
amazon search box
Friday, 13 September 2019
Show HN: Chrome extension to show how fast HN stories bubble to the top https://ift.tt/301l6WQ
Thursday, 12 September 2019
I just don't know dad. Will we ever find out who the good boy is?

My mom's 18yr old man has a heart on his nose

She was found under some insulation with no litter or mother in sight. No name yet, but I'm calling her Gizmo.
Someone threw this little guy over my aunt's fence. Looks like I have a kitten now. His name is Tribbles.

Nature Quote of the Day
Love Quote of the Day
Quote of the Day
Show HN: MuSHR – A Low-Cost DIY Platform for Mobile, Multi-Agent Robotics https://ift.tt/2Lt1vpf
My dog walker, holding court with his pack...

EFF: Encrypted DNS could help close the biggest privacy gap on the Internet. Why are some groups fighting against it?
Thanks to the success of projects like Let’s Encrypt and recent UX changes in the browsers, most page-loads are now encrypted with TLS. But DNS, the system that looks up a site’s IP address when you type the site’s name into your browser, remains unprotected by encryption.
Because of this, anyone along the path from your network to your DNS resolver (where domain names are converted to IP addresses) can collect information about which sites you visit. This means that certain eavesdroppers can still profile your online activity by making a list of sites you visited, or a list of who visits a particular site. Malicious DNS resolvers or on-path routers can also tamper with your DNS request, blocking you from accessing sites or even routing you to fake versions of the sites you requested.
A team of engineers is working to fix these problems with “DNS over HTTPS” (or DoH), a draft technology under development through the Internet Engineering Task Force that has been championed by Mozilla. DNS over HTTPS prevents on-path eavesdropping, spoofing, and blocking by encrypting your DNS requests with TLS.
Alongside technologies like TLS 1.3 and encrypted SNI, DoH has the potential to provide tremendous privacy protections. But many Internet service providers and participants in the standardization process have expressed strong concerns about the development of the protocol. The UK Internet Service Providers Association even went so far as to call Mozilla an “Internet Villain” for its role in developing DoH.
ISPs are concerned that DoH will complicate the use of captive portals, which are used to intercept connections briefly to force users to log on to a network, and will make it more difficult to block content at the resolver level. DNS over HTTPS may undermine plans in the UK to block access to online pornography (the block, introduced as part of the Digital Economy Act of 2017, was planned to be implemented through DNS).
Members of civil society have also expressed concerns over plans for browsers to automatically use specific DNS resolvers, overriding the resolver configured by the operating system (which today is most often the one suggested by the ISP). This would contribute to the centralization of Internet infrastructure, as thousands of DNS resolvers used for web requests would be replaced by a small handful.
That centralization would increase the power of the DNS resolver operators chosen by the browser vendors, which would make it possible for those resolver operators to censor and monitor browser users’ online activity. This capability prompted Mozilla to push for strong policies that forbid this kind of censorship and monitoring. The merits of trusting different entities for this purpose are complicated, and different users might have reasons to make different choices. But to avoid having this technology deployment produce such a powerful centralizing effect, EFF is calling for widespread deployment of DNS over HTTPS support by Internet service providers themselves. This will allow the security and privacy benefits of the technology to be realized while giving users the option to continue to use the huge variety of ISP-provided resolvers that they typically use now. Several privacy-friendly ISPs have already answered the call. We spoke with Marek Isalski, Chief Technology Officer at UK-based ISP Faelix, to discuss their plans around encrypted DNS.
Supporting privacy-protecting technologies is a moral imperative.
Faelix has implemented support for DNS over HTTPS on their pdns.faelix.net resolver. They weren’t motivated by concerns about government surveillance, Marek says, but by ”the monetisation of our personal data.” To Marek, supporting privacy-protecting technologies is a moral imperative. “I feel it is our calling as privacy- and tech-literate people to help others understand the rights that GDPR has brought to Europeans,” he said, “and to give people the tools they can use to take control of their privacy.”
EFF is very excited about the privacy protections that DoH will bring, especially since many Internet standards and infrastructure developers have pointed to unencrypted DNS queries as an excuse to delay turning on encryption elsewhere in the Internet. But as with any fundamental shift in the infrastructure of the Internet, DoH must be deployed in a way that respects the rights of the users. Browsers must be transparent about who will gain access to DNS request data and give users an opportunity to choose their own resolver. ISPs and other operators of public resolvers should implement support for encrypted DNS to help preserve a decentralized ecosystem in which users have more choices of whom they rely on for various services. They should also commit to data protections like the ones Mozilla has outlined in their Trusted Recursive Resolver policy. With these steps, DNS over HTTPS has the potential to close one of the largest privacy gaps on the web.
