[liberationtech] The Fork In The Road Is Only A Mirage.....

Robert Mathews (OSIA) mathews at hawaii.edu
Sun Jun 21 01:37:45 CEST 2020


Begging your pardon, in relation to the recent discussions here, on
Zoom's business/operational intentions, "E2EE", "preserving personal
privacy", "choice of privacy tools", and "validity of choices presented"
etc., if permissible, I would like to submit the following thoughts for
your consideration.   I hope that I can be forgiven for broadening the
context a little -- for properly realizing 'what' can, and must be done
(when mirages appear), are crucial to the struggle of emerging a winning
strategy to preserve and ensure PRIVACY, and to have the same manifest -
a PROFITABLE economic enterprise. 

*FIRST, on the matter of mirages.. on evolving conditions in HK,
swirling NOTIONS of there ever having been the presence of "a choice",*
"a fork" if you must, exists merely as a by-product of one's
_situational "unawareness_" and _a very personal "unenlightenment_".  
In order for Privacy model(s) to be turned into successful business
enterprises (among other considerations), CANDIDATE orientations/builds
must be able to: scale the vast SWATHS of disparities relating to
privacy and security knowledge among members of societies, deliver a
very personal benefit, be operationally sustainable, and yield superior
market profitability.

SECOND, on the matter of user's unawareness, I am forced having to admit
that investigative research on "Privacy" and "Security" of personal
information in the past 5 years would have me conclude that MANY users
of technology and tech services are, in Matt's shoes, humorously
depicted here, in this Kiwi Gov video at BBC:
https://www.bbc.com/news/av/embed/p08hdf2j/53103684 /
https://www.bbc.com/news/av/world-asia-53103684/the-new-zealand-porn-ad-designed-to-protect-children


Above all, a simple question that I could post here for our list
membership to consider is:  "How will it be possible for ANYONE to
protect the very substance of 'a certain something', when, 'THAT', which
is at the risk of being lost is not well understood, and the 'VALUE' of
that which is likely to be lost, is also not properly comprehended?"  
Adjacently, it can be said: in significant proportion, _'SECURITY
operators'_ are both unaware and unprepared to address the nature and
the scope of risks in the '_information environment_'.

*Law to Tighten Beijing’s Grip on Hong Kong With Chinese Security Force*
Pro-democracy politicians said the new details of the proposed national
security law showed that it would punch a hole in the city’s independent
judicial system.
By Chris Buckley, Keith Bradsher and Elaine Yu
*The New York Times*
June 20, 2020
https://www.nytimes.com/2020/06/20/world/asia/china-hong-kong-security-law.html

*Exposing: Secondary Infektion -- Forgeries, interference, and attacks
on Kremlin critics across six years and 300 sites and platforms.*
https://secondaryinfektion.org/

*Secondary Infektion at a Glance: A collection of information operations
on social media run from Russia by a central entity*
https://secondaryinfektion.org/report

-- 
/Dr. Robert Mathews, D.Phil.
Principal Technologist &
//Distinguished Senior Research Scholar//
//Office of Scientific Inquiry & Applications (OSIA)//
//University of Hawai'i/
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://lists.ghserv.net/pipermail/lt/attachments/20200620/1db9bbef/attachment.html>


More information about the LT mailing list