We LOST More of Our Privacy in 2023. A Bad Year: Year Review

Rob Braxman Tech
3 Jan 202418:42

Summary

TLDREl año 2023 fue un año desafiante para la privacidad, con intrusión gubernamental y adopción de leyes invasivas en el Reino Unido y la UE. La industria tecnológica enfrenta presiones para implementar escaneo de contenido y la vigilancia de notificaciones push. A pesar de los intentos de reformas, la ley FISA se renueva, perpetuando la vigilancia masiva. La respuesta a estas amenazas a la privacidad incluye educación y el uso de tecnologías como teléfonos libres de Google, VPN y servicios de correo electrónico que protejan la identidad y el privacidad.

Takeaways

  • 🌐 El año 2023 fue un año difícil para la privacidad, con intrusión gubernamental en nuestras vidas.
  • 📜 La pérdida de privacidad más grande ocurrió en el Reino Unido y puede afectarnos a nivel global.
  • 🧐 Se rechazó la ley de la UE sobre CSAM (material de explotación infantil), pero se aprobó un nuevo movimiento que aumentará la vigilancia masiva.
  • 🇺🇸 Las cortes estadounidenas estuvieron ocupadas con los disturbios del 6 de enero en la Capital, lo que dejó en evidencia la vigilancia sin orden judicial.
  • 📱 Apple y Google admitieron que la vigilancia de las notificaciones push de teléfonos móviles ha estado en marcha.
  • 🔍 Se ha promovido una técnica llamada escaneo del lado del cliente para identificar y reportar CSAM, lo que requiere la ruptura de la encriptación.
  • 🔗 La协调推动 por parte del Congreso de EE. UU., los legisladores del Reino Unido y la UE para combatir el llamado威胁 de CSAM fue casi completamente sincronizada.
  • 🛑 El escaneo del lado del cliente es un enfoque de sledgehammer para la vigilancia que puede detectar cualquier tipo de contenido.
  • 📈 La revelación de que las notificaciones push están siendo vigiladas por las fuerzas del orden es preocupante, ya que la mayoría de estas no están encriptadas.
  • 📍 Los datos de ubicación, como los proporcionados por Google durante los disturbios del 6 de enero, pueden ser utilizados selectivamente según la conveniencia política del gobierno.
  • 🌐 La UE busca implementar tarjetas de identificación nacional estándar para sus ciudadanos y crear un certificado raíz para la entidad EU, lo que podría comprometer la seguridad de la web.
  • 🔄 La renovación de la ley FISA por el Congreso demuestra la falta de voluntad para reformar la vigilancia masiva y proteger la privacidad.

Q & A

  • ¿Qué evento significativo sucedió en el Reino Unido en 2023 en cuanto a la privacidad?

    -El Reino Unido aprobó el Acta de Seguridad Online, que establece la responsabilidad de construir mecanismos de escaneo de contenido pre-encriptado en cada plataforma, lo que representa una amenaza para la privacidad.

  • ¿Qué es CESAM y por qué se considera una preocupación para las leyes de privacidad?

    -CESAM se refiere a imágenes relacionadas con la explotación infantil. La preocupación es que se utiliza como una justificación para romper la encriptación y permitir que las plataformas扫描内容 pre-encriptado, lo que podría extenderse a otras formas de vigilancia.

  • ¿Qué es el escaneo del lado del cliente y cómo se implementó Apple en 2022?

    -El escaneo del lado del cliente es una técnica en la que se escanea el contenido de los dispositivos para identificar material ilegal, como imágenes de explotación infantil. Apple implementó una versión de este escaneo en sus dispositivos, pero después de recibir críticas, decidió posponer el proyecto.

  • ¿Qué reveló el registro de la corte sobre las notificaciones push?

    -El registro de la corte reveló que las notificaciones push están siendo supervisadas por las fuerzas del orden, y que en muchos casos, estas notificaciones no están encriptadas, lo que facilita el acceso estatal a todos los contenidos de notificación en un dispositivo.

