this post was submitted on 02 Sep 2023
222 points (98.3% liked)

A Boring Dystopia

9744 readers
866 users here now

Pictures, Videos, Articles showing just how boring it is to live in a dystopic society, or with signs of a dystopic society.

Rules (Subject to Change)

--Be a Decent Human Being

--Posting news articles: include the source name and exact title from article in your post title

--Posts must have something to do with the topic

--Zero tolerance for Racism/Sexism/Ableism/etc.

--No NSFW content

--Abide by the rules of lemmy.world

founded 1 year ago
MODERATORS
 

In a well-intentioned yet dangerous move to fight online fraud, France is on the verge of forcing browsers to create a dystopian technical capability. Article 6 (para II and III) of the SREN Bill would force browser providers to create the means to mandatorily block websites present on a government provided list. Such a move will overturn decades of established content moderation norms and provide a playbook for authoritarian governments that will easily negate the existence of censorship circumvention tools.

you are viewing a single comment's thread
view the rest of the comments
[–] le_pouffre_bleu@lemmy.world 15 points 1 year ago

Right now in the EU :

EU’s Draconian Social Media Censorship Laws Are Now Officially Enforceable

EU capitals want media law carve-out to spy on reporters

Right now in France :

Criminalization of encryption : the 8 december case

We have had access to certain elements of the file confirming this information. We have chosen to make them visible in order to denounce the criminalisation of digital practices at the heart of our day-to-day work and the manipulation to which they are subjected in this affair.

Mixing fantasies, bad faith and technical incompetence, a police story has been constructed around the (good) digital practices of the accused, with the aim of staging a “clandestine” or “conspirative” group.

The elements of the investigation that have been communicated to us are staggering. Here are just some of the practices that are being misused as evidence of terrorist behavior6: – the use of applications such as Signal, WhatsApp, Wire, Silence or ProtonMail to encrypt communications ; – using Internet privacy tools such as VPN, Tor or Tails7 ; – protecting ourselves against the exploitation of our personal data by GAFAM via services such as /e/OS, LineageOS, F-Droid ; – encrypting digital media; – organizing and participating in digital hygiene training sessions; – simple possession of technical documentation.

France grants police power to spy on citizens through phones