171
submitted 5 days ago by [email protected] to c/[email protected]

The cable industry has been in a nose-dive for years. Comcast's Q1 2024 earnings report showed its cable business losing 487,000 subscribers. The cable giant ended 2022 with 16,142,000 subscribers; in January, it had 13,600,000.

Charter, the only US cable company bigger than Comcast, is rapidly losing pay-TV subscribers, too. In its Q1 2024 earnings report, Charter reported losing 405,000 subscribers, including business accounts. It ended 2022 with 15,147,000 subscribers; at the end of March, it had 13,717,000.

And, like Comcast, Charter is looking to streaming bundles to keep its pay-TV business alive and to compete with the likes of YouTube TV and Hulu With Live TV.

It’s a curious time as cable TV providers scramble to be part of an industry created in reaction to business practices that many customers viewed as anti-consumer. Meanwhile, the streaming industry is adopting some of these same practices, like commercials and incessant price hikes, to establish profitability. And some smaller streaming players say it's nearly impossible to compete as the streaming industry's top players are taking form and, in some cases, collaborating.

But after decades of discouraging many subscribers with few alternatives, it will be hard for former or current cable customers to view firms like Comcast and Charter as trustworthy competitive streaming providers.

462
submitted 5 days ago by [email protected] to c/[email protected]

The EU Council has now passed a 4th term without passing its controversial message-scanning proposal. The just-concluded Belgian Presidency failed to broker a deal that would push forward this regulation, which has now been debated in the EU for more than two years.

For all those who have reached out to sign the “Don’t Scan Me” petition, thank you—your voice is being heard. News reports indicate the sponsors of this flawed proposal withdrew it because they couldn’t get a majority of member states to support it.

Now, it’s time to stop attempting to compromise encryption in the name of public safety. EFF has opposed this legislation from the start. Today, we’ve published a statement, along with EU civil society groups, explaining why this flawed proposal should be withdrawn.

The scanning proposal would create “detection orders” that allow for messages, files, and photos from hundreds of millions of users around the world to be compared to government databases of child abuse images. At some points during the debate, EU officials even suggested using AI to scan text conversations and predict who would engage in child abuse. That’s one of the reasons why some opponents have labeled the proposal “chat control.”

There’s scant public support for government file-scanning systems that break encryption. Nor is there support in EU law. People who need secure communications the most—lawyers, journalists, human rights workers, political dissidents, and oppressed minorities—will be the most affected by such invasive systems. Another group harmed would be those whom the EU’s proposal claims to be helping—abused and at-risk children, who need to securely communicate with trusted adults in order to seek help.

The right to have a private conversation, online or offline, is a bedrock human rights principle. When surveillance is used as an investigation technique, it must be targeted and coupled with strong judicial oversight. In the coming EU council presidency, which will be led by Hungary, leaders should drop this flawed message-scanning proposal and focus on law enforcement strategies that respect peoples’ privacy and security.

Further reading:

149
submitted 5 days ago by [email protected] to c/[email protected]

The EU Council has now passed a 4th term without passing its controversial message-scanning proposal. The just-concluded Belgian Presidency failed to broker a deal that would push forward this regulation, which has now been debated in the EU for more than two years.

For all those who have reached out to sign the “Don’t Scan Me” petition, thank you—your voice is being heard. News reports indicate the sponsors of this flawed proposal withdrew it because they couldn’t get a majority of member states to support it.

Now, it’s time to stop attempting to compromise encryption in the name of public safety. EFF has opposed this legislation from the start. Today, we’ve published a statement, along with EU civil society groups, explaining why this flawed proposal should be withdrawn.

The scanning proposal would create “detection orders” that allow for messages, files, and photos from hundreds of millions of users around the world to be compared to government databases of child abuse images. At some points during the debate, EU officials even suggested using AI to scan text conversations and predict who would engage in child abuse. That’s one of the reasons why some opponents have labeled the proposal “chat control.”