  • ¿Qué es la geofencing y cómo se utiliza en la vigilancia selectiva?

    -La geofencing es un método de vigilancia que utiliza coordenadas GPS para delinear un área y luego determinar un período de tiempo para solicitar a las compañías como Google y Apple que proporcionen información de ubicación de los dispositivos dentro de esa área.

  • ¿Qué es el Google Sensor Vault y por qué es preocupante?

    -El Google Sensor Vault es una base de datos de información de ubicación proporcionada voluntariamente por Google, que se utiliza para identificar a las personas en el edificio del Capitolio el 6 de enero. Esto es preocupante porque demuestra que la ubicación de los ciudadanos es rastreada constantemente y puede ser utilizada selectivamente.

  • ¿Qué es la Ley de Tarjetas de Identidad Nacional Estandarizadas que la UE busca implementar?

    -La Ley de Tarjetas de Identidad Nacional Estandarizadas es una propuesta de la UE para crear una tarjeta de identidad común para los ciudadanos de la UE, lo que podría tener implicaciones en la privacidad y la seguridad de los datos de los ciudadanos.

  • ¿Qué es la Ley FISA y por qué se renovó en 2023?

    -La Ley FISA, o Ley de Vigilancia de Inteligencia Extranjera, fue originalmente diseñada para supervisar a personas extranjeras en nombre de la seguridad nacional. Sin embargo, se ha utilizado para la vigilancia masiva y sin autorización de estadounidenses y extranjeros. Se renovó en 2023, lo que demuestra la falta de voluntad para reformar esta ley y limitar la vigilancia.

  • ¿Qué sugiere el orador en el video para proteger la privacidad en línea?

    -El orador sugiere varias soluciones, como el uso de un teléfono 'degoogle' para proteger la identidad y evitar la geofencing, un servicio VPN para protegerse de la vigilancia masiva y ataques 'man in the middle', y el uso de un servicio de correo electrónico que proteja la información de identidad.

Outlines

00:00

📉 2023: Un año difícil para la privacidad

El año 2023 fue un desafío para la privacidad, con intrusiones gubernamentales y narrativas confusas que sugieren que las medidas son para el bien del ciudadano. A pesar de algunos retrasos en la adopción de leyes invasivas, el mayor retroceso fue en el Reino Unido, con implicaciones globales. La UE también está promoviendo medidas de vigilancia masiva. En los Estados Unidos, las riotes del 6 de enero揭露了 la existencia de vigilancia sin orden judicial, y la renovación de la ley FISA en diciembre reafirmó la justificación para la vigilancia en la ley, sin recourse para el ciudadano promedio.

05:01

🛡️ La lucha contra el CESAM y la vigilancia de las notificaciones push

Se ha promovido una ley para combatir el CESAM (material relacionado con la explotación infantil), que se utiliza como excusa para justificar la quebra de la encriptación. La propuesta requiere que las plataformas sean proactivas en la identificación y reporte de dichas imágenes, lo que implica la implementación de escaneo de lado del cliente, como Apple propuso en 2022. Aunque la UE no pasó la ley de CESAM, el Reino Unido aprobó el Online Safety Act, lo que obliga a las plataformas a construir mecanismos de escaneo de contenido, y las notificaciones push también han sido objeto de vigilancia por parte del gobierno.

10:03

📱 Geofencing y la vigilancia de ubicación

El gobierno ha utilizado datos de ubicación para identificar a individuos presentes en el Capitolio el 6 de enero. La técnica de geofencing permite solicitar a Google y Apple información de ubicación de dispositivos en áreas específicas. Google ha proporcionado esta información voluntariamente bajo el nombre de 'Google Sensor Vault'. Además, el gobierno está implementando tarjetas de identidad estándar para los ciudadanos de la UE y creando un certificado raíz para la UE, lo que podría permitir la emisión de certificados falsos y la quebra de la encriptación web.

