top of page
Search

Week 11 | Censorship and privacy

Writer: zeyad kenawizeyad kenawi

Words are very powerful but most importantly is to find people who listen to it and have the availability and growth between people now it becomes very powerful and sometimes dangerous. With censorship I picked up a very recent interesting incident about Trump's ban. After the Election's results were announced with the defeat of Donald Trump and his furious reaction to it with refusing to accept the defeat. Almost all of the social media platforms banned him permanently from speaking to his followers. To the extent that even when a new platform was created and he registered himself there the cloud provider Amazon shutdown this newly created platform's servers with the removal of the app from the smartphones app stores like google play and apple's store[1]. These actions were very concentrated towards banning any kind of appearance for Donald trump outside his website. This kind of systematic ban for his appearance was suspicious and increased his claims on tech giants and the "Fake news" campaign that he encouraged but at the other side all of these bans got him isolated from the people and nobody heard from him again after what happened at the Congress as if it's a punishment and we can see here the power of having big companies controlling most of the internet outlets and famous reaching tools and how it can impact politics. Privacy on the internet is a topic that keeps catching attention after every big incident that gets spoiled to the public and people get angry of how their data is being used.

The incident is interesting and somehow funny and it's very recent in Estonia. Some residents with ID cards couldn't sign in to eesti.ee portal with their ID card because the government had a data breach regarding them and the thing that was leaked was their personal photo. These, totaling 286,438, had been downloaded en masse from 9,000 different domestic and foreign IP addresses, using a malware network and forged digital certification and taking advantage of a vulnerability, Noormaa said, adding that digitally-stored photos were the only data the hacker had been able to obtain; no database had been compromised.[2] _______________________________________________________ [1] https://www.reuters.com/article/us-amazon-com-parler-idUSKBN29G282

 
 
 

Recent Posts

See All

Week 13 | Linux distros

I will pick two of the most famous distros we have and I tried both which are Manjaro and Ubuntu Desktop. Most users of these two distros...

Week 12 | Hackerdom

I think the values of a community should set the general rules of how the actions and events or activity should be done. Pekka Himanen...

Comments


+372 57843711

©2021 by Zeyad Kenawi's personal blog. Proudly created with Wix.com

bottom of page