Published September 13, 2019 at 04:07AM
Read more on eff.org
EFF: Encrypted DNS could help close the biggest privacy gap on the Internet. Why are some groups fighting against it?
Thanks to the success of projects like Let’s Encrypt and recent UX changes in the browsers, most page-loads are now encrypted with TLS. But DNS, the system that looks up a site’s IP address when you type the site’s name into your browser, remains unprotected by encryption.
Because of this, anyone along the path from your network to your DNS resolver (where domain names are converted to IP addresses) can collect information about which sites you visit. This means that certain eavesdroppers can still profile your online activity by making a list of sites you visited, or a list of who visits a particular site. Malicious DNS resolvers or on-path routers can also tamper with your DNS request, blocking you from accessing sites or even routing you to fake versions of the sites you requested.
A team of engineers is working to fix these problems with “DNS over HTTPS” (or DoH), a draft technology under development through the Internet Engineering Task Force that has been championed by Mozilla. DNS over HTTPS prevents on-path eavesdropping, spoofing, and blocking by encrypting your DNS requests with TLS.
Alongside technologies like TLS 1.3 and encrypted SNI, DoH has the potential to provide tremendous privacy protections. But many Internet service providers and participants in the standardization process have expressed strong concerns about the development of the protocol. The UK Internet Service Providers Association even went so far as to call Mozilla an “Internet Villain” for its role in developing DoH.
ISPs are concerned that DoH will complicate the use of captive portals, which are used to intercept connections briefly to force users to log on to a network, and will make it more difficult to block content at the resolver level. DNS over HTTPS may undermine plans in the UK to block access to online pornography (the block, introduced as part of the Digital Economy Act of 2017, was planned to be implemented through DNS).
Members of civil society have also expressed concerns over plans for browsers to automatically use specific DNS resolvers, overriding the resolver configured by the operating system (which today is most often the one suggested by the ISP). This would contribute to the centralization of Internet infrastructure, as thousands of DNS resolvers used for web requests would be replaced by a small handful.
That centralization would increase the power of the DNS resolver operators chosen by the browser vendors, which would make it possible for those resolver operators to censor and monitor browser users’ online activity. This capability prompted Mozilla to push for strong policies that forbid this kind of censorship and monitoring. The merits of trusting different entities for this purpose are complicated, and different users might have reasons to make different choices. But to avoid having this technology deployment produce such a powerful centralizing effect, EFF is calling for widespread deployment of DNS over HTTPS support by Internet service providers themselves. This will allow the security and privacy benefits of the technology to be realized while giving users the option to continue to use the huge variety of ISP-provided resolvers that they typically use now. Several privacy-friendly ISPs have already answered the call. We spoke with Marek Isalski, Chief Technology Officer at UK-based ISP Faelix, to discuss their plans around encrypted DNS.
Supporting privacy-protecting technologies is a moral imperative.
Faelix has implemented support for DNS over HTTPS on their pdns.faelix.net resolver. They weren’t motivated by concerns about government surveillance, Marek says, but by ”the monetisation of our personal data.” To Marek, supporting privacy-protecting technologies is a moral imperative. “I feel it is our calling as privacy- and tech-literate people to help others understand the rights that GDPR has brought to Europeans,” he said, “and to give people the tools they can use to take control of their privacy.”
EFF is very excited about the privacy protections that DoH will bring, especially since many Internet standards and infrastructure developers have pointed to unencrypted DNS queries as an excuse to delay turning on encryption elsewhere in the Internet. But as with any fundamental shift in the infrastructure of the Internet, DoH must be deployed in a way that respects the rights of the users. Browsers must be transparent about who will gain access to DNS request data and give users an opportunity to choose their own resolver. ISPs and other operators of public resolvers should implement support for encrypted DNS to help preserve a decentralized ecosystem in which users have more choices of whom they rely on for various services. They should also commit to data protections like the ones Mozilla has outlined in their Trusted Recursive Resolver policy. With these steps, DNS over HTTPS has the potential to close one of the largest privacy gaps on the web.
Published September 13, 2019 at 04:07AM
Read more on eff.org
My girlfriends cat does this thing with her paws
Had trouble finding the cat, gave up, then checked on my daughter...

