Begging your pardon, in relation to the recent discussions here, on Zoom's business/operational intentions, "E2EE", "preserving personal privacy", "choice of privacy tools", and "validity of choices presented" etc., if permissible, I would like to submit the following thoughts for your consideration. I hope that I can be forgiven for broadening the context a little -- for properly realizing 'what' can, and must be done (when mirages appear), are crucial to the struggle of emerging a winning strategy to preserve and ensure PRIVACY, and to have the same manifest - a PROFITABLE economic enterprise.
*FIRST, on the matter of mirages.. on evolving conditions in HK, swirling NOTIONS of there ever having been the presence of "a choice",* "a fork" if you must, exists merely as a by-product of one's _situational "unawareness_" and _a very personal "unenlightenment_". In order for Privacy model(s) to be turned into successful business enterprises (among other considerations), CANDIDATE orientations/builds must be able to: scale the vast SWATHS of disparities relating to privacy and security knowledge among members of societies, deliver a very personal benefit, be operationally sustainable, and yield superior market profitability. SECOND, on the matter of user's unawareness, I am forced having to admit that investigative research on "Privacy" and "Security" of personal information in the past 5 years would have me conclude that MANY users of technology and tech services are, in Matt's shoes, humorously depicted here, in this Kiwi Gov video at BBC: https://www.bbc.com/news/av/embed/p08hdf2j/53103684 / https://www.bbc.com/news/av/world-asia-53103684/the-new-zealand-porn-ad-designed-to-protect-children Above all, a simple question that I could post here for our list membership to consider is: "How will it be possible for ANYONE to protect the very substance of 'a certain something', when, 'THAT', which is at the risk of being lost is not well understood, and the 'VALUE' of that which is likely to be lost, is also not properly comprehended?" Adjacently, it can be said: in significant proportion, _'SECURITY operators'_ are both unaware and unprepared to address the nature and the scope of risks in the '_information environment_'. *Law to Tighten Beijing’s Grip on Hong Kong With Chinese Security Force* Pro-democracy politicians said the new details of the proposed national security law showed that it would punch a hole in the city’s independent judicial system. By Chris Buckley, Keith Bradsher and Elaine Yu *The New York Times* June 20, 2020 https://www.nytimes.com/2020/06/20/world/asia/china-hong-kong-security-law.html *Exposing: Secondary Infektion -- Forgeries, interference, and attacks on Kremlin critics across six years and 300 sites and platforms.* https://secondaryinfektion.org/ *Secondary Infektion at a Glance: A collection of information operations on social media run from Russia by a central entity* https://secondaryinfektion.org/report -- /Dr. Robert Mathews, D.Phil. Principal Technologist & //Distinguished Senior Research Scholar// //Office of Scientific Inquiry & Applications (OSIA)// //University of Hawai'i/
-- Liberationtech is public & archives are searchable from any major commercial search engine. Violations of list guidelines will get you moderated: https://lists.ghserv.net/mailman/listinfo/lt. Unsubscribe, change to digest mode, or change password by emailing [email protected].
