Law in the Internet Society

View   r4  >  r3  >  r2  >  r1
ChevaunSamuelsFirstEssay 4 - 09 Jan 2020 - Main.EbenMoglen
Line: 1 to 1
 
META TOPICPARENT name="FirstEssay"
Line: 7 to 7
 -- By ChevaunSamuels - 11 Oct 2019
Changed:
<
<
Most people today, whether it is big or small, rely on the help of technology. Commonly, these individuals cannot go through their day without the use of technological innovations such as computers, internet connection, printers, applications, and file storage. As technology continues to improve and our society modernizes, it has become easier and easier to access these technological innovations.
>
>
Most people today, whether it is big or small, rely on the help of technology. Commonly, these individuals cannot go through their day without the use of technological innovations such as computers, internet connection, printers, applications, and file storage. As technology continues to improve and our society modernizes, it has become easier and easier to access these technological innovations.
 

In the early 2000s, many households only had access to one computer, and individuals within the home could not use the telephone when they were connected to the internet. In today’s society, kids as young as 5 have access to the world through their handheld devices. Despite the burning sensation from cellphones and software malfunctions from laptops, it would be an extraneous task to try to remove the technology from these individuals.

Added:
>
>
This introduction doesn't tell us what your subject is: it starts so broadly that the reader has no idea where you are going. By the time the reader is 100 words in, she should know where you are heading.
 
Deleted:
<
<
In January 2019, Apple disabled its Group FaceTime? feature in iPhones after multiple reports that users could initiate a FaceTime? call and begin listening in on a recipient’s audio without them picking up the call or knowing they were being monitored. The bug occurred after a user-initiated a FaceTime? video call with another iPhone or device running iOS and added themselves to the call while it was dialing. This created a conference call that allowed the user to eavesdrop on the audio transmitted by the recipient. This security lapse is especially significant because, like other software companies, Apple markets itself as a consumer tech company dedicated to privacy and security. While many of the apps we have on our phones can be beneficial to us, we are sacrificing a lot of our privacy by using these apps. Privacy is slowly diminishing and as kids are growing up in modern society, they will have no concept of privacy. They will also not have the ability to understand that nothing digital is ever forgotten or destroyed.
 
Added:
>
>
In January 2019, Apple disabled its Group FaceTime? feature in iPhones after multiple reports that users could initiate a FaceTime? call and begin listening in on a recipient’s audio without them picking up the call or knowing they were being monitored.
 
Changed:
<
<
After the NSA leaks, Americans were divided about the impact of the leaks immediately following Snowden’s disclosures, but according to a Pew Research Center survey, about half of Americans (49%) said the release of the classified information served the public interest, while 44% said it harmed the public interest. At the same time, 54% of the public said the government should pursue a criminal case against the person responsible for the leaks, a view more commonly held among Republicans and Democrats (59% each) than independents (48%). The share of Americans who disapproved of the government’s collection of telephone and internet data as part of anti-terrorism efforts increased from 47% in the days after the initial disclosure to 53% the following January. Fast forward to today, many people are aware of the lack of privacy that they have when it comes to their technology. It was very prevalent based on user reaction to the Apple FaceTime? bug. Despite this revelation and many others like it, people are still using the same apps that are lacking true privacy. These individuals are willingly accepting privacy policies that are designed to give users ultimatums.
>
>
This descends from the completely general to the utterly specific. That doesn't help the reader understand the scope and purpose of the essay she is reading.
 
Changed:
<
<
As much as we can blame users for the usage of these apps and other technology that put them at risk, the blame is not solely on them. An analyst described that when a user of apps like WhatsApp? , Facebook, Snapchat, Instagram…etc., grants access to their camera and microphone, the app could do the following: access both the front and back camera; record you at any time the app is in the foreground; take pictures and videos without telling you; and, upload the pictures and videos without telling you. App producers should find ways to put users’ rights first, so their information is not put in jeopardy. Although there are privacy regulations in place, there needs to be better regulations to protect users. As well as details of your device such as the model, name and phone number these trackers can you’re your email address, the IP address that is allocated to your internet connection and even your precise location. Everything from music streaming and weather apps, through to news and storage apps are doing it.
>
>
The bug occurred after a user-initiated a FaceTime? video call with another iPhone or device running iOS and added themselves to the call while it was dialing. This created a conference call that allowed the user to eavesdrop on the audio transmitted by the recipient.
 
