Anais Do Ii Seminário Governança Das Redes E O Marco Civil Da Internet Globalização, Tecnologias E Conectividade

Total Page:16

File Type:pdf, Size:1020Kb

Anais Do Ii Seminário Governança Das Redes E O Marco Civil Da Internet Globalização, Tecnologias E Conectividade ANAIS DO II SEMINÁRIO GOVERNANÇA DAS REDES E O MARCO CIVIL DA INTERNET GLOBALIZAÇÃO, TECNOLOGIAS E CONECTIVIDADE ORGANIZADORES FABRÍCIO BERTINI PASQUOT POLIDO LUCAS COSTA DOS ANJOS LUÍZA COUTO CHAVES BRANDÃO S471a Seminário Governança das redes e o Marco Civil da Internet (2. : 2016 : Belo Horizonte, MG) Anais [recurso eletrônico]: globalização, tecnologias e conectividade / Fabrício Bertini Pasquot Polido, Lucas Costa dos Anjos, Luiza Couto Chaves Brandão, organizadores. Belo Horizonte: Instituto de Referência em Internet e Sociedade, 2017. 442 p. - Inclui bibliografias. ISBN: 978-85-94202-00-0 1. Direito 2. Internet 3. Cibercultura 4. Globalização 5. Propriedade intelectual I. Polido, Fabricio Bertini Pasquot II. Anjos, Lucas Costa dos III. Brandão, Luíza Couto Chaves IV. Título CDU(1976) 34:007 Ficha catalográfica elaborada pela Biblioteca da Faculdade de Direito da UFMG Qualquer parte desta publicação pode ser reproduzida, desde que citada a fonte. As opiniões emitidas em artigos ou notas assinadas são de exclusiva responsabilidade dos respectivos autores. Projeto gráfico: André Oliveira Capa: Samira Motta Diagramação: André Oliveira Revisão: Luíza Brandão Finalização: André Oliveira ANAIS DO II SEMINÁRIO GOVERNANÇA DAS REDES E O MARCO CIVIL DA INTERNET GLOBALIZAÇÃO, TECNOLOGIAS E CONECTIVIDADE ORGANIZADORES FABRÍCIO BERTINI PASQUOT POLIDO LUCAS COSTA DOS ANJOS LUÍZA COUTO CHAVES BRANDÃO Como citar em ABNT II Seminário Governança das Redes e o Marco Civil da Internet, 2016, Belo Horizonte. Governança das Redes e o Marco Civil da Internet: globalização, tecnologias e conectividade. Belo Horizonte: Instituto de Referência em Internet e Sociedade, 2017. Disponível em: http://bit.ly/38x8Iyp. Acesso em: DD mmm. AAAA Organização : Apoio: ORGANIZADORES Fabrício Bertini Pasquot Polido: Fundador do Instituto de Referência em Internet e Sociedade. Doutor em Di- reito Internacional pela Faculdade de Direito da Universidade de São Paulo (‘magna cum laude’, 2010) e Mestre pela Universitá degli Studi di Torino, Itália. Foi também pesqui- sador visitante – nível Pós-Doutorado – do Max-Planck Institute for Comparative and International Private Law em Hamburgo, Alemanha em 2012. Professor Adjunto de Di- reito Internacional da Faculdade de Direito da Universidade Federal de Minas Gerais (UFMG). Professor do corpo permanente do Programa de Pós-Graduação em Direito, na mesma instituição. É membro do Comitê de Direito Internacional Privado e Propriedade Intelectual da International Law Association (ILA), da Sociedade de Direito Internacional Econômico e da Associação Americana de Direito Internacional Privado. Coordenador do Grupo de Estudos Internacionais