10 interesting stories served every morning and every evening.
From the beginning, our goal has been to build tools that radically change what it feels like to work with Python — tools that feel fast, robust, intuitive, and integrated.
Today, we’re taking a step forward in that mission by announcing that we’ve entered into an agreement to join OpenAI as part of the Codex
team.
Over the past few years, our tools have grown from zero to hundreds of millions of downloads per month across Ruff, uv, and
ty. The Astral toolchain has become foundational to modern Python development. The numbers — and the impact — went far beyond my most ambitious expectations at every step of the way.
Open source is at the heart of that impact and the heart of that story; it sits at the center of everything we do. In line with our philosophy and
OpenAI’s own announcement, OpenAI will continue supporting our open source tools after the deal closes. We’ll keep building in the open, alongside our community — and for the broader Python ecosystem — just as we have from the start.
I view building tools as an incredibly high-leverage endeavor. As I wrote in our
launch post three years ago: “If you could make the Python ecosystem even 1% more productive, imagine how that impact would compound?”
Today, AI is rapidly changing the way we build software, and the pace of that change is only accelerating. If our goal is to make programming more productive, then building at the frontier of AI and software feels like the highest-leverage thing we can do.
It is increasingly clear to me that Codex is that frontier. And by bringing Astral’s tooling and expertise to OpenAI, we’re putting ourselves in a position to push it forward. After joining the Codex team, we’ll continue building our open source tools, explore ways they can work more seamlessly with Codex, and expand our reach to think more broadly about the future of software development.
Through it all, though, our goal remains the same: to make programming more productive. To build tools that radically change what it feels like to build software.
On a personal note, I want to say thank you, first, to the Astral team, who have always put our users first and shipped some of the most beloved software in the world. You’ve pushed me to be a better leader and a better programmer. I am so excited to keep building with you.
Second, to our investors, especially
Casey Aylward from Accel, who led our Seed and Series A, and Jennifer Li from Andreessen Horowitz, who led our Series B. As a first-time, technical, solo founder, you showed far more belief in me than I ever showed in myself, and I will never forget that.
And third, to our users. Our tools exist because of you. Thank you for your trust. We won’t let you down.
...
Read the original on astral.sh »
About Kagi Log in Try for free
...
Read the original on translate.kagi.com »
“They pulled me out instead and began jumping on my back,” he said. “Then they took me to a corner and questioned me about who had been in the car. I told them it was my mother and father. They accused me of lying and started beating me.”
...
Read the original on www.bbc.com »
The verdict was the icing on the cake.
Afroman did not defame Ohio cops in a satirical music video that featured footage of them fruitlessly raiding the rapper’s house, a jury found on Wednesday.
The 51-year-old “Because I Got High” rapper, whose real name is Joseph Foreman, held up his hands in triumph and hugged people in the courtroom after he was found not liable for defamation, or invasion of privacy false light publicity.
Foreman was sued by the Adams County Sheriff’s Office over a drug search at his home in August 2022 that resulted in no criminal charges.
The hip hop star wrote the satirical song “Lemon Pound Cake” and made a music video with real footage of the raid taken from his home surveillance cameras to raise money for property damage caused during the search, he has said.
Seven cops with the sheriff’s office then sued him in March 2023, alleging the music video defamed them, invaded their constitutional privacy, and was an intentional infliction of emotional distress.
The video features footage of the cops busting down his door during, and of one officer eyeing his “mama’s lemon poundcake” with his gun drawn.
After making the music video, Foreman allegedly continued putting up social media posts with names of the officers involved, the lawsuit states.
Several of the posts allegedly falsely claimed that the cops “stole my money” and were “criminals disguised as law enforcement,” according to the suit.
They also falsely stated that the officers are “white supremacists,” that Officer Brian Newman “used to do hard drugs” before “snitching” on his friends, and that Officer Lisa Phillips is “biologically male,” according to the lawsuit.
Foreman’s lawyer had argued the song, which he described as a combination of comedy and music, was simply free speech.
“We see public officials all the time that are made fun of,” lawyer David Osborne said in a closing statement Wednesday. “They are going to be held to higher standards, their work is going to be criticized, that’s just what happens when you’re a public official.”