Added:
>
>
Some sourcing would be useful. One link to some reliable reporting....

This security lapse is especially significant because, like other software companies, Apple markets itself as a consumer tech company dedicated to privacy and security.

What does this mean? Software failures result from failures of software making, distribution or use. As with other products, product defects that cause harm should produce legal liability that injured parties can prove in order to get appropriate relief. Is what's significant that this doesn't happen?

While many of the apps we have on our phones can be beneficial to us, we are sacrificing a lot of our privacy by using these apps. Privacy is slowly diminishing and as kids are growing up in modern society, they will have no concept of privacy. They will also not have the ability to understand that nothing digital is ever forgotten or destroyed.

Why won't kids have the ability to understand this if they are taught?

After the NSA leaks, Americans were divided about the impact of the leaks immediately following Snowden’s disclosures, but according to a Pew Research Center survey, about half of Americans (49%) said the release of the classified information served the public interest, while 44% said it harmed the public interest. At the same time, 54% of the public said the government should pursue a criminal case against the person responsible for the leaks, a view more commonly held among Republicans and Democrats (59% each) than independents (48%). The share of Americans who disapproved of the government’s collection of telephone and internet data as part of anti-terrorism efforts increased from 47% in the days after the initial disclosure to 53% the following January. Fast forward to today, many people are aware of the lack of privacy that they have when it comes to their technology.

Why give detailed information about public opinion in the past and no information about public opinion in the present? The "fast forward" doesn't lead to much understanding unless there is some basis for comparison over time.

It was very prevalent based on user reaction to the Apple FaceTime? bug. Despite this revelation and many others like it, people are still using the same apps that are lacking true privacy. These individuals are willingly accepting privacy policies that are designed to give users ultimatums.

As much as we can blame users for the usage of these apps and other technology that put them at risk, the blame is not solely on them.

Why should we blame users at all? That's convenient for the providers of defective products and services, but what is the principle of justice or argument of social welfare that justifies blaming the consumer for the harm done?

An analyst described that when a user of apps like WhatsApp? , Facebook, Snapchat, Instagram…etc., grants access to their camera and microphone, the app could do the following: access both the front and back camera; record you at any time the app is in the foreground; take pictures and videos without telling you; and, upload the pictures and videos without telling you. App producers should find ways to put users’ rights first,

Perhaps this would be the useful place to explain that "ways to put users' rights first" are what the free software movement is about, and what the ways are that we put in place and that would help here too.

so their information is not put in jeopardy. Although there are privacy regulations in place, there needs to be better regulations to protect users.

Here, in "there needs to be better regulations," is an example of an agreement problem: the verb and its object should agree in number. This is the sort of sentence-level editing that, as I said on the last draft, you need to be scrupulous about in your professional writing. One careful final read will always catch these problems.

As well as details of your device such as the model, name and phone number these trackers can you’re your email address, the IP address that is allocated to your internet connection and even your precise location. Everything from music streaming and weather apps, through to news and storage apps are doing it.

A good first step for counteracting these issues is to always make sure to cover your webcam with tape and cover your phone camera when possible.

How does that help with web tracking, with location selling, with all the other sensor-based data flow out of the handset? What source produced this advice?

Apps like LinkedIn? does not need camera access. Apps like Twitter does not require microphone access. Before you download an app, check the reviews and search for any negative information about it to prevent yourself from future harm. You never know who’s watching, or what’s happening in the background on your device. You do not want to take precautions when it is too late.

This account of the problem concentrates only on a few handset sensors, and assumes that only behavior collection, rather than targeted stimulation, is going on. So it can't give a full picture of the threat involved, and its advice about mitigation falls very short.
 
Deleted:
<
<
A good first step for counteracting these issues is to always make sure to cover your webcam with tape and cover your phone camera when possible. Apps like LinkedIn? does not need camera access. Apps like Twitter does not require microphone access. Before you download an app, check the reviews and search for any negative information about it to prevent yourself from future harm. You never know who’s watching, or what’s happening in the background on your device. You do not want to take precautions when it is too late.
 