em Internet, Inovação e Propriedade Intelectual, da Universidade Federal de Minas Gerais (GNet-UFMG) e Membro do Observatório Brasile- iro de Direito Internacional Privado – Brazilian PIL Watch. Autor de livros e artigos pub- licados no Brasil e exterior. Com o IRIS, tem desenvolvido pesquisas colaborativas en- volvendo temas do direito internacional, cooperação internacional e direito de internet. Lucas Costa dos Anjos: Fundador e Conselheiro Científico do Instituto de Referência em Internet e Socie- dade, é Doutorando, Mestre e Bacharel em Direito pela Universidade Federal de Minas Gerais. É também Professor Assistente da Universidade Federal de Juiz de Fora. Espe- cialista em Direito Internacional pelo CEDIN (Centro de Direito Internacional). Foi bolsis- ta CAPES (Coordenação de Aperfeiçoamento de Pessoal de Nível Superior) e estagiário docente dos cursos Relações Econômicas Internacionais, Ciências do Estado e Direito, da Universidade Federal de Minas Gerais. Advogado, é também membro da Associação Brasileira de Relações Internacionais (ABRI). Luíza Couto Chaves Brandão: Pesquisadora do Instituto de Referência em Internet e Sociedade, graduanda em Direito pela Universidade Federal de Minas Gerais, com experiência na Universidade de Ciências Aplicadas de Schmalkalden (Alemanha) e na Universidade de Genebra (Suíça). Membro do Grupo de Estudos em Internet, Inovação e Propriedade Intelectual (GNet). SUMÁRIO PALAVRAS INICIAIS 12 SOBRE OS PAINELISTAS 16 ABERTURA 22 GOVERNANÇA GLOBAL E JURISDIÇÃO 26 ARQUITETURA DA INTERNET E NEUTRALIDADE DE REDE 36 COALIZÃO DE DIREITOS NA REDE 48 ECOSSISTEMAS DE INOVAÇÃO DE EMPREENDEDORISMO 58 LEI ELEITORAL E LIBERDADE DE EXPRESSÃO NA INTERNET 69 DIREITOS DOS USUÁRIOS, CONSENTIMENTO E TRANSFERÊNCIA INTERNACIO- NAL DE DADOS 83 PRIVACIDADE E PROTEÇÃO DE DADOS 94 PROPRIEDADE INTELECTUAL E NOVAS TECNOLOGIAS 102 DIREITO, POLÍTICAS PÚBLICAS E INOVAÇÃO 114 DIREITOS HUMANOS E INTERNET 129 INCLUSÃO DIGITAL, ACESSO E CONECTIVIDADE 136 ENCERRAMENTO 146 RESUMOS 148 GRUPO DE TRABALHO 1 GOVERNANÇA DA INTERNET: 148 JURISDIÇÃO, POLÍTICAS PÚBLICAS E DESAFIOS INTERNACIONAIS A UTILIZAÇÃO DE BANCOS DE DADOS PÚBLICOS POR SERVIÇOS ONLINE: CONCILIANDO O MARCO CIVIL DA INTERNET E A LEI DE ACESSO A INFORMAÇÃO 151 ENTRE O DIREITO E A FORÇA NA SOCIEDADE DA INFORMAÇÃO: BLOQUEIO JUDICIAL DO WHATSAPP E ADI Nº 5.527 155 GOVERNANÇA, POLÍTICAS PÚBLICAS E ACCOUNTABILITY NOS PORTAIS DE TRANSPARÊNCIA GOVERNAMENTAIS BRASILEIROS 161 O JUDICIÁRIO COMO ATOR REGULADOR DA INTERNET: UMA ANÁLISE DA CONJUNTURA DAS DECISÕES DE BLOQUEIO DO WHATSAPP 166 OS PROGRAMAS DE SURVEILLANCE EXTRATERRITORIAL E O DIREITO GLOBAL À PRIVACIDADE 171 OS PROBLEMAS JURISDICIONAIS DA INTERNET E A ARBITRAGEM COMO MEIO EFICIENTE DE RESOLUÇÃO DOS CONFLITOS NO COMÉRCIO ELETRÔNICO 175 PARTICIPAÇÃO NA GOVERNANÇA DA INTERNET: O MULTISSETORIALISMO DO COMITÊ GESTOR DA INTERNET NO BRASIL (CGI.BR) 179 POLÍTICA DE INFORMAÇÃO PARA A INTERNET: REGULAÇÃO DO ZERO-RATING NA UNIÃO EUROPEIA 182 GRUPO DE TRABALHO 2 ASPECTOS ECONÔMICOS DAS NOVAS TECNOLOGIAS: 188 REDES DESCENTRALIZADAS, ECONOMIA DE COMPARTILHAMENTO, NEUTRALIDADE E INOVAÇÃO A ESTRATÉGIA DA UBER NO BRASIL: A INFORMAÇÃO COMO FATOR PRODUTIVO E O TERRITÓRIO COMO RECURSO DA EM- PRESA 191 A LEI Nº 12.865/2013 E A REGULAÇÃO DAS FINTECHS: UMA ANÁLISE DAS RESPOSTAS INSTITUCIONAIS AO MOVIMENTO DAS INOVAÇÕES 197 A RESPONSABILIDADE DO AIRBNB E OS CONTRATOS DE SUBLOCAÇÃO IMOBILIÁRIA NO CONTEXTO DA ECONOMIA DE COMPARTILHAMENTO 202 BLOCKCHAIN, SMART CONTRACTS E ‘JUDGE AS A SERVICE’ NO DIREITO BRASILEIRO 207 BLOCKCHAIN: DOS CONCEITOS ÀS POSSÍVEIS APLICAÇÕES 213 ECONOMIA DE COMPARTILHAMENTO E NOVAS TECNOLOGIAS: O CONFRONTO ENTRE MODELOS DE NEGÓCIOS 218 MERCADOS DE PLATAFORMA E EXTERNALIDADES DE REDE: UMA ABORDAGEM ECONÔMICO-JURÍDICA DA NEUTRALIDADE DE REDE 222 O PRINCÍPIO DA NEUTRALIDADE DA REDE À LUZ DA CIBERCULTURA 226 SERVIÇO NOTARIAL E REGISTRAL ALINHADO À ECONOMIA DO COMPARTILHAMENTO 230 GRUPO DE TRABALHO 3 DIREITOS HUMANOS E INTERNET: 234 LIBERDADE DE EXPRESSÃO, DISCURSO DE ÓDIO E PRIVACIDADE A INTERNET E OS DISCURSOS DE ÓDIO: RISCOS E INSTRUMENTALIZAÇÕES 236 A SUSPENSÃO DO APLICATIVO “WHATSAPP” POR DECISÃO JUDICIAL E OS DIREITOS À LIBERDADE DE EXPRESSÃO E À PRIVACI- DADE CONSOANTE O MARCO CIVIL DA INTERNET 242 CULTURA DE LIBERDADE EM RONALD DWORKIN E LIBERDADE DE EXPRESSÃO NA INTERNET 246 O DIREITO AO ESQUECIMENTO NA ERA DIGITAL 250 OS FUNDAMENTOS DO DIREITO À REPUTAÇÃO EM UMA DEMOCRACIA LIBERAL IGUALITÁRIA 255 GRUPO DE TRABALHO 4 NOVAS FRONTEIRAS DO DIREITO: 262 TRIBUTAÇÃO ONLINE, E-COMMERCE, CLOUD COMPUTING E STREAMING COMPUTAÇÃO EM NUVEM NO GOVERNO: CAMINHOS PARA A FORMAÇÃO DE UMA AGENDA GOVERNAMENTAL 265 INTELIGÊNCIAS ARTIFICIAIS (IAS): PROBLEMATIZAÇÕES NO ÂMBITO JURÍDICO 271 MOEDAS ANÁRQUICAS? OS DESAFIOS DA REGULAÇÃO TRIBUTÁRIA DE BITCOINS NO BRASIL 273 NOVAS FRONTEIRAS DO DIREITO TRIBUTÁRIO: A TRIBUTAÇÃO COMO FERRAMENTA DE DESENVOLVIMENTO OU ENTRAVE AO COMÉRCIO ELETRÔNICO? 275 O TRÁFICO ILÍCITO DE BENS CULTURAIS NA INTERNET 280 O TRATAMENTO TRIBUTÁRIO DA “CLOUD COMPUTING” 284 GRUPO DE TRABALHO 5 CYBERSEGURANÇA: 290 CRYPTOGRAFIA, ANONIMATO, PROTEÇÃO DE DADOS E CYBERESPIONAGEM A PORNOGRAFIA INFANTIL E OS DESAFIOS DA PROTEÇÃO DE DADOS 293 A PROTEÇÃO DE DADOS EMPRESARIAIS NA COMPUTAÇÃO EM NUVEM 297 DEFEZAP E NÓSPORNÓS: USOS, OPERACIONALIZAÇÕES E EFEITOS DE APLICATIVOS DE CONTRAVIGILÂNCIA 302 CHALLENGES TO EXPORT CONTROLS ON INFORMATION AND COMMUNICATIONS TECHNOLOGY 308 FIVE STEPS WITH THE FIVE EYES: UM GUIA PARA COMPREENDER A ESPIONAGEM CIBERNÉTICA ATRAVÉS DAS REVELAÇÕES DE EDWARD SNOWDEN 314 HACKTIVISMO COMO FORMA DE PROTESTO 318 INFORMAÇÕES SOBRE SAÚDE EM DISPOSITIVOS MÓVEIS E INTERNET: RESTRIÇÕES E CUIDADOS COM SEGURANÇA 323 TUTELA JURÍDICA DA PRIVACIDADE, ANONIMIZAÇÃO DE DADOS E ANONIMATO NA INTERNET 328 WHAT NATIONAL STRATEGIES CAN TELL ABOUT A COUNTRY’S VIEW ON CYBERSECURITY? 