ever submitted. According to Tumblr’s report, 96 percent of the requests submitted by South Korea in 2020 resulted in data being removed–the global average was 95 percent.

No further details on the requests are available.

TikTok

The number of requests submitted to TikTok has been steadily increasing in recent years. Most of these have come from Russia (24 percent), India (15 percent), and Pakistan (16 percent). While India and Pakistan submitted requests in 2019 and 2020, all of Russia’s requests came in 2020 alone.

TikTok doesn’t provide an insight into the reason for the content removal requests but does give figures for how much content is affected by the requests. Pakistan’s 97 removal requests in the second half of 2020 saw the greatest amount of content affected with 14,263 pieces implicated in total. In contrast, Russia’s 135 requests implicated 429 pieces of content.

Wikimedia

From 2018 to 2019, Wikimedia’s content removal requests dropped by 35 percent (from 880 to 573), before rising again by 29 percent (from 573 to 741) from 2019 to 2020.

The United States accounts for the greatest chunk of these requests (across all years), accounting for 23 percent in total. However, the US’s requests have decreased in recent years.

What is particularly interesting about these Wikimedia content removal requests is that they are hardly ever actioned. According to the reports, only 2 of the 380 requests submitted in the second half of 2020 were actioned. Before that, the only content removal request accepted was from Ukraine in 2014. A blogger included a photo of his visa to visit Burma/Myanmar on his website. He had scrubbed his personal details from the image. The same picture later appeared on English Wikipedia in an article about the country’s visa policy. The redactions were removed and his information exposed. Given the nature of the information and the circumstances of how it was exposed, Wikimedia granted the takedown request.

Methodology

Our team extracted the data from the transparency reports for Twitter, Facebook, Microsoft, Wikimedia, Pinterest, Dropbox, Reddit, LinkedIn, TikTok, and Tumblr. We analyzed the data by country and year, while also noting any other significant details where available.

In Facebook’s latest report for the second half of 2020, every country was listed as having at least 12 removal requests. Due to the volume of countries with a 12, this appeared to be a glitch in the report as the majority of countries normally had 0. Therefore, we omitted the ones with 12 and replaced them with a 0 to avoid over-exaggerating the number of requests received.

When creating a ratio of content removal requests to internet users, we omitted two countries from the top 10–Tokelau and Cook Islands. This is due to them having 1 and 6 content removal requests in total but, because of their low populations, they were classed as having a high rate of requests per 100,000 users, which would be an unfair representation.

Sources

https://transparencyreport.google.com/government-removals/by-country?hl=en

https://transparency.twitter.com/en/removal-requests.html

https://www.microsoft.com/en-us/corporate-responsibility/crrr

https://govtrequests.facebook.com/content-restrictions

https://transparency.wikimedia.org/content.html

https://www.dropbox.com/transparency/reports

https://about.linkedin.com/transparency/government-requests-report

https://policy.pinterest.com/en/transparency-report

https://www.redditinc.com/policies/transparency-report-2020

https://www.tumblr.com/transparency

https://www.tiktok.com/safety/resources/transparency-report-2020-2

Source: Which government censors the tech giants the most? – Comparitech

Does Copyright Give Companies The Right To Search Your Home And Computer?

One reason why copyright has become so important in the digital age is that it applies to the software that many of us use routinely on our smartphones, tablets and computers. In order to run those programs, you must have a license of some kind (unless the software is in the public domain, which rarely applies to modern code). The need for a license is why we must agree to terms and conditions when we install new software. On Twitter, Alvar C.H. Freude noticed something interesting in the software licence agreement for Capture One: “world-class tools for editing, organizing and working with photos” according to the Danish company that makes it (found via Wolfie Christl). The license begins by warning:

if you do not agree to the terms of this license, you may not install or use the software but should promptly return the software to the place where you obtained it for a refund.