ChevaunSamuelsFirstEssay 3 - 04 Dec 2019 - Main.ChevaunSamuels
Line: 1 to 1
 
META TOPICPARENT name="FirstEssay"
Line: 7 to 7
 -- By ChevaunSamuels - 11 Oct 2019
Changed:
<
<
Of all the noises that I will never forget growing up, the one that always sticks out to me the most and is nearest to my heart is not from my friends, songs nor a television show. Instead, it’s the sound of a modem connecting with another modem and yelling to my cousins that they need to get off the phone. It was the joyous noise of being part of the beginning of the internet and the power to immerse myself in a whole new world. Growing up this was our only computer in the house, and we had to make do with what we had. We found ways to get our homework done and late in the nights when everyone was sleeping and had no need for the telephones, we would play Disney Channel games and watch random YouTube? videos.
>
>
Most people today, whether it is big or small, rely on the help of technology. Commonly, these individuals cannot go through their day without the use of technological innovations such as computers, internet connection, printers, applications, and file storage. As technology continues to improve and our society modernizes, it has become easier and easier to access these technological innovations.
 
Deleted:
<
<
Today’s generation will never know the patience it took to connect to the internet. As society continues to modernize, these memories slowly fade away, losing a powerful part of our history. Technology is a powerful force that has continued to develop and mold itself around the modernization of our society. Kids today now have the power to browse the internet, send messages and make calls from watches on their hands and iPhones that cost the equivalent of one month’s rent for some people. Technology has thus demonstrated a consistent trend toward innovations as a result of improving upon current ones. Despite this trend, with innovations we see our freedom dwindle less and less as individuals find ways to use our data for personal gains unbeknownst to some, but not all. Some individuals are aware that they are being watched but the benefits of having that technology allow them to turn their head as Big Brother Watches.
 
Changed:
<
<
In his book 1984, George Orwell said “Power is not a means; it is an end. One does not establish a dictatorship to safeguard a revolution; one makes the revolution to establish a dictatorship…The object of power is power.” The modernization of the internet and technology is the revolution that Orwell mentions, and the NSA can be viewed as the dictators of our society. Since its creation in 1952, When President Harry S. Truman issued a secret executive order establishing the NSA as the hub of the government’s foreign intelligence activities, the agency has been covertly spying on Americans, listening in on their phone calls, reading their mail, and monitoring their communications.
>
>
In the early 2000s, many households only had access to one computer, and individuals within the home could not use the telephone when they were connected to the internet. In today’s society, kids as young as 5 have access to the world through their handheld devices. Despite the burning sensation from cellphones and software malfunctions from laptops, it would be an extraneous task to try to remove the technology from these individuals.
 
Deleted:
<
<
 
Changed:
<
<
This claim needs some evidence. So far as I know, until after September 2001 the NSA understood itself as legally prohibited from listening to Americans within the US. Americans abroad were supposed to be listened to only where that incidentally resulted from listening to non-US parties, and strict procedures for "masking" and "minimizing" were supposed by both outsiders and NSA lawyers to be absolutely required. This is what changed after the inception of the "war on terrorism," primarily but not exclusively during the Bush-Cheney Administration, and at which Snowden's disclosures, along with other whistles blown by Binney and Drake, were primarily aimed. I summarized this aspect of the situation in the first part of Snowden and the Future.
>
>
In January 2019, Apple disabled its Group FaceTime? feature in iPhones after multiple reports that users could initiate a FaceTime? call and begin listening in on a recipient’s audio without them picking up the call or knowing they were being monitored. The bug occurred after a user-initiated a FaceTime? video call with another iPhone or device running iOS and added themselves to the call while it was dialing. This created a conference call that allowed the user to eavesdrop on the audio transmitted by the recipient. This security lapse is especially significant because, like other software companies, Apple markets itself as a consumer tech company dedicated to privacy and security. While many of the apps we have on our phones can be beneficial to us, we are sacrificing a lot of our privacy by using these apps. Privacy is slowly diminishing and as kids are growing up in modern society, they will have no concept of privacy. They will also not have the ability to understand that nothing digital is ever forgotten or destroyed.
 