332 GRUPO DE TRABALHO 6 CONECTANDO O PRÓXIMO MILHÃO: 338 POLÍTICAS DE EXPANSÃO DE CONECTIVIDADE, ACESSO E INCLUSÃO DE GRUPOS MARGINALIZADOS #INTERNETJUSTA OU #INTERNETSOBATAQUE GOVERNANÇA E DESAFIOS DA CONECTIVIDADE NA INTERNET 342 A CAPILARIZAÇÃO DAS REDES DE INFORMAÇÃO NO TERRITÓRIO BRASILEIRO PELO SMARTPHONE 347 CONECTANDO AS PRÓXIMAS 3 BILHÕES DE PESSOAS À INTERNET: ACESSIBILIDADE EM CONFRONTO COM A NEUTRALIDADE DA REDE 354 JOGOS DIGITAIS E INCLUSÃO SOCIAL 358 GRUPO DE TRABALHO 7 DEMOCRACIA DIGITAL, POLÍTICA E APLICAÇÃO DAS 362 LEIS ELEITORAIS NAS REDES DIGITAIS A INTERNET POLARIZADA NO BRASIL: ANÁLISE PELA TEORIA DAS FUNDAÇÕES MORAIS 364 A LEGITIMIDADE CONSTITUCIONAL DA PARTICIPAÇÃO POPULAR VIRTUAL NA DEMOCRACIA BRASILEIRA: UMA ANÁLISE DO DEBATE PÚBLICO DE REGULAMENTAÇÃO DO MARCO CIVIL DA INTERNET NO PENSANDO O DIREITO 368 AS JORNADAS DE JUNHO DE 2013 E O IMPACTO DAS NOVAS MÍDIAS SOCIAIS NA DINÂMICA DA MOBILIZAÇÃO SOCIAL E NO GOVERNO REPRESENTATIVO 374 CROWDFUNDING: FINANCIAMENTO COLETIVO DE CAMPANHAS
Recommended publications
  • Borehole Gravity Meter Surveys at Thewaste Treatment Plant
    PNNL-16490 MGL-2007-001 Borehole Gravity Meter Surveys at the Waste Treatment Plant, Hanford, Washington J. D. MacQueen E. Mann March 2007 Prepared by Microg-LaCoste for the Pacific Northwest National Laboratory under Contract DE-AC05-76RL01830 with the U.S. Department of Energy Borehole Gravity Meter Surveys at the Waste Treatment Plant, Hanford, Washington Report MGL-2007-001 Jeffrey D. MacQueen Ethan Mann Microg-LaCoste March 30, 2007 DISCLAIMER This report was prepared as an account of work sponsored by an agency of the United States Government. Neither the United States Government nor any agency thereof, nor Battelle Memorial Institute, nor any of their employees, makes any warranty, express or implied, or assumes any legal liability or responsibility for the accuracy, completeness, or usefulness of any information, apparatus, product, or process disclosed, or represents that its use would not infringe privately owned rights. Reference herein to any specific commercial product, process, or service by trade name, trademark, manufacturer, or otherwise does not necessarily constitute or imply its endorsement, recommendation, or favoring by the United States Government or any agency thereof, or Battelle Memorial Institute. The views and opinions of authors expressed herein do not necessarily state or reflect those of the United States Government or any agency thereof. PACIFIC NORTHWEST NATIONAL LABORATORY operated by BATTELLE for the UNITED STATES DEPARTMENT OF ENERGY under Contract DE-AC05-76RL01830 Printed in the United States of America Available to DOE and DOE contractors from the Office of Scientific and Technical Information, P.O. Box 62, Oak Ridge, TN 37831-0062; ph: (865) 576-8401 fax: (865) 576-5728 email: mailto:[email protected] Available to the public from the National Technical Information Service, U.S.