15:04

🚨 Renovación de la ley FISA y la lucha por la privacidad

La ley FISA ha sido renovada nuevamente por el Congreso, lo que perpetúa la vigilancia masiva y secreta, incluso en contra de ciudadanos estadounidenses. A pesar de los esfuerzos de grupos de defensa de la privacidad para reformar FISA, no se han logrado cambios significativos. En 2023, la privacidad continuó su declive, y se prevé que esta tendencia continúe. Para combatir esto, se han desarrollado soluciones como teléfonos 'degoogle' y servicios de VPN que protegen la identidad y el IP, así como herramientas para proteger el correo electrónico.

Mindmap

Keywords

💡privacidad

La privacidad se refiere al derecho de una persona a tener su vida personal y sus actividades libres de interferencia o control no deseados por otros. En el video, se discute cómo en 2023 se han producido varias violaciones a la privacidad, principalmente por parte del gobierno y las leyes invasivas. Un ejemplo sería la Ley de Seguridad Online en el Reino Unido, que requiere que las plataformas扫描内容 pre-encrypt.

💡intrusión gubernamental

La intrusión gubernamental se refiere a la intervención del estado en la vida privada de los ciudadanos, a menudo bajo la justificación de proteger la seguridad nacional o combatir el crimen. En el contexto del video, se destaca cómo la narrativa política ha confundido a la población, haciéndoles creer que estas intrusiones son para su propio beneficio.

💡vigilancia masiva

La vigilancia masiva es la práctica de monitorear y recolectar datos de una gran cantidad de personas, generalmente sin una orden judicial o probable causa. En el video, se discute cómo la vigilancia masiva se ha incrementado en 2023, con la adopción de técnicas como el escaneo del lado del cliente y la utilización de datos de geofencing.

💡CESAM

CESAM es un término utilizado para referirse a imágenes de abuso infantil. En el video, se destaca cómo se ha utilizado el temor y la reacción instintiva de proteger a los niños para justificar la implementación de leyes que permiten la vigilancia y la intrusión en la privacidad de las comunicaciones digitales.

💡escaneo del lado del cliente

El escaneo del lado del cliente es una técnica de vigilancia en la que un software en el propio dispositivo del usuario escanea su contenido, como fotos o mensajes, y lo compara con una lista de contenidos prohibidos. Si el software detecta coincidencias, reporta estas al proveedor del servicio o directamente a las autoridades. En el video, se argumenta que este método es una herramienta invasiva para la vigilancia y puede ser utilizado para buscar contenidos no relacionados con el abuso infantil.

💡geofencing

Geofencing es la práctica de utilizar tecnologías GPS para definir una área geográfica virtual y, a partir de ahí, monitorear o controlar las actividades dentro de esos límites. En el contexto del video, se utiliza para identificar y rastrear a las personas que estaban presentes en un lugar específico durante un evento, como los disturbios del 6 de enero en la Capitolio.

💡notificaciones push

Las notificaciones push son mensajes o alerts que se envían directamente a los dispositivos móviles desde una aplicación o servicio. En el video, se revela que estas notificaciones, que generalmente no están cifradas, pueden ser supervisadas por las autoridades para rastrear a los usuarios y sus actividades.

💡FISA

FISA es la Ley de Vigilancia de Inteligencia Extranjera, una legislación de 1978 en los Estados Unidos que establece un sistema de supervisión judicial y congressional para las investigaciones sobre personas extranjeras en el nombre de la seguridad nacional. Sin embargo, el video destaca cómo esta ley ha sido utilizada para justificar la vigilancia masiva y sin orden judicial de estadounidenses y extranjeros.

💡certificados raíz

Los certificados raíz son una forma de identificación digital que permite a los navegadores y otros softwares verificar la autenticidad de un sitio web o servicio en línea. En el video, se discute la preocupante implementación de un certificado raíz por parte de la UE, lo que podría permitir a los gobiernos emitir certificados falsos y comprometer la seguridad y privacidad en línea.