There’s scant public support for government file-scanning systems that break encryption. Nor is there support in EU law. People who need secure communications the most—lawyers, journalists, human rights workers, political dissidents, and oppressed minorities—will be the most affected by such invasive systems. Another group harmed would be those whom the EU’s proposal claims to be helping—abused and at-risk children, who need to securely communicate with trusted adults in order to seek help.

The right to have a private conversation, online or offline, is a bedrock human rights principle. When surveillance is used as an investigation technique, it must be targeted and coupled with strong judicial oversight. In the coming EU council presidency, which will be led by Hungary, leaders should drop this flawed message-scanning proposal and focus on law enforcement strategies that respect peoples’ privacy and security.

Further reading:

209
submitted 1 week ago by [email protected] to c/[email protected]

We’ve said it before: online age verification is incompatible with privacy. Companies responsible for storing or processing sensitive documents like drivers’ licenses are likely to encounter data breaches, potentially exposing not only personal data like users’ government-issued ID, but also information about the sites that they visit.

This threat is not hypothetical. This morning, 404 Media reported that a major identity verification company, AU10TIX, left login credentials exposed online for more than a year, allowing access to this very sensitive user data.

A researcher gained access to the company’s logging platform, “which in turn contained links to data related to specific people who had uploaded their identity documents,” including “the person’s name, date of birth, nationality, identification number, and the type of document uploaded such as a drivers’ license,” as well as images of those identity documents. Platforms reportedly using AU10TIX for identity verification include TikTok and X, formerly Twitter.

Lawmakers pushing forward with dangerous age verifications laws should stop and consider this report. Proposals like the federal Kids Online Safety Act and California’s Assembly Bill 3080 are moving further toward passage, with lawmakers in the House scheduled to vote in a key committee on KOSA this week, and California's Senate Judiciary committee set to discuss AB 3080 next week. Several other laws requiring age verification for accessing “adult” content and social media content have already passed in states across the country. EFF and others are challenging some of these laws in court.

In the final analysis, age verification systems are surveillance systems. Mandating them forces websites to require visitors to submit information such as government-issued identification to companies like AU10TIX. Hacks and data breaches of this sensitive information are not a hypothetical concern; it is simply a matter of when the data will be exposed, as this breach shows.

Data breaches can lead to any number of dangers for users: phishing, blackmail, or identity theft, in addition to the loss of anonymity and privacy. Requiring users to upload government documents—some of the most sensitive user data—will hurt all users.

According to the news report, so far the exposure of user data in the AU10TIX case did not lead to exposure beyond what the researcher showed was possible. If age verification requirements are passed into law, users will likely find themselves forced to share their private information across networks of third-party companies if they want to continue accessing and sharing online content. Within a year, it wouldn’t be strange to have uploaded your ID to a half-dozen different platforms.

No matter how vigilant you are, you cannot control what other companies do with your data. If age verification requirements become law, you’ll have to be lucky every time you are forced to share your private information. Hackers will just have to be lucky once.

213
submitted 1 week ago by [email protected] to c/[email protected]

We’ve said it before: online age verification is incompatible with privacy. Companies responsible for storing or processing sensitive documents like drivers’ licenses are likely to encounter data breaches, potentially exposing not only personal data like users’ government-issued ID, but also information about the sites that they visit.

This threat is not hypothetical. This morning, 404 Media reported that a major identity verification company, AU10TIX, left login credentials exposed online for more than a year, allowing access to this very sensitive user data.

A researcher gained access to the company’s logging platform, “which in turn contained links to data related to specific people who had uploaded their identity documents,” including “the person’s name, date of birth, nationality, identification number, and the type of document uploaded such as a drivers’ license,” as well as images of those identity documents. Platforms reportedly using AU10TIX for identity verification include TikTok and X, formerly Twitter.

Lawmakers pushing forward with dangerous age verifications laws should stop and consider this report. Proposals like the federal Kids Online Safety Act and California’s Assembly Bill 3080 are moving further toward passage, with lawmakers in the House scheduled to vote in a key committee on KOSA this week, and California's Senate Judiciary committee set to discuss AB 3080 next week. Several other laws requiring age verification for accessing “adult” content and social media content have already passed in states across the country. EFF and others are challenging some of these laws in court.