    [Show full text]
  • Secure Smartphone for Secure Calls and Anonymous Surfing the Internet
    Secure smartphone for secure calls and anonymous surfing the Internet FEATURES SC.PHONE SMARTPHONE ENSURES THE MAXIMUM PROTECTION AND CONVENIENCE OF USE OPPORTUNITIES SC.PHONE Eliminates the tracking, surveillance, and espionage, carried out by phone manufacturers, mobile operators, Internet providers, advertising companies, !"#" $%&'() "&! *"+,'() does not scan data does not track does not collect information on the phone or in the cloud location about user interactions with applications 2 / 10 Own VPN Unlinked operating connection from Google system services Hidden Subscriber Identifiers Protection Data against encryption virus software on the phone VoIP account Hiding for encrypted calls geolocation data (GPS) 3 / 10 FEATURES SMARTPHONE 01 Own server 02 Built-in Firewall 03 MAC Address We use our own and VPN Randomization time servers and There are built-in Firewall We support randomization captive portal with and VPNs without the use of the MAC address the ability to disable them of proletarian applications of the device that protect you from snooping 04 Own 05 Secure 06 Anonymous application store interface surfing Before downloading Always the latest OS and Web browsing anonymously applications, you can look kernel security patches. in our private browser, with at the number of trackers The smartphone receives the ability to delete browsing and what rights the regular, automatic security data in 1 click application requires updates 07 HMA 08 Tracker Lock 09 MicroG Using the Hardened Blocking ad trackers Full MicroG support Memory
    [Show full text]
  • Lineageos-Galaxy 101
    LineageOS-Galaxy 101 https://wiki.lineageos.org/devices/n2awifi https://www.getdroidtips.com/lineage-os-14-1-samsung-galaxy-tab-pro-10-1-wifi/ https://twrp.me/samsung/samsunggalaxytabpro101exynoswifi.html https://www.youtube.com/watch?v=CWtHQj35clk http://www.lineageosdownloads.com/download-galaxy-tab-pro-10-1-lineage-os/ https://download.exynos5420.com/LineageOS-14.1/n2awifi/ S4 https://forum.xda-developers.com/galaxy-s4/i9505-orig-develop/recovery-twrp-3-2-1-0-t3742880 https://forum.xda-developers.com/galaxy-s4/i9505-develop/rom-lineageos-15-1-t3816279 https://www.los-legacy.de/16.0/jfltexx https://twrp.me/samsung/samsunggalaxys4internationalqualcomm.html https://eu.dl.twrp.me/jfltexx/ S5 https://download.lineageos.org/klte https://twrp.me/samsung/samsunggalaxys5qualcomm.html https://forum.xda-developers.com/showthread.php?t=2727406 https://eu.dl.twrp.me/klte/ https://gathering.tweakers.net/forum/list_messages/1588883 https://download.lineage.microg.org/klte/ S5 Neo https://forum.xda-developers.com/galaxy-s5-neo/development/rom-lineageos-15-1-t3735451 https://twrp.me/samsung/samsunggalaxys5neoexynos.html https://lineage.stricted.net/s5neolte https://www.cyanogenmods.org/forums/topic/lineageos-15-1-for-galaxy-s5-neo-android-8-1-oreo- download/ S5+ https://forum.xda-developers.com/galaxy-s5/development/rom-lineage-os-samsung-galaxy-s5-lte- t3534283 S6 https://download.lineage.microg.org/zerofltexx/ https://forum.xda-developers.com/galaxy-s6/development/rom-universal-oreo-port-galaxy-s6- t3831621 https://forum.xda-developers.com/galaxy-s6/development/rom-lineageos-15-1-unofficial-galaxy-s6-
    [Show full text]
  • The Android Platform Security Model∗
    The Android Platform Security Model∗ RENÉ MAYRHOFER, Google and Johannes Kepler University Linz JEFFREY VANDER STOEP, Google CHAD BRUBAKER, Google NICK KRALEVICH, Google Android is the most widely deployed end-user focused operating system. With its growing set of use cases encompassing communication, navigation, media consumption, entertainment, finance, health, and access to sensors, actuators, cameras, or microphones, its underlying security model needs to address a host of practical threats in a wide variety of scenarios while being useful to non-security experts. The model needs to strike a difficult balance between security, privacy, and usability for end users, assurances for app developers, and system performance under tight hardware constraints. While many of the underlying design principles have implicitly informed the overall system architecture, access control mechanisms, and mitigation techniques, the Android security model has previously not been formally published. This paper aims to both document the abstract model and discuss its implications. Based on a definition of the threat model and Android ecosystem context in which it operates, we analyze how the different security measures in past and current Android implementations work together to mitigate these threats. There are some special cases in applying the security model, and we discuss such deliberate deviations from the abstract model. CCS Concepts: • Security and privacy → Software and application security; Domain-specific security and privacy architectures; Operating systems security; • Human-centered computing → Ubiquitous and mobile devices. Additional Key Words and Phrases: Android, security, operating system, informal model 1 INTRODUCTION Android is, at the time of this writing, the most widely deployed end-user operating system.
