Lobbyists Hired for Top Jobs in Congress Yet Again
▻https://theintercept.com/2021/01/11/congress-lobbyists-biden
Special interests and corporations will see familiar voices when visiting legislators. Beyond the headlines around the unprecedented storming of Capitol Hill by rampagers and violent extremists, a more mundane group of Washington, D.C., insiders is trickling into the halls of government. The newly elected Congress is hiring a wave of corporate lobbyists to fill key staff roles. The embrace of lobbyists makes Congress a welcoming environment for their former corporate clients, which now (...)
##AT&T
Technopolice, villes et vies sous surveillance
▻https://www.laquadrature.net/2021/01/03/technopolice-villes-et-vies-sous-surveillance
Depuis plusieurs années, des projets de « Smart Cities » se développent en France, prétendant se fonder sur les nouvelles technologies du « Big Data » et de l’« Intelligence Artificielle » pour améliorer notre quotidien urbain. Derrière ce vernis de ces villes soi-disant « intelligentes », se cachent des dispositifs souvent dangereusement sécuritaires. D’une part, car l’idée de multiplier les capteurs au sein d’une ville, d’interconnecter l’ensemble de ses réseaux et d’en gérer l’entièreté depuis un centre (...)
#Cisco #Gemalto #Huawei #Thalès #algorithme #capteur #CCTV #PARAFE #SmartCity #biométrie #facial #reconnaissance #vidéo-surveillance #comportement #surveillance #BigData #TAJ #Technopolice (...)
]]>Inside China’s unexpected quest to protect data privacy
▻https://www.technologyreview.com/2020/08/19/1006441/china-data-privacy-hong-yanqing-gdpr
A new privacy law would look a lot like Europe’s GDPR—but will it restrict state surveillance?
Late in the summer of 2016, Xu Yuyu received a call that promised to change her life. Her college entrance examination scores, she was told, had won her admission to the English department of the Nanjing University of Posts and Telecommunications. Xu lived in the city of Linyi in Shandong, a coastal province in China, southeast of Beijing. She came from a poor family, singularly reliant on her father’s meager income. But her parents had painstakingly saved for her tuition; very few of her relatives had ever been to college.
A few days later, Xu received another call telling her she had also been awarded a scholarship. To collect the 2,600 yuan ($370), she needed to first deposit a 9,900 yuan “activation fee” into her university account. Having applied for financial aid only days before, she wired the money to the number the caller gave her. That night, the family rushed to the police to report that they had been defrauded. Xu’s father later said his greatest regret was asking the officer whether they might still get their money back. The answer—“Likely not”—only exacerbated Xu’s devastation. On the way home she suffered a heart attack. She died in a hospital two days later.
An investigation determined that while the first call had been genuine, the second had come from scammers who’d paid a hacker for Xu’s number, admissions status, and request for financial aid.
For Chinese consumers all too familiar with having their data stolen, Xu became an emblem. Her death sparked a national outcry for greater data privacy protections. Only months before, the European Union had adopted the General Data Protection Regulation (GDPR), an attempt to give European citizens control over how their personal data is used. Meanwhile, Donald Trump was about to win the American presidential election, fueled in part by a campaign that relied extensively on voter data. That data included details on 87 million Facebook accounts, illicitly obtained by the consulting firm Cambridge Analytica. Chinese regulators and legal scholars followed these events closely.
In the West, it’s widely believed that neither the Chinese government nor Chinese people care about privacy. US tech giants wield this supposed indifference to argue that onerous privacy laws would put them at a competitive disadvantage to Chinese firms. In his 2018 Senate testimony after the Cambridge Analytica scandal, Facebook’s CEO, Mark Zuckerberg, urged regulators not to clamp down too hard on technologies like face recognition. “We still need to make it so that American companies can innovate in those areas,” he said, “or else we’re going to fall behind Chinese competitors and others around the world.”
In reality, this picture of Chinese attitudes to privacy is out of date. Over the last few years the Chinese government, seeking to strengthen consumers’ trust and participation in the digital economy, has begun to implement privacy protections that in many respects resemble those in America and Europe today.
Even as the government has strengthened consumer privacy, however, it has ramped up state surveillance. It uses DNA samples and other biometrics, like face and fingerprint recognition, to monitor citizens throughout the country. It has tightened internet censorship and developed a “social credit” system, which punishes behaviors the authorities say weaken social stability. During the pandemic, it deployed a system of “health code” apps to dictate who could travel, based on their risk of carrying the coronavirus. And it has used a slew of invasive surveillance technologies in its harsh repression of Muslim Uighurs in the northwestern region of Xinjiang.
This paradox has become a defining feature of China’s emerging data privacy regime, says Samm Sacks, a leading China scholar at Yale and New America, a think tank in Washington, DC. It raises a question: Can a system endure with strong protections for consumer privacy, but almost none against government snooping? The answer doesn’t affect only China. Its technology companies have an increasingly global footprint, and regulators around the world are watching its policy decisions.
November 2000 arguably marks the birth of the modern Chinese surveillance state. That month, the Ministry of Public Security, the government agency that oversees daily law enforcement, announced a new project at a trade show in Beijing. The agency envisioned a centralized national system that would integrate both physical and digital surveillance using the latest technology. It was named Golden Shield.
Eager to cash in, Western companies including American conglomerate Cisco, Finnish telecom giant Nokia, and Canada’s Nortel Networks worked with the agency on different parts of the project. They helped construct a nationwide database for storing information on all Chinese adults, and developed a sophisticated system for controlling information flow on the internet—what would eventually become the Great Firewall. Much of the equipment involved had in fact already been standardized to make surveillance easier in the US—a consequence of the Communications Assistance for Law Enforcement Act of 1994.
Despite the standardized equipment, the Golden Shield project was hampered by data silos and turf wars within the Chinese government. Over time, the ministry’s pursuit of a singular, unified system devolved into two separate operations: a surveillance and database system, devoted to gathering and storing information, and the social-credit system, which some 40 government departments participate in. When people repeatedly do things that aren’t allowed—from jaywalking to engaging in business corruption—their social-credit score falls and they can be blocked from things like buying train and plane tickets or applying for a mortgage.
In the same year the Ministry of Public Security announced Golden Shield, Hong Yanqing entered the ministry’s police university in Beijing. But after seven years of training, having received his bachelor’s and master’s degrees, Hong began to have second thoughts about becoming a policeman. He applied instead to study abroad. By the fall of 2007, he had moved to the Netherlands to begin a PhD in international human rights law, approved and subsidized by the Chinese government.