That’s normal enough, and merely reflects the power of copyright holders to impose “take it or leave it” conditions on users. Less common is the following:

Capture One or a third-party designated by Capture One in its sole discretion has the right to verify your compliance with this License at any time upon request including without limitation to request information regarding your installation and/or use of the Software and/or to perform on-site investigations of your installation and use of the Software.

If you use Capture One, you must provide “without limitation access to your premises, IT systems on which the Software is installed”, and “Capture One or an Auditor may decide in their sole discretion to apply software search tools in accordance with audits.”

That is, thanks to copyright, a company is perfectly able to demand the right to access a user’s premises, the computer systems they use, and to run search tools on that system as part of an audit. Although this applies to business premises, there’s no reason a software license could not demand the same right to access somebody’s home. In fact, there are really no limits on what may be required. You’re not obliged to agree to such terms, but most people do, often without even checking the details.

The fact that such requirements are possible shows how far copyright has strayed from the claimed purpose of protecting creators and promoting creativity. Copyright has mutated into a monster because it was never designed to regulate activities, as it does with software, just static objects like books and drawings.

Source: Does Copyright Give Companies The Right To Search Your Home And Computer? | Techdirt

Blizzard started with this with World of Warcraft, allowing itself to search your hard drive and memory. Many games since then have given themselves this ability, which they make use of.

Microsoft blocks workaround that let Windows 11 users avoid its Edge browser – browser wars are on again

Microsoft plans to update Windows 11 to block a workaround that has allowed users to open Start menu search results in a browser other than Edge. The loophole was popularized by EdgeDeflector, an app that allows you to bypass some of the built-in browser restrictions found in Windows 10 and 11. Before this week, companies like Mozilla and Brave had planned to implement similar workarounds to allow users to open Start menu results in their respective browsers, but now won’t be able to do so.

When the block first appeared in an early preview build of Windows 11 last week, it looked like it was added by mistake. However, on Monday, the company confirmed it intentionally closed the loophole.

“Windows openly enables applications and services on its platform, including various web browsers,” a spokesperson for Microsoft told The Verge. “At the same time, Windows also offers certain end-to-end customer experiences in both Windows 10 and Windows 11, the search experience from the taskbar is one such example of an end-to-end experience that is not designed to be redirected. When we become aware of improper redirection, we issue a fix.”

Daniel Aleksandersen, the developer of EdgeDeflector, was quick to criticize the move. “These aren’t the actions of an attentive company that cares about its product anymore,” he said in a blog post. “Microsoft isn’t a good steward of the Windows operating system. They’re prioritizing ads, bundleware, and service subscriptions over their users’ productivity.”

Mozilla was similarly critical of Microsoft. “People deserve choice. They should have the ability to simply and easily set defaults and their choice of default browser should be respected,” a spokesperson for the company told The Verge. “We have worked on code that launches Firefox when the microsoft-edge protocol is used for those users that have already chosen Firefox as their default browser. Following the recent change to Windows 11, this planned implementation will no longer be possible.”

[…]

Source: Microsoft blocks workaround that let Windows 11 users avoid its Edge browser | Engadget

Portugal: Proposed law tries to sneak in biometric mass surveillance.

Whilst the European Parliament has been fighting bravely for the rights of everyone in the EU to exist freely and with dignity in publicly accessible spaces, the government of Portugal is attempting to push their country in the opposite direction: one of digital authoritarianism.

[…]

Eerily reminiscent of the failed attempts by the Serbian government just two months ago to rush in a biometric mass surveillance law, Portugal now asked its Parliament to approve a law in a shocking absence of democratic scrutiny. Just two weeks before the national Assembly will be dissolved, the government wants Parliamentarians to quickly approve a law, without public consultation or evidence. The law would enable and encourage widespread biometric mass surveillance – even though we have repeatedly shown just how harmful these practices are.