💡degoogle

Degoogle es un término utilizado para describir el proceso de eliminar o evitar el uso de productos y servicios de Google, con el objetivo de proteger la privacidad y la seguridad de los datos personales. En el video, se sugiere el uso de un teléfono degoogle como una solución para evitar la vigilancia y la geofencing.

💡VPN

Un VPN, o red privada virtual, es una tecnología que cifra y enruta el tráfico de internet de manera segura, permitiendo a los usuarios mantener su privacidad en línea y eludir la vigilancia. En el video, se menciona un producto VPN que protege contra la vigilancia masiva y ataques de interceptación de tráfico.

💡alias de correo electrónico

Los alias de correo electrónico son direcciones de correo electrónico temporales o falsas que se utilizan para proteger la identidad y los datos personales del usuario. En el video, se ofrecen servicios de correo electrónico con alias ilimitados para proteger la privacidad en línea.

Highlights

2023年对隐私权来说不是一个好的年份,特别是在政府侵入我们生活方面。

英国发生的最大的隐私损失可能会影响到我们,即使我们不在英国。

欧盟曾推迟了一个可能对隐私产生重大影响的危险法案,但现在他们有了新的举措,这将肯定增加大规模监控。

1月6日国会暴乱事件使一种我们目前可以命名的无证监控机制变得更加清晰。

12月,FISA法案再次被更新,监控的理由再次被嵌入法律中,而普通民众没有追索权。

苹果和谷歌终于承认,手机推送通知的监控已经存在一段时间。

今年,美国国会、英国和欧盟几乎协调一致地推动了所谓的对抗CESAM(与儿童虐待相关的图片)的威胁。

CESAM的说法是,它不能在加密平台上被观察到,所以解决方案是破解加密。

客户端扫描是一种对监控的大锤式方法,其中只有一小部分适用于CESAM。

苹果公司已经实现了客户端扫描,他们的论点是没有人类在检查照片,尽管决定照片内容的逻辑是内置在手机AI芯片本身的。

英国通过了在线安全法案,这基本上嵌入了构建客户端扫描的责任,每个平台都必须这样做。

由于英国的法律,每个平台都需要建立自己的基础设施,所以这只是开始。

如果你听到CESAM,假设你被愚弄了,国家想要破解加密,这通常是他们唯一关心的事情。

我们的推送通知正在被执法机构监视,这些推送通知在大多数情况下是完全未加密的。

政府可以使用位置数据有选择性地根据他们的政治目的或目的来识别人们的位置,这种方法称为地理围栏。

谷歌愿意并主动提供位置数据,甚至给位置数据库起了名字,叫做谷歌传感器保险库。

欧盟想要为欧盟公民实施标准化的国家身份证,并且还想创建一个欧盟实体的根证书。

FISA法案再次被国会更新,这是自1978年以来的外国情报监视法案。

FISA法案的实施是秘密的,它被用来对20万美国人进行无证监控。

隐私权每年都在减少,今年我们又遭受了一次重大打击。

Transcripts

play00:00

2023 wasn't a particularly good year for

play00:03

privacy particularly with government

play00:05

intrusion to our lives as always the

play00:08

narrative has been convoluted in such a

play00:11

way that you actually think that things

play00:14

are being done for your own good

play00:17

worldwide there were some successes or

play00:19

at least a delay in adopting privacy

play00:21

invading laws but not entirely our

play00:24

biggest privacy loss occurred in the UK

play00:28

this can impact us even if we're not in

play00:30

the UK the EU at one point pushed off a

play00:34

dangerous bill that could have had major

play00:36

effects on privacy however they have a

play00:38

new move that will definitely increase

play00:41

Mass surveillance with repercussions way

play00:44

past the EU the courts were busy with

play00:46

the January 6 Capital riots but that

play00:48

exposed a kind of surveillance that we

play00:51

can now attach a name to the mechanics

play00:53

of warrantless surveillance become all

play00:56

the more clear this December once again

play00:59

the FIS of law was renewed and the

play01:01

justification for surveillance is again

play01:04

embedded in law without recourse to the

play01:07

normal person and just as we thought

play01:10

that that was it for the year we finally

play01:13

get acknowledgement from Apple and

play01:14

Google that surveillance of phone push

play01:17

notifications has been in place for a

play01:19

while let me explain to you what these

play01:21

anti-privacy changes are and for the

play01:23

most part they are the ones initiated by

play01:26

the state the best ammunition against

play01:29

these is to destroy the fake narratives

play01:31

pushed by lawmakers and to make sure

play01:34

those lawmakers do not get reelected

play01:37

it's not an easy battle but our weapons

play01:39

are based on education which I will try

play01:41

to provide to you stay right

play01:45

[Music]