“It’s a social commentary on the fact that they didn’t do things correctly,” he said of the officers.
An attorney for the police, meanwhile, demanded a total of $3.9 million in damages — divided among the seven officers involved.
“[Foreman] perpetuated lies intentionally repeatedly over 3 1/2 years on the internet about these seven brave deputy sheriffs,” lawyer Robert Klingler said in closing remarks Wednesday. “[He] knew that what he posted on the internet were lies.”
“He says he’s not going to stop…tell him through your verdict that he needs to stop,” Klingler added.
“All of this is their fault,” Foreman testified in court Tuesday, according to WCPO.
“If they hadn’t wrongly raided my house, there would be no lawsuit, I would not know their names, they wouldn’t be on my home surveillance system, and there would be no songs … my money would still be intact.”
...
Read the original on nypost.com »
Zen gives you access to a handpicked set of AI models that OpenCode has tested and benchmarked specifically for coding agents. No need to worry about inconsistent performance and quality across providers, use validated models that work.
...
Read the original on opencode.ai »
The “advanced flow” will be available before verification enforcement begins later this year.
Google is planning big changes for Android in 2026 aimed at combating malware across the entire device ecosystem. Starting in September, Google will begin restricting application sideloading with its developer verification program, but not everyone is on board. Android Ecosystem President Sameer Samat tells Ars that the company has been listening to feedback, and the result is the newly unveiled advanced flow, which will allow power users to skip app verification.
With its new limits on sideloading, Android phones will only install apps that come from verified developers. To verify, devs releasing apps outside of Google Play will have to provide identification, upload a copy of their signing keys, and pay a $25 fee. It all seems rather onerous for people who just want to make apps without Google’s intervention.
Apps that come from unverified developers won’t be installable on Android phones—unless you use the new advanced flow, which will be buried in the developer settings.
When sideloading apps today, Android phones alert the user to the “unknown sources” toggle in the settings, and there’s a flow to help you turn it on. The verification bypass is different and will not be revealed to users. You have to know where this is and proactively turn it on yourself, and it’s not a quick process. Here are the steps:
Enable developer options by tapping the software build number in About Phone seven times
In Settings > System, open Developer Options and scroll down to “Allow Unverified Packages.”
Flip the toggle and tap to confirm you are not being coerced
Return to the unverified packages menu at the end of the security delay
Scroll past additional warnings and select either “Allow temporarily” (seven days) or “Allow indefinitely.”
Check the box confirming you understand the risks.
You can now install unverified packages on the device by tapping the “Install anyway” option in the package manager.
The actual legwork to activate this feature only takes a few seconds, but the 24-hour countdown makes it something you cannot do spur of the moment. But why 24 hours? According to Samat, this is designed to combat the rising use of high-pressure social engineering attacks, in which the scammer convinces the victim they have to install an app immediately to avoid severe consequences.
You’ll have to wait 24 hours to bypass verification.
You’ll have to wait 24 hours to bypass verification.
“In that 24-hour period, we think it becomes much harder for attackers to persist their attack,” said Samat. “In that time, you can probably find out that your loved one isn’t really being held in jail or that your bank account isn’t really under attack.”
But for people who are sure they don’t want Google’s verification system to get in the way of sideloading any old APK they come across, they don’t have to wait until they encounter an unverified app to get started. You only have to select the “indefinitely” option once on a phone, and you can turn dev options off again afterward.
According to Samat, Google feels a responsibility to Android users worldwide, and things are different than they used to be with more than 3 billion active devices out there.
“For a lot of people in the world, their phone is their only computer, and it stores some of their most private information,” Samat said. “Over the years, we’ve evolved the platform to keep it open while also keeping it safe. And I want to emphasize, if the platform isn’t safe, people aren’t going to use it, and that’s a lose-lose situation for everyone, including developers.”
But what does that safety look like? Google swears it’s not interested in the content of apps, and it won’t be checking proactively when developers register. This is only about identity verification—you should know when you’re installing an app that it’s not an imposter and does not come from known purveyors of malware. If a verified developer distributes malware, they’re unlikely to remain verified. And what is malware? For Samat, malware in the context of developer verification is an application package that “causes harm to the user’s device or personal data that the user did not intend.”