Deleted:
<
<
 
Changed:
<
<
The passage of the Foreign Intelligence Surveillance Act and the creation of the FISA Court brought some hope. However, it ultimately did not curtail the NSA’s illegal activities. In the aftermath of the 9/11 attacks, George W. Bush secretly authorized the NSA to conduct warrantless surveillance on American's phone calls and emails. Things did not get any better under President Barack Obama. Violations worsened, with the NSA being authorized to collect internet and telephone data from millions of Americans. It was only after Edward Snowden’s 2013 outburst that the American people fully understood the extent to which they were being betrayed once again.
>
>
After the NSA leaks, Americans were divided about the impact of the leaks immediately following Snowden’s disclosures, but according to a Pew Research Center survey, about half of Americans (49%) said the release of the classified information served the public interest, while 44% said it harmed the public interest. At the same time, 54% of the public said the government should pursue a criminal case against the person responsible for the leaks, a view more commonly held among Republicans and Democrats (59% each) than independents (48%). The share of Americans who disapproved of the government’s collection of telephone and internet data as part of anti-terrorism efforts increased from 47% in the days after the initial disclosure to 53% the following January. Fast forward to today, many people are aware of the lack of privacy that they have when it comes to their technology. It was very prevalent based on user reaction to the Apple FaceTime? bug. Despite this revelation and many others like it, people are still using the same apps that are lacking true privacy. These individuals are willingly accepting privacy policies that are designed to give users ultimatums.
 
Deleted:
<
<
Despite all this information that was released, people still use all the technology in the world and carry on like everything is okay. Corporate trackers monitor such things as purchases, web browsing, Facebook posts, and other activities in the cyber world. Certain credit cards are monitored when you purchase things at stores and are mined for data and essentially sold to the highest bidder. Uber’s ride service app knows where you are even when you are not actively using the app. The question is, how can we go on living in a society without these things in our life. If we turn each corner Big Brother is still watching.
 
Changed:
<
<
1984 has never been so prevalent as it is today. When we eat, drink, sleep or swipe our information is being monitored, but that doesn’t seem to scare people at all. I am at fault for this as well because I still use all of these apps and I still post on social media. However, our generation has gotten so hung up on these things that we feel are the basis of our society. Before the noise of the modem connecting to the internet, we didn’t have access to the world wide web. Before that we didn’t have access to computers, at least I didn’t. Back then we made do with what we had, and we engaged with people because we were living in the moment. As time passed, we saw less and less of that. People today have no sense of engagement and cannot take their eyes off their screens. What a life that will be if people just looked up more often.
>
>
As much as we can blame users for the usage of these apps and other technology that put them at risk, the blame is not solely on them. An analyst described that when a user of apps like WhatsApp? , Facebook, Snapchat, Instagram…etc., grants access to their camera and microphone, the app could do the following: access both the front and back camera; record you at any time the app is in the foreground; take pictures and videos without telling you; and, upload the pictures and videos without telling you. App producers should find ways to put users’ rights first, so their information is not put in jeopardy. Although there are privacy regulations in place, there needs to be better regulations to protect users. As well as details of your device such as the model, name and phone number these trackers can you’re your email address, the IP address that is allocated to your internet connection and even your precise location. Everything from music streaming and weather apps, through to news and storage apps are doing it.
 
Deleted:
<
<
I am not sure if there is a true solution to this problem of the modernization of technology. However, there is a solution to Big Brother’s eyes on us and the corporate trackers using our information. We have become so accustomed to having the world in our hands and the thought of giving it up is a hard choice to make. However, it is a choice that we have to make to preserve who we are and preserve our society.

Perhaps the better angle is to ask how much we would not have to give up if we redesigned the technology to put users' rights, including their privacy rights, first rather than last in the objectives of technology design.

I think this is a good first draft. It could use some attention to sentence-level editing. Sentences like

Technology has thus demonstrated a consistent trend toward innovations as a result of improving upon current ones. Despite this trend, with innovations we see our freedom dwindle less and less as individuals find ways to use our data for personal gains unbeknownst to some, but not all.
could use a little work. But the most important path to improvement is to get the reader over the "tradeoffs between convenience and privacy" speed bump. How much could we have of what we want and still protect our privacy in ways we don't do now? If the reader is informed about that, her life and the lives of those around her might actually change.
 
Added:
>
>
A good first step for counteracting these issues is to always make sure to cover your webcam with tape and cover your phone camera when possible. Apps like LinkedIn? does not need camera access. Apps like Twitter does not require microphone access. Before you download an app, check the reviews and search for any negative information about it to prevent yourself from future harm. You never know who’s watching, or what’s happening in the background on your device. You do not want to take precautions when it is too late.
 

