{"id":233313,"date":"2020-06-01T03:39:23","date_gmt":"2020-06-01T07:39:23","guid":{"rendered":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/first-amendment-rights-and-twitter-encryption-backdoors-security-boulevard\/"},"modified":"2020-06-01T03:39:23","modified_gmt":"2020-06-01T07:39:23","slug":"first-amendment-rights-and-twitter-encryption-backdoors-security-boulevard","status":"publish","type":"post","link":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/first-amendment-2\/first-amendment-rights-and-twitter-encryption-backdoors-security-boulevard\/","title":{"rendered":"First Amendment Rights and Twitter, Encryption Backdoors &#8211; Security Boulevard"},"content":{"rendered":"<p><p>In episode 123 for June 1st 2020: The controversy continues over fact checking and First Amendment rights on Twitter, and why government mandated encryption backdoors are bad for everyones security.<\/p>\n<p>** Show notes and links mentioned on the show **<\/p>\n<p>Trump to sign executive order aimed at cracking down on Facebook and Twitterhttps:\/\/www.cnbc.com\/2020\/05\/28\/trump-to-sign-executive-order-aimed-at-cracking-down-on-facebook-twitter.html<\/p>\n<p>The law enforcement backdoor debate continueshttps:\/\/www.helpnetsecurity.com\/2020\/05\/26\/backdoor-encryption\/<\/p>\n<p>OWASP Top 10 2020 Data Analysis Planhttps:\/\/owasp.org\/www-project-top-ten\/<\/p>\n<p>** Thank you to our sponsors! **<\/p>\n<p>Silent Pocket<\/p>\n<p>Visit <a href=\"https:\/\/silent-pocket.com\" rel=\"nofollow\">https:\/\/silent-pocket.com<\/a> to check out Silent Pockets amazing line of faraday bags and other products built to protect your privacy. As a listener of this podcast you receive 15% off your order at checkout using discount code sharedsecurity.<\/p>\n<p>Edgewise Networks<\/p>\n<p>Find out how Edgewise can stop lateral threat movement and prevent data breaches. Visit <a href=\"https:\/\/edgewise.net\" rel=\"nofollow\">https:\/\/edgewise.net<\/a> and request a demo!<\/p>\n<p>Take the Click Armor 3-minute interactive assessment: Can I be Phished?<a href=\"https:\/\/www.clickarmor.ca\/canibephished\" rel=\"nofollow\">https:\/\/www.clickarmor.ca\/canibephished<\/a><\/p>\n<p>** Help support the show **<\/p>\n<p>Looking for an affordable, reliable, no logs VPN provider? Support the podcast by purchasing a Private Internet Access VPN subscription via our affiliate link: <a href=\"http:\/\/www.privateinternetaccess.com\/pages\/buy-vpn\/sharedsecurity\" rel=\"nofollow\">http:\/\/www.privateinternetaccess.com\/pages\/buy-vpn\/sharedsecurity<\/a><\/p>\n<p>** Subscribe and follow the show **<\/p>\n<p>Sign-up for our email newsletter to receive our free Facebook Privacy & Security Guide, full transcripts of each weekly episode, contest announcements, and special offers from our sponsors: <a href=\"http:\/\/eepurl.com\/dwcc8D\" rel=\"nofollow\">http:\/\/eepurl.com\/dwcc8D<\/a><\/p>\n<p>Subscribe on your favorite podcast app: <a href=\"https:\/\/sharedsecurity.net\/subscribe\" rel=\"nofollow\">https:\/\/sharedsecurity.net\/subscribe<\/a><\/p>\n<p>Contact us: <a href=\"https:\/\/sharedsecurity.net\/contact\" rel=\"nofollow\">https:\/\/sharedsecurity.net\/contact<\/a><\/p>\n<p>Website: <a href=\"https:\/\/sharedsecurity.net\" rel=\"nofollow\">https:\/\/sharedsecurity.net<\/a><\/p>\n<p>Twitter: <a href=\"https:\/\/twitter.com\/sharedsec\" rel=\"nofollow\">https:\/\/twitter.com\/sharedsec<\/a><\/p>\n<p>Facebook: <a href=\"https:\/\/facebook.com\/sharedsec\" rel=\"nofollow\">https:\/\/facebook.com\/sharedsec<\/a><\/p>\n<p>Instagram: <a href=\"https:\/\/instagram.com\/sharedsecurity\" rel=\"nofollow\">https:\/\/instagram.com\/sharedsecurity<\/a><\/p>\n<p>YouTube: <a href=\"https:\/\/www.youtube.com\/c\/SharedSecurityPodcast\" rel=\"nofollow\">https:\/\/www.youtube.com\/c\/SharedSecurityPodcast<\/a><\/p>\n<p>The post First Amendment Rights and Twitter, Encryption Backdoors appeared first on Shared Security Podcast.<\/p>\n<p>Recent Articles By Author<\/p>\n<p>*** This is a Security Bloggers Network syndicated blog from Shared Security Podcast authored by Tom Eston. Read the original post at: <a href=\"https:\/\/sharedsecurity.net\/2020\/06\/01\/first-amendment-rights-and-twitter-encryption-backdoors\/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=first-amendment-rights-and-twitter-encryption-backdoors\" rel=\"nofollow\">https:\/\/sharedsecurity.net\/2020\/06\/01\/first-amendment-rights-and-twitter-encryption-backdoors\/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=first-amendment-rights-and-twitter-encryption-backdoors<\/a> <\/p>\n<p><!-- Auto Generated --><\/p>\n<p>See original here:<br \/>\n<a target=\"_blank\" href=\"https:\/\/securityboulevard.com\/2020\/06\/first-amendment-rights-and-twitter-encryption-backdoors\/\" title=\"First Amendment Rights and Twitter, Encryption Backdoors - Security Boulevard\" rel=\"noopener noreferrer\">First Amendment Rights and Twitter, Encryption Backdoors - Security Boulevard<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p> In episode 123 for June 1st 2020: The controversy continues over fact checking and First Amendment rights on Twitter, and why government mandated encryption backdoors are bad for everyones security. ** Show notes and links mentioned on the show ** Trump to sign executive order aimed at cracking down on Facebook and Twitterhttps:\/\/www.cnbc.com\/2020\/05\/28\/trump-to-sign-executive-order-aimed-at-cracking-down-on-facebook-twitter.html The law enforcement backdoor debate continueshttps:\/\/www.helpnetsecurity.com\/2020\/05\/26\/backdoor-encryption\/ OWASP Top 10 2020 Data Analysis Planhttps:\/\/owasp.org\/www-project-top-ten\/ ** Thank you to our sponsors! ** Silent Pocket Visit <a href=\"https:\/\/silent-pocket.com\" rel=\"nofollow\">https:\/\/silent-pocket.com<\/a> to check out Silent Pockets amazing line of faraday bags and other products built to protect your privacy <a href=\"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/first-amendment-2\/first-amendment-rights-and-twitter-encryption-backdoors-security-boulevard\/\">Continue reading <span class=\"meta-nav\">&rarr;<\/span><\/a><\/p>\n","protected":false},"author":9,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[94877],"tags":[],"class_list":["post-233313","post","type-post","status-publish","format-standard","hentry","category-first-amendment-2"],"_links":{"self":[{"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/posts\/233313"}],"collection":[{"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/users\/9"}],"replies":[{"embeddable":true,"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/comments?post=233313"}],"version-history":[{"count":0,"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/posts\/233313\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/media?parent=233313"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/categories?post=233313"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/tags?post=233313"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}