Claire Pershan
banner
clairepershan.bsky.social
Claire Pershan
@clairepershan.bsky.social
Pinned
“Another world is not only possible, she is on her way. On a quiet day, I can hear her breathing.”
- Arundhati Roy
Reposted by Claire Pershan
Mozilla Festival 2025 is Nov 7-9 in Barcelona w/ 500+ session hosts, 200+ experiences, talks, labs, forums, film screenings, & installations.

Keynotes @xychelsea.tv @audreyt.org @ruha9.bsky.social

If you haven't gotten your festival badge, use code MOZSEHER 🎟️ @mozilla.org www.mozillafestival.org
October 27, 2025 at 2:15 PM
Reposted by Claire Pershan
If you're short on time, you can find a summary of our investigation into data brokers endangering Europe's security here #databrokerfiles netzpolitik.org/2025/databro...
Databroker Files: All you need to know about how adtech data exposes the EU to espionage
Our latest investigation has shaken up Brussels by revealing that commercial datasets containing 278 million locations can be used to spy on the EU and NATO. The European Commission has expressed its ...
netzpolitik.org
November 4, 2025 at 10:11 AM
Reposted by Claire Pershan
📣 I am hiring a postdoc! aial.ie/hiring/postd...

applications from suitable candidates that are passionate about investigating the use of genAI in public service operations with the aim of keeping governments transparent and accountable are welcome

pls share with your networks
October 30, 2025 at 7:51 PM
Reposted by Claire Pershan
Last month, #NothingPersonal gave #WhatsApp a 6/10 for privacy 📱

Good news: they’re now adding encrypted chat backups using fingerprint or face ID.

Progress? Yes. Perfect? Not yet.

See what else needs fixing — and how you can protect your data 👇
🔗 mzl.la/43cIoHK
Whatsapp App Review 2025: Privacy, Pros and Cons, Personal Data
Read our privacy expert's review of the messaging app Whatsapp. While WhatsApp can be used relatively safely, there are some privacy pitfalls lurking beneath the surface. Most of them relate to WhatsA...
mzl.la
November 4, 2025 at 3:50 PM
Reposted by Claire Pershan
Reposted by Claire Pershan
The International Criminal Court is ending its dependency on Big Tech cloud solution by adopting the open-source solution OpenDesk. Univention is part of this process. It is a critical step to insulate international organizations from political pressure.
#opensource
International Criminal Court Kicks Out Microsoft
According to Handelsblatt, the International Criminal Court is kicking out US service providers like Microsoft. And is relying on German alternatives.
www.heise.de
October 30, 2025 at 2:22 PM
Reposted by Claire Pershan
"In the leaked document, Amazon executives warned that transparency was “a one-way door” and advised keeping its projections confidential, even as they feared inviting accusations of a cover-up"

www.source-material.org/amazon-leak-...
Leak reveals Amazon plan to keep water use of data centres secret
Amazon strategised about ways to keep the public in the dark over the true extent of its data centres’ water use, a leaked internal document reveals.
www.source-material.org
October 27, 2025 at 6:04 PM
ec.europa.eu/commission/p...

EC Preliminary Findings - Meta and TikTok in breach of their obligation to grant researchers adequate access to public data under the #DigitalServicesAct
Commission preliminarily finds TikTok and Meta in breach of their transparency obligations under the Digital Services Act
Today, the European Commission preliminarily found both TikTok and Meta in breach of their obligation to grant researchers adequate access to public data under the Digital Services Act (DSA).
ec.europa.eu
October 24, 2025 at 9:56 AM
SOV-8 refers to Environmental Sustainability factors

It's weighted lowest, but still present.
October 24, 2025 at 8:31 AM
Reposted by Claire Pershan
Global Encryption Day is for celebrating the wild idea that maybe platforms could protect us on purpose🔐