So a rootkit can be malware, but a rootkit you downloaded intentionally because you want root access on your phone is not malware, from Samat’s perspective. Likewise, an alternative YouTube client that bypasses Google’s ads and feature limits isn’t causing the kind of harm that would lead to issues with verification. But these are just broad strokes; Google has not commented on any specific apps.
Google says sideloading isn’t going away, but it is changing.
Google says sideloading isn’t going away, but it is changing.
Google is proceeding cautiously with the verification rollout, and some details are still spotty. Privacy advocates have expressed concern that verification will create a database that puts independent developers at risk of legal action. Samat says that Google does push back on judicial orders for user data when they are improper. The company further suggests it’s not intending to create a permanent list of developer identities that would be vulnerable to legal demands. We’ve asked for more detail on what data Google retains from the verification process and for what length of time.
There is also concern that developers living in sanctioned nations might be unable to verify due to the required fee. Google notes that the verification process may vary across countries and was not created specifically to bar developers in places like Cuba or Iran. We’ve asked for details on how Google will handle these edge cases and will update if we learn more.
Rolling out in 2026 and beyond
Android users in most of the world don’t have to worry about developer verification yet, but that day is coming. In September, verification enforcement will begin in Brazil, Singapore, Indonesia, and Thailand. Impersonation and guided scams are more common in these regions, so Google is starting there before expanding verification globally next year. Google has stressed that the advanced flow will be available before the initial rollout in September.
Google stands by its assertion that users are 50 times more likely to get malware outside Google Play than in it. A big part of the gap, Samat says, is Google’s decision in 2023 to begin verifying developer identities in the Play Store. This provided a framework for universal developer verification. While there are certainly reasons Google might like the control verification gives it, the Android team has felt real pressure from regulators in areas with malware issues to address platform security.
“In a lot of countries, there is chatter about if this isn’t safer, then there may need to be regulatory action to lock down more of this stuff,” Samat told Ars Technica. “I don’t think that it’s well understood that this is a real security concern in a number of countries.”
Google has already started delivering the verifier to devices around the world—it’s integrated with Android 16.1, which launched late in 2025. Eventually, the verifier and advanced flow will be on all currently supported Android devices. However, the UI will be consistent, with Google providing all the components and scare screens. So what you see here should be similar to what appears on your phone in a few months, regardless of who made it.
Ryan Whitwam is a senior technology reporter at Ars Technica, covering the ways Google, AI, and mobile technology continue to change the world. Over his 20-year career, he’s written for Android Police, ExtremeTech, Wirecutter, NY Times, and more. He has reviewed more phones than most people will ever own. You can follow him on Bluesky, where you will see photos of his dozens of mechanical keyboards.
Once again, ULA can’t deliver when the US military needs a satellite in orbit
You’re likely already infected with a brain-eating virus you’ve never heard of
NASA wants to know how the launch industry’s chic new rocket fuel explodes
Rocket Report: Canada makes a major move, US Space Force says actually, let’s be hasty
Microsoft keeps insisting that it’s deeply committed to the quality of Windows 11
...
Read the original on arstechnica.com »
If you have any questions or comments regarding the accessibility of this publication, please contact us at accessible@parl.gc.ca.
Skip to Document Navigation
Skip to Document Content
ENGLISHRECOMMENDATIONSUMMARYTABLE OF PROVISIONS1 Alternative Title2 PART 1 Timely Access to Data and Information2 Criminal Code2 Amendments to the Act28 Consequential Amendment to the Foreign Publishers Advertising Services Act29 Mutual Legal Assistance in Criminal Matters Act30 Canadian Security Intelligence Service Act37 Controlled Drugs and Substances Act38 Cannabis Act39 Coordinating Amendments40 Coming into Force41 PART 2 Supporting Authorized Access to Information Act41 Enactment of Act42 Related and Consequential Amendments to the Intelligence Commissioner Act42 Related and Consequential Amendments to the Intelligence Commissioner Act47 Coming into Force48 PART 3 Parliamentary ReviewSCHEDULE
Her Excellency the Governor General recommends to the House of Commons the appropriation of public revenue under the circumstances, in the manner and for the purposes set out in a measure entitled “An Act respecting lawful access”.