play01:54

there this year there was an almost

play01:57

coordinated Push by the US Congress the

play01:59

UK and EU lawmakers to battle the

play02:02

so-called threat of cesam which are

play02:05

photos related to child abuse the reason

play02:09

this wording was specifically used is

play02:12

because our gut reaction is that we need

play02:14

to protect our kids and I'm sure the

play02:16

focus groups measured the reaction of

play02:19

the average person to see Sam and

play02:21

without explaining the repercussions of

play02:23

what they're selling it was an easy

play02:26

thing to

play02:27

push so let's dive deep been through

play02:30

this specifically the claim is that each

play02:32

platform needs to be proactive in

play02:34

identifying child abuse photos and

play02:37

Reporting these to law

play02:38

enforcement however what a suspect is

play02:41

that it was almost completely

play02:43

coordinated with the EU UK and US

play02:46

completely in sync with this messaging

play02:49

the claim about cesam is that it is

play02:51

something that cannot be observed on

play02:54

encrypted platforms so the solution is

play02:57

to break into to an encryption and that

play03:00

will supposedly allow the policing of

play03:03

cesam now this is the most important

play03:05

part here supposedly in order to protect

play03:09

kids from cesam they need to break into

play03:12

an encryption right and the way to

play03:14

implement this is through a technique

play03:17

called client side scanning this is

play03:20

something that Apple pushed in the prior

play03:23

year in 2022 and they were left with a

play03:27

decision to set this aside for now

play03:29

because of the user backlash they

play03:32

encountered now this triggered the

play03:34

various State players to push this

play03:37

Solution by embedding it into law

play03:40

basically each state was pushing that

play03:43

the responsibility for the presence of

play03:45

cesam on their platforms belonged to the

play03:48

platforms and if they took no action

play03:50

they could be sued for the liability of

play03:53

having such content many platforms

play03:56

include some form of endtoend encryption

play03:59

such as WhatsApp iMessage signal to name

play04:03

a few this also exposes any cloud-based

play04:07

feature like iCloud Microsoft One Drive

play04:11

Google Drive Google photos and so on

play04:14

though these are more easily surveilled

play04:17

these platforms would be forced by these

play04:19

laws to scan for Content supposedly that

play04:22

could contain csab except here's the

play04:26

main problem client size scanning is

play04:29

basically a sledgehammer approach to

play04:31

surveillance where only a tiny fraction

play04:34

of it would apply to

play04:36

cesam at least in the US so this whole

play04:40

thing was about creating an

play04:42

infrastructure that didn't exist before

play04:45

I repeat the story because it showed the

play04:47

history of three-letter agency thought

play04:50

processes if you recall the 2015

play04:52

terrorist shooting in San Bernardino

play04:55

California Apple was being forced by the

play04:57

FBI to Aid and unlock blocking the phone

play05:00

of the terrorist Apple refused to comply

play05:03

and I can understand why if they

play05:05

provided a way to break into the iPhone

play05:08

then no one would trust apple and it

play05:09

would have been a major impact on their

play05:12

business image but over the years

play05:15

following the 2015 incident various CIA

play05:17

directors took to the press and stated

play05:19

that the solution to end to an

play05:21

encryption was to collect the data prior

play05:24

to

play05:26

encryption this would then in theory

play05:28

solve the encryption problem as it

play05:29

relates to terrorists but terrorists

play05:32

have not been common lately saying new

play05:34

Boogeyman was needed and that's the

play05:36

child

play05:37

Predators the dangerous thing about this

play05:40

that you should be aware of is that

play05:42

apple found a way to have the AI on the

play05:45

phone scan the content of the phone and

play05:48

have that reported to HQ without a human

play05:52

involved at least

play05:54

initially this is the Apple

play05:56

implementation of client side scanning

play06:00

their argument is that no human is

play06:02

examining the photos though the logic

play06:04

