Friendicahttps://poliverso.org/profile/privacypostla timeline di The Privacy PostUpdates from The Privacy Post on Benvenuto nel Poliversohttps://poliverso.org/photo/profile/privacypost.png?ts=16435464592024-03-29T09:12:42Zhttps://poliverso.org/profile/privacyposthttp://activitystrea.ms/schema/1.0/personhttps://poliverso.org/profile/privacypostprivacypostprivacypost@poliverso.orgLe notizie sulla privacy in Italia e in EuropaprivacypostThe Privacy PostLe notizie sulla privacy in Italia e in Europahttp://activitystrea.ms/schema/1.0/notehttps://poliverso.org/objects/0477a01e-6d4db1cd-a51143affa5f8d55France’s latest foreign interference bill questions democratic control over surveillance services<p><strong>France’s latest foreign interference bill questions democratic control over surveillance services</strong></p><p>On Wednesday (27 March), French MPs backed a bill to expand intelligence services competencies to monitor networks, re-opening a debate on democratic control of these agencies.</p><hr><p><a href="https://www.euractiv.com/section/data-privacy/news/frances-latest-foreign-interference-bill-questions-democratic-control-over-surveillance-services/" target="_blank" rel="noopener noreferrer">euractiv.com/section/data-priv…</a></p>http://activitystrea.ms/schema/1.0/post2024-03-29T08:30:03Z2024-03-29T08:30:03Zhttps://poliverso.org/objects/0477a01e-6d4db1cd-a51143affa5f8d55#contextpublichttp://activitystrea.ms/schema/1.0/notehttps://poliverso.org/objects/0477a01e-80db58c9-82a3fe2e0b1f9384Weekly Chronicles #69<p><strong>Weekly Chronicles #69</strong> <em>Questo è il numero <a href="https://poliverso.org/search?tag=69" class="mention hashtag" rel="tag">#<span>69</span></a> di Privacy Chronicles, la newsletter che ti spiega l’Era Digitale: sorveglianza di massa e privacy, sicurezza dei dati, nuove tecnologie e molto altro.</em></p><p><strong>Cronache della settimana</strong></p><ul><li><em>La Cina dice no al software e hardware statunitense</em></li><li><em>Samourai Wallet decentralizza il Coinjoin</em></li><li><em>L’Unione Europea ha vietato i wallet cripto privati e anonimi, è vero?</em></li></ul><p><strong>Lettere Libertarie</strong></p><ul><li><em>Ross ‘Dread Pirate’ Ulbricht compie 40 anni, in carcere</em></li></ul><p><strong>Rubrica OpSec</strong></p><ul><li><em>Proteggi le tue seed words con l’acciaio</em></li></ul><p><img src="https://substackcdn.com/image/fetch/w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd5c954aa-e24c-4007-b9ff-bb40472d4e59_1020x391.png" style="width:1020px;" alt="https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd5c954aa-e24c-4007-b9ff-bb40472d4e59_1020x391.png"> <a href="https://substackcdn.com/image/fetch/f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd5c954aa-e24c-4007-b9ff-bb40472d4e59_1020x391.png" target="_blank" rel="noopener noreferrer">https://substackcdn.com/image/fetch/f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd5c954aa-e24c-4007-b9ff-bb40472d4e59_1020x391.png</a></p><p><br></p><h3>La Cina dice no al software e hardware statunitense</h3><p><br>La Cina ha recentemente annunciato nuove regole che prevedono il divieto d’utilizzo di <strong>processori Intel e AMD</strong> su PC e server governativi. Il divieto si estende anche a software come <strong>Windows</strong> e in generale prodotti da <strong>Microsoft</strong>, nonché tutti i software per database sviluppati al di fuori della Cina.</p><p>Questa è però in realtà una mezza notizia, poiché la Cina già da tempo aveva <strong>politiche protezioniste</strong> in materia di ICT. Le aziende cinesi già oggi molto spesso usano numerosi strumenti open source per evitare software statunitense. In futuro il fenomeno sarà probabilmente più accentuato.</p><p>Da un lato l’interesse cinese è certamente aumentare il controllo sulla propria infrastruttura nazionale e sui dati, considerati dal governo una <strong>risorsa strategica</strong>, ma anche evitare <strong>rischi di spionaggio</strong> e accessi abusivi a sistemi governativi da parte dell’intelligence statunitense.</p><p>Lo stesso problema, per così dire, lo abbiamo noi europei. Da tempo discutiamo proprio della sorveglianza di massa perpetrata attraverso i software e hardware americani a danno di governi, aziende e cittadini europei, senza però alcun effetto reale. In quanto <strong>colonia politica</strong>, possiamo lamentarci e battere i piedi, ma non certo evitare l’uso degli <strong>strumenti di spionaggio</strong> di Madre Patria.</p><p>Iscriviti ora <a href="https://www.privacychronicles.it/subscribe" target="_blank" rel="noopener noreferrer">https://www.privacychronicles.it/subscribe</a></p><hr><p><img src="https://substackcdn.com/image/fetch/w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1eff168a-a00d-4045-8ce2-00200bc1d9e0_500x357.jpeg." alt="https://substackcdn.com/image/fetch/w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1eff168a-a00d-4045-8ce2-00200bc1d9e0_500x357.jpeg" style="width: 424px;" > <a href=" class="invalid-src" title="Protocollo sorgente non valido">https://substackcdn.com/image/fetch/f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1eff168a-a00d-4045-8ce2-00200bc1d9e0_500x357.jpeg</p><p><em>BitcoinVoucherBot sponsorizza Privacy Chronicles. Clicca qui per iniziare a usarlo! <a href="https://t.me/BitcoinVoucherBot?start=455009905" target="_blank" rel="noopener noreferrer">https://t.me/BitcoinVoucherBot?start=455009905</a></em></p><hr /><p></p><h3>Samourai Wallet decentralizza il Coinjoin</h3><p><br>Continuiamo la rassegna con una notizia più tecnica <a href="https://blog.ronindojo.io/ronindojo-v2-1-3/" target="_blank" rel="noopener noreferrer">https://blog.ronindojo.io/ronindojo-v2-1-3/</a>, ma estremamente <strong>interessante</strong> anche dal punto di vista politico. Il team di sviluppo di Samourai Wallet ha dichiarato di essere finalmente riusciti a decentralizzare il loro strumento di “coinjoin” di Bitcoin, chiamato Whirpool.</p><p> Read more <a href="https://www.privacychronicles.it/p/weekly-chronicles-69" target="_blank" rel="noopener noreferrer">https://www.privacychronicles.it/p/weekly-chronicles-69</a><br>[img=https://substack-post-media.s3.amazonaws.com/public/images/498fe85c-1939-4a9a-b28d-756b7f18d527_1024x1024.png]" title="https://substackcdn.com/image/fetch/w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1eff168a-a00d-4045-8ce2-00200bc1d9e0_500x357.jpeg" style="width: 424px;" >[/url]</p><p><em>BitcoinVoucherBot sponsorizza Privacy Chronicles. Clicca qui per iniziare a usarlo! <a href="https://t.me/BitcoinVoucherBot?start=455009905" target="_blank" rel="noopener noreferrer">https://t.me/BitcoinVoucherBot?start=455009905</a></em></p><hr /><p></p><h3>Samourai Wallet decentralizza il Coinjoin</h3><p><br>Continuiamo la rassegna con una notizia più tecnica <a href="https://blog.ronindojo.io/ronindojo-v2-1-3/" target="_blank" rel="noopener noreferrer">https://blog.ronindojo.io/ronindojo-v2-1-3/</a>, ma estremamente <strong>interessante</strong> anche dal punto di vista politico. Il team di sviluppo di Samourai Wallet ha dichiarato di essere finalmente riusciti a decentralizzare il loro strumento di “coinjoin” di Bitcoin, chiamato Whirpool.</p><p> Read more <a href="https://www.privacychronicles.it/p/weekly-chronicles-69" target="_blank" rel="noopener noreferrer">https://www.privacychronicles.it/p/weekly-chronicles-69</a><br>[img=https://substack-post-media.s3.amazonaws.com/public/images/498fe85c-1939-4a9a-b28d-756b7f18d527_1024x1024.png]"><br><img src="https://substackcdn.com/image/fetch/f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd5c954aa-e24c-4007-b9ff-bb40472d4e59_1020x391.png" alt="" title=""><br><img src="https://substackcdn.com/image/fetch/f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1eff168a-a00d-4045-8ce2-00200bc1d9e0_500x357.jpeg" alt="" title=""></p>http://activitystrea.ms/schema/1.0/post2024-03-29T07:08:05Z2024-03-29T07:08:05Zhttps://poliverso.org/objects/0477a01e-80db58c9-82a3fe2e0b1f9384#contextpublichttp://activitystrea.ms/schema/1.0/notehttps://poliverso.org/objects/0477a01e-1eb8d59b-97637c05872d57d3FPF Statement on Vice President Harris’ announcement on the OMB Policy to Advance Governance, Innovation, and Risk Management in Federal Agencies’ Use of Artificial Intelligence <p><strong>FPF Statement on Vice President Harris’ announcement on the OMB Policy to Advance Governance, Innovation, and Risk Management in Federal Agencies’ Use of Artificial Intelligence </strong> Following the groundbreaking White House Executive Order on AI <a href="https://www.whitehouse.gov/briefing-room/presidential-actions/2023/10/30/executive-order-on-the-safe-secure-and-trustworthy-development-and-use-of-artificial-intelligence/" target="_blank" rel="noopener noreferrer">https://www.whitehouse.gov/briefing-room/presidential-actions/2023/10/30/executive-order-on-the-safe-secure-and-trustworthy-development-and-use-of-artificial-intelligence/</a> last fall, which outlined ambitious goals to promote the safe, secure, and trustworthy use and development of AI systems, Vice President Harris has today announced the publication by the Office of Management and Budget of a binding memorandum on “Advancing Governance, Innovation, and Risk Management for Agency Use of Artificial Intelligence <a href="https://www.whitehouse.gov/wp-content/uploads/2024/03/M-24-10-Advancing-Governance-Innovation-and-Risk-Management-for-Agency-Use-of-Artificial-Intelligence.pdf" target="_blank" rel="noopener noreferrer">https://www.whitehouse.gov/wp-content/uploads/2024/03/M-24-10-Advancing-Governance-Innovation-and-Risk-Management-for-Agency-Use-of-Artificial-Intelligence.pdf</a>,” which indicates the diligent efforts of agencies toward achieving this objective. This commitment is further highlighted by the National Telecommunications and Information Administration (NTIA) publication earlier this week of the“Artificial Intelligence Accountability Policy Report <a href="https://www.ntia.gov/sites/default/files/publications/ntia_ai_report_final-3-27-24.pdf" target="_blank" rel="noopener noreferrer">https://www.ntia.gov/sites/default/files/publications/ntia_ai_report_final-3-27-24.pdf</a><em>,” </em>which details mechanisms to support the creation and adoption of trustworthy AI.</p><p>Although the OMB memorandum primarily focuses on the government’s use of AI, its influence on the private sector will be significant. This is due to not only the requirements for U.S. government vendors and procurement, but also how this framework will create broadly applicable norms and standards for conducting impact assessments, mitigating bias, providing rights to individuals affected by AI systems that impact their rights and safety, and assessing data quality and data privacy in these systems.</p><p><br></p><blockquote>“This is a pivotal moment for the development of AI standards when the public sector has a crucial role to play in setting norms for the assessment and procurement of AI systems. We are particularly enthused by the renewed commitment to bring clarity to the development of AI in the public sector and its national utilization. At FPF, we eagerly anticipate contributing to this crucial work through our evidence-based research on Artificial Intelligence.”<br>– Anne J. Flanagan, FPF Vice President for Artificial Intelligence</blockquote><hr><p><a href="https://fpf.org/blog/fpf-statement-on-vice-president-harris-announcement-on-the-omb-policy-to-advance-governance-innovation-and-risk-management-in-federal-agencies-use-of-artificial-intelligence/" target="_blank" rel="noopener noreferrer">fpf.org/blog/fpf-statement-on-…</a></p>http://activitystrea.ms/schema/1.0/post2024-03-28T14:48:29Z2024-03-28T14:48:29Zhttps://poliverso.org/objects/0477a01e-1eb8d59b-97637c05872d57d3#contextpublichttp://activitystrea.ms/schema/1.0/notehttps://poliverso.org/objects/0477a01e-1c95b696-9e81b7c684f653f6Youth Privacy in Immersive Technologies: Regulatory Guidance, Lessons Learned, and Remaining Uncertainties<p><strong>Youth Privacy in Immersive Technologies: Regulatory Guidance, Lessons Learned, and Remaining Uncertainties</strong> As young people adopt immersive technologies <a href="https://inlea.com/gen-z-and-the-metaverse/" target="_blank" rel="noopener noreferrer">https://inlea.com/gen-z-and-the-metaverse/</a> like extended reality (XR) and virtual world applications, companies are expanding their presence in digital spaces, launching brand experiences, advertisements, and digital products. While virtual worlds may in some ways resemble traditional social media and gaming experiences, they may also collect more data and raise potential manipulation risks, particularly for vulnerable and impressionable young people.</p><p>This policy brief <a href="https://fpf.org/wp-content/uploads/2024/03/Final-Youth_immersive-tech-regulatory-guidance.pdf" target="_blank" rel="noopener noreferrer">https://fpf.org/wp-content/uploads/2024/03/Final-Youth_immersive-tech-regulatory-guidance.pdf</a> analyzes recent regulatory and self-regulatory actions and guidance related to youth privacy, safety, and advertising in immersive spaces, pulling out key lessons for organizations building experiences in virtual worlds.</p><h3><strong>Recent FTC Enforcement Actions and Guidance</strong></h3><p><br>The Federal Trade Commission (FTC) has shown a strong interest in using its consumer protection authority to bring enforcement actions against a wide range of digital companies for alleged “unfair and deceptive” practices, rule violations <a href="https://www.ftc.gov/news-events/news/press-releases/2023/02/ftc-enforcement-action-bar-goodrx-sharing-consumers-sensitive-health-info-advertising" target="_blank" rel="noopener noreferrer">https://www.ftc.gov/news-events/news/press-releases/2023/02/ftc-enforcement-action-bar-goodrx-sharing-consumers-sensitive-health-info-advertising</a>, and other unlawful conduct. The Commission has also issued several policy statements and guidance documents relevant to organizations building immersive technologies, touching on issues such as biometric data and advertising to children. It is clear the agency is thinking seriously about how its authority could apply in emerging sectors like AI <a href="https://www.law360.com/articles/1723298/ftc-won-t-repeat-privacy-mistake-with-ai-bureau-chief-says" target="_blank" rel="noopener noreferrer">https://www.law360.com/articles/1723298/ftc-won-t-repeat-privacy-mistake-with-ai-bureau-chief-says</a>, and organizations working on immersive technologies should take heed. Lessons from recent FTC privacy cases and guidance include:</p><ul><li>The FTC interprets the Children’s Online Privacy Protection Act (COPPA)’s definition of “personal information” broadly <a href="https://www.ftc.gov/legal-library/browse/policy-statement-federal-trade-commission-biometric-information-section-5-federal-trade-commission" target="_blank" rel="noopener noreferrer">https://www.ftc.gov/legal-library/browse/policy-statement-federal-trade-commission-biometric-information-section-5-federal-trade-commission</a>, including data types that immersive technologies commonly collect, like eye tracking <a href="https://www.ftc.gov/system/files/ftc_gov/pdf/microsoftproposedstiporder.pdf" target="_blank" rel="noopener noreferrer">https://www.ftc.gov/system/files/ftc_gov/pdf/microsoftproposedstiporder.pdf</a>.</li><li>Default settings <a href="https://www.ftc.gov/news-events/news/press-releases/2022/12/fortnite-video-game-maker-epic-games-pay-more-half-billion-dollars-over-ftc-allegations" target="_blank" rel="noopener noreferrer">https://www.ftc.gov/news-events/news/press-releases/2022/12/fortnite-video-game-maker-epic-games-pay-more-half-billion-dollars-over-ftc-allegations</a> are key in protecting children’s and teens’ privacy and safety <a href="https://www.ftc.gov/news-events/news/press-releases/2023/06/ftc-will-require-microsoft-pay-20-million-over-charges-it-illegally-collected-personal-information" target="_blank" rel="noopener noreferrer">https://www.ftc.gov/news-events/news/press-releases/2023/06/ftc-will-require-microsoft-pay-20-million-over-charges-it-illegally-collected-personal-information</a>.</li><li>Immersive technologies’ unique capabilities <a href="https://bmdj-vt.github.io/assets/pdfs/Deceptive_Patterns.pdf" target="_blank" rel="noopener noreferrer">https://bmdj-vt.github.io/assets/pdfs/Deceptive_Patterns.pdf</a> may give organizations new ways to engage in manipulative design <a href="https://www.ftc.gov/news-events/news/press-releases/2023/05/ftc-doj-charge-amazon-violating-childrens-privacy-law-keeping-kids-alexa-voice-recordings-forever" target="_blank" rel="noopener noreferrer">https://www.ftc.gov/news-events/news/press-releases/2023/05/ftc-doj-charge-amazon-violating-childrens-privacy-law-keeping-kids-alexa-voice-recordings-forever</a>.</li><li>Immersive application providers must comply with COPPA if their application is “directed to children <a href="https://www.ftc.gov/system/files/ftc_gov/pdf/2223087EpicGamesComplaint.pdf" target="_blank" rel="noopener noreferrer">https://www.ftc.gov/system/files/ftc_gov/pdf/2223087EpicGamesComplaint.pdf</a>” or if there is “actual knowledge <a href="https://www.esrb.org/privacy-certified-blog/wrapping-up-2022-with-a-huge-epic-fortnite-privacy-case/" target="_blank" rel="noopener noreferrer">https://www.esrb.org/privacy-certified-blog/wrapping-up-2022-with-a-huge-epic-fortnite-privacy-case/</a>” children are accessing it.</li><li>Organizations should provide privacy policies and notices in a format appropriate for <a href="https://www.ftc.gov/system/files/ftc_gov/pdf/microsoftcomplaintcivilpenalties.pdf" target="_blank" rel="noopener noreferrer">https://www.ftc.gov/system/files/ftc_gov/pdf/microsoftcomplaintcivilpenalties.pdf</a> and consistent with the design elements <a href="https://www.ttclabs.net/site/assets/files/11085/data_transparency_and_control_in_xr_and_the_metaverse_report.pdf" target="_blank" rel="noopener noreferrer">https://www.ttclabs.net/site/assets/files/11085/data_transparency_and_control_in_xr_and_the_metaverse_report.pdf</a> of immersive experiences.</li><li>Organizations should take additional steps to be transparent <a href="https://www.ftc.gov/system/files/ftc_gov/pdf/p214505kidsadvertisingstaffperspective092023.pdf" target="_blank" rel="noopener noreferrer">https://www.ftc.gov/system/files/ftc_gov/pdf/p214505kidsadvertisingstaffperspective092023.pdf</a> about advertising practices.</li></ul><p><br> </p><h3><strong>Self-Regulatory Cases and Safe Harbor Guidance</strong></h3><p><br>Self-regulatory bodies also have an essential role in ensuring privacy and safety in child-directed applications and providing guidance to companies operating in the space. For example, organizations designated as COPPA Safe Harbors <a href="https://www.ftc.gov/enforcement/coppa-safe-harbor-program" target="_blank" rel="noopener noreferrer">https://www.ftc.gov/enforcement/coppa-safe-harbor-program</a> can guide companies toward compliant, developmentally appropriate, and privacy-protecting practices. Lessons from recent self-regulatory cases and Safe Harbor guidance include:</p><ul><li>Advertising disclosures in immersive environments should be designed to be as clear and conspicuous <a href="https://bbbprograms.org/media-center/dd/firefly-games-violations" target="_blank" rel="noopener noreferrer">https://bbbprograms.org/media-center/dd/firefly-games-violations</a> as possible and provided in an age-appropriate <a href="https://bbbnp-bbbp-stf-use1-01.s3.amazonaws.com/docs/default-source/caru/caru_advertisingguidelines.pdf" target="_blank" rel="noopener noreferrer">https://bbbnp-bbbp-stf-use1-01.s3.amazonaws.com/docs/default-source/caru/caru_advertisingguidelines.pdf</a> manner.</li><li>Platforms that allow advertisements to children should ensure <a href="https://bbbprograms.org/media-center/dd/roblox-advertising" target="_blank" rel="noopener noreferrer">https://bbbprograms.org/media-center/dd/roblox-advertising</a> that developers, brands, and content creators have the necessary tools and guidance <a href="https://bbbnp-bbbp-stf-use1-01.s3.amazonaws.com/docs/default-source/caru/caru_advertisingguidelines.pdf" target="_blank" rel="noopener noreferrer">https://bbbnp-bbbp-stf-use1-01.s3.amazonaws.com/docs/default-source/caru/caru_advertisingguidelines.pdf</a> to clearly and conspicuously disclose the presence of advertising to children.</li><li>Privacy by design and by default demonstrate to regulatory and self-regulatory bodies that an organization takes youth privacy seriously <a href="https://bbbprograms.org/media-center/dd/caru-finds-snap-inc.-complies-with-coppa.-company-goes-beyond-minimal-procedures-to-prevent-under-age-use" target="_blank" rel="noopener noreferrer">https://bbbprograms.org/media-center/dd/caru-finds-snap-inc.-complies-with-coppa.-company-goes-beyond-minimal-procedures-to-prevent-under-age-use</a>.</li><li>Privacy and advertising practices for teens <a href="https://industryselfregulation.org/docs/librariesprovider5/default-document-library/tapp_roadmap.pdf" target="_blank" rel="noopener noreferrer">https://industryselfregulation.org/docs/librariesprovider5/default-document-library/tapp_roadmap.pdf</a> should take into account the unique considerations relevant to teen privacy and safety, compared to child and adult guidance.</li><li>Organizations with a robust privacy culture that demonstrate good faith efforts <a href="https://bbbprograms.org/media-center/dd/caru-finds-snap-inc.-complies-with-coppa.-company-goes-beyond-minimal-procedures-to-prevent-under-age-use" target="_blank" rel="noopener noreferrer">https://bbbprograms.org/media-center/dd/caru-finds-snap-inc.-complies-with-coppa.-company-goes-beyond-minimal-procedures-to-prevent-under-age-use</a> to follow the law are more likely to be given the benefit of the doubt.</li></ul><p><br> </p><h3><strong>Remaining Areas of Uncertainty</strong></h3><p><br>Because immersive technologies are relatively new and evolve rapidly, much of the existing regulatory and self-regulatory guidance is pulled from other contexts. Therefore, questions remain about how regulations apply in immersive environments and how to operationalize best practices. These questions include:</p><ul><li>How <strong>age-appropriate design principles</strong> will best fit into an immersive technology context, such as how best to ensure strong default privacy settings for underage users; the best methods for clarity and transparency regarding data practices notices and advertising disclosures; and whether an immersive experience should require unique, additional safeguards.