Part 1 amends various Acts to modernize certain provisions respecting the timely gathering and production of data and information during an investigation. It, among other things,
(a)amends the Criminal Code to, among other things,
(i)facilitate access to basic information that will assist in the investigation of federal offences through confirmation of service demands given to telecommunications service providers or judicial production orders for the production of subscriber information,
(ii)expedite the response to production orders by shortening the review process and clarify the ability of peace officers and public officers to receive and act on certain information that is voluntarily provided to them and to obtain and act on information that is publicly available,
(iii)specify certain circumstances in which peace officers and public officers may obtain evidence, including subscriber information, in exigent circumstances,
(iv)allow a justice or judge to authorize, in a warrant, a peace officer or public officer to obtain tracking data or transmission data that relates to any thing that is similar to a thing in relation to which data is authorized to be obtained under the warrant and that is unknown at the time the warrant is issued,
(v)provide and clarify authorities by which computer data may be examined, and
(vi)allow a justice or judge to authorize a peace officer or public officer to make a request to a foreign entity that provides telecommunications services — or that provides services by a means of telecommunication — to the public to produce transmission data or subscriber information that is in its possession or control;
(c)amends the Mutual Legal Assistance in Criminal Matters Act to allow the Minister of Justice to authorize a competent authority to make arrangements for the enforcement of a decision made by an authority of a state or entity that is empowered to compel the production of transmission data or subscriber information that is in the possession or control of a person in Canada;
(d)amends the Canadian Security Intelligence Service Act to, among other things,
(i)facilitate access to basic information that will assist the Canadian Security Intelligence Service in the performance of its duties and functions under section 12 or 16 of that Act through confirmation of service demands given to telecommunications service providers and judicial orders against those providers, and
(e)amends the Controlled Drugs and Substances Act and the Cannabis Act to provide and clarify authorities by which computer data may be examined.
Part 2 enacts the Supporting Authorized Access to Information Act. That Act establishes a framework for ensuring that electronic service providers can facilitate the exercise, by authorized persons, of authorities to access information conferred under the Criminal Code or the Canadian Security Intelligence Service Act. It also makes related and consequential amendments to the Intelligence Commissioner Act.
Part 3 provides for the parliamentary review of Parts 1 and 2.
Available on the House of Commons website at the following address:
An Act respecting the obligations of electronic service providers in relation to authorized access to information
How act or omission may be proceeded with
Payment of Penalties and Alternatives to Payment
His Majesty, by and with the advice and consent of the Senate and House of Commons of Canada, enacts as follows:
This Act may be cited as the Lawful Access Act, .
Subsection () of the is replaced by the following:
Subsections () to () and section apply, with any modifications that the circumstances require, to a warrant issued under this section.
The portion of subsection () of the Act before paragraph (a) is replaced by the following:
A justice who is satisfied by information on oath in Form that there are reasonable grounds to believe that there is in a building, receptacle or place
Subsection () of the Act is amended by replacing “a public officer who has been appointed or designated to administer or enforce a federal or provincial law and whose duties include the enforcement of this Act or any other Act of Parliament and who is named in the warrant” with “a public officer”.
Subsections () to () of the Act are replaced by the following:
A warrant issued under subsection () may be executed at any place in Canada. A peace officer or public officer who executes the warrant must have authority to act in that capacity in the place where the warrant is executed.
A person authorized under to search a computer system in a building or place for data may
(a)use or cause to be used any computer system at the building or place to search any Insertion start Insertion end data contained in or available to the computer system; and
Duty of person in possession or control
Every person who is in possession or control of any building or place in respect of which a search is carried out under shall, on presentation of the warrant, permit the person carrying out the search to perform any of the acts referred to in subsection ().
The judge or justice may, in a warrant issued under subsection (), authorize the examination of any computer data seized under the warrant or contained in or available to a computer system seized under the warrant, if the judge or justice is satisfied that there are reasonable grounds to believe that the computer data will afford evidence with respect to the commission of the offence set out in the information.
A judge or justice may at any time issue a warrant authorizing the examination of computer data contained in or available to a computer system that is specified in the warrant and that is in the possession of a peace officer or public officer if the judge or justice is satisfied by information on oath in Form that there are reasonable grounds to believe that
(a)an offence has been or will be committed under this Act or any other Act of Parliament; and
(b)the computer data will afford evidence with respect to the commission of the offence.
