Profile avatar
christopher-parsons.com
Policy wonk. Street photographer. Torontonian. Not necessarily in that order. Interests: privacy, national security, artificial intelligence, accountability, democratic governance. Posts are mine, not my employer’s. https://christopher-parsons.com
246 posts 1,529 followers 779 following
Regular Contributor
Active Commenter
comment in response to post
It will be a good one, “Foreign Influence on American's [sic] Data Through the CLOUD Act” : judiciary.house.gov/committee-ac...
comment in response to post
This panel will not only scrutinize the UK's secret order demanding Apple build a backdoor into its products but also dive into the critical tension between law enforcement access and the fundamental importance of end-to-end encryption for global security and individual privacy
comment in response to post
It will delve into the US-UK data agreement and potential reforms. Expert testimony will be provided by: Richard Salgado (Salgado Strategies), Greg Nojeim (Center for Democracy & Technology), Susan Landau (Tufts University), and Caroline Wilson Palow (Privacy International)
comment in response to post
I’m aware of some people running consultancies using them (not necessarily to ‘sell’ AI to clients but using their knowledge of the tools as a lure for business), some small startups to try and reduce some ops costs, and folks who are designing homebrew apps cheaper than a paid developer.
comment in response to post
5. Japan will establish an independent oversight panel that will give prior authorization to all acts of data collection and analysis, as well as for offensive operations intended to target attackers’ servers. Again, underlying reporting is at: therecord.media/japan-enacts...
comment in response to post
Of note: the new law will not authorize the government to collect or analyze domestically generated internet traffic.
comment in response to post
4. The government will be empowered to analyze foreign internet traffic entering the country or just transiting through it. (The government has claimed it won’t collect or analyze the contents of this traffic.)
comment in response to post
2. LEAs can infiltrate and neutralize hostile servers before any malicious activity has taken place and to do so below the level of an armed attack against Japan. 3. The Self-Defence Forces be authorized to undertake offensive cyber operations against particularly sophisticated incidents.
comment in response to post
Absolutely exciting and fun. They make very, very creative and inspiring whiskies. I’ve sent a bunch of their bottles with colleagues who were bringing diplomatic gifts when travelling to rehabilitate Canadian whiskey’s international reputation 😝
comment in response to post
Very familiar with Last Straw and spoken with their head distiller several times at length. Haven’t had Stillwaters before.
comment in response to post
I was looking at the rye with interest; hard to find good cask strength rye that isn’t attached to an excessively high shipping cost.
comment in response to post
What have you had of theirs that you’d recommend in particular?
comment in response to post
It was written by Verónica Arroyo. Ms. Arroyo is a privacy lawyer and policy advisor on emerging technologies, and it was a pleasure to work with her and learn from her over the course of the report's production. Again, you can download and read the report from: www.ipc.on.ca/en/resources...
comment in response to post
The report provides an introductory overview of neurotechnologies and examines their adoption in healthcare, employment, and law enforcement settings. It also explores legal and ethical issues, legislative and policy developments, and future technological trends.
comment in response to post
To contribute to the discussion, and further enhance the state of knowledge, the @ipcontario.bsky.social commissioned an independent research report on the topic. You can find it at: www.ipc.on.ca/en/resources...
comment in response to post
The report was commissioned last year from Dr. Scott Thompson, and reviews the existing and emergent state of drones. It is the third independent research report we’ve recently published. You can read the other reports at @ipcontario.bsky.social’s research hub: www.ipc.on.ca/en/resources...
comment in response to post
Thread somewhat disappoints :P
comment in response to post
A challenge is that they all tend to be lumped together in many media outputs with the effect of confusing the type(s) of operations that may be occurring or under discussion.
comment in response to post
Influence operations come in many formats. They can be direct (help A to get X), indirect (help friend of A, in order to try and get A to do X), or shaping (adjust the scope of who is in positions to modify agendas or policy windows).
comment in response to post
Was great to hear your insights on the podcast! :)
comment in response to post
I want to add a re-post of a blog post I wrote about the risks of AI combined with end-to-end encryption systems. blog.cryptographyengineering.com/2025/01/17/l...