Parler Talk – Free Speech, Social Media and Section 230

Both conservatives and liberals are convinced that “mainstream” social media “censors” their views and opinions. Liberals point out that so-called conspiracy theories like those peddled by Q-Anon, white supremacist and white nationalist organizations get traction from social media and are amplified by their algorithms, and that as a result, more conservative viewpoints are expressed online…

Details

Healthcare Ransomware Readiness – What You Need to Do Today, Tomorrow and the Day After

On October 28, 2020, officials from the FBI and the U.S. Department of Homeland Security assembled a conference call with healthcare industry executives warning them about an “imminent cybercrime threat to U.S. hospitals and healthcare providers.” The agencies on the conference call, which included the U.S. Department of Health and Human Services (HHS), warned participants…

Details

Hunter Biden’s Laptop – Part Deux – Subpoena vs Warrant

A report on Fox News’ website describes the grand jury subpoena issued for the seizure and search of a laptop computer assertedly belonging to former Vice President Joe Biden’s son, Hunter. For all of the intrigue around the contents of the laptop, its provenance, and whether there is or is not evidence of corruption or criminal…

Details

Blind Mac’s Bluff

There’s currently a controversy around some Hunter Biden emails found on a laptop that he apparently flew from his home in Los Angeles and dropped off with a blind Mac repairman in Wilmington Delaware over a year ago and never picked up. Actually, several controversies — including whether social media like Twitter and Facebook should permit the…

Details

Five [Prying] Eyes – Western Democracies Want Weaker Encryption

The government thinks your emails are too secure. And your text messages. Oh, and your messaging apps. In fact, anything that relies on cryptography. Your messages are too secure in transit. And they are too secure when stored. They are too secure on your computers, your phone, in the cloud, in the control of third…

Details