Connect with us

Tech

Big Tech Companies in the US Have Been Told Not to Apply the Digital Services Act

Published

on

Big Tech Companies in the US Have Been Told Not to Apply the Digital Services Act


Trouble is brewing for the Digital Services Act (DSA), the landmark European law governing big tech platforms. On August 21, the Federal Trade Commission (FTC), sent a scathing letter to a number of tech giants, including Google, Meta, Amazon, Microsoft, and Apple. The letter’s subject: the European Digital Services Act cannot be applied if it jeopardizes freedom of expression and, above all, the safety of US citizens.

The opening of the letter—signed by FTC chairman Andrew Ferguson—features a prominent reference to the First Amendment of the US Constitution, namely freedom of speech: “Online platforms have become central to public debate, and the pervasive online censorship in recent years has outraged the American people. Not only have Americans been censored and banned from platforms for expressing opinions and beliefs not shared by a small Silicon Valley elite, but the previous administration actively worked to encourage such censorship.”

The Trump Administration’s Lunge

The Trump administration intends to reverse course, and it is in this direction that the attack on “foreign powers,” the European Union and in the United Kingdom, and in particular on the Digital Services Act and the Online Safety Act, begins. The letter also indirectly references GDPR, the European regulation on the protection of personal data, whose measures are “aimed at imposing censorship and weakening end-to-end encryption” with the result of a weakening of Americans’ freedoms, according to the letter.

Privacy and End-to-End Encryption: The Issues on the Table

In the letter, the US Antitrust Authority specifically asked the 13 companies to report “how they intend to comply with incorrect international regulatory requirements” (the deadline for scheduling a meeting was set for August 28) and recalled their “obligations towards American consumers under Section 5 of the Federal Trade Commission Act, which prohibits unfair or deceptive acts or practices” that could distort the market or compromise safety.

And it is precisely on the security front, and especially on the adoption of end-to-end encryption, that the FTC calls big tech companies to order: “Companies that promise that their service is secure or encrypted, but fail to use end-to-end encryption where appropriate, may deceive consumers who reasonably expect this level of privacy.” Furthermore, “certain circumstances may require the use of end-to-end encryption, and failure to implement such measures may constitute an unfair practice.” The weakening of encryption or other security measures to comply with laws or requests from a foreign government may therefore violate Section 5 of the Federal Trade Commission Act, the document states.

What Happens in Case of Disputes and Interference

In a tweet on X, Ferguson wrote flatly that “if companies censor Americans or weaken privacy and communications security at the request of a foreign power, I will not hesitate to enforce the law.”

“In a global society like the one we live in, overlaps and interferences between different legal systems are natural. Just think of those, in the opposite direction, between European privacy legislation and the famous American Cloud Act,” Guido Scorza, a member of the Italian Data Protection Authority, told WIRED. Scorza believes that in the event of significant discrepancies, “it will be up to the US government and the European Commission to identify corrective measures capable of guaranteeing the sovereignty, including digital, of each country.”

This article originally appeared on Wired Italy and has been translated from Italian.



Source link

Continue Reading
Click to comment

Leave a Reply

Your email address will not be published. Required fields are marked *

Tech

The 5 Big ‘Known Unknowns’ of Donald Trump’s New War With Iran

Published

on

The 5 Big ‘Known Unknowns’ of Donald Trump’s New War With Iran


More recently, Iran has been a regular adversary in cyberspace—and while it hasn’t demonstrated quite the acuity of Russia or China, Iran is “good at finding ways to maximize the impact of their capabilities,” says Jeff Greene, the former executive assistant director of cybersecurity at CISA. Iran, in particular, famously was responsible for a series of distributed-denial-of-service attacks on Wall Street institutions that worried financial markets, and its 2012 attack on Saudi Aramco and Qatar’s Rasgas marked some of the earliest destructive infrastructure cyberattacks.

Today, surely, Iran is weighing which of these tools, networks, and operatives it might press into a response—and where, exactly, that response might come. Given its history of terror campaigns and cyberattacks, there’s no reason to think that Iran’s retaliatory options are limited to missiles alone—or even to the Middle East at all.

Which leads to the biggest known unknown of all:

5. How does this end? There’s an apocryphal story about a 1970s conversation between Henry Kissinger and a Chinese leader—it’s told variously as either Mao-Tse Tung or Zhou Enlai. Asked about the legacy of the French revolution, the Chinese leader quipped, “Too soon to tell.” The story almost surely didn’t happen, but it’s useful in speaking to a larger truth particularly in societies as old as the 2,500-year-old Persian empire: History has a long tail.

As much as Trump (and the world) might hope that democracy breaks out in Iran this spring, the CIA’s official assessment in February was that if Khamenei was killed, he would be likely replaced with hardline figures from the Islamic Revolutionary Guard Corps. And indeed, the fact that Iran’s retaliatory strikes against other targets in the Middle East continued throughout Saturday, even after the death of many senior regime officials—including, purportedly, the defense minister—belied the hope that the government was close to collapse.

The post-World War II history of Iran has surely hinged on three moments and its intersections with American foreign policy—the 1953 CIA coup, the 1979 revolution that removed the shah, and now the 2026 US attacks that have killed its supreme leader. In his recent bestselling book King of Kings, on the fall of the shah, longtime foreign correspondent Scott Anderson writes of 1979, “If one were to make a list of that small handful of revolutions that spurred change on a truly global scale in the modern era, that caused a paradigm shift in the way the world works, to the American, French, and Russian Revolutions might be added the Iranian.”

It is hard not to think today that we are living through a moment equally important in ways that we cannot yet fathom or imagine—and that we should be especially wary of any premature celebration or declarations of success given just how far-reaching Iran’s past turmoils have been.

Defense Secretary Pete Hegseth has repeatedly bragged about how he sees the military and Trump administration’s foreign policy as sending a message to America’s adversaries: “F-A-F-O,” playing off the vulgar colloquialism. Now, though, it’s the US doing the “F-A” portion in the skies over Iran—and the long arc of Iran’s history tells us that we’re a long, long way from the “F-O” part where we understand the consequences.


Let us know what you think about this article. Submit a letter to the editor at mail@wired.com.



Source link

Continue Reading

Tech

This Backyard Smoker Delivers Results Even a Pitmaster Would Approve Of

Published

on

This Backyard Smoker Delivers Results Even a Pitmaster Would Approve Of


While my love of smoked meats is well-documented, my own journey into actually tending the fire started just last spring when I jumped at the opportunity to review the Traeger Woodridge Pro. When Recteq came calling with a similar offer to check out the Flagship 1600, I figured it would be a good way to stay warm all winter.

While the two smokers have a lot in common, the Recteq definitely feels like an upgrade from the Traeger I’ve been using. Not only does it have nearly twice the cooking space, but the huge pellet hopper, rounded barrel, and proper smokestack help me feel like a real pitmaster.

The trade-off is losing some of the usability features that make the Woodridge Pro a great first smoker. The setup isn’t as quite as simple, and the larger footprint and less ergonomic conditions require a little more experience or patience. With both options, excellent smoked meat is just a few button presses away, but speaking as someone with both in their backyard, I’ve been firing up the Recteq more often.

Getting Settled

Photograph: Brad Bourque

Setting up the Recteq wasn’t as time-consuming as the Woodridge, but it was more difficult to manage on my own. Some of the steps, like attaching the bull horns to the lid, or flipping the barrel onto its stand, would really benefit from a patient friend or loved one. Like most smokers, you’ll need to run a burn-in cycle at 400 degrees Fahrenheit to make sure there’s nothing left over from manufacturing or shipping. Given the amount of setup time and need to cool down the smoker after, I would recommend setting this up Friday afternoon if you want to smoke on a Saturday.



Source link

Continue Reading

Tech

Make the Most of Chrome’s Toolbar by Customizing It to Your Liking

Published

on

Make the Most of Chrome’s Toolbar by Customizing It to Your Liking


The main job of Google Chrome is to give you a window to the web. With so much engaging content out there on the internet, you may not have given much thought to the browser framework that serves as the container for the sites you visit.

You’d be forgiven for still using the default toolbar configuration that was in place when you first installed Chrome. But if you take a few minutes to customize it, it can make a significant difference to your browsing. You can get quicker access to the key features you need, and you may even discover features you didn’t know about.

If you’re reading this in Chrome on the desktop, you can experiment with a few customizations right now—all it takes is a few clicks. Here’s how the toolbar in Chrome is put together, and all the different changes you can make.

The Default Layout

Extensions are always easily accessible in Chrome.

Photograph: David Nield

Take a look up at the top right corner of your Chrome browser tab and you’ll see two key buttons: One reveals your browser extensions (the jigsaw piece), and the other opens up your bookmarks (the double-star icon). There should also be a button showing a downward arrow, which gives you access to recently downloaded files.

Right away, you can start customizing. If you click the jigsaw piece icon to show your browser extensions, you can also click the pin button next to any one of these extensions to make it permanently visible on the toolbar. While you don’t want your toolbar to become too cluttered, it means you can put your most-used add-ons within easy reach.

For the extension icons you choose to have on the toolbar, you can choose the way they’re arranged, too: Click and drag on any of the icons to change its position (though the extensions panel itself has to stay in the same place). To remove an extension icon (without uninstalling the extension), right-click on it and choose Unpin.

Making Changes

Image may contain Text and Page

The revamped toolbar customization pane.

Photograph: David Nield

Click the three dots up in the top right corner of any browser window and then Settings > Appearance > Customize your toolbar to get to the main toolbar customization panel, which has recently been revamped. Straight away you’ll see toggle switches that let you show or hide certain buttons on the toolbar.



Source link

Continue Reading

Trending