Join in the celebration and sign our petition to help protect encryption worldwide ✍️
mzl.la/48GTOag
#encryption
October 21, 2025 at 8:21 PM
Reposted by Claire Pershan
Today's AWS outage, which affected a range of websites and applications—from Signal to Fortnite to key UK government services—reveals the dangers of relying on a handful of Big Tech firms, write Article 19's Corinne Cath and Don Le. These are not glitches; they are democratic failures, they say.
Amazon Cloud Outage Reveals Democratic Deficit in Relying on Big Tech | TechPolicy.Press
The AWS outage demonstrates the need for a fundamental shift in how we think about digital infrastructure, write Corinne Cath and Don Le.
www.techpolicy.press
October 20, 2025 at 2:03 PM
Reposted by Claire Pershan
No noise. All signal. Nothing Personal.

Meet Nothing Personal — a new counterculture magazine from the Mozilla Foundation.

We’re handing the mic to the people rebuilding digital culture from the ground up.

mzl.la/3KOMiQF
#NothingPersonal #MakeGoodTech
October 15, 2025 at 3:27 PM
Reposted by Claire Pershan
Why Feminists Must Defend Encryption
_By Mallory Knodel_ The debate over encryption is more than a tradeoff between online safety and privacy, but it is often framed as such. In a new briefing on encryption and online gender-based violence, coauthored by myself and Chayn’s Hera Hussain, we highlight how public debates are too often dominated by law enforcement and victim narratives, overlooking survivors’ needs and feminist perspectives. As governments advance proposals to weaken encryption in the name of child safety, it’s urgent to center the voices of women, queer people, and gender minorities who rely on secure communication to seek help, organize, and live freely. Our briefing reframes encryption not as an obstacle to safety, but as a lifeline for survivors of online gender-based violence, one that protects privacy and free expression while advancing women’s and LGBTQIA+ rights and safeguarding vulnerable communities. Below is a summary of the full briefing, which you can find here. If you want to keep the discussion going, join us for our MozFest session, details are below this article. ## Sign up for Internet Exchange Feminist perspectives on digital justice and tech Subscribe Email sent! Check your inbox to complete your signup. No spam. Unsubscribe anytime. ### Reframing the Debate For hundreds of years, women have faced patriarchal barriers to education, art, science, business, housing, and autonomy in marriage and motherhood. These freedoms have been controlled by their fathers, brothers, husbands, sons and government officials in male-dominated systems. To protect themselves, women have often chosen to be anonymous, or had anonymity imposed on them. For gender minorities, hiding their gender identity can provide a safer way to explore their sexuality and relationships. Public debate about encryption is often reduced to binary narratives that pit child protection against privacy. Law enforcement and some child protection advocates argue that encryption shields abusers and obstructs investigations, while privacy and digital rights defenders counter that weakening encryption endangers everyone. This framing frames “victims” against “privacy advocates” and leaves little room for nuance.What is missing is the perspective of survivors themselves. Women, queer people, gender minorities, and other at-risk communities rely on encryption as a shield against surveillance, harassment, and retaliation. For them, encrypted communication is not an abstract principle, it is a condition of safety, dignity, and freedom online. ### Key Arguments from the Briefing The briefing makes the case that encryption is not a barrier to safety, but a foundation for human rights and survivor protection. It highlights a set of core arguments that reframe the debate and point toward more effective solutions. * **Encryption protects all human rights** : It safeguards privacy, security, freedom of expression, and access to information. These rights are recognised in international human rights law, including _Article 12_ of the UN’s Universal Declaration of Human Rights, which states that “No one shall be subjected to arbitrary interference with their] privacy, family, home or correspondence, nor to attacks upon [their] honour and reputation." They are also reinforced in the [_International Covenant on Civil and Political Rights_. * **Encryption protects survivors** : It is a lifeline for people experiencing intimate partner violence, stalking, or state repression, and for those seeking reproductive health care in hostile environments. Secure communication allows them to reach out for help without fear of retaliation. * **Encryption enables full lives** : Survivors are more than the harm they have experienced. Encryption and anonymity allow them to live fully: to learn, to voice opinions, create, form relationships, voice opinions and seek support without constant surveillance or fear of retaliation. For example, in countries where domestic violence is minimized or silenced, safe communications are a lifeline: shelters such as the _National Shelter Movement of South Africa_, the _Women Safe House_ in Nigeria, and _AlertGBV_ in Cameroon rely on WhatsApp to connect with women in danger. Weakening encryption would strip away these protections, exposing survivors, activists, and dissidents to greater harm **than the harm posed by those who exploit it.