for determining the content in a photo

play06:06

is built into the phone AI chip itself

play06:10

the problem once again with this

play06:12

Sledgehammer approach is that the AI can

play06:14

find any kind of content it did not be

play06:17

connected to Children whatsoever or it

play06:20

could be parents taking pictures of

play06:22

their children and causing false

play06:24

positives but the reality is that client

play06:26

side scanning just requires Specific

play06:27

Instructions to the AI to search for any

play06:30

content for example it wouldn't be too

play06:32

much of a stretch to assume that the AI

play06:35

could identify subversive content at

play06:37

least as it relates to the government in

play06:39

power let me first tell you the status

play06:41

of these various bills as they progress

play06:43

through the various chambers of

play06:45

lawmakers the EU failed to pass a cesam

play06:49

law the US has not yet successfully

play06:52

passed any of this laws however the bad

play06:55

news is that the UK did pass the Online

play06:58

safety act which basically embeds the

play07:01

responsibility for building client size

play07:03

getting to each

play07:05

platform even if only the UK puts this

play07:08

into law the problem is that each

play07:10

platform has to build their own

play07:11

mechanisms for scanning content pre-

play07:15

encryption Apple already has this so

play07:18

that is a big evil right there many

play07:20

Apple Fans actually believe in the Apple

play07:23

respon that they put this project on

play07:25

hold what Apple did not acknowledge is

play07:29

that the API or programming interface to

play07:32

scan for images was already put into an

play07:35

earlier version of iOS even

play07:39

earlier and lately we've heard that this

play07:41

API was also added to Mac OS so forget

play07:45

about cesam now the tools to do client

play07:48

size scanning are now part of every

play07:51

Apple

play07:53

device some testers were able to

play07:56

intercept calls by the file manager to

play07:59

use some of these image scanning apis

play08:02

this was discussed heavily in a Louis

play08:04

Rosman video again because of the UK law

play08:08

likely each platform will need to build

play08:11

their own infrastructure too so this is

play08:13

just the beginning of this watch out

play08:15

folks if you hear C Sam then assume

play08:19

you're being fooled the state wants to

play08:21

break into an encryption generally this

play08:24

is the only thing important to them and

play08:27

this technology already exists on Apple

play08:30

products and likely coming to other

play08:32

platforms near

play08:39

you while Cam and client ey scanning are

play08:42

on the Forefront of future actions it

play08:45

was recently revealed and wired that our

play08:48

push notifications are being surveilled

play08:50

by law enforcement the thing about push

play08:53

notifications is that in most cases

play08:56

these are completely unencrypted so simp

play08:59

simply by knowing which device to track

play09:01

it becomes easy for a state to review

play09:04

all push notifications to your device

play09:08

this was revealed in court record and

play09:10

brought to the Public's attention by

play09:12

Senator Ron weiden and as usual when

play09:16

these actions take place it is often

play09:18

accompanied by a gag order on the

play09:20

platform so we would not know about this

play09:23

and other surveillance methods obviously

play09:26

we already know from Snowden that there

play09:28

are bunch of surveillance methods like

play09:31

capturing email texting and phone

play09:34

records the point is that these are

play09:37

always stated as necessary for

play09:40

protection against terrorists though it

play09:42

will be interesting to note that the use

play09:44

of these surveillance methods are not

play09:46

connected to terrorists or foreign

play09:48

persons one specific case used

play09:51

notifications in a January 6 Capital

play09:53

Riot case and I have more to say about

play09:56

that

play09:58

later

play10:02

so beyond notifications the court record

play10:06

specifically for the January 6 Capital

play10:08

Riot cases showed that close to a

play10:11

thousand people have been charged in the

play10:13

capital riots based on location data

play10:17

acquired from Google this is important

play10:19

