<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	
	>
<channel>
	<title>
	Comments on: #AxisOfEasy 255: CRTC Chair Ian Scott Confirms Bill C-11 Can Be Used To Pressure Internet Platforms To Manipulate Algorithms	</title>
	<atom:link href="https://axisofeasy.com/aoe/axisofeasy-255-crtc-chair-ian-scott-confirms-bill-c-11-can-be-used-to-pressure-internet-platforms-to-manipulate-algorithms/feed/" rel="self" type="application/rss+xml" />
	<link>https://axisofeasy.com/aoe/axisofeasy-255-crtc-chair-ian-scott-confirms-bill-c-11-can-be-used-to-pressure-internet-platforms-to-manipulate-algorithms/?pk_campaign=feed&#038;pk_kwd=axisofeasy-255-crtc-chair-ian-scott-confirms-bill-c-11-can-be-used-to-pressure-internet-platforms-to-manipulate-algorithms&#038;utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=axisofeasy-255-crtc-chair-ian-scott-confirms-bill-c-11-can-be-used-to-pressure-internet-platforms-to-manipulate-algorithms</link>
	<description>Rapid Coverage of a World Gone Full Cyberpunk</description>
	<lastBuildDate>Wed, 20 Jul 2022 15:07:57 +0000</lastBuildDate>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.9.4</generator>
	<item>
		<title>
		By: Mike Kieres		</title>
		<link>https://axisofeasy.com/aoe/axisofeasy-255-crtc-chair-ian-scott-confirms-bill-c-11-can-be-used-to-pressure-internet-platforms-to-manipulate-algorithms/?pk_campaign=feed&#038;pk_kwd=axisofeasy-255-crtc-chair-ian-scott-confirms-bill-c-11-can-be-used-to-pressure-internet-platforms-to-manipulate-algorithms/#comment-126234</link>

		<dc:creator><![CDATA[Mike Kieres]]></dc:creator>
		<pubDate>Wed, 20 Jul 2022 15:07:57 +0000</pubDate>
		<guid isPermaLink="false">https://axisofeasy.com/?p=26166#comment-126234</guid>

					<description><![CDATA[A guess on the quote this week - Salvadore Dali]]></description>
			<content:encoded><![CDATA[<p>A guess on the quote this week &#8211; Salvadore Dali</p>
]]></content:encoded>
		
			</item>
		<item>
		<title>
		By: Jake Dee		</title>
		<link>https://axisofeasy.com/aoe/axisofeasy-255-crtc-chair-ian-scott-confirms-bill-c-11-can-be-used-to-pressure-internet-platforms-to-manipulate-algorithms/?pk_campaign=feed&#038;pk_kwd=axisofeasy-255-crtc-chair-ian-scott-confirms-bill-c-11-can-be-used-to-pressure-internet-platforms-to-manipulate-algorithms/#comment-126233</link>

		<dc:creator><![CDATA[Jake Dee]]></dc:creator>
		<pubDate>Wed, 20 Jul 2022 08:06:21 +0000</pubDate>
		<guid isPermaLink="false">https://axisofeasy.com/?p=26166#comment-126233</guid>

					<description><![CDATA[The China&#039;s Security State story has an interesting little inconsistency;
&quot;Security researchers say the leaked database, apparently used by the police in Shanghai, had been left online and unsecured for months. It was exposed after an anonymous user posted in an online forum offering to sell the vast trove of data for 10 Bitcoin, or about $200,000&quot;
That doesn&#039;t seem to me to be a &quot;leak&quot;, in fact in the linked story it&#039;s specifically called a &quot;hack&quot; as in;
&quot;Chinese Police Database Was Left Unsecured Long Before Hackers
 Seized It &quot;
This eliding between a leak that you can passively pick up and a hack that you actively go out to make is important. There was a lot of debate as to whether the DNC emails were leaked from the inside or hacked from the outside, it&#039;s politically significant.
The Xinjiang Uyughar files where presented as &quot;leaks&quot; even though no evidence to support that claim has been given. If they were hacked by Western intelligence the story becomes very different.]]></description>
			<content:encoded><![CDATA[<p>The China&#8217;s Security State story has an interesting little inconsistency;<br />
&#8220;Security researchers say the leaked database, apparently used by the police in Shanghai, had been left online and unsecured for months. It was exposed after an anonymous user posted in an online forum offering to sell the vast trove of data for 10 Bitcoin, or about $200,000&#8221;<br />
That doesn&#8217;t seem to me to be a &#8220;leak&#8221;, in fact in the linked story it&#8217;s specifically called a &#8220;hack&#8221; as in;<br />
&#8220;Chinese Police Database Was Left Unsecured Long Before Hackers<br />
 Seized It &#8221;<br />
This eliding between a leak that you can passively pick up and a hack that you actively go out to make is important. There was a lot of debate as to whether the DNC emails were leaked from the inside or hacked from the outside, it&#8217;s politically significant.<br />
The Xinjiang Uyughar files where presented as &#8220;leaks&#8221; even though no evidence to support that claim has been given. If they were hacked by Western intelligence the story becomes very different.</p>
]]></content:encoded>
		
			</item>
		<item>
		<title>
		By: Matthew O'Connor		</title>
		<link>https://axisofeasy.com/aoe/axisofeasy-255-crtc-chair-ian-scott-confirms-bill-c-11-can-be-used-to-pressure-internet-platforms-to-manipulate-algorithms/?pk_campaign=feed&#038;pk_kwd=axisofeasy-255-crtc-chair-ian-scott-confirms-bill-c-11-can-be-used-to-pressure-internet-platforms-to-manipulate-algorithms/#comment-126232</link>

		<dc:creator><![CDATA[Matthew O'Connor]]></dc:creator>
		<pubDate>Wed, 20 Jul 2022 02:32:38 +0000</pubDate>
		<guid isPermaLink="false">https://axisofeasy.com/?p=26166#comment-126232</guid>

					<description><![CDATA[&quot;I put my heart and my soul into my work, and have lost my mind in the process.” was this Mary Shelly in &#039;frankenstein&#039;?]]></description>
			<content:encoded><![CDATA[<p>&#8220;I put my heart and my soul into my work, and have lost my mind in the process.” was this Mary Shelly in &#8216;frankenstein&#8217;?</p>
]]></content:encoded>
		
			</item>
		<item>
		<title>
		By: Tricia		</title>
		<link>https://axisofeasy.com/aoe/axisofeasy-255-crtc-chair-ian-scott-confirms-bill-c-11-can-be-used-to-pressure-internet-platforms-to-manipulate-algorithms/?pk_campaign=feed&#038;pk_kwd=axisofeasy-255-crtc-chair-ian-scott-confirms-bill-c-11-can-be-used-to-pressure-internet-platforms-to-manipulate-algorithms/#comment-126231</link>

		<dc:creator><![CDATA[Tricia]]></dc:creator>
		<pubDate>Wed, 20 Jul 2022 00:06:49 +0000</pubDate>
		<guid isPermaLink="false">https://axisofeasy.com/?p=26166#comment-126231</guid>

					<description><![CDATA[Quote was by Vincent Van Gogh]]></description>
			<content:encoded><![CDATA[<p>Quote was by Vincent Van Gogh</p>
]]></content:encoded>
		
			</item>
	</channel>
</rss>