</li><li>What <strong>novel data collection and analysis methods</strong> in the immersive technology space will require discerning data practices surrounding its safeguarding and use, such as what kinds of inferences are appropriate to make from body-based data or to what extent avatars not derived from a child’s data are considered personal information.</li><li>How<strong> immersive technology</strong><strong>impacts children and teens</strong>; more research is needed to understand whether certain kinds of experiences and privacy practices are harmful for children and teens, if there are unique risks to children’s privacy and mental health, and how organizations, parents, schools, and other stakeholders can address potential issues.</li></ul><p><br><strong>Download the Brief</strong> <a href="https://fpf.org/wp-content/uploads/2024/03/Final-Youth_immersive-tech-regulatory-guidance.pdf" target="_blank" rel="noopener noreferrer">https://fpf.org/wp-content/uploads/2024/03/Final-Youth_immersive-tech-regulatory-guidance.pdf</a></p><hr><p><a href="https://fpf.org/blog/youth-privacy-in-immersive-technologies-regulatory-guidance-lessons-learned-and-remaining-uncertainties/" target="_blank" rel="noopener noreferrer">fpf.org/blog/youth-privacy-in-…</a></p>http://activitystrea.ms/schema/1.0/post2024-03-26T15:06:56Z2024-03-26T15:06:56Zhttps://poliverso.org/objects/0477a01e-1c95b696-9e81b7c684f653f6#contextpublichttp://activitystrea.ms/schema/1.0/notehttps://poliverso.org/objects/0477a01e-44ddb235-1c6f3f9539f6135dAutorità nazionale per l’intelligenza artificiale: le nostre proposte<p><strong>Autorità nazionale per l’intelligenza artificiale: le nostre proposte</strong> Approvato l’AI Act dal Parlamento europeo, ora tocca agli Stati membri garantirne la corretta applicazione creando un’autorità nazionale per il governo dell’IA indipendente.</p><p>Insieme a Privacy Network, The Good Lobby, e molte altre organizzazioni italiane, abbiamo pubblicato un documento con le nostre raccomandazioni a politici e istituzioni che presto dovranno decidere quali caratteristiche dovrà avere l’autorità italiana.</p><p><a href="https://www.hermescenter.org/wp-content/uploads/2024/03/Autorita-AI-Ita-2024-1.pdf" target="_blank" rel="noopener noreferrer">https://www.hermescenter.org/wp-content/uploads/2024/03/Autorita-AI-Ita-2024-1.pdf</a><a href="https://www.hermescenter.org/wp-content/uploads/2024/03/Autorita-AI-Ita-2024-1.pdf" target="_blank" rel="noopener noreferrer">Download</a></p><p>Di seguito riportiamo in sintesi le caratteristiche principali che l’autorità nazionale per l’intelligenza artificiale dovrà possedere, per essere in gradi di affrontare il compito che la attende:</p><p><strong>Indipendenza e Autonomia Politica. </strong></p><p>Questa Autorità dovrebbe, innanzitutto, essere indipendente e autonoma da influenze politiche e interessi economici. Per questo raccomandiamo che i componenti del collegio vengano nominati attraverso un percorso parlamentare trasparente e possibilmente partecipativo.</p><p><strong>Multidisciplinarietà. </strong></p><p>L’autorità dovrà disporre di personale competente ed esperto con una conoscenza approfondita e multidisciplinare dell’IA, dei dati e dell’informatica, dei diritti fondamentali, dei rischi per la salute e per la sicurezza ,delle norme e dei requisiti giuridici esistenti. Devono essere inclusi esperti in scienze sociali e umanistiche per assicurare un’analisi esaustiva degli impatti dell’IA sulla società.</p><p><strong>Etica e Standardizzazione. </strong></p><p>Con un’autorità indipendente per l’IA ci sarebbe maggiore chiarezza nella distribuzione delle competenze, facilitando e uniformando l’applicazione delle norme. Un ente ad-hoc potrebbe concentrarsi sulle implicazioni etiche e legali, fornendo linee guida e supporto alle organizzazioni che sviluppano e impiegano l’IA.</p><p><strong>Trasparenza e Accesso alle Informazioni. </strong></p><p>La nuova autorità indipendente per l’IA dovrebbe sfruttare il proprio mandato per offrire una supervisione trasparente e mettere cittadine e cittadini nelle condizioni di comprendere le applicazioni dell’IA, i dati coinvolti e le decisioni adottate. Per questo suggeriamo all’autorità di istituire un registro algoritmico nazionale.</p><p><strong>Apertura. </strong></p><p>In linea con i principi dell’open governmenti, è importante che l’autorità si doti anche di meccanismi di apertura nei confronti della società civile. Tavoli di lavoro, commissioni miste, protocolli di intesa, sono “strumenti” che possono facilitare il dialogo tra l’autorità e i soggetti che da anni si occupano del tema, rendendone l’operato più efficace.</p><p><strong>Capacità Finanziaria. </strong></p><p>Ci auguriamo che l’autorità sia fornita di risorse economiche e strumentali adatte: questo significa disporre di personale interno adeguato, formato e remunerato adeguatamente. Consigliamo anche di prevedere fondi per realizzare studi finalizzati ad aggiornare periodicamente la fotografia dello stato dell’arte dell’IA in Italia.</p><p><strong>Rappresentatività del Collegio. </strong></p><p>Le persone nominate nel board dell’autorità dovranno rappresentare il più ampio spettro sociale possibile, anche in termini di genere, etnia, background culturale e di rappresentazione generazionale.</p><p><strong>Agilità Operativa. </strong></p><p>L’autorità indipendente si troverà nelle condizioni di dover rispondere con immediatezza alle sfide poste dalle rapide innovazioni nel campo dell’IA. Per questo servono validi meccanismi di controllo per verificare che ciò avvenga in maniera etica e rispettosa dei diritti fondamentali.</p><p><strong>Meccanismi di controllo. </strong></p><p>L’Agenzia nominata dovrà essere in grado di implementare misure e linee guida a supporto di chi sviluppa o adotta sistemi di IA. Dovrà, inoltre, sviluppare meccanismi di controllo per intervenire quando non vengono rispettate. Questi meccanismi di controllo dovranno essere tanto reattivi quanto accurati, assicurando che le decisioni automatizzate siano prese con una piena consapevolezza di tutte implicazioni etiche e sociali.</p><p>The post Autorità nazionale per l’intelligenza artificiale: le nostre proposte <a href="https://www.hermescenter.org/it/autorita-nazionale-per-lintelligenza-artificiale-le-nostre-proposte/" target="_blank" rel="noopener noreferrer">https://www.hermescenter.org/it/autorita-nazionale-per-lintelligenza-artificiale-le-nostre-proposte/</a> appeared first on Hermes Center <a href="https://www.hermescenter.org/it/home" target="_blank" rel="noopener noreferrer">https://www.hermescenter.org/it/home</a>.</p>http://activitystrea.ms/schema/1.0/post2024-03-22T12:03:07Z2024-03-22T12:03:07Zhttps://poliverso.org/objects/0477a01e-44ddb235-1c6f3f9539f6135d#contextpublichttp://activitystrea.ms/schema/1.0/notehttps://poliverso.org/objects/0477a01e-4d845586-c23ff53ed97d23cbECJ rules against EU law on fingerprints in national IDs<p><strong>ECJ rules against EU law on fingerprints in national IDs</strong></p><p>The European Court of Justice (ECJ) ruled on Thursday (21 March) that a 2019 EU regulation obliging EU citizens to give their fingerprints for national identification cards was founded on the wrong legal basis, declaring the EU law entirely invalid.</p><hr><p><a href="https://www.euractiv.com/section/data-privacy/news/ecj-rules-against-eu-law-on-fingerprints-in-national-ids/" target="_blank" rel="noopener noreferrer">euractiv.com/section/data-priv…</a></p>http://activitystrea.ms/schema/1.0/post2024-03-21T11:42:05Z2024-03-21T11:42:05Zhttps://poliverso.org/objects/0477a01e-4d845586-c23ff53ed97d23cb#contextpublichttp://activitystrea.ms/schema/1.0/notehttps://poliverso.org/objects/0477a01e-c64e9f30-07ec0a4a670648e2New Report Explores Privacy Implications of Driver Safety Systems<p><strong>New Report Explores Privacy Implications of Driver Safety Systems</strong> <em>Report Offers Recommendations for Organizations Developing, Implementing, and Regulating Technologies</em></p><p>Today, the Future of Privacy Forum <a href="https://fpf.org/" target="_blank" rel="noopener noreferrer">https://fpf.org/</a> (FPF) is releasing a new report <a href="https://fpf.org/wp-content/uploads/2024/03/FPF-Vehicle-Safety-Systems_March2024-FINAL.pdf" target="_blank" rel="noopener noreferrer">https://fpf.org/wp-content/uploads/2024/03/FPF-Vehicle-Safety-Systems_March2024-FINAL.pdf</a> explaining how safeguarding driver privacy and data protection will be critical to ensuring widespread acceptance of new safety technology in vehicles. This report <a href="https://fpf.org/wp-content/uploads/2024/03/FPF-Vehicle-Safety-Systems_March2024-FINAL.pdf" target="_blank" rel="noopener noreferrer">https://fpf.org/wp-content/uploads/2024/03/FPF-Vehicle-Safety-Systems_March2024-FINAL.pdf</a> comes as the National Highway Traffic Safety Administration (NHTSA) is in the process of establishing new requirements for safety technology that vehicle manufacturers will soon integrate into vehicles of the future.</p><p>FPF’s report <a href="https://fpf.org/wp-content/uploads/2024/03/FPF-Vehicle-Safety-Systems_March2024-FINAL.pdf" target="_blank" rel="noopener noreferrer">https://fpf.org/wp-content/uploads/2024/03/FPF-Vehicle-Safety-Systems_March2024-FINAL.pdf</a> explores the privacy implications of vehicle safety systems – including Advanced Driver Assistance Systems (ADAS) and Driver Monitoring Systems (DMS) – and impairment detection technologies, which use automated technology to enhance vehicle safety. In addition to core recommendations for public and private entities developing and enforcing these technologies, the report includes insights from a survey completed with the Automotive Coalition for Traffic Safety <a href="https://actsautosafety.org/" target="_blank" rel="noopener noreferrer">https://actsautosafety.org/</a>, which gauges individuals’ attitudes toward the use of Vehicle Safety Systems and explores how to prioritize privacy.</p><p><br></p><blockquote>“Vehicle safety systems can save lives and reduce injuries–but only if people use them. Policy makers and auto manufacturers must consider the privacy and data protection implications for all drivers when incorporating new technology into vehicles to bolster driver trust and adoption.”<br>Adonne Washington <a href="https://fpf.org/person/adonne-washington/" target="_blank" rel="noopener noreferrer">https://fpf.org/person/adonne-washington/</a>, Policy Counsel of Data, Mobility, and Location</blockquote><p><br>The 2021 Infrastructure Investment and Jobs Act requires NHTSA to establish a new Federal Motor Vehicle Safety Standard surrounding impaired driving technology. In response, the report <a href="https://fpf.org/wp-content/uploads/2024/03/FPF-Vehicle-Safety-Systems_March2024-FINAL.pdf" target="_blank" rel="noopener noreferrer">https://fpf.org/wp-content/uploads/2024/03/FPF-Vehicle-Safety-Systems_March2024-FINAL.pdf</a> identifies five core recommendations for organizations developing, implementing, and regulating these technologies:</p><ul><li>Regulators, technology developers, and technology deployers should ensure that privacy is a foundational principle for any Vehicle Safety System and should implement appropriate legal, policy, and technical safeguards when personal information is implicated, including measures that:</li><li>Technology developers and technology deployers should de-identify data collected by Vehicle Safety Systems as appropriate.