In the final analysis, age verification systems are surveillance systems. Mandating them forces websites to require visitors to submit information such as government-issued identification to companies like AU10TIX. Hacks and data breaches of this sensitive information are not a hypothetical concern; it is simply a matter of when the data will be exposed, as this breach shows.

Data breaches can lead to any number of dangers for users: phishing, blackmail, or identity theft, in addition to the loss of anonymity and privacy. Requiring users to upload government documents—some of the most sensitive user data—will hurt all users.

According to the news report, so far the exposure of user data in the AU10TIX case did not lead to exposure beyond what the researcher showed was possible. If age verification requirements are passed into law, users will likely find themselves forced to share their private information across networks of third-party companies if they want to continue accessing and sharing online content. Within a year, it wouldn’t be strange to have uploaded your ID to a half-dozen different platforms.

No matter how vigilant you are, you cannot control what other companies do with your data. If age verification requirements become law, you’ll have to be lucky every time you are forced to share your private information. Hackers will just have to be lucky once.

758
submitted 1 week ago by [email protected] to c/[email protected]

The downfall of Chevron deference could completely change the ways courts review net neutrality, according to Bloomberg Intelligence’s Matt Schettenhelm. “The FCC’s 2024 effort to reinstitute federal broadband regulation is the latest chapter in a long-running regulatory saga, yet we think the demise of deference will change its course in a fundamental way,” he wrote in a recent report. “This time, we don’t expect the FCC to prevail in court as it did in 2016.” Schettenhelm estimated an 80 percent chance of the FCC’s newest net neutrality order being blocked or overturned in the absence of Chevron deference.

Federal Trade Commission Chair Lina Khan has made no secret of her ambitions to use the agency’s authority to take bold action to restore competition to digital markets and protect consumers. But with Chevron being overturned amid a broader movement undermining agency authority without clear direction from Congress, Schettenhelm said, “it’s about the worst possible time for the FTC to be claiming novel rulemaking power to address unfair competition issues in a way that it never has before.”

Khan’s methods have drawn intense criticism from the business community, most recently with the agency’s labor-friendly rulemaking banning noncompete agreements in employment contracts. That action relies on the FTC’s interpretation of its authority to allow it to take action in this area — the kind of thing that brings up questions about agency deference.

140
submitted 1 week ago by [email protected] to c/[email protected]
322
submitted 1 week ago by [email protected] to c/[email protected]
706
submitted 1 week ago by [email protected] to c/[email protected]

Long-term carrier lock-in could soon be a thing of the past in America after the FCC proposed requiring telcos to unlock cellphones from their networks 60 days after activation.

FCC boss Jessica Rosenworcel put out that proposal on Thursday, saying it would encourage competition between carriers. If subscribers could simply walk off to another telco with their handsets after two months of use, networks would have to do a lot more competing, the FCC reasons.

"When you buy a phone, you should have the freedom to decide when to change service to the carrier you want and not have the device you own stuck by practices that prevent you from making that choice," Rosenworcel said.

Carrier-locked devices contain software mechanisms that prevent them from being used on other providers' networks. The practice has long been criticized for being anti-consumer.

231
submitted 1 week ago by [email protected] to c/[email protected]

Earlier this year, Microsoft revealed that a Russia-based cybercriminal group labeled as Midnight Blizzard got access to the email accounts of its top executives in late 2023. Today, the company has confirmed that it is informing more of its customers that emails sent to those executives were seen by that hacker group.

The Russian security breach, combined with an earlier one in 2023 by Chinese hackers who accessed Outlook-based government email accounts in the US and Europe, has been a major embarrassment to Microsoft.

372
submitted 1 week ago by [email protected] to c/[email protected]

Mac malware that steals passwords, cryptocurrency wallets, and other sensitive data has been spotted circulating through Google ads, making it at least the second time in as many months the widely used ad platform has been abused to infect web surfers.