Over the next four years, he familiarized himself with the Western practice of law through his PhD research and a series of internships at international organizations. He worked at the International Labor Organization on global workplace discrimination law and the World Health Organization on road safety in China. “It’s a very legalistic culture in the West—that really strikes me. People seem to go to court a lot,” he says. “For example, for human rights law, most of the textbooks are about the significant cases in court resolving human rights issues.”
Hong found this to be strangely inefficient. He saw going to court as a final resort for patching up the law’s inadequacies, not a principal tool for establishing it in the first place. Legislation crafted more comprehensively and with greater forethought, he believed, would achieve better outcomes than a system patched together through a haphazard accumulation of case law, as in the US.
After graduating, he carried these ideas back to Beijing in 2012, on the eve of Xi Jinping’s ascent to the presidency. Hong worked at the UN Development Program and then as a journalist for the People’s Daily, the largest newspaper in China, which is owned by the government.
Xi began to rapidly expand the scope of government censorship. Influential commentators, or “Big Vs”—named for their verified accounts on social media—had grown comfortable criticizing and ridiculing the Chinese Communist Party. In the fall of 2013, the party arrested hundreds of microbloggers for what it described as “malicious rumor-mongering” and paraded a particularly influential one on national television to make an example of him.
The moment marked the beginning of a new era of censorship. The following year, the Cyberspace Administration of China was founded. The new central agency was responsible for everything involved in internet regulation, including national security, media and speech censorship, and data protection. Hong left the People’s Daily and joined the agency’s department of international affairs. He represented it at the UN and other global bodies and worked on cybersecurity cooperation with other governments.
By July 2015, the Cyberspace Administration had released a draft of its first law. The Cybersecurity Law, which entered into force in June of 2017, required that companies obtain consent from people to collect their personal information. At the same time, it tightened internet censorship by banning anonymous users—a provision enforced by regular government inspections of data from internet service providers.
In the spring of 2016, Hong sought to return to academia, but the agency asked him to stay. The Cybersecurity Law had purposely left the regulation of personal data protection vague, but consumer data breaches and theft had reached unbearable levels. A 2016 study by the Internet Society of China found that 84% of those surveyed had suffered some leak of their data, including phone numbers, addresses, and bank account details. This was spurring a growing distrust of digital service providers that required access to personal information, such as ride-hailing, food-delivery, and financial apps. Xu Yuyu’s death poured oil on the flames.
The government worried that such sentiments would weaken participation in the digital economy, which had become a central part of its strategy for shoring up the country’s slowing economic growth. The advent of GDPR also made the government realize that Chinese tech giants would need to meet global privacy norms in order to expand abroad.
Hong was put in charge of a new task force that would write a Personal Information Protection Specification (PIPS) to help solve these challenges. The document, though nonbinding, would tell companies how regulators intended to implement the Cybersecurity Law. In the process, the government hoped, it would nudge them to adopt new norms for data protection by themselves.
Hong’s task force set about translating every relevant document they could find into Chinese. They translated the privacy guidelines put out by the Organization for Economic Cooperation and Development and by its counterpart, the Asia-Pacific Economic Cooperation; they translated GDPR and the California Consumer Privacy Act. They even translated the 2012 White House Consumer Privacy Bill of Rights, introduced by the Obama administration but never made into law. All the while, Hong met regularly with European and American data protection regulators and scholars.
Bit by bit, from the documents and consultations, a general choice emerged. “People were saying, in very simplistic terms, ‘We have a European model and the US model,’” Hong recalls. The two approaches diverged substantially in philosophy and implementation. Which one to follow became the task force’s first debate.
At the core of the European model is the idea that people have a fundamental right to have their data protected. GDPR places the burden of proof on data collectors, such as companies, to demonstrate why they need the data. By contrast, the US model privileges industry over consumers. Businesses define for themselves what constitutes reasonable data collection; consumers only get to choose whether to use that business. The laws on data protection are also far more piecemeal than in Europe, divvied up among sectoral regulators and specific states.
At the time, without a central law or single agency in charge of data protection, China’s model more closely resembled the American one. The task force, however, found the European approach compelling. “The European rule structure, the whole system, is more clear,” Hong says.
But most of the task force members were representatives from Chinese tech giants, like Baidu, Alibaba, and Huawei, and they felt that GDPR was too restrictive. So they adopted its broad strokes—including its limits on data collection and its requirements on data storage and data deletion—and then loosened some of its language. GDPR’s principle of data minimization, for example, maintains that only necessary data should be collected in exchange for a service. PIPS allows room for other data collection relevant to the service provided.
PIPS took effect in May 2018, the same month that GDPR finally took effect. But as Chinese officials watched the US upheaval over the Facebook and Cambridge Analytica scandal, they realized that a nonbinding agreement would not be enough. The Cybersecurity Law didn’t have a strong mechanism for enforcing data protection. Regulators could only fine violators up to 1,000,000 yuan ($140,000), an inconsequential amount for large companies. Soon after, the National People’s Congress, China’s top legislative body, voted to begin drafting a Personal Information Protection Law within its current five-year legislative period, which ends in 2023. It would strengthen data protection provisions, provide for tougher penalties, and potentially create a new enforcement agency.
After Cambridge Analytica, says Hong, “the government agency understood, ‘Okay, if you don’t really implement or enforce those privacy rules, then you could have a major scandal, even affecting political things.’”
The local police investigation of Xu Yuyu’s death eventually identified the scammers who had called her. It had been a gang of seven who’d cheated many other victims out of more than 560,000 yuan using illegally obtained personal information. The court ruled that Xu’s death had been a direct result of the stress of losing her family’s savings. Because of this, and his role in orchestrating tens of thousands of other calls, the ringleader, Chen Wenhui, 22, was sentenced to life in prison. The others received sentences between three and 15 years.Retour ligne automatique
xu yuyu
Emboldened, Chinese media and consumers began more openly criticizing privacy violations. In March 2018, internet search giant Baidu’s CEO, Robin Li, sparked social-media outrage after suggesting that Chinese consumers were willing to “exchange privacy for safety, convenience, or efficiency.” “Nonsense,” wrote a social-media user, later quoted by the People’s Daily. “It’s more accurate to say [it is] impossible to defend [our privacy] effectively.”
In late October 2019, social-media users once again expressed anger after photos began circulating of a school’s students wearing brainwave-monitoring headbands, supposedly to improve their focus and learning. The local educational authority eventually stepped in and told the school to stop using the headbands because they violated students’ privacy. A week later, a Chinese law professor sued a Hangzhou wildlife zoo for replacing its fingerprint-based entry system with face recognition, saying the zoo had failed to obtain his consent for storing his image.
But the public’s growing sensitivity to infringements of consumer privacy has not led to many limits on state surveillance, nor even much scrutiny of it. As Maya Wang, a researcher at Human Rights Watch, points out, this is in part because most Chinese citizens don’t know the scale or scope of the government’s operations. In China, as in the US and Europe, there are broad public and national security exemptions to data privacy laws. The Cybersecurity Law, for example, allows the government to demand data from private actors to assist in criminal legal investigations. The Ministry of Public Security also accumulates massive amounts of data on individuals directly. As a result, data privacy in industry can be strengthened without significantly limiting the state’s access to information.
The onset of the pandemic, however, has disturbed this uneasy balance.
On February 11, Ant Financial, a financial technology giant headquartered in Hangzhou, a city southwest of Shanghai, released an app-building platform called AliPay Health Code. The same day, the Hangzhou government released an app it had built using the platform. The Hangzhou app asked people to self-report their travel and health information, and then gave them a color code of red, yellow, or green. Suddenly Hangzhou’s 10 million residents were all required to show a green code to take the subway, shop for groceries, or enter a mall. Within a week, local governments in over 100 cities had used AliPay Health Code to develop their own apps. Rival tech giant Tencent quickly followed with its own platform for building them.
The apps made visible a worrying level of state surveillance and sparked a new wave of public debate. In March, Hu Yong, a journalism professor at Beijing University and an influential blogger on Weibo, argued that the government’s pandemic data collection had crossed a line. Not only had it led to instances of information being stolen, he wrote, but it had also opened the door to such data being used beyond its original purpose. “Has history ever shown that once the government has surveillance tools, it will maintain modesty and caution when using them?” he asked.
Indeed, in late May, leaked documents revealed plans from the Hangzhou government to make a more permanent health-code app that would score citizens on behaviors like exercising, smoking, and sleeping. After a public outcry, city officials canceled the project. That state-run media had also published stories criticizing the app likely helped.
The debate quickly made its way to the central government. That month, the National People’s Congress announced it intended to fast-track the Personal Information Protection Law. The scale of the data collected during the pandemic had made strong enforcement more urgent, delegates said, and highlighted the need to clarify the scope of the government’s data collection and data deletion procedures during special emergencies. By July, the legislative body had proposed a new “strict approval” process for government authorities to undergo before collecting data from private-sector platforms. The language again remains vague, to be fleshed out later—perhaps through another nonbinding document—but this move “could mark a step toward limiting the broad scope” of existing government exemptions for national security, wrote Sacks and fellow China scholars at New America.
Hong similarly believes the discrepancy between rules governing industry and government data collection won’t last, and the government will soon begin to limit its own scope. “We cannot simply address one actor while leaving the other out,” he says. “That wouldn’t be a very scientific approach.”
Other observers disagree. The government could easily make superficial efforts to address public backlash against visible data collection without really touching the core of the Ministry of Public Security’s national operations, says Wang, of Human Rights Watch. She adds that any laws would likely be enforced unevenly: “In Xinjiang, Turkic Muslims have no say whatsoever in how they’re treated.”
Still, Hong remains an optimist. In July, he started a job teaching law at Beijing University, and he now maintains a blog on cybersecurity and data issues. Monthly, he meets with a budding community of data protection officers in China, who carefully watch how data governance is evolving around the world.
#criminalité #Nokia_Siemens #fraude #Huawei #payement #Cisco #CambridgeAnalytica/Emerdata #Baidu #Alibaba #domination #bénéfices #BHATX #BigData #lutte #publicité (...)
##criminalité ##CambridgeAnalytica/Emerdata ##publicité ##[fr]Règlement_Général_sur_la_Protection_des_Données__RGPD_[en]General_Data_Protection_Regulation__GDPR_[nl]General_Data_Protection_Regulation__GDPR_ ##Nortel_Networks ##Facebook ##biométrie ##consommation ##génétique ##consentement ##facial ##reconnaissance ##empreintes ##Islam ##SocialCreditSystem ##surveillance ##TheGreatFirewallofChina ##HumanRightsWatch
Facebook Joined by Human Rights Groups to Fight Spyware Maker
▻https://www.bloomberg.com/news/articles/2020-12-23/facebook-joined-by-human-rights-groups-to-fight-spyware-maker
A coalition of human rights and press freedom groups have filed a brief supporting Facebook Inc.’s lawsuit against the Israeli surveillance technology company NSO Group, arguing that the “very core of the principles that America represents” are at stake in the case. Facebook last year initiated the lawsuit against NSO Group, accusing the company of reverse-engineering WhatsApp and using the popular chat service to send spyware to the devices of approximately 1,400 people, including attorneys, (...)
#Cisco #Google #Microsoft #NSO #Facebook #WhatsApp #Pegasus #hacking #surveillance #écoutes #AccessNow #Amnesty (...)
##RSF
]]>Google, Cisco and VMware join Microsoft to oppose NSO Group in WhatsApp spyware case
▻https://techcrunch.com/2020/12/21/google-cisco-and-vmware-join-microsoft-to-oppose-nso-group-in-whatsapp-s
A coalition of companies have filed an amicus brief in support of a legal case brought by WhatsApp against Israeli intelligence firm NSO Group, accusing the company of using an undisclosed vulnerability in the messaging app to hack into at least 1,400 devices, some of which were owned by journalists and human rights activists. NSO develops and sells governments access to its Pegasus spyware, allowing its nation-state customers to target and stealthily hack into the devices of its targets. (...)
#NSO #Cisco #Google #Microsoft #VMWare #WhatsApp #Pegasus #smartphone #spyware #activisme #journalisme #écoutes #hacking (...)
]]>Reconnaissance faciale, un remède miracle ?
▻https://lvsl.fr/reconnaissance-faciale-un-remede-miracle
Depuis quelques temps déjà, un débat autour de la reconnaissance faciale s’érige auprès des sphères politico-industrielles ainsi qu’au sein des organisations de défense des libertés, un développement technologique qui fascine autant qu’il inquiète. Vendue par ses promoteurs comme la solution miracle aux problèmes sécuritaires, la reconnaissance faciale est une véritable marotte contemporaine. Confortablement installées sur un marché mondial qui se compte en plusieurs milliards de dollars, bon nombre (...)
#Cognitec #Google #Idemia #Safran #Thalès #NEC #Amazon #Facebook #algorithme #CCTV #Rekognition #biométrie #facial #reconnaissance #vidéo-surveillance #surveillance #LaQuadratureduNet #Technopolice #DeepFace #Alicem #Gemalto #CNIL #TAJ #TES #S2ucre (...)
##[fr]Règlement_Général_sur_la_Protection_des_Données__RGPD_[en]General_Data_Protection_Regulation__GDPR_[nl]General_Data_Protection_Regulation__GDPR_ ##Cisco ##SmartCity ##biais ##Morpho ##sexisme ##discrimination
Reconnaissance faciale : officiellement interdite, elle se met peu à peu en place
►https://www.franceinter.fr/reconnaissance-faciale-officiellement-interdite-elle-se-met-peu-a-peu-en
Nice, Metz, Marseille... Toutes ces villes tentent d’expérimenter des dispositifs qui s’apparentent à de la reconnaissance faciale, toujours interdite en France. La Cnil veille au grain, mais n’exclut pas de rendre un avis favorable pour les Jeux olympiques de Paris en 2024. Imaginez : le 26 juillet 2024. Les Jeux olympiques de Paris débutent. Une foule compacte se presse devant les grilles d’entrée du Stade de France. À l’entrée sud, une file semble avancer plus vite que les autres. En effet, (...)
#Atos #CapGemini #Cisco #Dassault #Datakalab #Europol #Idemia #RATP #Two-I #algorithme #Alicem #capteur #CCTV #QRcode #SmartCity #smartphone #biométrie #racisme #consentement #émotions #facial #reconnaissance #son (...)
##[fr]Règlement_Général_sur_la_Protection_des_Données__RGPD_[en]General_Data_Protection_Regulation__GDPR_[nl]General_Data_Protection_Regulation__GDPR_ ##biais ##comportement ##discrimination ##enseignement ##masque ##sport ##TAJ ##bug ##CNIL ##LaQuadratureduNet
Podcast : Want consumer privacy ? Try China
▻https://www.technologyreview.com/2020/08/19/1007425/data-privacy-china-gdpr
Forget the idea that China doesn’t care about privacy—its citizens will soon have much greater consumer privacy protections than Americans. The narrative in the US that the Chinese don’t care about data privacy is simply misguided. It’s true that the Chinese government has built a sophisticated surveillance apparatus (with the help of Western companies), and continues to spy on its citizenry. But when it comes to what companies can do with people’s information, China is rapidly moving toward a (...)
#Alibaba #Apple #ByteDance #Cisco #Google #Nokia_Siemens #Nortel_Networks #TikTok #Facebook #WeChat #Weibo #QRcode #smartphone #censure #BHATX #BigData #COVID-19 #GAFAM #santé #surveillance (...)
##santé ##[fr]Règlement_Général_sur_la_Protection_des_Données__RGPD_[en]General_Data_Protection_Regulation__GDPR_[nl]General_Data_Protection_Regulation__GDPR_
Exclusive : More than 1,000 people at Twitter had ability to aid hack of accounts
▻https://www.reuters.com/article/us-twitter-cyber-access-exclusive/exclusive-more-than-1000-people-at-twitter-had-ability-to-aid-hack-of-accou
SAN FRANCISCO (Reuters) - More than a thousand Twitter employees and contractors as of earlier this year had access to internal tools that could change user account settings and hand control to others, two former employees said, making it hard to defend against the hacking that occurred last week. Twitter Inc and the FBI are investigating the breach that allowed hackers to repeatedly tweet from verified accounts of the likes of Democratic presidential candidate Joe Biden, billionaire (...)
#Twitter #Cisco #Cognizant #FBI #SIM #écoutes #hacking #BigData
]]>Qui surveille, la CIA ou Huawei ?, par Dan Schiller
▻https://www.monde-diplomatique.fr/mav/170/SCHILLER/61707
Le premier ministre britannique Boris Johnson a décidé mardi d’interdire au géant chinois des télécommunications Huawei l’accès au réseau 5G du Royaume-Uni en raison d’un risque pour la sécurité nationale. « Je suis persuadé qu’ils ont fait ça parce que leurs experts en sécurité sont parvenus aux mêmes conclusions que les nôtres », a réagi le secrétaire d’État américain Mike Pompeo. Mais quelles conclusions, au juste ? Qui surveille, la CIA ou Huawei ? Surpris par l’arrivée sur le marché mondial du spécialiste de (...)
#Alcatel-Lucent #Alibaba #Alphabet #Apple #Cisco #Crypto #Google #Huawei #Microsoft #Motorola #Nokia_Siemens #Samsung #Sony-Ericsson_ #Tencent #5G #technologisme #domination #bénéfices (...)
##lutte
Automatic for the Bosses
▻https://reallifemag.com/automatic-for-the-bosses
Workers may be more affected by robots taking their bosses’ jobs than their own Generally speaking, the four economic sectors in the U.S. that rely most heavily on human labor are, in order of most people employed : retail, fast food, health care, and clerical office work. These are jobs that involve interacting — often intimately — with other people. To eliminate these jobs, companies couldn’t just replace humans’ role in production with machines, as they might on an assembly line. It would (...)
#Cisco #Microsoft #Ring #Amazon #Foursquare #Lyft #Netflix #Spotify #Twitter #Uber #Zoom #algorithme #robotique #Alexa #domotique #consommation #supermarché #technologisme #FoodTech #recrutement #COVID-19 #santé #télétravail (...)
##supermarché ##santé ##travail
Zoom, Whereby, WhatsApp : les apps de visioconférences sont-elles sécurisées ? - Tech - Numerama
▻https://www.numerama.com/tech/614315-zoom-whereby-whatsapp-les-apps-de-visioconferences-sont-elles-secur
Les applications qui permettent d’organiser des visioconférences sont massivement utilisées en ces temps de confinement. Pour la sécurité de vos conversations, il convient toutefois de rappeler les bonnes pratiques en ligne, et de souligner les limites de certains outils. Confinés depuis lundi 16 mars 2020, les Français et les Françaises trouvent des manières de continuer à communiquer entre eux : jeux vidéo en ligne, coups de fil, mais aussi visioconférences à plusieurs interlocuteurs. Une (...)
#Zoom #BigData #FaceTime #Messenger #Skype #WhatsApp #Cisco #Facebook #URL
//c0.lestechnophiles.com/www.numerama.com/content/uploads/2020/03/conf-slack-ok.jpg
]]>Le surveillant général Muselier perd la face - Ligue des droits de l’Homme
▻https://www.ldh-france.org/le-surveillant-general-muselier-perd-la-face
Par une délibération du 14 décembre 2018, le conseil régional Sud (ex Provence-Alpes-Côte d’Azur) a autorisé une expérimentation de reconnaissance faciale dans deux lycées de Marseille et Nice. Cette expérimentation devait être entièrement financée par l’entreprise américaine Cisco, qui profite ici de la politique sécuritaire des élus locaux pour tester ses technologies de surveillance. L’objectif affiché par le conseil régional, et en particulier par son président Renaud Muselier, était clair : étendre, au (...)
#Cisco #algorithme #CCTV #biométrie #procès #facial #reconnaissance #vidéo-surveillance #enseignement #surveillance #LaQuadratureduNet (...)
]]>The Rise of the Video Surveillance Industrial Complex
▻https://theintercept.com/2020/01/27/surveillance-cctv-smart-camera-networks
There’s widespread concern that video cameras will use facial recognition software to track our every public move. Far less remarked upon — but every bit as alarming — is the exponential expansion of “smart” video surveillance networks. Private businesses and homes are starting to plug their cameras into police networks, and rapid advances in artificial intelligence are investing closed-circuit television, or CCTV, networks with the power for total public surveillance. In the not-so-distant (...)
#Western_Digital #Axis #Accenture #Briefcam #Canon #Cisco #Comcast #Google #Microsoft #Milestone #Motorola_Mobility #Verizon #Amazon #algorithme #CCTV #smartphone #biométrie #criminalité #police #racisme #automobilistes #émotions #facial #législation (...)
##criminalité ##prédiction ##reconnaissance ##vidéo-surveillance ##bénéfices ##BigData ##MinorityReport ##comportement ##BlackLivesMatter ##data ##discrimination ##Islam ##profiling
De la ville intelligente à la ville capturée
►http://www.internetactu.net/a-lire-ailleurs/de-la-ville-intelligente-a-la-ville-capturee
Dès l’origine, le projet de ville intelligente a été défini de manière ambiguë : « il promet d’habiliter la planification urbaine en faisant de la ville un centre de données en temps réel sur tous les aspects de son fonctionnement et d’optimiser l’infrastructure urbaine via des capteurs reliés dans un réseau centralisé ». Son enjeu est profondément économique : il vise avant tout à produire une efficacité nouvelle, pour un coût moindre ; il vise à introduire « l’esprit d’entreprise à l’hôtel de ville » (...)
#Cisco #SidewalkLabs #IBM #algorithme #CCTV #SmartCity #Microsoft #Palantir #CIA #DomainAwarenessSystem-DAS #militarisation #technologisme #reconnaissance #vidéo-surveillance #surveillance #NYPD #FBI #Amazon #Ring #ACLU #urbanisme #PersistentSurveillanceSystem (...)
##aérien
/assets/images/logo_ia.png
The “smart city” makes infrastructure and surveillance indistinguishable
▻https://reallifemag.com/the-captured-city
You can’t go about your day anymore without tripping over smart stuff — smart refrigerators, smart toothbrushes, smart locks, smart whatever. All this smartness usually amounts to equipping the previously dumb thing with sensors that collect data, software for algorithmic operation, and internet capabilities so it can constantly communicate with other things and be remotely controlled by its owners, makers, and hackers. But what does it mean to apply “smart” to an entire city ? From the (...)
#Cisco #Google #Microsoft #NYPD #Palantir #DHS #CIA #Amazon #algorithme #capteur #CCTV #anti-terrorisme #technologisme #vidéo-surveillance #surveillance #urbanisme #InternetOfThings #ACLU (...)
]]>Lycées Nice Marseille : première victoire contre la reconnaissance faciale
▻https://www.laquadrature.net/2019/10/28/lycees-nice-marseille-premiere-victoire-contre-la-reconnaissance-facia
La CNIL vient de rendre un avis déclarant que le système de reconnaissance faciale dans deux lycées de la région Sud « ne saurait être légalement mis en œuvre ». La CNIL ne propose pas de correctif et rejette par principe le dispositif. Cette première victoire contre la reconnaissance faciale en France ne peut que nous rendre optimistes dans la lutte qui nous oppose aux systèmes déjà existants (comme la reconnaissance faciale dans les aéroports via PARAFE) ou futurs (l’application d’identité numérique (...)
#Cisco #CCTV #biométrie #vidéo-surveillance #[fr]Règlement_Général_sur_la_Protection_des_Données_(RGPD)[en]General_Data_Protection_Regulation_(GDPR)[nl]General_Data_Protection_Regulation_(GDPR) #étudiants #surveillance #facial #reconnaissance #LaQuadratureduNet (...)
##[fr]Règlement_Général_sur_la_Protection_des_Données__RGPD_[en]General_Data_Protection_Regulation__GDPR_[nl]General_Data_Protection_Regulation__GDPR_ ##CNIL
La Cnil juge illégale la reconnaissance faciale à l’entrée des lycées
▻https://www.mediapart.fr/journal/france/281019/la-cnil-juge-illegale-la-reconnaissance-faciale-l-entree-des-lycees
La Région Sud avait demandé à la Cnil d’analyser son projet d’installation de dispositifs biométriques à l’entrée de deux lycées situés à Nice et à Marseille. « Ce dispositif ne saurait être légalement mis en œuvre », affirme la Commission dans sa réponse, obtenue par Mediapart. La Commission nationale informatique et libertés (Cnil) a envoyé un sévère avertissement à la région Sud, vendredi 25 octobre, concernant son projet d’installation des portiques de « contrôle d’accès biométrique » à l’entrée de deux (...)
#Cisco #biométrie #vidéo-surveillance #facial #[fr]Règlement_Général_sur_la_Protection_des_Données_(RGPD)[en]General_Data_Protection_Regulation_(GDPR)[nl]General_Data_Protection_Regulation_(GDPR) #étudiants #surveillance #LaQuadratureduNet (...)
##[fr]Règlement_Général_sur_la_Protection_des_Données__RGPD_[en]General_Data_Protection_Regulation__GDPR_[nl]General_Data_Protection_Regulation__GDPR_ ##CNIL
5G : « Les États-Unis ont peur de perdre leur prééminence technologique »
►https://usbeketrica.com/article/5g-les-etats-unis-ont-peur-de-perdre-leur-preeminence-technologique
Objet d’une rivalité exacerbée entre les États-Unis et la Chine depuis plusieurs mois, la technologie 5G se retrouve au cœur d’enjeux géopolitiques majeurs et parfois complexes à décrypter. À l’occasion des Assises de la Sécurité, rendez-vous annuel des experts de la cybersécurité qui s’est tenu du 9 au 12 octobre à Monaco, nous avons tenté de faire le point sur le sujet. « Les ennemis de mes ennemis sont mes amis. » Et si le célèbre adage était en passe de devenir une réalité stratégique pour les États-Unis (...)