</li><li>Impairment-detection systems should be accurate, should be tested for potential bias, and should not produce false-positive results more often for people from underrepresented, marginalized, and multimarginalized communities. Well-defined standards for consistent deployment and alignment across the industry may be beneficial.</li><li>Driver acceptance should be promoted through transparency about Vehicle Safety Systems functions and operations, as well as the handling of personal data.</li><li>Regulators, technology developers, and technology deployers should identify and mitigate, to the extent possible, potential future harms to drivers, especially to people from underrepresented, marginalized, and multimarginalized communities.</li></ul><p><br>The survey results informed the recommendations. The key findings from the survey revealed that many individuals value advanced vehicle safety technologies but worry about the privacy risks, accuracy of the technology, cost, and data transfers to third parties. Additionally, individuals indicated that they generally trust carmakers’ data practices more than online companies and the government but worry about vehicle systems that collect information about occupant behaviors. Individuals want to incorporate these technologies for safety but need privacy and data protection practices like disclosure limits, encryption, on-car storage, and de-identification to trust these systems.</p><p><br></p><blockquote>“Ensuring privacy protections in vehicles is necessary. Privacy protections can’t be considered at the end of the process when developing technology and shouldn’t be considered in a vacuum, but rather privacy should be continually considered in regard not only to every stage of the development pipeline but also to any unique risks for marginalized or multimarginalized individuals and communities.”<br>Adonne Washington <a href="https://fpf.org/person/adonne-washington/" target="_blank" rel="noopener noreferrer">https://fpf.org/person/adonne-washington/</a>, Policy Counsel of Data, Mobility, and Location</blockquote><p><br>The report <a href="https://fpf.org/wp-content/uploads/2024/03/FPF-Vehicle-Safety-Systems_March2024-FINAL.pdf" target="_blank" rel="noopener noreferrer">https://fpf.org/wp-content/uploads/2024/03/FPF-Vehicle-Safety-Systems_March2024-FINAL.pdf</a> examines the strategies needed to protect consumer privacy when technologies, especially those to detect impairment, are included in vehicles. Washington underscored that policy leaders, regulators, and automakers should use the resources published to better understand drivers’ knowledge of data collection and safety systems in and around new and advanced vehicles.</p><p>FPF will also host a panel discussion and reception on the report. Learn more about the event here <a href="https://www.eventbrite.com/e/fpfs-driving-the-conversation-on-privacy-and-vehicle-safety-systems-tickets-827210026457" target="_blank" rel="noopener noreferrer">https://www.eventbrite.com/e/fpfs-driving-the-conversation-on-privacy-and-vehicle-safety-systems-tickets-827210026457</a>.</p><p><strong>DOWNLOAD THE REPORT</strong> <a href="https://fpf.org/wp-content/uploads/2024/03/FPF-Vehicle-Safety-Systems_March2024-FINAL.pdf" target="_blank" rel="noopener noreferrer">https://fpf.org/wp-content/uploads/2024/03/FPF-Vehicle-Safety-Systems_March2024-FINAL.pdf</a></p><hr><p><a href="https://fpf.org/blog/new-report-explores-privacy-implications-of-driver-safety-systems/" target="_blank" rel="noopener noreferrer">fpf.org/blog/new-report-explor…</a></p>http://activitystrea.ms/schema/1.0/post2024-03-21T11:45:00Z2024-03-21T11:45:00Zhttps://poliverso.org/objects/0477a01e-c64e9f30-07ec0a4a670648e2#contextpublichttp://activitystrea.ms/schema/1.0/notehttps://poliverso.org/objects/0477a01e-c9cfde9e-e160aee47fcce989New note by privacypost<p>"Pagare o andare bene": 1.500 € all'anno per la vostra privacy online? Se "Pay or Okay" dovesse essere legittimato per Meta, le aziende di tutti i settori potrebbero seguirne l'esempio. Ma qual è la situazione attuale negli Stati membri? <img src="https://noyb.eu/sites/default/files/styles/media_large/public/2024-03/bathroom_stall_2.png?itok=qJfsdNvE" alt="Pay or Okay Bathroom Stall" title="Pay or Okay Bathroom Stall"></p><hr><p><a href="https://noyb.eu/it/pay-or-okay-1500-eu-year-your-online-privacy" target="_blank" rel="noopener noreferrer">noyb.eu/it/pay-or-okay-1500-eu…</a></p>http://activitystrea.ms/schema/1.0/post2024-03-19T10:52:45Z2024-03-19T10:52:45Zhttps://poliverso.org/objects/0477a01e-c9cfde9e-e160aee47fcce989#contextpublichttp://activitystrea.ms/schema/1.0/notehttps://poliverso.org/objects/0477a01e-b9fcbe7c-f06e2d72fef67da4Privacy and the Rise of “Neurorights” in Latin America<p><strong>Privacy and the Rise of “Neurorights” in Latin America</strong> <em>Authors: Beth Do, Maria Badillo, Randy Cantz, Jameson Spivack</em></p><p><strong>“Neurorights</strong>,” a set of proposed rights that specifically protect mental freedom and privacy, have captured the interest of many governments, scholars, and advocates. Nowhere is that more apparent than in Latin America, where several countries are actively seeking to enshrine these rights in law, and some even in their Constitutions.</p><p>The rapid global proliferation <a href="https://fpf.org/blog/five-top-of-mind-data-protection-recommendations-for-brain-computer-interfaces/" target="_blank" rel="noopener noreferrer">https://fpf.org/blog/five-top-of-mind-data-protection-recommendations-for-brain-computer-interfaces/</a> of <strong>neurotechnology</strong>—devices that can access mental states by decoding and modulating neural activity—has generated a large amount of consumer <strong>neurodata </strong>(also known as neural, brain, or cerebral data; brain information; mental activity; etc.). As most existing privacy laws do not separately or explicitly regulate neurodata—even though such data is normally covered by the broad definitions of “personal data” in such legislation—several governments and international bodies have begun to develop specific legal protections for this type of personal data.</p><p>This analysis focuses on current legislative efforts in Chile, Mexico, and Brazil, which are indicative of how far the conversation in Latin America has progressed. Other jurisdictions, such as the United States <a href="https://leg.colorado.gov/sites/default/files/documents/2024A/bills/2024a_1058_01.pdf" target="_blank" rel="noopener noreferrer">https://leg.colorado.gov/sites/default/files/documents/2024A/bills/2024a_1058_01.pdf</a>, Israel <a href="https://braintech.kenes.com/about-ibt/" target="_blank" rel="noopener noreferrer">https://braintech.kenes.com/about-ibt/</a>, South Korea <a href="https://www.kbri.re.kr/new/pages_eng/sub/page.html?mc=3186" target="_blank" rel="noopener noreferrer">https://www.kbri.re.kr/new/pages_eng/sub/page.html?mc=3186</a>, and Europe <a href="https://www.lamoncloa.gob.es/presidente/actividades/Documents/2021/140721-Carta_Derechos_Digitales_RedEs.pdf" target="_blank" rel="noopener noreferrer">https://www.lamoncloa.gob.es/presidente/actividades/Documents/2021/140721-Carta_Derechos_Digitales_RedEs.pdf</a>, are also in the nascent stages of discussing protections for mental privacy. As neurotechnologies continue to evolve, industry and regulatory bodies alike should look to Latin America for developing trends and best practices.</p><h3><strong>1. What is neurotechnology?</strong></h3><p>Neurotechnology <a href="https://pubmed.ncbi.nlm.nih.gov/37183686/" target="_blank" rel="noopener noreferrer">https://pubmed.ncbi.nlm.nih.gov/37183686/</a> is an umbrella term for technologies that allow access to neurodata. Raw neurodata is collected from an individual’s central nervous system (the brain and spinal cord) and/or peripheral nervous system (the nerves outside the brain and spinal cord), including electrical activity between these systems. Neurotechnology includes both traditional techniques such as electroencephalography (EEG) testing and magnetic resonance imaging (MRI) scans, as well as new methods that can monitor or modulate brain activity.</p><p>Neurodata is valuable and uniquely sensitive as it can access a person’s emotions, biases, and memories. For example, EEGs can measure inattention, as brainwaves can indicate whether someone’s mind is focused or wandering. With sufficient data over a period of time, brainwave patterns may also even be more uniquely identifying than fingerprints <a href="https://doi.org/10.1101/2021.03.24.436733" target="_blank" rel="noopener noreferrer">https://doi.org/10.1101/2021.03.24.436733</a>.</p><h3><strong>2. What are neurorights?</strong></h3><p>“Neurorights” have been formulated to encompass mental privacy, integrity, and liberty. They are not yet widely recognized at the national level or codified in an international human rights framework, and there is disagreement about their usefulness as a conceptual framework. Some prefer using other terms such as “mental privacy <a href="https://www.frontiersin.org/articles/10.3389/fnhum.2021.701258/full" target="_blank" rel="noopener noreferrer">https://www.frontiersin.org/articles/10.3389/fnhum.2021.701258/full</a>” or “cognitive liberty <a href="https://iapp.org/news/a/an-introduction-to-neurorights-and-the-next-flashpoint-of-medical-privacy/" target="_blank" rel="noopener noreferrer">https://iapp.org/news/a/an-introduction-to-neurorights-and-the-next-flashpoint-of-medical-privacy/</a>;” others question <a href="https://www.coe.int/en/web/bioethics/round-table-on-the-human-rights-issues-raised-by-the-applications-of-neurotechnologies" target="_blank" rel="noopener noreferrer">https://www.coe.int/en/web/bioethics/round-table-on-the-human-rights-issues-raised-by-the-applications-of-neurotechnologies</a> the necessity of introducing new rights, or if current legal frameworks are sufficient or could be strengthened to account for them. Neurorights can be simplified into five fundamental rights <a href="https://neurorightsfoundation.org/mission" target="_blank" rel="noopener noreferrer">https://neurorightsfoundation.org/mission</a>:</p><ul><li><strong>Mental Privacy</strong>: Personal neurodata should be private, and should not be stored or sold without consent.</li><li><strong>Personal Identity</strong>: Neurotechnology should not alter “mental integrity,” or an individual’s sense of self. </li><li><strong>Free Will</strong>: Individuals should retain decision-making control, without unknown manipulation via neurotechnology.</li><li><strong>Fair Access to Mental Augmentation</strong>: Cognitive enhancement neurotechnology should be accessible to everyone.</li><li><strong>Protection from Bias</strong>: Neurotechnology algorithms should not discriminate.