    [Show full text]
  • 2021/VIII: Tag Movies
    2021/VIII: Tag movies Three years “Open Source” Smart Phone Egg, 17 February 2020: Almost exactly three years ago, LineageOS was presented here with the MotoG4 (German only). A few months later there was an extensive series of blogs about LineageOS and the LG G6 (German only). Today the aim is to describe the experiences, to bring the devices up to date and to venture a look into the future. Sense and purpose of a “free” Smartphone With a “free” Android, the aim is to be able to use a “free”, but compatible Android on the smartphone instead of the loaded system. For this, the following requirements are necessary: First, the smartphone must be unlockable. Second, after unlocking, a mini- system has to be installed, which allows the “original” Android to be transferred to another system (CustomROM) and third, the CustomROM must always fit the corresponding smartphone. As already written in 2017 (German), loading a CustomROM can be quite tricky. It should be noted here that neither the search giant nor the manufacturers are interested in making this easy. Because if it were easy, consumers would certainly not put up with the current martingale, but more about that later. After all, with a “free” smartphone, the reward is a system that runs without the coercive services of the search giant or other players. Even more importantly, free systems can be adapted and locally saved. This is especially important if the system no longer works (correctly) in terms of software. In such cases the system can simply be reloaded, including the desired apps.
    [Show full text]
  • 5 COVID-19 Research Literatures Mark Herbert World Development Institute 39-06 Main Street, Flushing, Queens, New York 1354
    COVID-19 Research Literatures Mark Herbert World Development Institute 39-06 Main Street, Flushing, Queens, New York 1354, USA, [email protected] Abstract: Coronavirus disease 2019 (COVID-19) is an infectious disease caused by severe acute respiratory syndrome coronavirus 2 (SARS-CoV-2). The virus is mainly spread during close contact and via respiratory droplets that are produced when a person talks, coughs, or sneezes. Respiratory droplets may be produced during breathing, however, current research indicates that the virus is not considered airborne. People may also contract COVID-19 by touching a contaminated surface (Fomite) and then inadvertently transfer the pathogen to a mucous membrane (such as the eyes, nose, or mouth). It is most contagious when people are symptomatic, although spread may be possible before symptoms appear. The virus can live on surfaces up to 72 hours. Time from exposure to onset of symptoms is generally between two and fourteen days, with an average of five days. The standard method of diagnosis is by reverse transcription polymerase chain reaction (rRT-PCR) from a nasopharyngeal swab. The infection can also be diagnosed from a combination of symptoms, risk factors and a chest CT scan showing features of pneumonia. This article introduces recent research reports as references in the related studies. [Mark Herbert. COVID-19 Research Literatures. Rep Opinion 2020;12(3):5-73]. ISSN 1553-9873 (print); ISSN 2375-7205 (online). http://www.sciencepub.net/report. 2. doi:10.7537/marsroj120320.02. Key words: Coronavirus disease 2019 (COVID-19); life; research; literature Introduction Adhikari, S. P., et al. (2020). "Epidemiology, Coronavirus disease 2019 (COVID-19) is an causes, clinical manifestation and diagnosis, infectious disease caused by severe acute respiratory prevention and control of coronavirus disease syndrome coronavirus 2 (SARS-CoV-2).
    [Show full text]
  • Annual Report 2019-2020
    CALYX INSTITUTE ANNUAL 0.4375 in REPORT MAY 1ST, 2019 — APRIL 30, 2020 ANNUAL REPORT 2019–2020 TABLE OF CONTENTS INTRODUCTION 3 Mission & Objectives 0.4375 in 4 Letter from the Executive Director ACCOMPLISHMENTS Membership Program 5 Membership Growth 6 A New Look Digital Services 7 CalyxVPN 7 Tor Hosting 8 Online Chat 8 F-Droid Hosting Android Development 9 CalyxOS SeedVault Android Vulnerability Community Support 10 Micro-Grants Program 11 Conferences & Convenings Growth & Change 12 Weathering a Pandemic Staff Expansion 13 FINANCIALS 2 THE CALYX INSTITUTE ANNUAL REPORT 2019–2020 INTRODUCTION MISSION & 0.4375 in OBJECTIVES THE CALYX INSTITUTE is a not-for-profit education and research organization devoted to studying, testing, developing, and implementing privacy technology and tools to promote free speech, free expression, civic engagement, and privacy rights on the Internet and in the mobile tele- phone industry. The mission of The Calyx Institute is to educate the public about the importance of privacy in digital communications and to develop building blocks that Internet users and service providers alike can use to build “privacy by design” into their Internet experience. Calyx seeks to incorporate privacy and anonymity controls into services at root levels, and make these controls easy for all people to access and use. In order to achieve the ultimate goal of reinforcing the fundamental right to freedom of expression, we seek to make robust privacy tools and ubiquitous strong encryption avail- able to everyone. 3 THE CALYX INSTITUTE INTRODUCTION ANNUAL REPORT 2019–2020 This year, The Calyx Institute has prioritized LETTER FROM improvements to our digital services that can immediately assist individuals and commu- THE EXECUTIVE nities grappling with this new normal while retaining privacy and assurances of online DIRECTOR security.