** * **​​Encryption defends rights:** Reproductive rights are an area where encryption, state surveillance and bodily autonomy collide in the most lethal ways. In 2022, unencrypted Facebook messages _were used to prosecute_ a Nebraska teenager and her mother for seeking abortion pills, leading to _prison sentences_. In the years since Roe fell, abortion-related lawsuits and prosecutions have escalated dramatically, underscoring _how dangerous it can be for healthcare providers as well as healthcare seekers when the State apparatus turns against you_ and the urgent need for safe, encrypted communication. * **Failure to access information costs lives:** Encryption is a lifeline in contexts of repression. In Latin America and the Caribbean, _an estimated 3.7 million unsafe abortions_ take place each year, leading to the deaths of nearly 4,000 people. Encrypted tools such as __Aya Contigo__ provide abortion-related information and services while protecting users in Venezuela from state surveillance. Abortion rights are far from the only area where encryption protects people from state repression. A 2023 report by Human Rights Watch found that security forces in _Egypt_ , _Iraq_ , _Jordan_ , _Lebanon_ , and _Tunisia_ targeted queer communities based on their social media and dating app activity, resulting in prosecution, torture, and other offline abuses. * **Alternatives exist** : Weakening encryption is not the answer. Safer approaches include developing content moderation tools that work within encrypted systems, strengthening public institutions that support survivors, investing in prevention through education and safety-by-design, and disrupting the financial networks that enable abuse. ### The Feminist Response We believe that the feminist response is to defend encryption because it protects human rights, especially for women, girls, and gender-diverse people at risk of surveillance, abuse, and repression. To reject binary narratives that pit child protection against privacy, and to challenge tech and policy decisions that ignore the lived experiences of survivors. Feminists working in tech, policy, and frontline services have been clear: _privacy is not a privilege, it’s a necessity_. It enables people to ask for help, avoid retaliation, and seek information safely. It protects activists and journalists. It shields people fleeing domestic violence. It allows LGBTQ+ youth to come out on their own terms. Survivors shouldn’t have to choose between their safety and their right to be online and communicate privately. * Survivor-centered groups have built tools and guidance to support this reality. The National Network to End Domestic Violence (NNEDV) and Tech Safety published _encryption basics for programs serving survivors of gender-based violence_, because secure communication can be the difference between reaching out and staying silent. * Feminist technologists are also shaping internet standards to protect people from harm. Work at the IETF on unwanted Bluetooth tracking devices emerged from concerns about stalkerware and coercive control. Civil society, including CDT and NNEDV, pushed for _cross-platform protections_ now being implemented by Apple and Google. * At the infrastructure level, the IEEE 2987 standard is an early but important step in codifying _technology-assisted responses to GBV_, combining technical expertise with survivor-informed practices. The call to action here is that feminist technologists can and should show up to these decision making spaces with their unique competencies and expertise to put forward technical designs that go beyond keeping vulnerable communities safe: feminist technology is for everyone. ### Why This Matters for Policymakers and the Public Weakening encryption undermines more than privacy. It destabilizes the entire human rights framework. For survivors, queer communities, and other at-risk groups, secure communication can mean the difference between safety and silence. Encryption is also a democratic safeguard, restoring boundaries between individuals and institutions. Surveillance-driven solutions may promise safety, but they expose survivors to greater harm and ignore systemic failures. A survivor-centered, rights-based approach shows that protecting encryption is not a tradeoff but the most effective way to uphold dignity, freedom, and security for all. We should also remember that children’s rights include privacy. Encryption protects them today and safeguards the adults they will become, enabling dissent, activism, and security in the future. * * * ## Encryption and Feminism: Reimagining Child Safety Without Surveillance Continue the conversation about encryption as a feminist issue with IX at MozFest in Barcelona: **November 8, 2025 at 13:30 CET.** Our session, with speakers including Chayn’s Hera Hussain, Superbloom’s Georgia Bullen, and IX's Mallory Knodel, will explore how current narratives around “child safety” are being used to justify surveillance and weaken encryption, and how feminist approaches to care, autonomy, and dignity can help us imagine alternative models. Together with audience voices, we’ll co-create emerging Feminist Principles for Encryption & Child Safety. Get 10% off MozFest tickets with code EXCHANGE ****Support the Internet Exchange**** If you find our emails useful, consider becoming a paid subscriber! You'll get access to our members-only Signal community where we share ideas, discuss upcoming topics, and exchange links. Paid subscribers can also leave comments on posts and enjoy a warm, fuzzy feeling. Not ready for a long-term commitment? You can always leave us a tip. Become A Paid Subscriber ## From the Group Chat 👥 💬 _This week in the group chat, we talked about..._ The Danish Minister of Justice and chief architect of the current Chat Control proposal, Peter Hummelgaard, said the quiet part out-loud: “We must break with the totally erroneous perception that it is everyone’s civil liberty to communicate on encrypted messaging services.” If you’re in Europe, Fight Chat Control invites you to share your thoughts about the "Chat Control" proposal with your MEP. On their site, you can see which states are backing the proposal and how to contact your representatives. _https://fightchatcontrol.eu_ If Hummelgaard gets his wish, make sure to say “hello” to your friendly Europol officer every time you send an “encrypted” message, just in case they’re reading along. _Want to join our group chat?__Become a paid subscriber_ _._ * * * ## This Week's Links ### Open Social Web * How did you join the Fediverse? One of the important projects for the Social Web Foundation is developing a Fediverse Starter page, helping people get onto the social web. As part of this work, we are conducting user interviews with current Fediverse users to get to know how they joined up and what their experience has been so far. Get in touch if you’d like to be interviewed: _https://socialwebfoundation.org/2025/09/10/how-did-you-join-the-fediverse_ ### Internet Governance * W3C has released a draft Digital Credentials API that lets browsers handle digital IDs with user consent, encrypted responses, selective disclosure, and safeguards against misuse. _https://www.w3.org/TR/digital-credentials_ * The US should amend the CLOUD Act to block the UK’s efforts to weaken Apple’s encryption and protect global privacy, argue Bob Goodlatte and Greg Nojeim. _https://www.techpolicy.press/leverage-the-cloud-act-to-protect-encryption_ * While some US politicians have recently characterized European platform and social media regulation laws as “censorship” of speech, this isn't true argues Daphne Keller, an Internet law expert with a twenty-year history of resisting cross-border internet speech suppression demands. _https://cyberlaw.stanford.edu/about/people/daphne-keller_ * Brazil’s new AI strategy reveals a political battle between Big Tech, industry, and civil society, with labor rights sidelined in the race for digital sovereignty. _https://bristoluniversitypressdigital.com/view/journals/gpe/aop/article-10.1332-26352257Y2025D000000037/article-10.1332-26352257Y2025D000000037.xml_ * Keep up with the latest on the Geedge & MESA Leak, the largest-ever Great Firewall document dump, with over 500 GB of source code and internal records available for download and analysis. _https://gfw.report/blog/geedge_and_mesa_leak_ ### Digital Rights * The UN Commission of Inquiry finds “direct evidence of genocidal intent” in Israel’s actions in Gaza. The report documents mass killings, destruction of infrastructure, and starvation, alongside social media posts from Israeli officials and soldiers that both incite violence and serve as evidence of atrocities. _https://www.ohchr.org/sites/default/files/documents/hrbodies/hrcouncil/sessions-regular/session60/advance-version/a-hrc-60-crp-3.pdf_ * Police departments testing Axon’s AI tool to draft reports have been quietly disabling safeguards meant to reveal when the reports were written by artificial intelligence. _https://www.marketplace.org/episode/2025/09/04/police-depts-are-quietly-disabling-ai-report-safeguards_ * Sir Keir Starmer has confirmed for the first time that the government is looking at digital ID as a way to tackle illegal immigration. File under: We told you so. Now that digital ID is on the table for kids, it's coming for literally everyone. _https://www.bbc.co.uk/news/articles/c5y5379djl3o_ * Clay Higgins sent a letter to Bluesky and other social media sites threatening investigations if they don't censor speech critical of Charlie Kirk. https://bsky.app/profile/esqueer.net/post/3lyyqtzb7ns2m ### Technology for Society * Massive Attack turned a concert into a facial recognition surveillance experiment, scanning the crowd to make creepy art that forces fans to confront the realities of surveillance culture. _https://www.gadgetreview.com/massive-attack-turns-concert-into-facial-recognition-surveillance-experiment_ * After a “cruel summer” of AI harms, Alondra Nelson argues the US should adopt an Ethical, Legal, and Social Implications (ELSI) model for AI. _https://www.science.org/doi/10.1126/science.aeb0393_ * A recording of _Educating an A(ctivist) Intelligence_ explores radical AI education as civic protection, echoing Ars Electronica’s call for a “digital immune system” instead of fear. _https://www.youtube.com/watch?v=494fkSzBd3A_ * Report by ECOS with Open Future finds that data centre expansion risks derailing climate goals and proposes how to fix it. An analysis of the environmental impacts of data centres, the solutions to this, and possible EU policy responses. _https://ecostandard.org/publications/data-centres_ * Responsible tech is simultaneously maturing and fragmenting, rewarding those who can translate between policy, technical, and business demands to turn governance into shippable, trustworthy products, finds the All Tech Is Human 2025 job market report. _https://alltechishuman.org/responsible-technology-workforce-series_ * In peddling "AI for Social Good" initiatives, technology companies and philanthropies are suggesting that complex