</li></ul><p><br> </p><h3><strong>3. The emergence of neurorights</strong></h3><p>Advances in neurotechnology, partly funded by large research programs such as the US-based Brain Research Through Advancing Innovative Neurotechnologies (<a href="https://obamawhitehouse.archives.gov/BRAIN" target="_blank" rel="noopener noreferrer">https://obamawhitehouse.archives.gov/BRAIN</a>) Initiative, have spurred global interest in establishing legal safeguards for the brain and neurodata. In 2019, the Organisation for Economic Co-operation and Development (OECD) developed the first international standards to respond to neurotechnology’s ethical, legal, and social challenges. The OECD’s Recommendation on Responsible Innovation in Neurotechnology <a href="https://www.oecd.org/science/emerging-tech/recommendation-on-responsible-innovation-in-neurotechnology.htm" target="_blank" rel="noopener noreferrer">https://www.oecd.org/science/emerging-tech/recommendation-on-responsible-innovation-in-neurotechnology.htm</a> provides guiding principles to prioritize safety, inclusivity, collaboration, and trust in neurotechnology. In 2022, the UNESCO International Bioethics Committee issued a report <a href="https://unesdoc.unesco.org/ark:/48223/pf0000383559" target="_blank" rel="noopener noreferrer">https://unesdoc.unesco.org/ark:/48223/pf0000383559</a> on the ethical issues of neurotechnology and advocated for a comprehensive governance framework <a href="https://www.unesco.org/en/articles/ethics-neurotechnology-unesco-leaders-and-top-experts-call-solid-governance" target="_blank" rel="noopener noreferrer">https://www.unesco.org/en/articles/ethics-neurotechnology-unesco-leaders-and-top-experts-call-solid-governance</a>.</p><p>On a regional level, the Inter-American Juridical Committee of the Organization of American States (OAS) issued a Declaration <a href="https://www.oas.org/en/sla/iajc/docs/CJI-DEC_01_XCIX-O-21_ENG.pdf" target="_blank" rel="noopener noreferrer">https://www.oas.org/en/sla/iajc/docs/CJI-DEC_01_XCIX-O-21_ENG.pdf</a> on neuroscience and neurotechnologies and human rights in 2021. Two years later, the OAS followed up with a set of Principles <a href="https://www.oas.org/en/sla/iajc/docs/CJI-RES_281_CII-O-23_corr1_ENG.pdf" target="_blank" rel="noopener noreferrer">https://www.oas.org/en/sla/iajc/docs/CJI-RES_281_CII-O-23_corr1_ENG.pdf</a> to align international standards to national frameworks. In the same year, the Ibero-American Network of Data Protection Authorities (RIPD), the main forum for Spanish- and Portuguese-speaking data protection regulators, declared support <a href="https://www.redipd.org/sites/default/files/2023-10/declaracion-encuentro-xx-aniversario-ripd.pdf" target="_blank" rel="noopener noreferrer">https://www.redipd.org/sites/default/files/2023-10/declaracion-encuentro-xx-aniversario-ripd.pdf</a> for the OAS Declaration and Principles and announced the establishment of a working group on neurodata.</p><p>Perhaps the most consequential call for action was the 2022 Neurorights Model Law <a href="https://parlatino.org/wp-content/uploads/2017/09/leym-neuroderechos-7-3-2023.pdf" target="_blank" rel="noopener noreferrer">https://parlatino.org/wp-content/uploads/2017/09/leym-neuroderechos-7-3-2023.pdf</a>, drafted by the Latin American and Caribbean Parliament (Parlatino), a regional organization that promotes regional integration through legislative harmonization. The model law provides both structure and foundational concepts to regulate neurotechnology, including establishing an independent oversight authority and providing redress mechanisms.</p><p>Transnational stakeholders such as the OAS and Parlatino have played large roles in establishing Latin America as a leading player in the neurorights discussion. However, legislative initiatives at the domestic level may prove more influential, as their impact continues to reverberate in Latin America and beyond.</p><h3><strong>4. Chile: The first country to protect “mental integrity” in its Constitution</strong></h3><p>As a pioneer in the neuroprivacy movement, Chile was the first country to amend its Constitution <a href="https://www.bcn.cl/leychile/navegar?idNorma=1166983&tipoVersion=0" target="_blank" rel="noopener noreferrer">https://www.bcn.cl/leychile/navegar?idNorma=1166983&tipoVersion=0</a> to protect “mental integrity” and neurodata in 2021. Specifically, the provision states that “the law shall regulate the requirements, conditions, and restrictions for [neurodata], and shall especially protect brain activity, as well as the information derived from it.” Furthermore, scientific and technological developments are to be conducted with “respect for […] physical and mental integrity.”</p><p>Led by Senator Guido Girardi Lavín and several other legislators, the amendment centered on the individual identity as an intrinsic value of human evolution and referred to physical and psychic integrity as its main elements. The legislators asserted that any technological development affecting mental integrity, as a fundamental right, should be authorized by law. Simultaneously, the same legislators introduced Bill 13.828-19 <a href="https://www.camara.cl/legislacion/ProyectosDeLey/tramitacion.aspx?prmID=14385&prmBOLETIN=13828-19" target="_blank" rel="noopener noreferrer">https://www.camara.cl/legislacion/ProyectosDeLey/tramitacion.aspx?prmID=14385&prmBOLETIN=13828-19</a>, which aimed to further regulate neurotechnology by requiring consent to use neurotechnology and establishing penalties for noncompliance.</p><p>In 2023, only two years after the country’s Constitution was amended, Chile’s Supreme Court became the first court to rule on aneuroprivacy case <a href="https://www.afslaw.com/perspectives/news/neural-rights-landmark-ruling" target="_blank" rel="noopener noreferrer">https://www.afslaw.com/perspectives/news/neural-rights-landmark-ruling</a>. The plaintiff, Senator Girardi, alleged that his brain data was insufficiently protected by the US-based Emotiv’s “Insight” device, a headband that records detailed information about the brain’s electrical activity. The Court ultimately found thatEmotiv violated Sen. Girardi’s constitutional rights to physical and psychological integrity as well as the right to privacy, setting aside Emotiv’s arguments that the harms were hypothetical. Citing both Chilean domestic law and international human rights law, the Court focused on the fact that Emotiv retained Sen. Girardi’s data for research purposes, even in anonymized form, without obtaining prior consent for this specific purpose. In addition to setting a precedent for neuroprivacy litigation, this case reflects the neurorights movement’s influence beyond the policy sphere.</p><h3><strong>5. Mexico: Proposed constitutional amendment for neuroprivacy rights</strong></h3><p>As of March 2024, there are two pending neuroprivacy bills that seek to amend Mexico’s Constitution. The first bill <a href="http://sil.gobernacion.gob.mx/Archivos/Documentos/2023/08/asun_4588906_20230808_1690903141.pdf" target="_blank" rel="noopener noreferrer">http://sil.gobernacion.gob.mx/Archivos/Documentos/2023/08/asun_4588906_20230808_1690903141.pdf</a>, proposed by Deputy María Eugenia Hernández Pérez, would include the right toindividual identity, as well as physical and psychological integrity. The Chilean constitutional amendment’s influence is noticeable throughout the Mexican bill, including language requiring the State to respect mental privacy and integrity. Moreover, the proposal has the same wording as Chile’s constitutional amendment and similarly spotlights the value of individual identity.</p><p>The proposal centers on human identity and its relation to technology, and not solely privacy and data protection, which are already recognized as two separate fundamental rights under Article 16 of Mexico’s Constitution <a href="https://www.senado.gob.mx/comisiones/puntos_constitucionales/docs/CPM_INGLES.pdf" target="_blank" rel="noopener noreferrer">https://www.senado.gob.mx/comisiones/puntos_constitucionales/docs/CPM_INGLES.pdf</a>. It includes broad legal safeguards to ensure the confidentiality of neurodata collection, informed consent before access, clear limits on neurotechnologies, and anti-discrimination measures. Moreover, the bill notes that while some local laws protect human rights and neurodata in the context of medical and scientific uses, there is a lack of regulation for non-medical uses.</p><p>The second Mexican bill <a href="https://infosen.senado.gob.mx/sgsp/gaceta/65/3/2023-09-26-1/assets/documentos/Inic_PVEM_diversos_senadores_art_73_CPEUM.pdf" target="_blank" rel="noopener noreferrer">https://infosen.senado.gob.mx/sgsp/gaceta/65/3/2023-09-26-1/assets/documentos/Inic_PVEM_diversos_senadores_art_73_CPEUM.pdf</a>, spearheaded by Senator Alejandra Lagunes Soto Ruiz, would amend Article 73 of the Constitution to provide congressional authorization to pass federal legislation related to artificial intelligence (AI), cybersecurity, and neurorights. Under this authority, Congress could safeguard mental privacy, cognitive autonomy, informed consent for the use of brain data, identity and self-expression, non-discrimination, and equal access to technology.</p><p>Both bills acknowledge that neuroprivacy is an emerging concept and focus on how neurotechnology could jeopardize fundamental rights. Although these bills approach the issue from different viewpoints, they both seek to protect personal data and build citizen trust. Additionally, in November 2023 the Mexican Data Protection Authority published a Digital Human Rights Charter <a href="https://www.infocdmx.org.mx/doctos/2022/Carta_DDigitales.pdf" target="_blank" rel="noopener noreferrer">https://www.infocdmx.org.mx/doctos/2022/Carta_DDigitales.pdf</a> that recognizes the five fundamental neurorights.</p><h3><strong>6. Brazil: Proposed constitutional amendment and neuroprivacy rights in privacy law</strong></h3><p>Several neuroprivacy initiatives have gained traction in Brazil. Bill 29/2023 <a href="https://www25.senado.leg.br/web/atividade/materias/-/materia/158095" target="_blank" rel="noopener noreferrer">https://www25.senado.leg.br/web/atividade/materias/-/materia/158095</a>, introduced by Senator Randolph Frederich Rodrigues Alves in June 2023, seeks to amend the Brazilian Constitution to include protections for mental integrity and algorithmic transparency. In particular, the proposal <a href="https://legis.senado.leg.br/sdleg-getter/documento?dm=9386704&ts=1689276688763&disposition=inline" target="_blank" rel="noopener noreferrer">https://legis.senado.leg.br/sdleg-getter/documento?dm=9386704&ts=1689276688763&disposition=inline</a> highlights that recognizing “mental integrity” is essential to expand the “legal and normative understanding of human dignity in this new digital context” that protects both personal data and the “psychic and physical integrity of human beings.” The proposal was presented to the Senate in June 2023 and is pending until a Rapporteur <a href="https://www2.camara.leg.br/atividade-legislativa/legislacao/regimento-interno-da-camara-dos-deputados/arquivos-1/RICD%20atualizado%20ate%20RCD%206-2023.pdf" target="_blank" rel="noopener noreferrer">https://www2.camara.leg.br/atividade-legislativa/legislacao/regimento-interno-da-camara-dos-deputados/arquivos-1/RICD%20atualizado%20ate%20RCD%206-2023.pdf</a> is appointed to review the bill. 1 Of note, the Brazilian Constitution was amended in February 2022 to include a right to the protection of personal data, distinct from the right to privacy.