to understand Way Beyond the capital

play10:22

Riot cases it's just that the government

play10:24

was very eager to prosecute individuals

play10:27

found in a capital building on January 6

play10:30

though I do not recall where governments

play10:33

have identified people involved in riots

play10:35

and destruction of property in the

play10:37

various riots around the country so

play10:40

governments can use location data

play10:43

selectively depending on their political

play10:46

expediency or purpose this method of

play10:49

identifying people's locations based on

play10:51

the presence of their phone is called

play10:54

geofencing you mark GPS coordinates of

play10:57

the area you want to surveil and then

play11:00

determine a time span and you can then

play11:03

ask Google and apple to supply this

play11:05

information I don't have specific

play11:07

information on Apple's response to Geo

play11:09

fencing since nothing is public that I'm

play11:12

aware but Google has been providing the

play11:14

data on locations willingly and even

play11:17

gave the database of locations a name it

play11:21

is called the Google sensor Vault we

play11:25

know this because it is in the court

play11:27

records I've discussed this in various

play11:30

videos and I won't go into detail on

play11:33

this in fact I explained it again in

play11:35

last week's video but generally be aware

play11:38

that your location is constantly tracked

play11:40

on a phone

play11:42

24/7 and you cannot turn this off unless

play11:46

you have a the Google phone and worse

play11:49

iPhones can be tracked even if you turn

play11:51

the phone off since they turn into air

play11:54

tags so just be aware of this technology

play11:57

because it is used for for Dragnet in

play12:00

many areas I wouldn't be surprised if a

play12:02

large portion of the population has been

play12:04

part of search results just by being

play12:07

near places where crimes have occurred

play12:10

this would victimize average citizens in

play12:12

many big cities this would fall under

play12:15

the category of warrantless digital

play12:22

searches while the EU did us a good turn

play12:25

by not passing the cesam related laws un

play12:28

un fortunately we did not pass 2023

play12:31

unscathed apparently the EU wants to

play12:33

implement standardized national identity

play12:35

cards for EU citizens now that part is

play12:38

the business of the EU but they are

play12:40

apparently implementing something else

play12:42

that will impact us all the EU wants to

play12:45

create a root certificate for the EU

play12:48

entity and then this root certificate

play12:51

will grant intermediate root certificate

play12:53

authority to each country just so you

play12:56

know it is very unusual to have a root

play12:59

certificate be forced Upon Us by a

play13:02

democratic government this is a policy

play13:04

implemented in countries like Iran Cuba

play13:07

China and so

play13:10

on but the presence of a root

play13:12

certificate that is not a valid rot

play13:15

certificate Authority is very dangerous

play13:17

as I explained in multiple recent videos

play13:20

it allows that government to issue fake

play13:22

certificates which can then be used to

play13:25

break web encryption in cyber security

play13:28

speech it allows a man in the middle to

play13:31

capture Network traffic and observe it

play13:33

this capability will be in the hands of

play13:35

each EU country when this law gets

play13:38

implemented apparently the browsers

play13:41

would be banned by law from removing

play13:43

these root

play13:44

certificates and these are not really

play13:47

true root certificates issued by valid

play13:50

authorities they would be impos

play13:53

certificates the same way Google Apple

play13:55

and Microsoft imposes their root

play13:58

certificate

play13:59

on their devices without any check and

play14:01

balance so in addition to the already

play14:04

dangerous Ro certificates from Big Tech

play14:07

we now will have governments to worry

play14:09

about selective surveillance of web

play14:12

traffic would become easy to do anywhere

play14:14

in the world as long as you are in

play14:16

cahoots with one of these EU countries

play14:21

scary stuff and I personally feel that

play14:23

web encryption is completely broken I

play14:26

made a proposal to change the whole

play14:28

