• CRYPTO-GRAM, August 15, 2025 Part2

    From Sean Rima@21:1/229 to All on Fri Aug 15 15:03:40 2025
    ave waived their Fourth Amendment rights under the third-party doctrine. The Article rejects this both because the customers were not on notice of the backdoor and because historical understandings of the Amendment would not have tolerated it. The Article concludes that none of these theories removed the Amendment?s reasonableness requirement.

    ** *** ***** ******* *********** *************

    Google Sues the Badbox Botnet Operators

    [2025.07.23] It will be interesting to watch what will come of this private lawsuit:

    Google on Thursday announced filing a lawsuit against the operators of the Badbox 2.0 botnet, which has ensnared more than 10 million devices running Android open source software.

    These devices lack Google?s security protections, and the perpetrators pre-installed the Badbox 2.0 malware on them, to create a backdoor and abuse them for large-scale fraud and other illicit schemes.

    This reminds me of Meta?s lawauit against Pegasus over its hack-for-hire software (which I wrote about here.) It?s a private company stepping into a regulatory void left by governments.

    Slashdot thread.

    ** *** ***** ******* *********** *************

    How the Solid Protocol Restores Digital Agency

    [2025.07.24] The current state of digital identity is a mess. Your personal information is scattered across hundreds of locations: social media companies, IoT companies, government agencies, websites you have accounts on, and data brokers you?ve never heard of. These entities collect, store, and trade your data, often without your knowledge or consent. It?s both redundant and inconsistent. You have hundreds, maybe thousands, of fragmented digital profiles that often contain contradictory or logically impossible information. Each serves its own purpose, yet there is no central override and control to serve you -- as the identity owner.

    We?re used to the massive security failures resulting from all of this data under the control of so many different entities. Years of privacy breaches have resulted in a multitude of laws -- in US states, in the EU, elsewhere -- and calls for even more stringent protections. But while these laws attempt to protect data confidentiality, there is nothing to protect data integrity.

    In this context, data integrity refers to its accuracy, consistency, and reliability...throughout its lifecycle. It means ensuring that data is not only accurately recorded but also remains logically consistent across systems, is up-to-date, and can be verified as authentic. When data lacks integrity, it can contain contradictions, errors, or outdated information -- problems that can have serious real-world consequences.

    Without data integrity, someone could classify you as a teenager while simultaneously attributing to you three teenage children: a biological impossibility. What?s worse, you have no visibility into the data profiles assigned to your identity, no mechanism to correct errors, and no authoritative way to update your information across all platforms where it resides.

    Integrity breaches don?t get the same attention that confidentiality breaches do, but the picture isn?t pretty. A 2017 write-up in The Atlantic found error rates exceeding 50% in some categories of personal information. A 2019 audit of data brokers found at least 40% of data broker sourced user attributes are ?not at all? accurate. In 2022, the Consumer Financial Protection Bureau documented thousands of cases where consumers were denied housing, employment, or financial services based on logically impossible data combinations in their profiles. Similarly, the National Consumer Law Center report called ?Digital Denials? showed inaccuracies in tenant screening data that blocked people from housing.

    And integrity breaches can have significant effects on our lives. In one 2024 British case, two companies blamed each other for the faulty debt information that caused catastrophic financial consequences for an innocent victim. Breonna Taylor was killed in 2020 during a police raid on her apartment in Louisville, Kentucky, when officers executed a ?no-knock? warrant on the wrong house based on bad data. They had faulty intelligence connecting her address to a suspect who actually lived elsewhere.

    In some instances, we have rights to view our data, and in others, rights to correct it, but these sorts of solutions have only limited value. When journalist Julia Angwin attempted to correct her information across major data brokers for her book Dragnet Nation, she found that even after submitting corrections through official channels, a significant number of errors reappeared within six months.

    In some instances, we have the right to delete our data, but -- again -- this only has limited value. Some data processing is legally required, and some is necessary for services we truly want and need.

    Our focus needs to shift from the binary choice of either concealing our data entirely or surrendering all control over it. Instead, we need solutions that prioritize integrity in ways that balance privacy with the benefits of data sharing.

    It?s not as if we haven?t made progress in better ways to manage online identity. Over the years, numerous trustworthy systems have been developed that could solve many of these problems. For example, imagine digital verification that works like a locked mobile phone -- it works when you?re the one who can unlock and use it, but not if someone else grabs it from you. Or consider a storage device that holds all your credentials, like your driver?s license, professional certifications, and healthcare information, and lets you selectively share one without giving away everything at once. Imagine being able to share just a single cell in a table or a specific field in a file. These technologies already exist, and they could let you securely prove specific facts about yourself without surrendering control of your whole identity. This isn?t just theoretically better than traditional usernames and passwords; the technologies represent a fundamental shift in how we think about digital trust and verification.

    Standards to do all these things emerged during the Web 2.0 era. We mostly haven?t used them because platform companies have been more interested in building barriers around user data and identity. They?ve used control of user identity as a key to market dominance and monetization. They?ve treated data as a corporate asset, and resisted open standards that would democratize data ownership and access. Closed, proprietary systems have better served their purposes.

    There is another way. The Solid protocol, invented by Sir Tim Berners-Lee, represents a radical reimagining of how data operates online. Solid stands for
    ?SOcial LInked Data.? At its core, it decouples data from applications by storing personal information in user-controlled ?data wallets?: secure, personal data stores that users can host anywhere they choose. Applications can access specific data within these wallets, but users maintain ownership and control.

    Solid is more than distributed data storage. This architecture inverts the

    --- BBBS/LiR v4.10 Toy-7
    * Origin: TCOB1: https/binkd/telnet binkd.rima.ie (21:1/229)