</p><p>Separately, Bill 522/2022 <a href="https://www.camara.leg.br/proposicoesWeb/fichadetramitacao?idProposicao=2317524" target="_blank" rel="noopener noreferrer">https://www.camara.leg.br/proposicoesWeb/fichadetramitacao?idProposicao=2317524</a>, introduced by Deputy Carlos Henrique Gaguim in March 2022, would amend Brazil’s General Data Protection Law (LGPD) to regulate neurodataas a category of sensitive data. The bill would add a new section to regulate the processing of neurodata, emphasizing that therequest for consent must “clearly and prominently indicate the possible physical, cognitive and emotional effects” of processing neurodata. Currently, Article 5 of the LGPD establishes racial and ethnic origin; religious, political, and philosophical affiliations; health, sexual and life data; and genetic and biometric data as categories of sensitive data. However, the proposal <a href="https://www.camara.leg.br/proposicoesWeb/prop_mostrarintegra?codteor=2146384&filename=PL%20522/2022" target="_blank" rel="noopener noreferrer">https://www.camara.leg.br/proposicoesWeb/prop_mostrarintegra?codteor=2146384&filename=PL%20522/2022</a> highlights the need to include neurodata as a distinct category of sensitive data, not to be confused or associated with biometric data. The bill was approved by the Health Commission Rapporteur in October 2023 and awaits further consideration.</p><p>The neurorights discussion has also made its way into Brazil’s Federal Civil Code. In December 2023, the Sub-Committee on Digital Law of the Commission of Jurists, who are responsible for reviewing the Civil Code, submitted a report <a href="https://legis.senado.leg.br/comissoes/arquivos?ap=7935&codcol=2630" target="_blank" rel="noopener noreferrer">https://legis.senado.leg.br/comissoes/arquivos?ap=7935&codcol=2630</a> that seeks to recognize neuroprivacyunder the LGPD. Independently, in December 2023, Río Grande do Sul <a href="https://estado.rs.gov.br/constituicao-estadual" target="_blank" rel="noopener noreferrer">https://estado.rs.gov.br/constituicao-estadual</a>, Brazil’s fifth-largest state by population, amended its Constitution to include neurorights, specifying mental integrity as a constitutional principle.</p><h3><strong>7. Other regional initiatives</strong></h3><p>Similar legislative efforts are underway in the region, with some variations:</p><ul><li><strong>Costa Rica </strong>proposed amending <a href="https://delfino.cr/asamblea/proyecto/23667" target="_blank" rel="noopener noreferrer">https://delfino.cr/asamblea/proyecto/23667</a> the country’s data protection law to include a definition of biometric data which, in contrast to Brazil’s proposal, categorizes neurodata as biometric data.</li><li><strong>Colombia</strong> is considering updating <a href="https://www.camara.gov.co/proteccion-de-datos-personales" target="_blank" rel="noopener noreferrer">https://www.camara.gov.co/proteccion-de-datos-personales</a> its data protection law to include a section specific to the processing of data through AI and neurotechnologies. The proposal sets out specific obligations for accessing and processing neurodata. </li><li><strong>Argentina</strong> has two pending bills: Bill 2446/23 <a href="https://www.senado.gob.ar/parlamentario/comisiones/verExp/2446.23/S/PL" target="_blank" rel="noopener noreferrer">https://www.senado.gob.ar/parlamentario/comisiones/verExp/2446.23/S/PL</a> proposed the creation of a bicameral committee to develop a neurorights framework. Separately, another bill <a href="https://www4.hcdn.gob.ar/dependencias/dsecretaria/Periodo2022/PDF2022/TP2022/0339-D-2022.pdf" target="_blank" rel="noopener noreferrer">https://www4.hcdn.gob.ar/dependencias/dsecretaria/Periodo2022/PDF2022/TP2022/0339-D-2022.pdf</a> would amend the Federal Code of Civil Procedure to allow neurotechnologies that infer mental activity as admissible evidence. </li><li><strong>Uruguay’s</strong> Parliament reported that elected officials have met with their Chilean counterparts to discuss <a href="https://parlamento.gub.uy/documentosyleyes/documentos/diarios-de-sesion/6492/IMG" target="_blank" rel="noopener noreferrer">https://parlamento.gub.uy/documentosyleyes/documentos/diarios-de-sesion/6492/IMG</a> neurorights. In February 2024, Deputy Rodrigo Goñi indicated <a href="https://twitter.com/neuro_rights/status/1757390296671830114" target="_blank" rel="noopener noreferrer">https://twitter.com/neuro_rights/status/1757390296671830114</a> that Parliament is considering regulating neurotechnologies and providing safeguards for brain integrity and neurodata.</li></ul><p><br>As neurotechnology continues to advance, it raises key questions about how the data involved should be regulated. Latin America is at the forefront of that conversation and has paved the way in recognizing neuroprivacy, from Chile’s Constitution, to Mexico and Brazil’s pending legislation. Regional frameworks, such as the OAS Declaration and Principles, illustrate that neurorights are coalescing on the international level as well. The groundswell of legislative proposals and domestic laws demonstrates that the fight for neuroprivacy is here to stay—and for now, at least, Latin America is the place to watch.</p><p>1 According to the Brazilian Chamber of Deputies Internal Rules, Art. 56 <a href="https://www2.camara.leg.br/atividade-legislativa/legislacao/regimento-interno-da-camara-dos-deputados/arquivos-1/RICD%20atualizado%20ate%20RCD%206-2023.pdf" target="_blank" rel="noopener noreferrer">https://www2.camara.leg.br/atividade-legislativa/legislacao/regimento-interno-da-camara-dos-deputados/arquivos-1/RICD%20atualizado%20ate%20RCD%206-2023.pdf</a>, committee bills and other proposals will be examined by a Rapporteur who must issue an opinion.</p><hr><p><a href="https://fpf.org/blog/privacy-and-the-rise-of-neurorights-in-latin-america/" target="_blank" rel="noopener noreferrer">fpf.org/blog/privacy-and-the-r…</a></p>http://activitystrea.ms/schema/1.0/post2024-03-20T14:33:26Z2024-03-20T14:33:26Zhttps://poliverso.org/objects/0477a01e-b9fcbe7c-f06e2d72fef67da4#contextpublichttp://activitystrea.ms/schema/1.0/notehttps://poliverso.org/objects/0477a01e-72a3bc5a-82a3fe2e0b1f9385Weekly Chronicles #68<p><strong>Weekly Chronicles #68</strong> <em>Questo è il numero <a href="https://poliverso.org/search?tag=68" class="mention hashtag" rel="tag">#<span>68</span></a> di Privacy Chronicles, la newsletter che ti spiega l’Era Digitale: sorveglianza di massa e privacy, sicurezza dei dati, nuove tecnologie e molto altro.</em></p><p><strong>Cronache della settimana</strong></p><ul><li><em>Privacy Chronicles, ma alla radio</em></li><li><em>Il futuro è dei droni</em></li><li><em>A Como il parchimetro è anche esattore</em></li></ul><p><strong>Lettere Libertarie</strong></p><ul><li><em>La sciagurata condizione di “cittadino”</em></li></ul><p><strong>Rubrica OpSec</strong></p><ul><li><em>Raccogli ora, decifra dopo: i rischi del quantum computing</em></li></ul><p><img src="https://substackcdn.com/image/fetch/w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd5c954aa-e24c-4007-b9ff-bb40472d4e59_1020x391.png" style="width:1020px;" alt="https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd5c954aa-e24c-4007-b9ff-bb40472d4e59_1020x391.png"> <a href="https://substackcdn.com/image/fetch/f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd5c954aa-e24c-4007-b9ff-bb40472d4e59_1020x391.png" target="_blank" rel="noopener noreferrer">https://substackcdn.com/image/fetch/f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd5c954aa-e24c-4007-b9ff-bb40472d4e59_1020x391.png</a></p><p><br></p><h3>Privacy Chronicles, ma alla radio</h3><p><br>Il 26 marzo, dalle 22 alle 24, ti aspetta un’ora di pensieri in libertà da parte del sottoscritto su NO LIMITS Radio <a href="https://nolimitsradio.it/" target="_blank" rel="noopener noreferrer">https://nolimitsradio.it/</a>. Insieme a Luca, il conduttore, abbiamo iniziato <strong>un percorso</strong> di due episodi che porterà gli ascoltatori ad approfondire molti dei temi trattati regolarmente su queste pagine.</p><p>Siamo partiti <strong>dalle basi</strong>: cos’è la privacy e qual è la differenza tra privacy, segretezza e anonimato. Da qui, ci siamo lanciati in voli pindarici che ci hanno fatto toccare vette metafisiche: siamo pronti a vivere nell’Era Digitale? I nostri <strong>cervelli</strong> sono in grado di riconoscere <strong>pericoli immateriali</strong> o c’è bisogno di un “salto” intellettuale e spirituale? Una prima risposta forse arriva dal passato, coi primi <strong>Cypherpunk</strong>, che prospettavano un futuro che si avvicina a velocità fotonica: neurotecnologie, intelligenza artificiale, falsificazione della realtà e <strong>standardizzazione</strong> dell’essere umano. Non sarà però solo la tecnologia a salvarci.</p><p>La prima intervista andrà in onda il <strong>26 marzo</strong> su <a href="https://nolimitsradio.it/" target="_blank" rel="noopener noreferrer">https://nolimitsradio.it/</a> dalle 22 alle 24, con <strong>replica</strong> <strong>il 27 marzo</strong> dalle 10 alle 12. Non perderla!<br></p><h3>Il futuro è dei droni</h3><p><br><em>“Li abbiamo presi di sorpresa, non se l’aspettavano, ne abbiamo ammazzati un sacco […] i droni sono le nostre forze aeree…”</em></p><p>I <strong>ribelli</strong> <strong>del Myanmar</strong> hanno costruito una flotta di droni <a href="https://www.theguardian.com/world/2024/jan/20/myanmar-rebels-junta-above-drones" target="_blank" rel="noopener noreferrer">https://www.theguardian.com/world/2024/jan/20/myanmar-rebels-junta-above-drones</a> che in breve tempo è diventata un grosso problema per la fanteria militare del <strong>Tatmadaw</strong> (l’esercito), che dopo un colpo di stato nel 2021 ha preso il controllo del Paese.</p><p>Iscriviti ora <a href="https://www.privacychronicles.it/subscribe" target="_blank" rel="noopener noreferrer">https://www.privacychronicles.it/subscribe</a></p><hr><p><img src="https://substackcdn.com/image/fetch/w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1eff168a-a00d-4045-8ce2-00200bc1d9e0_500x357.jpeg." alt="https://substackcdn.com/image/fetch/w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1eff168a-a00d-4045-8ce2-00200bc1d9e0_500x357.jpeg" style="width: 424px;" > <a href=" class="invalid-src" title="Protocollo sorgente non valido">https://substackcdn.com/image/fetch/f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1eff168a-a00d-4045-8ce2-00200bc1d9e0_500x357.jpeg</p><p><em>BitcoinVoucherBot sponsorizza Privacy Chronicles. Clicca qui per iniziare a usarlo! <a href="https://t.me/BitcoinVoucherBot?start=455009905" target="_blank" rel="noopener noreferrer">https://t.me/BitcoinVoucherBot?start=455009905</a></em></p><hr /><p>Nella guerra in Myanmar tra ribelli e governo militare, pare che generalmente stesse vincendo il governo. Questo fino a quando i ribelli non hanno iniziato a usare <strong>stampanti 3D</strong> per costruire <strong>droni d’attacco</strong> fatti in casa. I droni hanno l’enorme vantaggio di poter essere estremamente mobili e letali — lo vediamo, purtroppo — dai video che arrivano dal fronte ucraino.</p><p>Soprattutto, però, possono essere <strong>operati da chiunque</strong> con un minimo di allenamento, al contrario dei veicoli militari. Inoltre, grazie alle nuove tecnologie di stampa 3D ne possono essere costruiti a centinaia in una capanna in mezzo al bosco.</p><p>Il futuro, nel bene e nel male, sarà dei droni e dell’intelligenza artificiale, e non solo in campo militare.</p><p>Già oggi è possibile costruire in casa piccoli droni con <strong>sistemi d’intelligenza artificiale </strong>di<strong> riconoscimento biometrico</strong> in grado di identificare e sorvegliare da lontano una o più specifiche persone anche in mezzo a grandi folle. Di nuovo: è sufficiente una stampante 3D, il giusto software e qualche competenza informatica ed elettronica per assemblare il tutto. Un lavoro che con un pizzico di buona volontà e l’aiuto di chatGPT può essere alla portata di chiunque.