…leges, hiding behind important protections, and ignoring the tenets and purpose of true journalism. Of course I don’t want personal photos published, but I also won’t participate in their well-known practice of blackmail, political favors, political attacks, and corruption. I prefer to stand up, roll this log over, and see what crawls out.
…tems you need to consider them dynamically, as processes, instead of statically, as rigid products. Centralized systems often start out fully baked, but only get better at the rate at which employees at the sponsoring company improve them. Decentralized systems start out half-baked but, under the right conditions, grow exponentially as they attract new contributors.
…on and the lack of insights from Apple (does their security update include Intel’s Spectre fixes?), Apple users are left to assume the worst: this patch includes Intel’s flawed fixes and could lead to an unstable and slow system.
…nvolved in our visit to the doctor. We don’t know who our credit card company shares our data with. Every new vendor, partner, and interaction propagates our data farther. In the information economy, faceless data brokers hold the power. IronCore changes that by giving u…
We all have a powerful reason to hold accountable those who would steal Americans’ identities and assault the public’s right to be heard in government rulemaking. If law enforcement can’t investigate and (where appropriate) prosecute when it happens on this scale, the door is open for it to happen again and again.
I encourage the FCC to reconsider its refusal to assist in my office’s law enforcement investigat…
Specifically, for six months my office has been investigating who perpetrated a massive scheme to corrupt the FCC’s notice and comment process through the misuse of enormous numbers of real New Yorkers’ and other Americans’ identities. Such conduct likely violates state law — yet the FCC has refused multiple requests for crucial evidence in its sole possession that is vital to permit that law enforcement investigation to proceed.
…he views of the real people, businesses, and others who honestly commented on this important issue. Worse, while some of these fake comments used made up
names and addresses, many misused the real names and addresses of actual people as part of the effort to undermine the integrity of the comment process. That’s akin to identity theft, and it happened on a massive scale.