‘Ms. Purple’ Review: The Ties That Bind (and Sometimes Strangle) | Ms. Purple Review

By JEANNETTE CATSOULIS
Ms. Purple ()
Opening September 6, 2019
from NYT Critics' Pick https://ift.tt/2LsWRaX
‘América’ Review: A Matriarch’s Illness Unites and Divides a Family | América Review

By GLENN KENNY
América ()
Opening September 13, 2019
from NYT Critics' Pick https://ift.tt/2O44xlw
Wednesday, 11 September 2019
The moment a passerby saved Felix the cat after she fell i...

Show HN: A zero configuration remote monitoring tool that's better than nothing https://ift.tt/2Acmp5N
Nature Quote of the Day
Quote of the Day
Love Quote of the Day
Once this little guy is off his meds he is all ours!! Adopt, don’t shop!!

Rescued this guy from a shelter. He was there for 8 months and no one wanted him. I believe he was waiting for my wife and I. Reddit meet Hunter Bigol Pupperton McGillicuddy.

Guide dog, Roselle, lead blind man down 78 flights of stairs of the North Tower on 9/11. Photo by Richard Avedon 10/10/01.

EFF: That Time EFF Got a Copyright Takedown Demand
Earlier this week, EFF received an email claiming that our body-camera police officer illustration (shown in the banner above) violated the sender’s copyright in a graphic they used to illustrate a tweet (cropped screenshot shown on the right). The email demanded we remove the image or provide a link to their e-commerce website, which sells police body cameras. For those interested in Search Engine Optimization (SEO), a link from EFF can be very beneficial to their page ranking. The funny thing was, the police officer illustration is an original EFF work.
It’s not a problem for someone to use our works in their own—they are available to the public under a Creative Commons attribution license—but that certainly doesn’t give a claim against our original. And their graphic had no attribution. (The Action Camera skateboarder illustration on the left appears to be an Adobe stock image.)
For EFF this was more amusing than threatening. We knew instantly that we needn’t worry about the implied threat, and if things went badly, we probably have more IP litigators per capita than any entity that’s not a boutique IP litigation firm. So we wrote back explaining the situation, and expect that will be the end of this.
But for many entities, it can be quite scary. Even if they are secure in their rights, the potential for a costly or time-consuming conflict may lead to a rational choice that a link is a low-cost solution. They might wonder if this misunderstanding will escalate into a DMCA takedown, potentially interfering with the availability of the page until the improper notice is resolved. Even if they disregard such a weak threat, dealing with it has the serious potential to take time away from running their operation.
We have not named the email’s sender. There is no indication that they are in the business of copyright trolling, it likely was a simple mistake, and we had no desire to use our platform to mobilize a shame campaign. Moreover, we’re well aware of the Streisand effect and see no need to provide the very link they seek in our discussion of why they shouldn’t have demanded a link. Instead, we hope that this example serves to show how copyright demands can be misused. Below is our response:
Dear [NAME REDACTED],
I am the General Counsel of the Electronic Frontier Foundation (EFF) and am writing in response to your email of September 10, in which you asserted that the illustration of a police officer in our Body Warn Camera page, https://ift.tt/2AIp1Xf, violated your company’s rights in the image used in your July 4 tweet, and demanded that we remove the illustration or provide a commercial link to your company on the eff.org website.
As an initial matter, please allow me to correct a fundamental mistake. The illustration on our page is an original image created by the Electronic Frontier Foundation, specifically our talented Art Director Hugh D’Andrade. Accordingly, you have no right to ask EFF, or anyone else, to remove our illustration, much less to provide your company with links or other benefits in exchange for its use. To the extent that you have sent similar demands to anyone else regarding our illustration, you will need to retract them immediately.
This is not to say that you can never use our illustration. In addition to your rights under fair use and fair dealing, EFF makes its content available under the Creative Commons Attribution 3.0 United States (CC BY 3.0 US) license, see https://ift.tt/TcNIpl. Thus, you would have had permission to use our illustration in your tweet if you had simply complied with the attribution requirement. If you wish to continue to use the police officer illustration, please be sure to comply with these license terms.
Finally, while we understand your desire to get links to your company’s website (and the SEO value of a link from EFF), we are disappointed and surprised that you would use copyright threats to try to make that happen. Baseless copyright threats are an ongoing problem for the Internet (see examples in our Takedown Hall of Shame https://www.eff.org/takedowns). Rather than contributing to that problem, we suggest that you and your company endeavor to earn that attention through the quality of your offerings.
In order to better educate the public about the issues with copyright demands, please note that we are blogging about your email and this response, but will endeavor to keep your name and the name of your company out of it.