</p><p>In futuro, ma in verità già oggi, non servirà più neanche operarli manualmente. Lo stesso piccolo drone con riconoscimento biometrico può essere programmato per <strong>identificare e seguire a distanza</strong> (o schiantarcisi addosso..) una persona specifica, senza alcun bisogno di essere operato manualmente. Le capacità di questi strumenti automatizzati lasciano a bocca aperta e onestamente fanno anche molta paura. Questo <strong>video</strong> vale più di mille parole (clicca qui <a href="https://twitter.com/i/status/1764394261460709775" target="_blank" rel="noopener noreferrer">https://twitter.com/i/status/1764394261460709775</a>).</p><p>La tecnologia ICT è da sempre un grande equalizzatore e al contrario di veicoli militari, cannoni, razzi e aerei, non conosce padroni. Chiunque potrà costruire e dotarsi di questi strumenti, sia per autodifesa che per aggressione. I tempi che s’annunciano saranno certamente titanici… e quando i nostri cieli saranno sorvolati da centinaia di droni sarà fondamentale pensare alla nostra privacy e incolumità tridimensionalmente.<br></p><h3>A Como il parchimetro è anche esattore</h3><p><br>Gli amministratori di Como non trovano pace. Dopo aver tentato di essere <strong>precursori </strong>di telecamere illegali con riconoscimento biometrico alcuni anni fa, oggi provano ancora a farsi notare sul fronte della <strong>sorveglianza di massa</strong> dei loro stessi cittadini. E lo fanno in un modo che mai avrei pensato: col parchimetro esattore.</p><p>I parchimetri a Como potranno verificare in tempo reale i dati della persona che inserisce la targa per pagare il parcheggio e, nel caso in cui tale persona sia residente a Como e in regola con il pagamento dei tributi, allora avrà diritto a uno <strong>sconto sulla tariffa oraria</strong>. Viceversa, dovrà pagare prezzo pieno e visualizzerà un avviso con invito a recarsi in Comune per saldare i debiti (ma se la persona che paga il parcheggio non è la proprietaria dell’auto?).</p><p>In sostanza è una query incrociata con il database tributario del comune senza però alcuna conseguenza concreta, se non la facile propaganda elettorale. Il sindaco era infatti molto felice di essere ospite in TV per spiegare la nuova trovata “anti-evasori”.</p><p>Il problema però, oltre che nella morale, sta anche nello strumento: i sistemi ICT dei parchimetri sono operati da aziende terze, che in questo modo avranno accesso a <strong>dati eccedenti</strong> rispetto a ciò che è meramente necessario per pagare il parcheggio. Questo aumenterà a dismisura il rischio di violazione degli stessi, oltre ad aumentarne l’accessibilità a terzi.</p><p>L’amministrazione di Como dimostra ancora di non avere alcun interesse nel tutelare gli interessi dei propri cittadini e di essere disposta a tutto pur di fare facile propaganda elettorale. Anche se la domanda resta: chi mai è <strong>così scemo</strong> da votare gente del genere?</p><p><img src="https://substackcdn.com/image/fetch/w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F43f5f544-1259-406a-9427-0fdc7953e616_1020x391.png" style="width: 1020px;" > <a href="https://substackcdn.com/image/fetch/f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F43f5f544-1259-406a-9427-0fdc7953e616_1020x391.png" target="_blank" rel="noopener noreferrer">https://substackcdn.com/image/fetch/f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F43f5f544-1259-406a-9427-0fdc7953e616_1020x391.png</a></p><p><br></p><h3>La sciagurata condizione di “cittadino”</h3><p><br>Ieri ho letto su X una notizia: <em>“Illegal immigrants can now carry guns, a federal judge has ruled”. </em>Gli immigrati clandestini potranno possedere armi da fuoco, così ha deciso un giudice federale.</p><p>Il caso è quello di Heriberto Carbajal-Flores, un immigrato clandestino imputato per violazione dello statuto federale 18 U.S.C § 922, che vieta agli immigrati illegali di portare con sé armi o munizioni. Secondo il giudice federale però la legge <strong>viola il secondo emendamento</strong> e anche i migranti irregolari dovrebbero poter portare con sé armi e munizioni.</p><p>Il caso mi suscita una riflessione libertaria sulla condizione di “cittadino”, in contrapposizione con l’immigrato irregolare, cioè il <strong>non-cittadino</strong> per definizione.</p><p>Nel mondo progressista del “<em>volemosebbene</em>” non esistono confini; siamo tutti uguali e tutti titolari degli stessi diritti universali — soprattutto quelli di <strong>welfare</strong>. Il problema risiede però proprio nella contraddizione in termini di questa favola che ci piace raccontarci: non siamo tutti uguali. Alcuni animali, per citare Orwell, sono più uguali degli altri.</p><p>Il cittadino è infatti sottoposto, fin dalla nascita, a un <strong>programma di sorveglianza ed estrazione di risorse</strong> che non tocca, se non distrattamente, il migrante irregolare. Il neonato cittadino acquisisce fin da subito un codice identificativo alfanumerico che lo immette negli ingranaggi burocratici statali da cui poi sarà impossibile uscire (se non acquisendo esso stesso lo status di immigrato irregolare in altro paese).</p><p>Il cittadino poi, durante l’età adulta, sarà chiamato a dotarsi di numerosi <strong>documenti identificativi</strong> che gli consentiranno, se il Dio stato vuole, di vivere e lavorare: carta d’identità, patente, certificati di studi, dichiarazioni dei redditi, partita IVA e molto altro.</p><p>Viceversa, l’immigrato illegale può vivere e lavorare nei paesi occidentali senza alcun tipo di sottomissione a tale sistema burocratico e di sorveglianza di massa. Nella migliore delle ipotesi godrà anche degli stessi diritti di welfare del cittadino stesso, che invece deve pagarli di tasca propria, attraverso l’altissima esazione fiscale.</p><p>Con <strong>l’evoluzione dell’identità digitale</strong> la forbice si allargherà sempre più: gli immigrati illegali infatti saranno sempre più estraniati dal sistema statale digitalizzato. Viceversa, il cittadino sarà sempre più schiavo di sistemi automatizzati, codici QR e algoritmi pensati per tracciare ogni suo movimento, pensiero e azione.</p><p>Essere “cittadini” di uno stato occidentale oggi è divenuta una condizione sciagurata che ricorda molto da vicino quella dei <strong>servi della gleba</strong>, ma in versione globalista-tecnocratica.</p><p><img src="https://substackcdn.com/image/fetch/w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F39302a45-4006-4696-aa48-e35085608e01_1020x391.png" style="width: 1020px;" > <a href="https://substackcdn.com/image/fetch/f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F39302a45-4006-4696-aa48-e35085608e01_1020x391.png" target="_blank" rel="noopener noreferrer">https://substackcdn.com/image/fetch/f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F39302a45-4006-4696-aa48-e35085608e01_1020x391.png</a></p><p><br></p><h3>Raccogli ora, decifra dopo: i rischi del quantum computing</h3><p><br>L’avvento dei computer quantistici mette a repentaglio i sistemi di crittografia più diffusi, come <strong>RSA</strong> (Rivest-Shamir-Adleman), <strong>DSA</strong> (Digital Signature Algorithm) e <strong>ECC</strong> (Elliptic Curve Cryptography).</p><p>La crittografia moderna si basa sulla difficoltà di risolvere certi problemi matematici, come la capacità di fattorizzare grandi numeri composti. I computer quantistici possono però elaborare informazioni in modi che permettono di risolvere questi problemi matematici molto più rapidamente, grazie a algoritmi quantistici specifici come l’algoritmo di Shor.</p><p>Il motivo è che avranno un potere computazionale superiore ai computer tradizionali, grazie allo stato fisico particolare dei "<em>qubit</em>", la loro unità di dati. Grazie alla “<em>sovrapposizione quantistica</em>” i qubit possono essere costantemente in una sorta di stato "ibrido" tra 0 e 1, o in una combinazione di entrambi. I bit a cui siamo abituati possono essere invece solo in uno stato di 0 o 1.</p><p>In risposta, sono stati già sviluppati <strong>nuovi algoritmi di crittografia</strong> progettati per essere sicuri anche nell'era quantistica. Ad esempio, <strong>Tutanota</strong> ha recentemente aggiornato di aver sostituito i propri algoritmi di crittografia (RSA-2048) con una combinazione di algoritmi “quantum safe”: un “post-quantum Key Encapsulation Mechanism” e un “Elliptic-Curve-Diffie-Hellmann Key exchange” per creare un protocollo chiamato TutaCrypt.</p><p>La questione però è più complessa. Se infatti gradualmente tutti i fornitori di servizi, sistemi di pagamento e monete digitali passeranno ad algoritmi di crittografia resistenti ad attacchi quantistici, lo stesso non potrà dirsi per i milioni di dati <strong>conservati </strong>con algoritmi obsoleti.</p><p>Ecco allora che il grosso problema della crittografia non sarà da ricercarsi nel presente o nel futuro, ma nel passato! Se un attaccante, anche a livello governativo, iniziasse ad ammassare <strong>grandi quantitativi di dati cifrati</strong> con algoritmi che saranno obsoleti, potrà in futuro decodificarli facilmente e acquisire infine il tesoro d’informazioni che cercavamo di proteggere. In gergo questo attacco si chiama “<em>harvest now, decrypt later</em>”, cioè “raccogli adesso, decifra dopo”.</p><p>Come proteggersi? Non è facile: è doveroso <strong>aggiornare periodicamente</strong> i nostri dati cifrati con gli ultimi algoritmi disponibili, avendo però anche cura di <strong>cancellare </strong>definitivamente le vecchie copie e aver cura di non diffonderle in giro. Nel caso in cui la diffusione fosse inevitabile, allora sarà opportuno modificare nel corso del tempo le informazioni, così da rendere obsolete, e quindi inutilizzabili, le precedenti versioni.</p><hr /><p><a href="https://www.privacychronicles.it/p/weekly-chronicles-68" target="_blank" rel="noopener noreferrer">privacychronicles.it/p/weekly-…</a><br>[img=https://substack-post-media.s3.amazonaws.com/public/images/b817524d-72a7-46bc-9af7-d21d08e3423f_1024x1024.png]" title="https://substackcdn.com/image/fetch/w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1eff168a-a00d-4045-8ce2-00200bc1d9e0_500x357.jpeg" style="width: 424px;" >[/url]</p><p><em>BitcoinVoucherBot sponsorizza Privacy Chronicles. Clicca qui per iniziare a usarlo! <a href="https://t.me/BitcoinVoucherBot?start=455009905" target="_blank" rel="noopener noreferrer">https://t.me/BitcoinVoucherBot?start=455009905</a></em></p><hr /><p>Nella guerra in Myanmar tra ribelli e governo militare, pare che generalmente stesse vincendo il governo. Questo fino a quando i ribelli non hanno iniziato a usare <strong>stampanti 3D</strong> per costruire <strong>droni d’attacco</strong> fatti in casa. I droni hanno l’enorme vantaggio di poter essere estremamente mobili e letali — lo vediamo, purtroppo — dai video che arrivano dal fronte ucraino.</p><p>Soprattutto, però, possono essere <strong>operati da chiunque</strong> con un minimo di allenamento, al contrario dei veicoli militari. Inoltre, grazie alle nuove tecnologie di stampa 3D ne possono essere costruiti a centinaia in una capanna in mezzo al bosco.</p><p>Il futuro, nel bene e nel male, sarà dei droni e dell’intelligenza artificiale, e non solo in campo militare.