The examination of computer data under a warrant issued under this section may be made subject to any conditions that the judge or justice considers advisable to ensure that the examination is reasonable in the circumstances.
As soon as feasible after a warrant authorizing the examination of computer data is issued under this section, the person who applied for it shall give a copy of it to the following persons:
(a)any person, if known, who is the lawful owner of the computer system that contains the computer data or through which the computer data is available or who is lawfully entitled to the possession of that computer system; and
(b)any person who is referred to in the information, who is under investigation for the commission of the offence set out in the warrant and whose computer data is authorized to be examined under the warrant.
However, a copy of the warrant is not required to be given to a person under subsection () if
(a)the person has already received a copy under section 487.093; or
(b)the judge or justice who issues the warrant sets aside the requirement in respect of the person, on being satisfied that doing so is justified in the circumstances.
If the judge or justice who issues a warrant under this section authorizing the examination of computer data or any other judge or justice having jurisdiction to issue such a warrant is satisfied, on the basis of an affidavit submitted in support of an application to extend the period within which a copy of the warrant shall be given under subsection (), that the interests of justice warrant the granting of the application, the judge or justice may grant an extension, or a subsequent extension, of the period, but no extension may exceed three years.
An examination of computer data authorized under a warrant issued under this section may take place at any time and at any place in Canada and, for the purposes of the examination, a person may copy computer data at any time and at any place in Canada.
Section of the Act is amended by adding the following after subsection ():
The following definitions apply in this section.
computer data has the same meaning as in subsection 342.1(2). (données informatiques)
computer system has the same meaning as in subsection 342.1(2). (ordinateur)
judge means a judge of a superior court of criminal jurisdiction or a judge of the Court of Quebec. (juge)
public officer means a public officer who is appointed or designated to administer or enforce a federal or provincial law and whose duties include the enforcement of this Act or any other Act of Parliament. (fonctionnaire public)
The portion of section of the Act before the first definition is replaced by the following:
The following definitions apply in this section and in sections to .
Section of the Act is amended by adding the following in alphabetical order:
subscriber information, in relation to any client of a person who provides services to the public or any subscriber to the services of such a person, means
(a)information that may be used to identify the subscriber or client, including their name, pseudonym, address, telephone number and email address;
(b)identifiers assigned to the subscriber or client by the person, including account numbers; and
(c)information relating to the services provided to the subscriber or client, including
(ii)the period during which the services were provided, and
The Act is amended by adding the following after section :
A peace officer or public officer may make a demand in Form to a telecommunications service provider requiring them to confirm, within the time and in the manner specified in the demand, whether or not they provide or have provided telecommunication services to any subscriber or client, or to any account or identifier, specified in the demand.
The peace officer or public officer may make the demand only if they have reasonable grounds to suspect that
(a)an offence has been or will be committed under this Act or any other Act of Parliament; and
(b)the confirmation that is demanded will assist in the investigation of the offence.
For greater certainty, a demand must not be made if the confirmation would disclose medical information or information that is subject to solicitor-client privilege or the professional secrecy of advocates and notaries.
A demand must not be made to a telecommunications service provider that is under investigation for the offence referred to in subsection ().
The time specified in the demand is to be not less than hours.
The peace officer or public officer who makes the demand may impose conditions in the demand prohibiting the disclosure of its existence or some or all of its contents for a period not greater than one year after the day on which the demand is made. The peace officer or public officer may impose the conditions only if they have reasonable grounds to believe that the disclosure during that period would jeopardize the conduct of the investigation of the offence to which the demand relates.
A peace officer or public officer may, at any time, revoke the demand or a condition by notice given to the telecommunications service provider.
The telecommunications service provider may, within five business days after the day on which they receive the demand, apply in writing, to a judge in the judicial district where the demand was received, to revoke or vary the demand.
The telecommunications service provider may make an application under subsection () only if, before the confirmation is required to be provided, they give notice to the peace officer or public officer who made the demand of the telecommunications service provider’s intention to make the application.
The telecommunications service provider is not required to provide the confirmation until a final decision is made with respect to the application.