#Alcatel-Lucent #Bouygues #Cisco #Huawei #Nokia_Siemens #Orange #Sony #Verizon #backdoor #solutionnisme #domination #concurrence #ANSSI #SFR_Vivendi #KT (...)
##5G
Un député souhaite que les développeurs codent mieux au nom de l’environnement
▻https://www.numerama.com/tech/518848-un-depute-souhaite-que-les-developpeurs-codent-mieux-au-nom-de-lenv
Le gouvernement est interpellé par un député qui souhaite que l’on oblige les éditeurs de logiciels à consacrer un budget pour une programmation plus compatible avec les enjeux environnementaux. Greenpeace a fait sa communication dessus : les plateformes de streaming vidéo ne sont pas toujours très écolo-compatibles. Dans un rapport daté de 2017, l’ONG avait épinglé plusieurs services très populaires, comme Netflix, HBO ou encore Amazon Video pour leurs faibles performances en matière environnementale. (...)
#Cisco #Google #Huawei #Intel #Lenovo #Microsoft #Nokia_Siemens #Samsung #Seagate #Tencent #Western_Digital #Amazon #Netflix #IBM #HP #écologie #cloud #Greenpeace (...)
##HBO
//c1.lestechnophiles.com/www.numerama.com/content/uploads/2016/02/femmes-programmation.jpg
Quatre associations attaquent la reconnaissance faciale testée dans deux lycées de PACA
▻https://www.nextinpact.com/news/107629-quatre-associations-attaquent-reconnaissance-faciale-testee-dans-
Quatre associations viennent de contester devant le tribunal administratif de Marseille une délibération du conseil régional autorisant l’expérimentation d’un contrôle d’accès par reconnaissance faciale dans deux lycées de Provence-Alpes-Côte d’Azur. L’installation d’un portique virtuel à l’entrée de deux lycées – l’un à Marseille (Ampère) l’autre à Nice (Eucalyptus) – n’a pas laissé insensible la Quadrature du Net, la Ligue des droits de l’Homme, CGT Educ’Action des Alpes-Maritimes et la Fédération des Conseils (...)
#Cisco #CCTV #biométrie #facial #étudiants #surveillance #vidéo-surveillance #LaQuadratureduNet (...)
##LDH
Will #cisco Be the Next Roadkill for #aws?
▻https://hackernoon.com/will-cisco-be-the-next-roadkill-for-aws-f6fff2a56135?source=rss----3a814
I’m not keeping very close track, but it feels like months since Amazon Web Services (AWS) most recently turned a major tech industry upside down. But with all their resources and market power, I’m sure there’s always something interesting cooking in the kitchens of wherever Amazon’s headquarters happens to be right now.So let me throw my purely speculative prediction into the silence. As I describe in my Learn AWS in a Month of Lunches book, AWS has happily replaced your server room with EC2, your SAN and NAS with S3, your data warehousing with Redshift, and your database with RDS (and Aurora). They’ve also invented entirely new deployment models: politely informing you, for instance, that you simply have to serve your mobile apps via serverless functions (Lambda).So what’s next? Well how (...)
]]>Smart City : Cisco déploie 1 milliard de dollars pour la ville du futur
▻https://www.silicon.fr/smart-city-cisco-1-milliard-dollars-190389.html
Doté d’un milliard de dollars, le City Infrastructure Financing Acceleration Program (CIFAP) vise à accélérer les déploiements des technologies numériques qui rendront les villes plus agréables à vivre (du moins sur le papier).
Circulation mieux régulée, pollution réduite, dépenses énergétiques optimisées, sécurité renforcée, etc., autant de promesses qui construiront la ville intelligente de demain .
Sauf que les projets de type smart city tardent à se concrétiser, y compris en France. La faute au manque de financement, considère Cisco.
« Le financement est une pierre d’achoppement majeure pour les municipalités qui commencent leur transformation des villes connectées », avance Anil Menon, Président monde de Cisco Smart+Connected Communities.
« Avec nos partenaires, Cisco apportera le capitale et l’expertise nécessaires pour faire des projets de villes intelligentes une réalité. »
Le ramassage connecté des ordures
Plus concret, Kinetic for Cities Waste Management permet de surveiller le remplissage des poubelles en temps réel.
Une expérimentation aujourd’hui lancée en Espagne, dans six quartiers de Grenade (Andalousie), avec Ferrovial Services. 210 capteurs de remplissage, sur les 420 prévus, ont été déployés dans des bennes à ordures.
Après traitement, les données (informatiques) récoltées à partir d’un réseau IoT Lora permettent de prendre des décisions appropriées en regard de la situation (par exemple face à un départ de feu ou une benne renversée) et d’optimiser les déplacements des engins de ramassage.
L’objectif étant d’endiguer la pollution environnementale tout en assurant un service de qualité.
Un exemple parmi d’autres des applications de smart cities auxquelles Cisco entend se connecter durablement.
]]>« C’est quoi le port parallèle ? »
▻http://www.dsfc.net/informatique/perspective/c-est-quoi-le-port-parallele
J’espère, très cher Lucas, que tu prendras le temps d’écouter les conseils d’un vieux con.
#Perspective #Active_Directory #BTS_Administration_et_Réseau #Cisco #Connaissances #Formation #Savoirs #Vmware
]]>Inside Kansas City’s goal to become ’the smartest city on planet earth’ - TechRepublic
▻http://www.techrepublic.com/article/inside-kansas-citys-goal-to-become-the-smartest-city-on-planet-earth
There’s more to #Kansas_City than barbecue and baseball, as the metro area digs in even deeper to become a smart city.
In May, the Missouri city heralded the first phase of its plan to become a smart, connected city by creating a 2.2 mile smart district with 20,000 residents in the heart of downtown. The core area includes a streetcar line, free public Wi-Fi, smart LED streetlights, and 25 digital kiosks as part of an infrastructure overhaul. The first phase has been limited to the area covered, as it’s served as a living lab for smart city Internet of Things (IoT) technology.
[…]
The free public Wi-Fi is the core component of the project, in that it touches the most people’s lives by improving their connectivity. The city initially thought that residents in the area would get the most impact from the free Wi-Fi. But it turns out that visitors are using it, and using it repeatedly. This means that the city can collect data about the visitors, such as their area codes and, through sensors in kiosks stationed throughout the smart city district, the pattern of where they are going while they are in the area, Bennett [Kansas City’s chief innovation officer] said.