</p><p>Già oggi è possibile costruire in casa piccoli droni con <strong>sistemi d’intelligenza artificiale </strong>di<strong> riconoscimento biometrico</strong> in grado di identificare e sorvegliare da lontano una o più specifiche persone anche in mezzo a grandi folle. Di nuovo: è sufficiente una stampante 3D, il giusto software e qualche competenza informatica ed elettronica per assemblare il tutto. Un lavoro che con un pizzico di buona volontà e l’aiuto di chatGPT può essere alla portata di chiunque.</p><p>In futuro, ma in verità già oggi, non servirà più neanche operarli manualmente. Lo stesso piccolo drone con riconoscimento biometrico può essere programmato per <strong>identificare e seguire a distanza</strong> (o schiantarcisi addosso..) una persona specifica, senza alcun bisogno di essere operato manualmente. Le capacità di questi strumenti automatizzati lasciano a bocca aperta e onestamente fanno anche molta paura. Questo <strong>video</strong> vale più di mille parole (clicca qui <a href="https://twitter.com/i/status/1764394261460709775" target="_blank" rel="noopener noreferrer">https://twitter.com/i/status/1764394261460709775</a>).</p><p>La tecnologia ICT è da sempre un grande equalizzatore e al contrario di veicoli militari, cannoni, razzi e aerei, non conosce padroni. Chiunque potrà costruire e dotarsi di questi strumenti, sia per autodifesa che per aggressione. I tempi che s’annunciano saranno certamente titanici… e quando i nostri cieli saranno sorvolati da centinaia di droni sarà fondamentale pensare alla nostra privacy e incolumità tridimensionalmente.<br></p><h3>A Como il parchimetro è anche esattore</h3><p><br>Gli amministratori di Como non trovano pace. Dopo aver tentato di essere <strong>precursori </strong>di telecamere illegali con riconoscimento biometrico alcuni anni fa, oggi provano ancora a farsi notare sul fronte della <strong>sorveglianza di massa</strong> dei loro stessi cittadini. E lo fanno in un modo che mai avrei pensato: col parchimetro esattore.</p><p>I parchimetri a Como potranno verificare in tempo reale i dati della persona che inserisce la targa per pagare il parcheggio e, nel caso in cui tale persona sia residente a Como e in regola con il pagamento dei tributi, allora avrà diritto a uno <strong>sconto sulla tariffa oraria</strong>. Viceversa, dovrà pagare prezzo pieno e visualizzerà un avviso con invito a recarsi in Comune per saldare i debiti (ma se la persona che paga il parcheggio non è la proprietaria dell’auto?).</p><p>In sostanza è una query incrociata con il database tributario del comune senza però alcuna conseguenza concreta, se non la facile propaganda elettorale. Il sindaco era infatti molto felice di essere ospite in TV per spiegare la nuova trovata “anti-evasori”.</p><p>Il problema però, oltre che nella morale, sta anche nello strumento: i sistemi ICT dei parchimetri sono operati da aziende terze, che in questo modo avranno accesso a <strong>dati eccedenti</strong> rispetto a ciò che è meramente necessario per pagare il parcheggio. Questo aumenterà a dismisura il rischio di violazione degli stessi, oltre ad aumentarne l’accessibilità a terzi.</p><p>L’amministrazione di Como dimostra ancora di non avere alcun interesse nel tutelare gli interessi dei propri cittadini e di essere disposta a tutto pur di fare facile propaganda elettorale. Anche se la domanda resta: chi mai è <strong>così scemo</strong> da votare gente del genere?</p><p><img src="https://substackcdn.com/image/fetch/w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F43f5f544-1259-406a-9427-0fdc7953e616_1020x391.png" style="width: 1020px;" > <a href="https://substackcdn.com/image/fetch/f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F43f5f544-1259-406a-9427-0fdc7953e616_1020x391.png" target="_blank" rel="noopener noreferrer">https://substackcdn.com/image/fetch/f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F43f5f544-1259-406a-9427-0fdc7953e616_1020x391.png</a></p><p><br></p><h3>La sciagurata condizione di “cittadino”</h3><p><br>Ieri ho letto su X una notizia: <em>“Illegal immigrants can now carry guns, a federal judge has ruled”. </em>Gli immigrati clandestini potranno possedere armi da fuoco, così ha deciso un giudice federale.</p><p>Il caso è quello di Heriberto Carbajal-Flores, un immigrato clandestino imputato per violazione dello statuto federale 18 U.S.C § 922, che vieta agli immigrati illegali di portare con sé armi o munizioni. Secondo il giudice federale però la legge <strong>viola il secondo emendamento</strong> e anche i migranti irregolari dovrebbero poter portare con sé armi e munizioni.</p><p>Il caso mi suscita una riflessione libertaria sulla condizione di “cittadino”, in contrapposizione con l’immigrato irregolare, cioè il <strong>non-cittadino</strong> per definizione.</p><p>Nel mondo progressista del “<em>volemosebbene</em>” non esistono confini; siamo tutti uguali e tutti titolari degli stessi diritti universali — soprattutto quelli di <strong>welfare</strong>. Il problema risiede però proprio nella contraddizione in termini di questa favola che ci piace raccontarci: non siamo tutti uguali. Alcuni animali, per citare Orwell, sono più uguali degli altri.</p><p>Il cittadino è infatti sottoposto, fin dalla nascita, a un <strong>programma di sorveglianza ed estrazione di risorse</strong> che non tocca, se non distrattamente, il migrante irregolare. Il neonato cittadino acquisisce fin da subito un codice identificativo alfanumerico che lo immette negli ingranaggi burocratici statali da cui poi sarà impossibile uscire (se non acquisendo esso stesso lo status di immigrato irregolare in altro paese).</p><p>Il cittadino poi, durante l’età adulta, sarà chiamato a dotarsi di numerosi <strong>documenti identificativi</strong> che gli consentiranno, se il Dio stato vuole, di vivere e lavorare: carta d’identità, patente, certificati di studi, dichiarazioni dei redditi, partita IVA e molto altro.</p><p>Viceversa, l’immigrato illegale può vivere e lavorare nei paesi occidentali senza alcun tipo di sottomissione a tale sistema burocratico e di sorveglianza di massa. Nella migliore delle ipotesi godrà anche degli stessi diritti di welfare del cittadino stesso, che invece deve pagarli di tasca propria, attraverso l’altissima esazione fiscale.</p><p>Con <strong>l’evoluzione dell’identità digitale</strong> la forbice si allargherà sempre più: gli immigrati illegali infatti saranno sempre più estraniati dal sistema statale digitalizzato. Viceversa, il cittadino sarà sempre più schiavo di sistemi automatizzati, codici QR e algoritmi pensati per tracciare ogni suo movimento, pensiero e azione.</p><p>Essere “cittadini” di uno stato occidentale oggi è divenuta una condizione sciagurata che ricorda molto da vicino quella dei <strong>servi della gleba</strong>, ma in versione globalista-tecnocratica.</p><p><img src="https://substackcdn.com/image/fetch/w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F39302a45-4006-4696-aa48-e35085608e01_1020x391.png" style="width: 1020px;" > <a href="https://substackcdn.com/image/fetch/f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F39302a45-4006-4696-aa48-e35085608e01_1020x391.png" target="_blank" rel="noopener noreferrer">https://substackcdn.com/image/fetch/f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F39302a45-4006-4696-aa48-e35085608e01_1020x391.png</a></p><p><br></p><h3>Raccogli ora, decifra dopo: i rischi del quantum computing</h3><p><br>L’avvento dei computer quantistici mette a repentaglio i sistemi di crittografia più diffusi, come <strong>RSA</strong> (Rivest-Shamir-Adleman), <strong>DSA</strong> (Digital Signature Algorithm) e <strong>ECC</strong> (Elliptic Curve Cryptography).</p><p>La crittografia moderna si basa sulla difficoltà di risolvere certi problemi matematici, come la capacità di fattorizzare grandi numeri composti. I computer quantistici possono però elaborare informazioni in modi che permettono di risolvere questi problemi matematici molto più rapidamente, grazie a algoritmi quantistici specifici come l’algoritmo di Shor.</p><p>Il motivo è che avranno un potere computazionale superiore ai computer tradizionali, grazie allo stato fisico particolare dei "<em>qubit</em>", la loro unità di dati. Grazie alla “<em>sovrapposizione quantistica</em>” i qubit possono essere costantemente in una sorta di stato "ibrido" tra 0 e 1, o in una combinazione di entrambi. I bit a cui siamo abituati possono essere invece solo in uno stato di 0 o 1.</p><p>In risposta, sono stati già sviluppati <strong>nuovi algoritmi di crittografia</strong> progettati per essere sicuri anche nell'era quantistica. Ad esempio, <strong>Tutanota</strong> ha recentemente aggiornato di aver sostituito i propri algoritmi di crittografia (RSA-2048) con una combinazione di algoritmi “quantum safe”: un “post-quantum Key Encapsulation Mechanism” e un “Elliptic-Curve-Diffie-Hellmann Key exchange” per creare un protocollo chiamato TutaCrypt.</p><p>La questione però è più complessa. Se infatti gradualmente tutti i fornitori di servizi, sistemi di pagamento e monete digitali passeranno ad algoritmi di crittografia resistenti ad attacchi quantistici, lo stesso non potrà dirsi per i milioni di dati <strong>conservati </strong>con algoritmi obsoleti.</p><p>Ecco allora che il grosso problema della crittografia non sarà da ricercarsi nel presente o nel futuro, ma nel passato! Se un attaccante, anche a livello governativo, iniziasse ad ammassare <strong>grandi quantitativi di dati cifrati</strong> con algoritmi che saranno obsoleti, potrà in futuro decodificarli facilmente e acquisire infine il tesoro d’informazioni che cercavamo di proteggere. In gergo questo attacco si chiama “<em>harvest now, decrypt later</em>”, cioè “raccogli adesso, decifra dopo”.</p><p>Come proteggersi? Non è facile: è doveroso <strong>aggiornare periodicamente</strong> i nostri dati cifrati con gli ultimi algoritmi disponibili, avendo però anche cura di <strong>cancellare </strong>definitivamente le vecchie copie e aver cura di non diffonderle in giro. Nel caso in cui la diffusione fosse inevitabile, allora sarà opportuno modificare nel corso del tempo le informazioni, così da rendere obsolete, e quindi inutilizzabili, le precedenti versioni.</p><hr /><p><a href="https://www.privacychronicles.it/p/weekly-chronicles-68" target="_blank" rel="noopener noreferrer">privacychronicles.it/p/weekly-…</a><br>[img=https://substack-post-media.s3.amazonaws.com/public/images/b817524d-72a7-46bc-9af7-d21d08e3423f_1024x1024.png]"><br><img src="https://substackcdn.com/image/fetch/f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd5c954aa-e24c-4007-b9ff-bb40472d4e59_1020x391.png" alt="" title=""><br><img src="https://substackcdn.com/image/fetch/f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1eff168a-a00d-4045-8ce2-00200bc1d9e0_500x357.jpeg" alt="" title=""><br><img src="https://substackcdn.com/image/fetch/f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F43f5f544-1259-406a-9427-0fdc7953e616_1020x391.png" alt="" title=""><br><img src="https://substackcdn.com/image/fetch/f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F39302a45-4006-4696-aa48-e35085608e01_1020x391.png" alt="" title=""></p>http://activitystrea.ms/schema/1.0/post2024-03-20T07:45:22Z2024-03-20T07:45:22Zhttps://poliverso.org/objects/0477a01e-72a3bc5a-82a3fe2e0b1f9385#contextpublic