political, historical, and social issues can be reduced to technical problems. But given how today's AI systems work, there is no reason we should believe them – and much reason to be suspicious of their claims, writes former _IX contributor_ Abeba Birhane. _https://www.project-syndicate.org/magazine/ai-for-social-good-false-promise-of-technosolutionism-by-abeba-birhane-2025-09_ ### Privacy and Security * AI chatbots pose greater privacy risks than online tracking because their conversational format encourages people to share more personal details, revealing not just interests but also thought processes, communication styles, and intimate aspects of personality. We should ban AI surveillance while there’s still time, says DuckDuckGo CEO Gabriel Weinberg. _https://gabrielweinberg.com/p/ai-surveillance-should-be-banned_ * This article uses the Investigatory Powers (Amendment) Act 2024 to show how government surveillance of communications has changed since the original 2016 law, finding that the government has moved from directly intercepting communications to relying more on private companies that control data, devices, and analysis tools. _https://www.tandfonline.com/doi/full/10.1080/09615768.2025.2551419#d1e81_ * The Swedish VPN provider Mullvad has enhanced WireGuard with a new obfuscation method based on the QUIC protocol to bypass restrictive firewalls. _https://www.cnet.com/tech/services-and-software/mullvad-vpn-now-adds-quic-protocol-to-get-around-firewalls-and-censorship_ * A new paper from researchers at Northeastern University shows how the convenience of eSIMs hides serious privacy and security risks, from opaque resellers to hidden data routing across jurisdictions, leaving users with far less control than they think. _https://www.usenix.org/system/files/usenixsecurity25-motallebighomi.pdf_ ### Upcoming Events * Let Them Eat Compute: Computer Says Maybe Climate Week Livestream. **September 24, 5pm EST. Online.**_https://luma.com/l7m3nzzn_ * #PrivacyCamp25: The draft program is now out! **September 30. Online and La Tricoterie, Brussels.**_https://privacycamp.eu/2025/08/07/privacycamp25-the-draft-programme-is-out-now_ * topDNS Best Practice Series: How is DNS Abuse actually measured? **October 8, 4pm BST. Online.** _https://register.gotowebinar.com/register/4755079276624283741_ * _The Future of Democracy_. A high-level two-day conference of leading thinkers, lawmakers, technologists, and advocates to discuss the direct and growing threats to our democracies and basic liberties posed by today’s dominant online communications platforms, the rise of AI, and interference by foreign states. **October 15-16, Brussels.**_https://www.eventbrite.com/e/the-future-of-democracy-tickets-1683592312929?discount=SPEECHANDPOWER_ * The Global DPI Summit brings together innovators and policymakers to turn dialogue into action, driving safe and inclusive digital public infrastructure through keynotes, panels, and interactive workshops. **November 4-6. Cape Town, SA.**_https://www.globaldpisummit.org_ * FOSS Backstage. Join to learn more about what makes Free and Open Source Software projects flourish! **March 16-17. Berlin, Germany.******_https://26.foss-backstage.de_ ### Careers and Funding Opportunities * Patagonia: Principal, Head of AI. **Ventura, CA.**_https://careers.patagonia.com/us/en/job/JOB-REQ-10876/Principal-Head-of-AI_ * Gates Foundation: AI Fellows. Apply by **September 20.** **Seattle, WA.**_https://gatesfoundation.wd1.myworkdayjobs.com/en-US/Gates/job/Seattle-WA/AI-Fellows--12-month-LTE--_B021159-1?source=gatesfoundation.org_ * Internet Security Research Group: Director of Advancement. **Remote US**. _https://internetsecurityresearchgroup.applytojob.com/apply/AvkVl7VtMR/Director-Of-Advancement_ * Jobs for the Future (JFF): Vice President, Center for AI. **Boston, DC, Oakland, or Remote US.**_https://job-boards.greenhouse.io/jobsforthefuture/jobs/8069367002?gh_src=kbXfCo_ * CYBERSTAND.eu: 8th Specific Service Procedure (SSP). Pays experts to directly contribute to shaping the technical standards that will implement the EU’s Cyber Resilience Act. **Europe.** Apply by **September 19**. _https://cyberstand.eu/8th-specific-service-procedure_ * Tony Blair Institute for Global Change: Senior Policy Advisor - AI Policy & Governance. **London, UK.** Apply by**October 3.**_https://www.linkedin.com/jobs/view/4292798851_ * BlueDot Impact: Tech Lead. **London, UK.** _https://bluedot.org/join-us/tech-lead_ * ICO: Principal Policy Adviser – AI and ADM Code of Practice. **Wilmslow, London, Edinburgh, Cardiff or Belfast, UK**. _https://ico.wd3.myworkdayjobs.com/en-GB/ICO/details/Principal-Policy-Adviser—AI-and-ADM-Code-of-Practice_JR606_ * The Nominet DNS Fund seeks to fund open source projects that support the Domain Name System (DNS). **International**. Apply by **October 26.** _https://nominet.uk/blog/introducing-the-nominet-dns-fund-supporting-the-vital-work-of-the-open-source-community_ _What did we miss? Please send us a reply or write to_ _editor@exchangepoint.tech_ _._ 💡 Want to see some of our week's links in advance? Follow us on Mastodon, Bluesky or LinkedIn, and don't forget to forward and share! ##
internet.exchangepoint.tech
September 24, 2025 at 2:55 PM
Reposted by Claire Pershan
Perplexity, despite its modest size, gave $1M to Trump’s inaugural - so this tracks.
August 6, 2025 at 8:56 PM
Reposted by Claire Pershan
From Africa to Asia, a movement is threatening Big Tech's business model of harvesting data abroad while keeping profits at home