The judge in the judicial district where the demand was received may revoke or vary the demand if satisfied that
(a)it is unreasonable in the circumstances to require the applicant to provide the confirmation; or
(b)provision of the confirmation would disclose information that is privileged or otherwise protected from disclosure by law.
Despite subsection (), no demand under that subsection is necessary for a peace officer or public officer to ask a telecommunications service provider to voluntarily provide the confirmation referred to in that subsection if the telecommunications service provider is not prohibited by law from providing it. A telecommunications service provider that provides a confirmation in those circumstances does not incur any criminal or civil liability for doing so.
In this section, has the same meaning as in subsection () of the .
The Act is amended by adding the following after section :
On application made by a peace officer or public officer, a justice or judge may order a person who provides services to the public to prepare and produce a document containing all the subscriber information that relates to any information, including transmission data, that is specified in the order and that is in their possession or control when they receive the order.
Before making the order, the justice or judge must be satisfied by information on oath in Form that there are reasonable grounds to suspect that
(a)an offence has been or will be committed under this Act or any other Act of Parliament; and
(b)the subscriber information is in the person’s possession or control and will assist in the investigation of the offence.
The order is to be in Form
A person who is under investigation for the offence referred to in subsection () is not to be made subject to an order.
The Act is amended by adding the following after section :
On application made by a peace officer or public officer, a justice or judge may authorize a peace officer or public officer to make a request to a foreign entity that provides telecommunications services — or that provides services by a means of telecommunication — to the public to prepare and produce a document containing transmission data or subscriber information that is in the foreign entity’s possession or control when it receives the request.
The justice or judge may authorize a peace officer or public officer to make the production request only if the justice or judge is satisfied by information on oath in Form that there are reasonable grounds to suspect that
(a)an offence has been or will be committed under this or any other Act of Parliament; and
(b)the transmission data or the subscriber information is in the foreign entity’s possession or control and will assist in the investigation of the offence.
The authorization is to be in Form and must specify that a peace officer or public officer must not send a production request more than days after the day on which the authorization is granted.
The production request is to be in Form and may include any information that is required by the foreign entity, by the foreign state in which the foreign entity is located or under an international agreement or arrangement to which Canada and the foreign state are parties.
Subsection () of the Act is replaced by the following:
On application made by a peace officer or public officer, a justice or judge may make an order prohibiting a person from disclosing the existence or some or all of the contents of a preservation demand made under section or an order made under any of sections to during the period set out in the order.
Subsection () of the Act is replaced by the following:
An order made under any of sections and to must require a person, financial institution or entity to produce the document to a peace officer or public officer named in the order within the time, at the place and in the form specified in the order.
Subsections () and () of the Act are replaced by the following:
...
Read the original on www.parl.ca »
The decades-long battle over lawful access entered a new phase yesterday with the introduction of Bill C-22, the Lawful Access Act. This bill follows the attempt last spring to bury lawful access provisions in Bill C-2, a border measures bill that was the new government’s first piece of substantive legislation. The lawful access elements of the bill faced an immediate backlash given the inclusion of unprecedented rules permitting widespread warrantless access to personal information. Those rules were on very shaky constitutional ground and the government ultimately decided to hit the reset button on lawful access by proceeding with the border measures in a different bill.
Lawful access never dies, however. Bill C-22 cover the two main aspects of lawful access: law enforcement access to personal information held by communication service providers such as ISPs and wireless providers and the development of surveillance and monitoring capabilities within Canadian networks. In fact, the bill is separated into two with the first half dealing with “timely access to data and information” and the second establishing the Supporting Authorized Access to Information Act (SAAIA).
I anticipate providing extensive coverage of the bill on both this blog and my podcast. My initial take is that the access to data and information piece of the bill is much improved. The earlier Bill C-2 iteration of a new information demand power was astonishing in its breadth (covering far more than just communications providers by targeting anyone who provides a service in Canada including physicians and lawyers) and demands for warrantless disclosure of personal information in direct contradiction to recent Supreme Court of Canada jurisprudence.