ChevaunSamuelsFirstEssay 2 - 25 Nov 2019 - Main.EbenMoglen
Line: 1 to 1
 
META TOPICPARENT name="FirstEssay"
Deleted:
<
<
It is strongly recommended that you include your outline in the body of your essay by using the outline as section titles. The headings below are there to remind you how section and subsection titles are formatted.
 

Big Brother Is Still Watching

Line: 14 to 13
  In his book 1984, George Orwell said “Power is not a means; it is an end. One does not establish a dictatorship to safeguard a revolution; one makes the revolution to establish a dictatorship…The object of power is power.” The modernization of the internet and technology is the revolution that Orwell mentions, and the NSA can be viewed as the dictators of our society. Since its creation in 1952, When President Harry S. Truman issued a secret executive order establishing the NSA as the hub of the government’s foreign intelligence activities, the agency has been covertly spying on Americans, listening in on their phone calls, reading their mail, and monitoring their communications.
Added:
>
>

This claim needs some evidence. So far as I know, until after September 2001 the NSA understood itself as legally prohibited from listening to Americans within the US. Americans abroad were supposed to be listened to only where that incidentally resulted from listening to non-US parties, and strict procedures for "masking" and "minimizing" were supposed by both outsiders and NSA lawyers to be absolutely required. This is what changed after the inception of the "war on terrorism," primarily but not exclusively during the Bush-Cheney Administration, and at which Snowden's disclosures, along with other whistles blown by Binney and Drake, were primarily aimed. I summarized this aspect of the situation in the first part of Snowden and the Future.

  The passage of the Foreign Intelligence Surveillance Act and the creation of the FISA Court brought some hope. However, it ultimately did not curtail the NSA’s illegal activities. In the aftermath of the 9/11 attacks, George W. Bush secretly authorized the NSA to conduct warrantless surveillance on American's phone calls and emails. Things did not get any better under President Barack Obama. Violations worsened, with the NSA being authorized to collect internet and telephone data from millions of Americans. It was only after Edward Snowden’s 2013 outburst that the American people fully understood the extent to which they were being betrayed once again.

Despite all this information that was released, people still use all the technology in the world and carry on like everything is okay. Corporate trackers monitor such things as purchases, web browsing, Facebook posts, and other activities in the cyber world. Certain credit cards are monitored when you purchase things at stores and are mined for data and essentially sold to the highest bidder. Uber’s ride service app knows where you are even when you are not actively using the app. The question is, how can we go on living in a society without these things in our life. If we turn each corner Big Brother is still watching.

Line: 23 to 38
  I am not sure if there is a true solution to this problem of the modernization of technology. However, there is a solution to Big Brother’s eyes on us and the corporate trackers using our information. We have become so accustomed to having the world in our hands and the thought of giving it up is a hard choice to make. However, it is a choice that we have to make to preserve who we are and preserve our society.

Added:
>
>

Perhaps the better angle is to ask how much we would not have to give up if we redesigned the technology to put users' rights, including their privacy rights, first rather than last in the objectives of technology design.

I think this is a good first draft. It could use some attention to sentence-level editing. Sentences like

Technology has thus demonstrated a consistent trend toward innovations as a result of improving upon current ones. Despite this trend, with innovations we see our freedom dwindle less and less as individuals find ways to use our data for personal gains unbeknownst to some, but not all.
could use a little work. But the most important path to improvement is to get the reader over the "tradeoffs between convenience and privacy" speed bump. How much could we have of what we want and still protect our privacy in ways we don't do now? If the reader is informed about that, her life and the lives of those around her might actually change.

 

ChevaunSamuelsFirstEssay 1 - 11 Oct 2019 - Main.ChevaunSamuels
Line: 1 to 1
Added:
>
>
META TOPICPARENT name="FirstEssay"
It is strongly recommended that you include your outline in the body of your essay by using the outline as section titles. The headings below are there to remind you how section and subsection titles are formatted.

Big Brother Is Still Watching

-- By ChevaunSamuels - 11 Oct 2019

Of all the noises that I will never forget growing up, the one that always sticks out to me the most and is nearest to my heart is not from my friends, songs nor a television show. Instead, it’s the sound of a modem connecting with another modem and yelling to my cousins that they need to get off the phone. It was the joyous noise of being part of the beginning of the internet and the power to immerse myself in a whole new world. Growing up this was our only computer in the house, and we had to make do with what we had. We found ways to get our homework done and late in the nights when everyone was sleeping and had no need for the telephones, we would play Disney Channel games and watch random YouTube? videos.