New from @tarykuh.bsky.social:
restofworld.org/2025/big-tec...
Why Big Tech is threatened by a global push for data sovereignty
Countries are forcing tech giants to store citizen data locally, challenging the standard business model of harvesting data abroad while keeping profits at home.
restofworld.org
July 9, 2025 at 1:29 PM
Reposted by Claire Pershan
BEUC is currently looking for a Digital Policy officer to reinforce its Digital Team. Reporting directly to the Head of Digital Policy, you will be in charge of coordinating BEUC’s advocacy work on simplification of the EU digital rulebook and supporting team members on specific files.
Vacancy: Digital Policy Officer
BEUC – The European Consumer Organisation is currently looking for a Digital Policy officer to reinforce its Digital Team in Brussels, Belgium.
www.beuc.eu
July 17, 2025 at 10:29 AM
Reposted by Claire Pershan
#SHEIN was fined €40 million by French authorities on Thursday after an investigation found the Chinese fast-fashion giant had misled #consumers about its discounts and environmental impact. 🎉

Source […]
Original post on eupolicy.social
eupolicy.social
July 3, 2025 at 4:58 PM
Reposted by Claire Pershan
📢 Big news for platform researchers across Europe and beyond:

Today, the @ec.europa.eu adopted the Delegated Act for Article 40 of the Digital Services Act (DSA) – a long-anticipated milestone enabling researchers to request access to non-public platform data under Article 40.4.
July 2, 2025 at 6:28 PM
Reposted by Claire Pershan
"Cloudflare will now block AI crawlers by default—a quiet but radical reversal of the status quo where bots could crawl first and ask questions never" #infrastructure www.linkedin.com/posts/radsch...
Big news from Cloudflare today as it took a decisive step in the escalating war between publishers/website owners and AI companies that have treated the open web as a limitless, consequence-free… | Co...
Big news from Cloudflare today as it took a decisive step in the escalating war between publishers/website owners and AI companies that have treated the open web as a limitless, consequence-free train...
www.linkedin.com
July 2, 2025 at 6:00 AM
Looking forward to the discussion!
"Regulating #disinformation: How much is too much?" 👉 Panel 3️⃣ of the #RECLAIM Final Conference will focus on the EU's efforts to counter fake news📲