public infrastructure to defend against

play14:31

mitm or man in the middle that was in a

play14:34

recent

play14:40

video another highlight of 2023 is that

play14:43

once again the fisa law has been renewed

play14:46

by Congress fisa means the foreign

play14:49

intelligence surveillance act originally

play14:51

from 1978 it was meant to provide

play14:54

judicial and congressional oversight on

play14:57

investigations on foreign person

play14:59

in the name of National Security this

play15:02

law was changed rapidly though with the

play15:03

passing of the Patriot Act as a result

play15:06

of 9911 under Section 702 of the foreign

play15:10

intelligence surveillance act the US

play15:12

government engaged in Mass warrantless

play15:16

surveillance of Americans and foreigners

play15:18

phone calls text messages emails and

play15:21

other electronic

play15:23

communications information collected

play15:26

under the law without a warrant can be

play15:28

used to prosecute and imprison people

play15:31

even for crimes that have nothing to do

play15:33

with National Security First of all fisa

play15:37

is implemented in secret second though

play15:40

the original intent was to spy on

play15:42

foreign persons the reality is that fisa

play15:45

was used to spy on 200,000 us persons

play15:48

fisa was abused constantly and fisa

play15:52

courts really rubber stamped every

play15:54

request once again Congress was weak

play15:57

privacy group groups including the ACLU

play16:00

and the Electronic Frontier Foundation

play16:02

have lobbied for reform of fisa to put

play16:05

limits on the surveillance but once

play16:07

again they

play16:08

failed it failed because we as a people

play16:11

accept surveillance as a fact of

play16:15

life yeah yeah you have nothing to hide

play16:17

so you don't

play16:18

care got

play16:25

it these are the events highlighted for

play16:29

2023 each year a further reduction in

play16:32

privacy occurs and this year we took

play16:34

another big hit I thought there was

play16:37

going to be a positive in 2023 with the

play16:39

introduction of past keys and I've

play16:42

learned recently that even that's a fake

play16:44

so I thought that was going to be a

play16:46

privacy positive but apparently not I've

play16:49

said over and over that my goals are

play16:51

very simple I don't care that I have

play16:54

nothing to hide I care that it's none of

play16:57

their business as a law abiding and

play16:59

taxpaying citizen I just want to be left

play17:07

alone I started a company to provide

play17:10

solutions to the average person instead

play17:11

of just talking about problems privacy

play17:14

is a changing Battlefield and approaches

play17:17

always change so I've studied the

play17:19

Privacy problem and I came up with a few

play17:21

things that will greatly help the

play17:24

primary solution to use is still a

play17:26

degoogle phone as as I discussed in

play17:29

other videos it is immune from Geo

play17:31

fencing and also protects your identity

play17:34

since it does not have a Google ID check

play17:36

that out these phones are around $400 so

play17:40

they are cheaper than normal phones I

play17:43

have a VPN product that protects you

play17:46

from Mass surveillance and even hackers

play17:48

doing man in the midle attacks they also

play17:51

protect your IP address so this solves

play17:54

one of the issues I mentioned in this

play17:56

video which is the EU root

play17:59

certificate and the solution is the bvpn

play18:02

service which I started a few years ago

play18:04

we have worldwide coverage and a known

play18:06

entity providing the service me

play18:09

hopefully someone you can

play18:11

trust we have a bra Mill service that

play18:14

highs identity information from your

play18:16

email we offer unlimited aliases seven

play18:19

domains and web mail check that out for

play18:22

$50 a year all these are on my store on

play18:26

bra me sign up on there and you will not

play18:29

be asked for personal information to

play18:31

sign up thanks for watching and see you

play18:35

next

play18:36

[Music]

play18:41

time

Rate This

5.0 / 5 (0 votes)

Related Tags
Privacidad 2023Vigilancia GovernamentalLegislación de PrivacidadCesam y Child AbuseEncifrado de ClientesNotificaciones Push VigiladasGeofencingFISA y VigilanciaEU y Certificados RaízSoluciones de Privacidad
Do you need a summary in English?