The government has scrapped that approach by shifting to a new “confirmation of service” demand power. This would allow law enforcement to demand that telecom providers (not any service provider) confirm whether they provide service to a particular person. The other subscriber information would be subject to a new production order reviewed and approved by a judge. This would address the longstanding police complaint that they may do considerable work seeking information about a subscriber at a provider only to learn that the person isn’t a customer and they start over with someone else.
These new rules contain other orders and rules on voluntary disclosure, challenging the requests, exigent circumstances, and foreign orders for the same information. I plan to unpack these rules in the coming weeks. For example, there are concerns about the thresholds that the production orders envision, namely the low “reasonable grounds to suspect” standard. However, the main takeaway here is that the government has significantly limited the scope of warrantless information demand powers, now focusing solely on telecommunications providers and whether they provide service to a particular individual. Access to more personal information will require oversight. That’s a major concession and highlights how Bill C-2 was too broad, dangerous from a privacy perspective, and unlikely to pass constitutional muster.
If that is the good news, the bad news is very bad. The SAAIA, which establishes new requirements for communications providers to actively work with law enforcement on their surveillance and monitoring capabilities are largely unchanged from Bill C-2. In fact, there are elements involving data retention that are even worse. The government will point to increased oversight — ministerial orders must now be approved by the Intelligence Commissioner — but the concerns regarding surveillance capabilities, security vulnerabilities, secrecy, and cross-border data sharing remain.
The SAAIA has huge implications for network providers as they envision providing law enforcement with direct access to provider networks to test capabilities for data access and interception. The bill introduces a new term — “electronic service provider” — that is presumably designed to extend beyond telecom and Internet providers by scoping in Internet platforms (Google, Meta, etc.). Those international services are now key players in electronic communications (think Gmail or WhatsApp), though some may be beyond this form of regulation (eg. Signal if you don’t inadvertently add people to chat groups).
The definition of an ESP is:
a person that, individually or as part of a group, provides an electronic service, including for the purpose of enabling communications, and that (a) provides the service to persons in Canada; or (b) carries on all or part of its business activities in Canada.
“a service, or a feature of a service, that involves the creation, recording, storage, processing, transmission, reception, emission or making available of information in electronic, digital or any other intangible form by an electronic, digital, magnetic, optical, biometric, acoustic or other technological means, or a combination of any such means.”
All electronic service providers are subject to obligations to “provide all reasonable assistance, in any prescribed time and manner, to permit the assessment or testing of any device, equipment or other thing that may enable an authorized person to access information.” Moreover, all are required to keep such requests secret.
But beyond the basic obligations, the government will identify “core providers” who will be subject to additional regulations. These may include:
(a) the development, implementation, assessment, testing and maintenance of operational and technical capabilities, including capabilities related to extracting and organizing information that is authorized to be accessed and to providing access to such information to authorized persons;
(b) the installation, use, operation, management, assessment, testing and maintenance of any device, equipment or other thing that may enable an authorized person to access information;
(c) notices to be given to the Minister or other persons, including with respect to any capability referred to in paragraph (a) and any device, equipment or other thing referred to in paragraph (b); and
(d) the retention of categories of metadata — including transmission data, as defined in section 487.011 of the Criminal Code — for reasonable periods of time not exceeding one year.
Note that the retention of metadata found in (d) is new. It was not in Bill C-2, so this bill actually expands the scope of obligations. The new bill contains some limits on data retention:
4) Paragraph (2)(d) does not authorize the making of regulations that require core providers to retain information that would reveal
(a) the content — that is to say the substance, meaning or purpose — of information transmitted in the course of an electronic service;
(b) a person’s web browsing history; or
(c) a person’s social media activities.
The bill also retains an exception for systemic vulnerabilities, which states:
A core provider is not required to comply with a provision of a regulation made under subsection (2), with respect to an electronic service, if compliance with that provision would require the provider to introduce a systemic vulnerability related to that service or prevent the provider from rectifying such a vulnerability.
There remain concerns that is insufficient and that there are real risks that networks may be made less secure by virtue of these rules with the changes kept secret from the public. Moreover, as Kate Robertson of the Citizen Lab has discussed (including on the Law Bytes podcast), many of these rules appear geared toward global information sharing, including compliance with the Second Additional Protocol to the Budapest Convention (2AP) and the CLOUD Act.