    [Show full text]
  • Couldn't Find Any Tzdata When Looking for GMT! Starting TWRP 3.1.1-0
    __bionic_open_tzdata: couldn't find any tzdata when looking for GMT! Starting TWRP 3.1.1-0-91b59f50 on Fri Jan 2 21:09:39 1970 (pid 221) BOARD_HAS_NO_REAL_SDCARD := true I:Lun file '/sys/devices/msm_dwc3/f9200000.dwc3/gadget/lun0/file' I:Found brightness file at '/sys/class/leds/lcd-backlight/brightness' I:Got max brightness 255 from '/sys/class/leds/lcd-backlight/max_brightness' I:TWFunc::Set_Brightness: Setting brightness control to 255 I:TW_EXCLUDE_MTP := true I:LANG: en I:TW_OEM_BUILD := true Starting the UI... setting DRM_FORMAT_RGB565 and GGL_PIXEL_FORMAT_RGB_565 cannot find/open a drm device: No such file or directory fb0 reports (possibly inaccurate): vi.bits_per_pixel = 32 vi.red.offset = 24 .length = 8 vi.green.offset = 16 .length = 8 vi.blue.offset = 8 .length = 8 setting GGL_PIXEL_FORMAT_RGBX_8888 double buffered framebuffer: 0 (1080 x 1920) Using fbdev graphics. I:TWFunc::Set_Brightness: Setting brightness control to 255 I:Loading package: splash (/twres/splash.xml) I:Load XML directly I:PageManager::LoadFileToBuffer loading filename: '/twres/splash.xml' directly I:Checking resolution... I:Loading resources... I:Loading variables... I:Loading mouse cursor... I:Loading pages... I:Loading page splash I:Switching packages (splash) => Linking mtab Renaming regular /etc/recovery.fstab -> /etc/recovery.fstab.bak Moving /etc/twrp.fstab -> /etc/recovery.fstab => Processing recovery.fstab I:Processing '/cache' I:Processing '/data' I:Processing '/system' I:Processing '/boot' I:Processing '/recovery' I:Processing '/misc' I:Processing '/firmware' I:Created '/firmware' folder. I:Processing '/persist' I:Created '/persist' folder. I:Processing '/external_sd' I:Created '/external_sd' folder. I:Processing '/usb-otg' I:Created '/usb-otg' folder. I:Using automatic handling for /data/media emulated storage device.
    [Show full text]
  • Privacy in the Facebook Era
    Privacy in the Facebook era Pawel Krawczyk About me ● Information Security Consultant – Since 90’s – penetration testing, security engineering, software security architecture, DevOps – Creator of WebCookies.org As I’m talking, you can download some of the apps on http://ssb.webcookies.pub/ The Great Transformation From the Internet of Humans to the Internet of Commodities Stage #1 Diverse ecosystem of individual websites and blogs Shared through IRC, Usenet, RSS Decentralized ownership Federated identities Stage #2 Centralisation through content aggregators Centralisation of ownership through M&A FeedBurner, Google News, Facebook Algorithmic content selection, promotion and presentation Stage #3 Fully monetized content delivery Algorithmic delivery optimized for profit maximisation Platform for Cambridge Analytica scandal Have you ever had this feeling…? The Why? Source: WebCookies.org Source: ghostery.com Source: ghostery.com Source: Victor Zhou Real-Time Bidding Where Your Privacy is Being Traded in Real-Time Source: www.businessinsider.com Source: Olejnik, Minh-Dung, Castelluccia, “Selling Off Privacy at Auction”, 2013 Source: Olejnik, Minh-Dung, Castelluccia, “Selling Off Privacy at Auction”, 2013 Where this greed for data gets us? Source: Financial Times, Reuters Where this greed for data gets us? Source: Financial Times, Reuters Fighting back Firefox comes with powerful tracker blocking If you prefer Chrome engine: • Vivaldi https://vivaldi.com/ • Iridium https://iridiumbrowser.de/ • Brave https://brave.com/ Privacy Badger - blocks
    [Show full text]
  • How to Install Microg an Odexed Stock Android ROM