Today’s generation will never know the patience it took to connect to the internet. As society continues to modernize, these memories slowly fade away, losing a powerful part of our history. Technology is a powerful force that has continued to develop and mold itself around the modernization of our society. Kids today now have the power to browse the internet, send messages and make calls from watches on their hands and iPhones that cost the equivalent of one month’s rent for some people. Technology has thus demonstrated a consistent trend toward innovations as a result of improving upon current ones. Despite this trend, with innovations we see our freedom dwindle less and less as individuals find ways to use our data for personal gains unbeknownst to some, but not all. Some individuals are aware that they are being watched but the benefits of having that technology allow them to turn their head as Big Brother Watches.

In his book 1984, George Orwell said “Power is not a means; it is an end. One does not establish a dictatorship to safeguard a revolution; one makes the revolution to establish a dictatorship…The object of power is power.” The modernization of the internet and technology is the revolution that Orwell mentions, and the NSA can be viewed as the dictators of our society. Since its creation in 1952, When President Harry S. Truman issued a secret executive order establishing the NSA as the hub of the government’s foreign intelligence activities, the agency has been covertly spying on Americans, listening in on their phone calls, reading their mail, and monitoring their communications.

The passage of the Foreign Intelligence Surveillance Act and the creation of the FISA Court brought some hope. However, it ultimately did not curtail the NSA’s illegal activities. In the aftermath of the 9/11 attacks, George W. Bush secretly authorized the NSA to conduct warrantless surveillance on American's phone calls and emails. Things did not get any better under President Barack Obama. Violations worsened, with the NSA being authorized to collect internet and telephone data from millions of Americans. It was only after Edward Snowden’s 2013 outburst that the American people fully understood the extent to which they were being betrayed once again.

Despite all this information that was released, people still use all the technology in the world and carry on like everything is okay. Corporate trackers monitor such things as purchases, web browsing, Facebook posts, and other activities in the cyber world. Certain credit cards are monitored when you purchase things at stores and are mined for data and essentially sold to the highest bidder. Uber’s ride service app knows where you are even when you are not actively using the app. The question is, how can we go on living in a society without these things in our life. If we turn each corner Big Brother is still watching.

1984 has never been so prevalent as it is today. When we eat, drink, sleep or swipe our information is being monitored, but that doesn’t seem to scare people at all. I am at fault for this as well because I still use all of these apps and I still post on social media. However, our generation has gotten so hung up on these things that we feel are the basis of our society. Before the noise of the modem connecting to the internet, we didn’t have access to the world wide web. Before that we didn’t have access to computers, at least I didn’t. Back then we made do with what we had, and we engaged with people because we were living in the moment. As time passed, we saw less and less of that. People today have no sense of engagement and cannot take their eyes off their screens. What a life that will be if people just looked up more often.

I am not sure if there is a true solution to this problem of the modernization of technology. However, there is a solution to Big Brother’s eyes on us and the corporate trackers using our information. We have become so accustomed to having the world in our hands and the thought of giving it up is a hard choice to make. However, it is a choice that we have to make to preserve who we are and preserve our society.


You are entitled to restrict access to your paper if you want to. But we all derive immense benefit from reading one another's work, and I hope you won't feel the need unless the subject matter is personal and its disclosure would be harmful or undesirable. To restrict access to your paper simply delete the "#" character on the next two lines:

Note: TWiki has strict formatting rules for preference declarations. Make sure you preserve the three spaces, asterisk, and extra space at the beginning of these lines. If you wish to give access to any other users simply add them to the comma separated ALLOWTOPICVIEW list.


Revision 4r4 - 09 Jan 2020 - 10:59:00 - EbenMoglen
Revision 3r3 - 04 Dec 2019 - 05:34:00 - ChevaunSamuels
Revision 2r2 - 25 Nov 2019 - 15:37:11 - EbenMoglen
Revision 1r1 - 11 Oct 2019 - 17:18:21 - ChevaunSamuels
This site is powered by the TWiki collaboration platform.
All material on this collaboration platform is the property of the contributing authors.
All material marked as authored by Eben Moglen is available under the license terms CC-BY-SA version 4.
Syndicate this site RSSATOM