[…]

Source: Portugal: Proposed law tries to sneak in biometric mass surveillance. – Reclaim Your Face

Woman Allegedly Made $57,000 From Unofficial Demon Slayer Cakes

A 34-year-old resident of Tokyo’s Shibuya has been arrested on suspicion of violating Japanese copyright law after selling unlicensed Demon Slayer cakes.

According to Kyodo News, the women sold the cakes through Instagram, with customers submitting their desired images to be turned into frosting, cream, and sugar. The suspect is said to have charged between 13,000 yen ($114) and 15,000 yen ($132) per cake. Since July 2019, it is believed she made over 6,500,000 yen in sales. That’s over $57,000!

It’s a lot of cakes, too.

The Metropolitan Police Department released photos of the criminal cakes in question, which can be seen in the above TBS News clip.

Source: Woman Allegedly Made $57,000 From Unofficial Demon Slayer Cakes

yay well done copyright. not.

Apple has tight control over states’ digital ID cards

Apple’s digital ID card support in iOS 15 may be convenient, but it also comes with tight requirements for the governments that use them. CNBC has learned states using Apple’s system are required to not only run the platforms for issuing and checking credentials, but hire managers to handle Apple’s requests and meet the iPhone maker’s performance reporting expectations. States also have to “prominently” market the feature and encourage other government agencies (both state and federal) to adopt the technology.

Contracts are nearly identical for Arizona, Georgia, Kentucky and Oklahoma, some of the earliest adopters of the program. That suggests other states, including Connecticut, Iowa, Maryland and Utah, may have to honor similar terms.

Apple declined to comment. A representative for Arizona’s Transportation Department told CNBC there were no payments to Apple or other “economic considerations,” though the states would have to cover the costs.

The details raise a number of concerns. While it isn’t surprising that states would have pay for at least some of the expenses, the contracts give a private company a significant amount of control over the use and promotion of government systems while asking governments to foot the bills.

[…]

Source: Apple has tight control over states’ digital ID cards | Engadget

Take Two and Rockstar Use DMCA Claims To Remove More GTA Mods

As players continue to criticize the recently released GTA Trilogy remastered collection, Rockstar Games parent company Take-Two Interactive has decided this is the perfect time to use DMCA takedown notices to remove some more GTA mods and fan projects.

On November 11, according to the folks over at the GTA modding site LibertyCity, Take-Two contacted them and used DMCA strikes to remove three different GTA-related mods. The three removed mods are listed below:

  • GTA Advance PC Port Beta 2
  • The Lost and Damned Unlocked for GTA 4
  • GTA IV EFLC The Lost And Damned (65%)

GTA Advance PC Port is a fan-developed project attempting to port the game into the GTA 3 engine. Developed by Digital Eclipse, GTA Advance was only released on the GameBoy Advance in 2004.

The Lost and Damned Unlocked for GTA IV is a mod released in 2009 which lets players swap out the star of GTA IV, Niko Bellic, with the protagonist of the Lost and Damned DLC, biker Johnny Klebitz. It also included some new biker outfits and icons.

Finally, GTA IV EEFLC (65%) isn’t even a mod! It’s just a save file for the game that lets players start from 65% completion. Yes, Take-Two used a DMCA strike against a save file for a game released over a decade ago.

These are just the latest in a growing number of GTA mods Take-Two has gone after and removed using legal DMCA notices. Over the last year, the company has been on a takedown spree, like a GTA character on a rampage. It has also sued fan devs over source code projects and led to some old mods, like GTA Underground, shutting down over fears of more legal and financial trouble.

[…]

Regardless of if these takedowns are evidence of a future GTA IV remaster or not, it still is a frustrating situation for modders and community devs who have spent decades improving, porting, and maintaining the classic GTA games, allowing fans to play them years after Rockstar had moved on. Kotaku spoke to some modders who seemed fed up with Rockstar and many more have moved on to other games from other companies, worried about the potential legal pitfalls for continuing to mod Grand Theft Auto titles.

Source: Take Two and Rockstar Use DMCA Claims To Remove More GTA Mods