For instance, “There are 48 people who walk past the corner of 9th and Broadway between 9 and 10 am each day. There is not a single restaurant in that entire two-block area. Once I figured that out, I talked to our economic development council. We talked to two people who bid, and they put a new deli in,” Bennett said.
[…]
Kim Majerus, local and education vice president for #Cisco, worked with the city on the project. “The amount of data and information they’re collecting from that street car and the usership and the opportunities, I think that itself has paid for the project in gold from the city’s perspective.”
[…]
Cities are realizing the value in IoT, and putting the technology into practice, and it has accelerated in the last year, Majerus said.
“It’s no longer telling people why they should be smart and connected, but it’s telling the city leaders that you have an asset that you can monetize to the benefit of your citizens. Once you get that piece done, the rest is easy. Once you show them the value of the assets they have, it makes it a little easier for the city leadership to get behind it,” she said.
Le futur âge d’or de la #smart_city …
]]>Juniper Backdoor
__________________
Cisco Starts Company-Wide Code Audit to Search for Hidden Backdoors
After Juniper found “unauthorized code” in the source code of their ScreenOS, deployed with NetScreen firewall equipment, Cisco announced a full audit of all their products’ source code.
▻http://news.softpedia.com/news/cisco-starts-reviewing-code-after-juniper-finds-hidden-backdoor-4979
The code reviewers will be looking for undisclosed device access methods (backdoors), hardcoded or undocumented hidden account credentials, undocumented traffic diversions, or any type of covert communications initiated from the device.
Cisco has firmly stated that it has a “no backdoor” policy for its products, and has also reassured clients that, up to this point, no unauthorized code has been found in its devices.
[...]
It appears that the Juniper incident has rocked the communications equipment market, and now, many companies are scrambling left and right to reassure clients that their businesses’ communications channels are safe.
About the Juniper Backdoor (in some of their firewalls):
Security Firm Discovers Backdoor Password for Juniper ScreenOS Devices
▻http://news.softpedia.com/news/security-firm-discovers-backdoor-password-for-juniper-screenos-devic
The issue was present only in some of its equipment, NetScreen devices using ScreenOS 6.2.0r15 through 6.2.0r18 and 6.3.0r12 through 6.3.0r20, to be more precise.
According to Rapid7, attackers can use the password “<<< %s(un=’%s’) = %u” to bypass both SSH and Telnet authentication procedures, with the only condition that they know a valid username.
The password was found in the ScreenOS code, and it looks like a code comment, probably the reason it remained in the code for so many years.
According to security analyst Ralf-Philipp Weinmann [1], these vulnerabilities could find their source in NSA’s deliberately crippled dual elliptic curve algorithm Dual_EC_DBRG, a pseudo-random number generator used to encrypt traffic.
A Wired article also explains how the backdoor works:
▻http://www.wired.com/2015/12/researchers-solve-the-juniper-mystery-and-they-say-its-partially-the-nsas-fau
Apparently, Juniper is still using this weakened algorithm.
#Cisco
#Juniper #NetScreen #ScreenOS
#backdoor
#spy
#NSA
___
]]> Le ‘fog computing’ et ses perspectives
▻https://www.futuribles.com/base/article/le-fog-computing-et-ses-perspectives
En tant que moyen d’accès et de stockage dynamique de ressources virtuelles, le cloud a suscité l’enthousiasme au vu des possibilités qu’il permettait d’explorer, et également de vives inquiétudes quant à la sécurité et la propriété des données qui viendraient à être y être stockées. Pour les fournisseurs de serveurs de type cloud, l’angoisse première est celle de la surcharge. Bugs, lenteur, mouvement inutile des données, conséquences des data centers sur l’environnement : les critiques envers le cloud ont été plutôt nombreuses. L’entreprise américaine Cisco Systems est partie de ce constat pour lancer un nouveau paradigme qui se proposerait de répondre aux problèmes posés par le cloud : le fog computing.
[...]
Quoi qu’il en soit, le fog computing s’annonce synonyme de réseau fluide, ancré dans l’immédiateté et, surtout, surveillé.
Redécouvrir la décentralisation... mais avec la surveillance en plus.
#Cisco_Systems #Cloud_computing #Fog_computing #Internet #Internet_des_objets #Numérique #Surveillance
]]>#Cisco rachète #OpenDNS (et aura donc accès à toutes les requêtes DNS des utilisateurs). Rappel : utiliser un résolveur #DNS public d’une grosse boîte US (OpenDNS, Google Public DNS) est une très mauvaise idée, question #vie_privée.
▻http://www.enterprisenetworkingplanet.com/netsecur/cisco-acquires-opendns-for-635-million.html
]]>#OpenH264 Now in #Firefox (for WebRTC only)
▻http://andreasgal.com/2014/10/14/openh264-now-in-firefox
]]>Accidental temporary Verizon route disaggregation causes legacy #Cisco #BGP routers to hit their 512K routes limit, explaining today’s #Internet hiccup...
►http://www.bgpmon.net/what-caused-todays-internet-hiccup
Les entreprises américaines accélèrent leur retour en Iran
►http://www.lefigaro.fr/societes/2014/05/03/20005-20140503ARTFIG00030-les-entreprises-americaines-accelerent-leur-retou
Alors que les négociations politiques entre les Occidentaux et l’Iran avancent, les sociétés outre-Atlantique multiplient les contacts auprès de Téhéran.
Dans le secteur automobile, le groupe Chrysler a transmis à la présidence iranienne une offre d’investissements sur ce vaste marché de 75 millions de consommateurs, affirme au Figaro un homme d’affaires à Téhéran. La proposition, faite début mars, a été transmise par le canal diplomatique, c’est-à-dire avec l’aval de l’Administration américaine. Officiellement, Washington multiplie pourtant les appels aux entreprises étrangères à ne pas se précipiter en Iran, tant qu’un accord sur la neutralisation de la menace nucléaire n’aura pas été trouvé.Le géant de l’informatique Cisco Systems, de son côté, a lancé des demandes de licence d’exportation de ses équipements auprès du Trésor, s’engouffrant ainsi dans la brèche ouverte par Barack Obama qui encourage le développement d’Internet en Iran pour renforcer la démocratie.
Fin février, selon une autre source occidentale à Téhéran, une dizaine de présidents d’universités américaines ont fait le tour des meilleurs établissements iraniens, comme l’université Sharif de Téhéran. Outre une rencontre avec le ministre de l’Éducation et Mohammad Nahavandian, le conseiller économique du président Hassan Rohani, la délégation américaine a été reçue par Mohammadi Golpayegani, le directeur de cabinet du guide suprême, l’ayatollah Ali Khamenei, numéro un du régime et porte-drapeau du très vif sentiment antiaméricain. « Qui plus est, les Américains ont été reçus au bureau du Guide, tout un symbole ! » constate notre source. Conséquence de cette visite : trois semaines plus tard, pour Norouz, le Nouvel An iranien, l’Administration américaine levait les restrictions à la formation des étudiants iraniens dans les universités outre-Atlantique........