Please let me know if you have any further questions.
best regards,
Kurt
-------------------------------
Kurt Opsahl, kurt@eff.org
Deputy Executive Director and General Counsel
Electronic Frontier Foundation https://www.eff.org/
ph: +1 415.436.9333 x 106 \\ fx: +1 415.436.9993 \\ @kurtopsahl
Published September 12, 2019 at 02:26AM
Read more on eff.org
EFF: That Time EFF Got a Copyright Takedown Demand
Earlier this week, EFF received an email claiming that our body-camera police officer illustration (shown in the banner above) violated the sender’s copyright in a graphic they used to illustrate a tweet (cropped screenshot shown on the right). The email demanded we remove the image or provide a link to their e-commerce website, which sells police body cameras. For those interested in Search Engine Optimization (SEO), a link from EFF can be very beneficial to their page ranking. The funny thing was, the police officer illustration is an original EFF work.
It’s not a problem for someone to use our works in their own—they are available to the public under a Creative Commons attribution license—but that certainly doesn’t give a claim against our original. And their graphic had no attribution. (The Action Camera skateboarder illustration on the left appears to be an Adobe stock image.)
For EFF this was more amusing than threatening. We knew instantly that we needn’t worry about the implied threat, and if things went badly, we probably have more IP litigators per capita than any entity that’s not a boutique IP litigation firm. So we wrote back explaining the situation, and expect that will be the end of this.
But for many entities, it can be quite scary. Even if they are secure in their rights, the potential for a costly or time-consuming conflict may lead to a rational choice that a link is a low-cost solution. They might wonder if this misunderstanding will escalate into a DMCA takedown, potentially interfering with the availability of the page until the improper notice is resolved. Even if they disregard such a weak threat, dealing with it has the serious potential to take time away from running their operation.
We have not named the email’s sender. There is no indication that they are in the business of copyright trolling, it likely was a simple mistake, and we had no desire to use our platform to mobilize a shame campaign. Moreover, we’re well aware of the Streisand effect and see no need to provide the very link they seek in our discussion of why they shouldn’t have demanded a link. Instead, we hope that this example serves to show how copyright demands can be misused. Below is our response:
Dear [NAME REDACTED],
I am the General Counsel of the Electronic Frontier Foundation (EFF) and am writing in response to your email of September 10, in which you asserted that the illustration of a police officer in our Body Warn Camera page, https://ift.tt/2AIp1Xf, violated your company’s rights in the image used in your July 4 tweet, and demanded that we remove the illustration or provide a commercial link to your company on the eff.org website.
As an initial matter, please allow me to correct a fundamental mistake. The illustration on our page is an original image created by the Electronic Frontier Foundation, specifically our talented Art Director Hugh D’Andrade. Accordingly, you have no right to ask EFF, or anyone else, to remove our illustration, much less to provide your company with links or other benefits in exchange for its use. To the extent that you have sent similar demands to anyone else regarding our illustration, you will need to retract them immediately.
This is not to say that you can never use our illustration. In addition to your rights under fair use and fair dealing, EFF makes its content available under the Creative Commons Attribution 3.0 United States (CC BY 3.0 US) license, see https://ift.tt/TcNIpl. Thus, you would have had permission to use our illustration in your tweet if you had simply complied with the attribution requirement. If you wish to continue to use the police officer illustration, please be sure to comply with these license terms.
Finally, while we understand your desire to get links to your company’s website (and the SEO value of a link from EFF), we are disappointed and surprised that you would use copyright threats to try to make that happen. Baseless copyright threats are an ongoing problem for the Internet (see examples in our Takedown Hall of Shame https://www.eff.org/takedowns). Rather than contributing to that problem, we suggest that you and your company endeavor to earn that attention through the quality of your offerings.
In order to better educate the public about the issues with copyright demands, please note that we are blogging about your email and this response, but will endeavor to keep your name and the name of your company out of it.
Please let me know if you have any further questions.
best regards,
Kurt
-------------------------------
Kurt Opsahl, kurt@eff.org
Deputy Executive Director and General Counsel
Electronic Frontier Foundation https://www.eff.org/
ph: +1 415.436.9333 x 106 \\ fx: +1 415.436.9993 \\ @kurtopsahl
Published September 12, 2019 at 02:26AM
Read more on eff.org
Me and my boy Gus, taking in the sights on his first road trip!! He handled it pretty dang well, that good boi!!

