**[The requisition of garbage collectors began in Paris following the mobilization against the pension reform. After a refusal from the mayor of Paris, we learned in the press that the prefect of Paris has retrieved the contact details of the agents to requisition them. The method raises questions.](** (Automatic translation) [@privacy]( > In addition to the conditions of urgency and breach of good order or health, it is clearly specified that an order is required to requisition any goods or services . In the case of the garbage collectors in Paris, it is their personal data that has been transmitted to the prefecture. The problem is that it seems difficult to qualify the list of service agents as a good. In any case, this raises questions. > > Recently the CNIL recalled the rules for the sale of files when Camaieu was put up for sale. The CNIL specified for example that this was possible but that informing people was important. > > In the case of garbage collectors, the situation is all the more complex as there was no requisition order until after the transmission of the list of 4000 agents of the city of Paris. The provisions of the General Code of Local Authorities on requisition have not been updated since the GDPR and seem quite obsolete. > > If we were in the context of a requisition, the basis of lawfulness of the mayor of Paris would probably have been the legal obligation. However, a recital of the GDPR on requisitions by public authorities casts doubt on the legality of the operation since recital 31 in question indicates that requisitions of this type "should not relate to the entirety of a file » . > > If the transmission of data had come within the scope of this recital, this would potentially mean that the request for all the names and addresses of the cleaning service agents could have posed a problem since it could have been considered that it related to the entire file. This would have remained at the discretion of the CNIL as the supervisory authority. ### [Linked here is the full post written by ]( [@David]( ### [![]( "")](

According to [libreddit]( > Official instance ( > > The official instance is hosted at And it's also still listed on [libreddit-instances]( But Today it hadn't worked for me at all.

Exposed data include patient names, birth dates, insurance information, and people's responses to mental health self-evaluations.

**Datenschutz ist in jedem Alter wichtig**. Darum baut das Lehrmittel auf Grundwissen auf, das Kinder ab dem Kindergartenalter stufengerecht erwerben. Es wurden **Lehrmittel** für die Zyklen 1-3 der Volksschule entwickelt, die den Schutz der **Privatsphäre** zum Thema haben und eine spielerische, altersgerechte Vermittlung der Inhalte ermöglichen.

Energized GitHub has been unmaintained since few months, and is showing 404 error on HOSTS files. Here is a copy of Energized Ultimate HOSTS file, and alternative HOSTS ruleset providers to consider.
cross-posted from: > The HOSTS ruleset has been not maintained for a while, and that is not very helpful. This is a copy of Energized Ultimate from April 2022 that I am still using just fine. > > The various lists that Energized project used in combination can still be referenced. > > I think **1Hosts PRO** is a good replacement, but try Lite or Pro whichever you prefer. You may try combining other HOSTS lists with this if you want to, and are technically adept enough. > > Another good option is **AdAway**, but you might need to combine other lists with it to have competent blocking compared to Energized. > > You also need to reference, download and merge spam and phishing lists manually if you want extra protection, unless you want to rely solely on DNS providers. I prefer having both HOSTS ruleset systemwide and a DNS provider, then whatever network firewalling/tunnelling is needed.

Calling the FBI’s past abuses of Section 702 “egregious,” Darin LaHood—who is leading the House Intelligence Committee's working group pushing to reauthorize Section 702 amid a steeply divided Congress—said that “ironically,” being targeted by the FBI gives him a “unique perspective” on “what’s wrong with the FBI.”

“Our facial age estimation is a privacy-preserving solution," says Julie Dawson, chief policy and regulatory officer at Yoti.

cross-posted from: > [r/Futurology](

Third-party doctrine - Wikipedia
The third-party doctrine is a United States legal doctrine that holds that people who voluntarily give information to third parties—such as banks, phone companies, internet service providers (ISPs), and e-mail servers—have "no reasonable expectation of privacy" in that information. A lack of privacy protection allows the United States government to obtain information from third parties without a legal warrant and without otherwise complying with the Fourth Amendment prohibition against search and seizure without probable cause and a judicial search warrant.[1]

You are not just being tracked by a network of cameras, new tech can also detect who has been with you. US-based firm Vintra sells its co-appearance feature to the San Francisco 49ers, the IRS and police departments across the country, and the Chinese government uses co-appearance to spot protesters and dissidents.

Kind reminder: your whole internet traffic, encryption, backups, communication, shopping, writings, business interaction, etc are transferred through your router. Many internet service providers across Europe impose their own routers to consumers. This is a clear contradiction with the 🌐 Net Neutrality principle.

France aims to protect kids from parents oversharing pics online
**[PARIS — French parents had better think twice before posting too many pictures of their offspring on social media](** [@privacy]( > "The message to parents is that their job is to protect their children's privacy," Bruno Studer, an MP from President Emmanuel Macron's party who put the bill forward, said in an interview. "On average, children have 1,300 photos of themselves circulating on social media platforms before the age of 13, before they are even allowed to have an account," he added **[By LAURA KAYALI on Politico](**

How is it possible that NSA recorded nearly every cell phone conversation in the Bahamas, without th
cross-posted from: > The NSA recording nearly every cell phone conversation in the Bahamas, without the Bahamian government's permission, and similar programs in Kenya, the Philippines, Mexico and Afghanistan. > > From Wikipedia > > Did NSA have to hack every cell tower in the Bahamas?

    Create a post

    A place to discuss privacy and freedom in the digital world.

    Privacy has become a very important issue in modern society, with companies and governments constantly abusing their power, more and more people are waking up to the importance of digital privacy.

    In this community everyone is welcome to post links and discuss topics related to privacy.

    Some Rules

    • Posting a link to a website containing tracking isn’t great, if contents of the website are behind a paywall maybe copy them into the post
    • Don’t promote proprietary software
    • Try to keep things on topic
    • If you have a question, please try searching for previous discussions, maybe it has already been answered
    • Reposts are fine, but should have at least a couple of weeks in between so that the post can reach a new audience
    • Be nice :)

    Related communities

    Chat rooms

    much thanks to @gary_host_laptop for the logo design :)

    • 1 user online
    • 2 users / day
    • 5 users / week
    • 29 users / month
    • 227 users / 6 months
    • 37 subscribers
    • 1.98K Posts
    • Modlog
    A community of privacy and FOSS enthusiasts, run by Lemmy’s developers

    What is


    1. No bigotry - including racism, sexism, ableism, homophobia, transphobia, or xenophobia. Code of Conduct.
    2. Be respectful. Everyone should feel welcome here.
    3. No porn.
    4. No Ads / Spamming.

    Feel free to ask questions over in: