This program would allow the FCC to get information regarding net neutrality behaviors and have more information on net neutrality behaviors and have identifiable proof of such behaviors. Also, with a signed capture packet, it will be easier to ignore those who submit packets with no errors in them, or just spam packets within the program, they can simply ignore those signed with the same signature
However, by having each participant signing the packet with his or her private key, all the information is submitted is identifiable. Some participants may prefer to submit their information anonymously, rather than being identified and associated with their packet history.
2. Read this article and discuss what actions you can and/or will take.
2. Read this article and discuss what actions you can and/or will take.
I was aware that the Eletronic Communications Privacy act was outdated, but did not know how legislation was so behind the times. I was shocked to find out that the government can legally obtain e-mail as well as access cloud documents without users permissions.
From now on, I will take care to delete personal e-mails from cloud storage, as well as spread awareness of this to more people. There is a petition on the American Civil Liberties Union that interested parties can sign to petition for change in this law (here)
No comments:
Post a Comment