EFF: Victory! California Senate Votes Against Face Surveillance on Police Body Cams
The California Senate listened to the many voices expressing concern about the use of face surveillance on cameras worn or carried by police officers, and has passed an important bill that will, for three years, prohibit police from turning a tool intended to foster police accountability into one that furthers mass surveillance.
A.B. 1215, authored by Assemblymember Phil Ting, prohibits the use of face recognition, or other forms of biometric technology, on a camera worn or carried by a police officer in California for three years. The Assembly passed an earlier version of the bill with a 45-17 vote on May 9. Today’s vote of the Senate was 22-15. We are pleased that the Senate has listened to the growing number of voices who oppose the way government agencies use face surveillance.
The government's use of face surveillance—particularly when used with body-worn cameras in real-time— has grave implications for privacy, free speech, and racial justice. For example, face recognition technology has disproportionately high error rates for women and people of color. Making matters worse, law enforcement agencies conducting face surveillance often rely on images pulled from mugshot databases, which include a disproportionate number of people of color due to racial discrimination in our criminal justice system.
As EFF activist Nathan Sheard told the California Assembly in May, using face recognition technology “in connection with police body cameras would force Californians to decide between actively avoiding interaction and cooperation with law enforcement, or having their images collected, analyzed, and stored as perpetual candidates for suspicion.” Stopping the use of face surveillance on police cameras for three years gives the state time to evaluate the effect that this technology has on our communities. We hope the California Legislature will follow-up with a permanent ban.
Thank you to everyone who contacted their legislators to support this bill. We also wish to thank the bill's sponsor, Assemblymember Ting, as well as the American Civil Liberties Union of Northern California and our many coalition partners for all of their hard work on this bill.
Lawmakers and community members across the country are advancing their own prohibitions and moratoriums on their local government’s use of face surveillance, including the San Francisco Board of Supervisors’ historic May ban on government use of face recognition. We encourage communities across the country to enact similar measures in their own cities.
A.B. 1215 will now head back to the Assembly for a procedural vote on its latest amendments, before being sent to the governor’s desk. We urge Governor Newsom to sign this important bill into law.
Published September 12, 2019 at 05:18AM
Read more on eff.org
Show HN: An Android-Based Touch Screen Document Scanner https://ift.tt/2I3Z9vb
Squirrels doing superhero landings is my spirit animal