    How to install microG an odexed stock android ROM The method of replacing Google Services Framework with microG suite on the stock, Android Marshmallow ROM of a Nomu S10 1 of 16 Why would anyone want an android without Google? About 1.5 years ago I attended to a wedding. It took place outside of the city, at a restaurant with a very nice garden, where I've never before. In about 2 hours into the happening, my phone buzzed. I took it out, expecting a text message, or similar, but no: it was Google Maps, asking me if I'm at the place where I am, and since I'm there, could I upload some pictures of the place? Since then this had become regular, until the point it became obstructive and annoying. I'm not alone: Brad Frost's[^1] entry talks about the same problem. I've tried everything to turn Google location tracking off. I went to Location History[^2] and disabled it. I went through the Google Maps application and removed every notification. This latter one cleared the madness for a while - until a new version of Maps came up, which introduced some extra notification setting, which then showed yet another popup out of the blue. Google fails to respect user settings lately, turning into a desperately annoying data hoarding monster. They've been doing nasty things, like silently collecting cell tower information, even with location settings disabled for years[^3], but with the coming of GDPR[^4] they need to get consent - hence the silly amount of notifications they are bombarding you with.
    [Show full text]
  • Lista Para La Protección De Datos O Manual De
    Lista para la protección de datos o Manual de resistencia al capitalismo de vigilancia Valentin Delacour 2016 - 2020 Versión del 23.10.20 Valentin Delacour Índice 1. Introducción p. 2 2. Reglas de oro p. 3 3. Computadora pp. 4-6 3.1 Sistemas operativos 4 3.2 Servicios y programas 5 3.3 Firefox 6 3.4 Instancias de videoconferencia 6 4. Smartphone pp. 7-8 4.1 Sistemas operativos 7 4.2 Hardware 7 4.3 Aplicaciones 8 5. DNS p. 9 5.1 Transcontinental 9 5.2 Europa 9 6. Recursos adicionales (y fuentes) pp. 10-11 7. Configuraciones pp. 12-23 7.1 MX Linux 12 7.2 F-Droid 12 7.3 Blokada 12 7.4 Firefox 13-23 1 Versión del 23.10.20 Valentin Delacour 1. Introducción Este documento tiene como objetivo principal proponer herramientas y alternativas para proteger los datos y la privacidad de la predación de empresas privadas bajo el sistema actual de capitalismo de vigilancia. Ahora bien, seguir las siguientes recomendaciones permite también mejorar, en ciertas medidas, la protección contra otras entes tales como servicios de Estados o piratas, por ejemplo. Esta lista se destina a todas las personas conscientes o tomando consciencia de la importancia de la protección de datos en nuestra sociedad, independientemente de sus conocimientos del tema. No se destina a las personas necesitando un anonimato total de parte de su función a riesgos tales como opositores políticos o algunos periodistas, aún si algunas opciones propuestas podrían convenirles. Efectivamente, la privacidad no necesariamente es igual al anonimato.
    [Show full text]
  • Free with “
    Free with “Android” Three years “Open Source” Smart Phone Egg, 17 February 2020: Almost exactly three years ago, LineageOS was presented here with the MotoG4 (German only). A few months later there was an extensive series of blogs about LineageOS and the LG G6 (German only). Today the aim is to describe the experiences, to bring the devices up to date and to venture a look into the future. Sense and purpose of a “free” Smartphone With a “free” Android, the aim is to be able to use a “free”, but compatible Android on the smartphone instead of the loaded system. For this, the following requirements are necessary: First, the smartphone must be unlockable. Second, after unlocking, a mini- system has to be installed, which allows the “original” Android to be transferred to another system (CustomROM) and third, the CustomROM must always fit the corresponding smartphone. As already written in 2017 (German), loading a CustomROM can be quite tricky. It should be noted here that neither the search giant nor the manufacturers are interested in making this easy. Because if it were easy, consumers would certainly not put up with the current martingale, but more about that later. After all, with a “free” smartphone, the reward is a system that runs without the coercive services of the search giant or other players. Even more importantly, free systems can be adapted and locally saved. This is especially important if the system no longer works (correctly) in terms of software. In such cases the system can simply be reloaded, including the desired apps.
    [Show full text]