Like most other large advertising networks, Google Ads regularly serves malicious content that isn’t taken down until third parties have notified the company. Google Ads takes no responsibility for any damage that may result from these oversights. The company said in an email it removes malicious ads once it learns of them and suspends the advertiser and has done so in this case.

People who want to install software advertised online should seek out the official download site rather than relying on the site linked in the ad. They should also be wary of any instructions that direct Mac users to install apps through the right-click method mentioned earlier. The Malwarebytes post provides indicators of compromise people can use to determine if they’ve been targeted.

866
submitted 1 week ago by [email protected] to c/[email protected]

Netflix, once a pioneer of ad-free viewing that offered a break from traditional TV norms, is now contemplating launching free ad-supported versions of its service in markets like Europe and Asia, Bloomberg reported.

The plans to offer a free ad-supported tier, albeit in select markets, suggests that pivot towards monetizing user data, in other words — making users and not the extensive library of award-winning shows a product, might be well in the pipeline.

[-] [email protected] 113 points 1 week ago

Tesla didn’t respond to a request for comment; it has dissolved its press office.

[-] [email protected] 132 points 2 weeks ago

Summary:

  • The US government is suing Adobe for allegedly deceiving customers with hidden fees and making it difficult to cancel subscriptions.
  • The Department of Justice claims Adobe enrolls customers in its most lucrative subscription plan without clearly disclosing important plan terms.
  • Adobe allegedly hides the terms of its annual, paid monthly plan in fine print and behind optional textboxes and hyperlinks.
  • The company fails to properly disclose the early termination fee, which can amount to hundreds of dollars, upon cancellation.
  • The cancellation process is described as "onerous and complicated", involving multiple webpages and pop-ups.
  • Customers who try to cancel over the phone or via live chats face similar obstacles, including dropped or disconnected calls and having to re-explain their reason for calling.
  • The lawsuit targets Adobe executives Maninder Sawhney and David Wadhwani, alleging they directed or participated in the deceptive practices.
  • The federal government began investigating Adobe's cancellation practices late last year.
  • Adobe's subscription model has long been a source of frustration for creatives, who feel forced to stay subscribed to continue working.
  • Recently, Adobe's new terms of service were met with backlash, with some users interpreting the changes as an opportunity for Adobe to train its AI on users' art.
  • The company has also faced regulatory scrutiny in the past, including antitrust scrutiny from European regulators over its attempted $20 billion acquisition of product design platform Figma in 2022, which was ultimately abandoned.
[-] [email protected] 104 points 1 month ago* (last edited 1 month ago)

For more than two and a half decades, we have collected, preserved, and shared our digital cultural artifacts. Thanks to the generosity of our patrons, the Internet Archive has grown from a small preservation project into a vast library that serves millions of people each year. Our work has impacted the lives of so many of our users who value free and open access to information.

From the beginning, it was important for the Internet Archive to be a nonprofit, because it was working for the people. Its motives had to be transparent; it had to last a long time. That's why we don't charge for access, sell user data, or run ads, even while we offer free resources to citizens everywhere. We rely on the generosity of individuals like you to pay for servers, staff, and preservation projects.

If you can't imagine a future without the Internet Archive, please consider supporting our work. We promise to put your donation to good use as we continue to store over 99 petabytes of data, including 625 billion webpages, 38 million books and texts, and 14 million audio recordings.

[-] [email protected] 137 points 1 month ago

Summary:

  • Internet Archive, including its Wayback Machine, has been facing sustained DDoS attacks for several days
  • The attacks began on Sunday and have been intermittent, but disruptive to the organization's services
  • Internet Archive says the attacks have been "sustained, impactful, targeted, adaptive, and mean"
  • Despite the attacks, the organization's collections are safe, though access has been inconsistent
  • This comes as Internet Archive is also embroiled in a legal battle with US book publishers over its Controlled Digital Lending program
  • The non-profit is working to harden its defenses to offer more reliable access to its digital library
  • Cyberattacks have been increasingly targeting libraries and other knowledge institutions recently
[-] [email protected] 53 points 1 month ago
view more: ‹ prev next ›

ForgottenFlux

joined 5 months ago