#États-Unis
#embargo
#Iran
#sanctions
#entreprises-américaines
#Chrysler
#Cisco
#Boeing
#contrats ..........#France ???
Le vice-président de Cisco, un des principaux opérateurs de la smart city, prône l’opt in/out sur les données, de la même façon que les GAFA sont montés au créneau sur l’espionnage : pas de confiance des usagers, pas de business, ou disons moins.
▻http://www.theguardian.com/news/2014/apr/04/if-smart-cities-dont-think-about-privacy-citizens-will-refuse-to-accept
]]>Cisco’s OpenFlow SDN killer : OpFlex
Cisco proposes OpFlex as alternative standard for software-defined networking and adds the protocol to its ACI programmable networking architecture.
OpFlex is intended to maintain control intelligence in the network infrastructure itself instead of centralizing it in a separate controller, which is the essence of the OpenFlow control/forwarding decoupling model. OpFlex will become Cisco’s favored southbound protocol.
▻http://www.lightreading.com/carrier-sdn/sdn-architectures/goin-south-cisco-offers-opflex-as-alternative-to-openflow-/d/d-id/708478?_mc=RSS_LR_EDT
OpFlex is intended to promote Cisco’s vision of “declarative control” of the network, where the policy manager dictates the network end state, and intelligent devices on the network execute that policy. Declarative control is the alternative to “imperative control,” as found in OpenFlow software-defined networks, where the centralized controller has all the intelligence and network devices are dumb.
[...]
Cisco believes declarative control is superior to imperative control, which has a single point of failure in the centralized controller. Also, on imperative networks, upgrading device capabilities breaks compatibility with other devices on the network, which is not a problem on a declarative network
[...]
strict OpenFlow model threatens Cisco in that it enables the potential use of so-called “white box” switches, rather than the expensive, specialized hardware that is Cisco’s bread and butter. So the more Cisco can do to promote declarative networks, the better off Cisco will likely be
]]>After years of speculation that electronics can be accessed by intelligence agencies through #backdoors, an internal #NSA catalog reveals that such methods exist for numerous end-user devices - #Dell, #Cisco, #Juniper, #IBM, #Western_Digital, #Seagate, #Maxtor and others, risking enormous damage to US tech sector - with or without their cooperation ?
►http://www.spiegel.de/international/world/catalog-reveals-nsa-has-back-doors-for-numerous-devices-a-940994.html
Cisco’s disastrous quarter shows how NSA spying could freeze US companies out of a trillion-dollar opportunity
▻http://qz.com/147313/ciscos-disastrous-quarter-shows-how-nsa-spying-could-freeze-us-companies-out-of-
Cisco se plaint des mauvaises conséquences de la surveillance du NSA sur son chiffre d’affaires.
En fait Cisco veut le beurre et l’argent du beurre,
Cisco accusé de contribuer à la surveillance d’Internet et à la répression en Chine
▻http://www.zdnet.fr/actualites/cisco-accuse-de-contribuer-a-la-surveillance-d-internet-et-a-la-repression-en-
OpenH264 devient open-source sous licence BSD... pour WebRTC
▻http://neosting.net/openh264-webrtc-open-source-h264
La famille de l’open-source s’agrandit. Cette fois-ci, ce n’est autre que le vieillissant codec H264 qui rentre dans la famille, grâce à Cisco Systems, qui dans sa grande bonté, paiera les licences à MPEG LA pour chaque téléchargement sur ses serveurs des binaires qu’elle proposera. Il faut savoir que normalement le codec H264 n’est pas […] #cisco-systems #codec #openh264 #opensource #webrtc
]]>NSA Laughs at PCs, Prefers Hacking Routers and Switches | Threat Level | Wired.com
▻http://www.wired.com/threatlevel/2013/09/nsa-router-hacking
The NSA’s focus on routers highlights an often-overlooked attack vector with huge advantages for the intruder, says Marc Maiffret, chief technology officer at security firm Beyond Trust. Hacking routers is an ideal way for an intelligence or military agency to maintain a persistent hold on network traffic because the systems aren’t updated with new software very often or patched in the way that Windows and Linux systems are.
“No one updates their routers,” he says. “If you think people are bad about patching Windows and Linux (which they are) then they are … horrible about updating their networking gear because it is too critical, and usually they don’t have redundancy to be able to do it properly.”
#NSA #surveillance #routage #infrastructure #cybersécurité via @stephane
Fondé en 1984 par Leonard Bosack et Sandra Lerner, un couple qui travaillait au service informatique de l’université Stanford, #Cisco n’a pas été la première société à créer et vendre des routeurs mais Cisco créa le premier routeur multi-protocoles permettant d’interconnecter des réseaux utilisant des protocoles de communication différents.
▻https://fr.wikipedia.org/wiki/Cisco_Systems
Cumulus Networks unveils #Cisco killer #Debian based #Linux distribution for commodity switching hardware. Debian on a big switch using generic hardware... I had been waiting for that for a long time. ▻http://podcasts.infoworld.com/t/linux/cumulus-networks-unveils-cisco-killer-221007
]]>Technologies et responsabilité des entreprises - Youtube
▻http://www.youtube.com/watch?feature=player_embedded&v=lj3YB6JjcDE
comment le directeur général de CISCO france élude les questions sur les problèmes de responsabilité des fournisseurs de technologies aux régimes totalitaires en causant greenwashing... « utilisation malencontreuse » dit il en parlant de leurs clients qui utilisent leurs produits à des fins de traque des dissidents
#vidéo #responsabilité #éthique #entreprise #greenwashing #cisco #dpi
]]>Les routeurs de la discorde | Pierre Alonso
►http://owni.fr/2012/10/11/routeurs-discorde-bockel-zte-huawei
Européens et Américains sont d’accord : les équipements chinois sont materia non grata, en particulier les routeurs - pièces clefs pour le fonctionnement des réseaux. Plongée dans les méandres des Internets pour comprendre l’importance de ces équipements.
#Analyse #Libertés_Numériques #Pouvoirs #ANSSI #Cisco #cyberdéfense #cybersecurité #états-unis #France_Telecom #huawei #Jean-Marie_Bockel #Juniper #rapport_Bockel #routeur #zte
]]>