There is much to unpack with this section including the ability to challenge orders, the secrecy associated with the system, oversight, and costs. I plan to cover these as well but for the moment it is sufficient to conclude that Bill C-22’s SAAIA envisions a significant change to how government agencies interact with Canadian communications networks and network providers raising enormous privacy and civil liberties concerns. The government may have taken warrantless access to subscriber information off the table, but there remains serious privacy concerns associated with its lawful access plans.
...
Read the original on www.michaelgeist.ca »
Rule 1. You can’t tell where a program is going to spend its time. Bottlenecks occur in surprising places, so don’t try to second guess and put in a speed hack until you’ve proven that’s where the bottleneck is.
Rule 2. Measure. Don’t tune for speed until you’ve measured, and even then don’t unless one part of the code overwhelms the rest.
Rule 3. Fancy algorithms are slow when n is small, and n is usually small. Fancy algorithms have big constants. Until you know that n is frequently going to be big, don’t get fancy. (Even if n does get big, use Rule 2 first.)
Rule 4. Fancy algorithms are buggier than simple ones, and they’re much harder to implement. Use simple algorithms as well as simple data structures.
Rule 5. Data dominates. If you’ve chosen the right data structures and organized things well, the algorithms will almost always be self-evident. Data structures, not algorithms, are central to programming.
Pike’s rules 1 and 2 restate Tony Hoare’s famous maxim “Premature optimization is the root of all evil.”
Ken Thompson rephrased Pike’s rules 3 and 4 as “When in doubt, use brute force.”.
Rules 3 and 4 are instances of the design philosophy KISS.
Rule 5 was previously stated by Fred Brooks in The Mythical Man-Month. Rule 5 is often shortened to “write stupid code that uses smart objects”.
...
Read the original on www.cs.unc.edu »
Reddit researcher exposes Meta’s $2B campaign to force Apple and Google into building surveillance systems while exempting its own platforms
Reddit researcher exposes Meta’s $2B campaign to force Apple and Google into building surveillance systems while exempting its own platforms
A Reddit researcher just exposed how Meta funneled over $2 billion through shadowy nonprofits to push age verification laws that would force Apple and Google to build surveillance infrastructure into every device—while conveniently exempting Meta’s own platforms from the same requirements.
The investigation by GitHub user “upper-up” traces funding through organizations like the Digital Childhood Alliance (DCA), which launched December 18, 2024, and testified for Utah’s SB-142 just days later. Bloomberg and Deseret News reported Meta’s backing of DCA, part of a $70 million fragmented super PAC strategy designed to evade FEC tracking. Traditional election spending disclosure requirements don’t apply to this fragmented approach.
The technical reality hits harder than policy abstractions. These bills mandate OS-level APIs that apps can query for age data—creating a permanent identity layer baked into your phone’s core functions. Meta’s Horizon OS for Quest VR already implements this infrastructure through Family Center controls. Now they want Apple and Google to build similar systems that every app can access, turning age verification into persistent device fingerprinting.
Here’s where the lobbying gets surgical. The proposed laws hammer Apple’s App Store and Google Play with compliance requirements but reportedly spare social media platforms—Meta’s core business. It’s like Spotify lobbying for streaming regulations that only apply to Apple Music. The “child safety” rhetoric masks a competitive strategy that shifts liability from platforms to operating system makers.
The European Union’s Digital Identity Wallet takes a radically different approach. Zero-knowledge proofs let you verify age without revealing personal data—like showing you’re over 18 without disclosing your birthdate or identity details. It’s open-source, self-hostable, and only applies to large platforms while exempting FOSS and small entities. Meanwhile, US lawmakers seem ready to let Meta bamboozle them into complete privacy annihilation.
Your device’s trustworthiness hangs in the balance. These laws could force every Linux distribution and privacy-focused Android fork to implement identity verification or face legal liability. The choice between surveillance-free computing and regulatory compliance is coming faster than you think.
...
Read the original on www.gadgetreview.com »
To add this web app to your iOS home screen tap the share button and select "Add to the Home Screen".
10HN is also available as an iOS App
If you visit 10HN only rarely, check out the the best articles from the past week.
If you like 10HN please leave feedback and share
Visit pancik.com for more.