Human tests are no match for cats (1 inch = 2.5cm).
Hy-Vee Voluntarily Recalls Several Hy-Vee Mealtime Asian Entrees Due to Undeclared Milk Allergen
Hy-Vee, Inc., based in West Des Moines, Iowa, is voluntarily recalling seven of its Hy-Vee Mealtime Asian Entrees after discovering the liquid egg used to make the fried rice contains milk, which is not declared on the product label.
Published September 11, 2019 at 10:05PM
Read more from the CDC
Made a new friend today, he was pretty keen to get in my car and come home with me 🙂

This photo of Saitama, Japan looks like a Van Gogh painting

EFF: New Report Finds Border Communities Inundated with Surveillance Technologies
San Francisco - The Electronic Frontier Foundation (EFF) today published “The Atlas of Surveillance: Southwestern Border Communities,” the first report from a new research partnership with the University of Nevada, Reno’s Reynolds School of Journalism.
EFF and a team of students compiled profiles of six counties along the U.S.-Mexico border, outlining the types of surveillance technologies deployed by local law enforcement—including drones, body-worn cameras, automated license plate readers, and face recognition. The report also includes a set of 225 data points marking surveillance by local, state, and federal agencies in the border region.
Student researchers found a heavy concentration of surveillance technology, even among smaller municipalities. These technologies were often funded through federal grants, particularly Operation Stonegarden, which transfers money to local law enforcement to assist in border security operations.
“The federal government’s push to conduct persistent surveillance along the border has also accelerated adoption of advanced technology by police and sheriff departments in border town communities,” EFF Senior Investigative Researcher and Visiting Reynolds Professor of Media Technology Dave Maass says. “Our research paints a picture of a region beset by surveillance. Homeland Security agencies are using sensor towers and blimps. Meanwhile, we identified more than 30 law enforcement agencies on the ground using automated license plate readers, body-worn cameras, and mobile face recognition devices.”
The new report focuses on: San Diego County, Calif.; Pima and Cochise counties, Ariz.; Doña Ana County, N.M.; and El Paso and Webb counties, Texas. EFF and the Reynolds School are now embarking on a larger scale project to inventory police surveillance across the country, using crowdsourcing to collect news articles and public records and aggregating existing surveillance datasets.
“Because surveillance issues are increasingly relevant to every aspect of our lives, this collaboration between the Reynolds School at the University of Nevada, Reno and EFF provides great educational and engagement opportunities to our students,” Reynolds School Associate Professor and Director of the Center for Advanced Media Studies Gi Yun says.
To assist with large-scale newsgathering, EFF has launched a new tool, Report Back, to streamline research assignments. Report Back allows students to quickly receive small online reporting tasks, such as searching for a news article or government policy document about a certain technology in a particular jurisdiction. Once the student identifies a record about the surveillance technology, they enter the information into the greater database. Currently limited to Reynolds School students, EFF plans to expand its user base to grassroots organizations in 2020.
The Atlas of Surveillance project is part of a new partnership with the Reynolds School, which will also involve developing a course on Cybersecurity and Surveillance and leading students in regular workshops on filing Freedom of Information Act and other public records requests.
For the full report:
https://eff.org/atlas-border
Published September 11, 2019 at 07:12PM
Read more on eff.org
EFF: New Report Finds Border Communities Inundated with Surveillance Technologies
San Francisco - The Electronic Frontier Foundation (EFF) today published “The Atlas of Surveillance: Southwestern Border Communities,” the first report from a new research partnership with the University of Nevada, Reno’s Reynolds School of Journalism.
EFF and a team of students compiled profiles of six counties along the U.S.-Mexico border, outlining the types of surveillance technologies deployed by local law enforcement—including drones, body-worn cameras, automated license plate readers, and face recognition. The report also includes a set of 225 data points marking surveillance by local, state, and federal agencies in the border region.
Student researchers found a heavy concentration of surveillance technology, even among smaller municipalities. These technologies were often funded through federal grants, particularly Operation Stonegarden, which transfers money to local law enforcement to assist in border security operations.
“The federal government’s push to conduct persistent surveillance along the border has also accelerated adoption of advanced technology by police and sheriff departments in border town communities,” EFF Senior Investigative Researcher and Visiting Reynolds Professor of Media Technology Dave Maass says. “Our research paints a picture of a region beset by surveillance. Homeland Security agencies are using sensor towers and blimps. Meanwhile, we identified more than 30 law enforcement agencies on the ground using automated license plate readers, body-worn cameras, and mobile face recognition devices.”
The new report focuses on: San Diego County, Calif.; Pima and Cochise counties, Ariz.; Doña Ana County, N.M.; and El Paso and Webb counties, Texas. EFF and the Reynolds School are now embarking on a larger scale project to inventory police surveillance across the country, using crowdsourcing to collect news articles and public records and aggregating existing surveillance datasets.
“Because surveillance issues are increasingly relevant to every aspect of our lives, this collaboration between the Reynolds School at the University of Nevada, Reno and EFF provides great educational and engagement opportunities to our students,” Reynolds School Associate Professor and Director of the Center for Advanced Media Studies Gi Yun says.
To assist with large-scale newsgathering, EFF has launched a new tool, Report Back, to streamline research assignments. Report Back allows students to quickly receive small online reporting tasks, such as searching for a news article or government policy document about a certain technology in a particular jurisdiction. Once the student identifies a record about the surveillance technology, they enter the information into the greater database. Currently limited to Reynolds School students, EFF plans to expand its user base to grassroots organizations in 2020.
The Atlas of Surveillance project is part of a new partnership with the Reynolds School, which will also involve developing a course on Cybersecurity and Surveillance and leading students in regular workshops on filing Freedom of Information Act and other public records requests.
For the full report:
https://eff.org/atlas-border
Published September 11, 2019 at 07:12PM
Read more on eff.org
Where have you been... I missed you so much!

Show HN: GitHub action to setup PHP with required extensions and Composer https://ift.tt/2NaGSR1
askFSIS Q&A: Antimicrobial intervention in slaughter operation
What procedure must an establishment follow in order to use a new/previously unused antimicrobial intervention in a slaughter operation?
</<br>
Published at: September 11, 2019 at 04:37PM
URL: https://ift.tt/2kkqQGm
askFSIS Q&A: Control of STEC Organisms in Raw Non-intact Beef Processing Establishments
Scenario: A small establishment receives raw beef primal and subprimals from several suppliers and brokers. <<br>
Published at: September 11, 2019 at 04:36PM
URL: https://ift.tt/2vKQQQn
askFSIS Q&A: Safe & Suitable Ingredient Use
Can an establishment use a chemical acidifier (i.e., a substance which may be used as a pH control agent in meat and poultry processing water) and alter the classification, application, or purpose
Published at: September 11, 2019 at 04:35PM
URL: https://ift.tt/2qeMxHR
I’m going through a divorce and my buddies are sticking by my side

Friday, 6 September 2019
Thursday, 5 September 2019
Wednesday, 4 September 2019
Tuesday, 3 September 2019
-
Adult film star Ron Jeremy, 67, won the Guinness Book of World Records award for 'Most Appearances in Adult Films.' He told CNN th...
-
Depuis l'annonce de son départ de l'Espagne en raison d'une accusation de corruption qui pèse contre lui, l'exil du roi Jua...