With @luisbouzagarcia.bsky.social, @clairepershan.bsky.social, Anja Wyrobek & @simplyshada.bsky.social🎤

Register here ➡️ forms.gle/tRCZpRVQBhqj...
June 24, 2025 at 1:37 PM
Among AliExpress's announced binding commitments:

A commitment to enable researchers who meet the criteria set out in Article 40.12 #DSA to independently access and use public data to analyse systemic risks via automated means, such as ‘data scraping’.

digital-strategy.ec.europa.eu/en/news/comm...
Commission makes AliExpress’ commitments under the Digital Services Act binding
The Commission has made binding AliExpress’ commitments to address concerns raised in formal proceedings under the Digital Services Act (DSA).
digital-strategy.ec.europa.eu
June 18, 2025 at 6:01 PM
Reposted by Claire Pershan
🧵How TikTok failed Polish democracy during the 2025 Presidential Election

Our new investigation exposes serious gaps in TikTok's election content moderation that disproportionately harmed the Polish diaspora : aiforensics.org/work/tiktok-...
Tiktok's Polish Elections Labels: Only Sometimes, And Only For Some
Our investigation reveals TikTok's systematic failures in applying election information labels during Poland's 2025 Presidential Election. The platform excluded 20+ million Polish diaspora users from ...
aiforensics.org
June 9, 2025 at 1:19 PM
Reposted by Claire Pershan
Supported by @mozilla.org, this report argues that in light of the changing AI landscape and recent geopolitical shifts, the UK’s strongest bet for realising its AI ambitions for sovereignty, deployment, and influence is to lean into open-source. 🔓
June 5, 2025 at 8:33 AM
Reposted by Claire Pershan
In a recent report, Human Rights Watch documented how major companies operating in the US are misclassifying gig workers as independent contractors.

Hear more from experts on "The Gig Trap" and labor rights ⤵️
May 27, 2025 at 6:26 PM
Reposted by Claire Pershan
Happy #WorldInternetDay from Taiwan's Cyber Ambassador, first Digital Minister, and Mozilla Foundation's newest, Senior Advisor, @audreyt.org 🥳 More to come from Audrey 🔜
May 17, 2025 at 1:45 PM