Slashdot is powered by your submissions, so send in your scoop

 



Forgot your password?
typodupeerror

Comment Re:What really went wrong (Score 1) 100

The food analogy doesn’t quite hold. If you serve food in China, of course you follow Chinese rules.
But if you export that food to the U.S. and it violates FDA standards, you can’t just say: “It’s America’s job to block it, I’m not responsible.”

That’s not how cross-border regulation works. Whether it’s baby formula, toys, or online services, if you reach into another market, you’re expected to comply with that market’s laws.

The same principle applies to digital services. If your service is accessible in the EU, handles EU users, or processes their data, you’re not invisible just because your server is elsewhere. You’re subject to their law, just like any other import.

This isn’t unique to the EU. The U.S. enforces this logic all the time, with embargoes, export/import controls, and extraterritorial data access laws.
It’s not “stupid.” It’s sovereignty. And pretending you’re exempt just because the internet crosses borders doesn’t make the laws go away.

The real problem isn’t that there are rules. It’s that digital systems weren’t built to handle jurisdictional nuance.
But saying “Ignore foreign laws unless they block you at the firewall” isn’t legal minimalism, it’s wishful thinking.

Comment Re:What really went wrong (Score 1) 100

I get the impulse, a lot of people are fed up with legal chaos. "Server = jurisdiction" feels clean, simple, and under your control. But that model’s been dead since at least GDPR. That would require every country to agree or surrender their data laws to foreign servers. That’s never going to happen. These days, you’re accountable not just for where the server is, but where the user is and who they are.

If you offer a service used in the EU, that service falls under EU law.
If that service is accessed abroad by an EU resident, it’s still subject to EU law.
And if the country they're in has conflicting requirements (say, a U.S. preservation order vs. GDPR)? You may have no choice but to block access or suspend the service, at least for that user, in that location.

So the problem isn’t just "too many laws." It’s that systems weren’t built to track legal context, what laws apply, to whom, and where.

We don’t need to ditch jurisdictions. We need systems that can say:
“This user is German, they’re in the U.S., these two laws conflict, block until legal basis is clear.”

That’s not regulatory overkill. That’s defensive architecture.

Comment What really went wrong (Score 1) 100

A U.S. judge initially asked OpenAI to preserve only chats that users had deleted, a narrowly targeted legal hold intended to balance evidentiary needs with user privacy. But when OpenAI said it couldn't isolate those chats without risking violations of European privacy law, the court issued a sweeping, all-user retention order instead.

At the heart of the dispute is a deeper design flaw: OpenAI built its system without distinguishing data by “service jurisdiction”, whether a conversation was handled under U.S. or EU legal frameworks. That means it couldn’t preserve U.S.-relevant logs without potentially breaching GDPR, nor delete EU data without violating a U.S. court order.

The outcome: a blunt, global mandate rooted not just in legal complexity, but in the absence of a jurisdiction-aware data architecture.

In the age of global services, legal nuance starts at the design phase, or comes back as a court order.

Comment Re:Out of curiosity (Score 1) 31

AWS’s ESC (German parent, EU-only CA, EU SOC, code escrow) delivers 99 % of the real-world sovereignty most companies need without Brussels writing a €50 billion check. If that last 1 % isn’t enough, lobby for a pan-EU hyperscaler... just don’t expect it this decade.

Comment Not just fraud ... (Score 5, Informative) 55

While the headline frames this as a quirky “laptop farm” scam, the DOJ filings show it’s far more serious:

- This wasn’t a typical remote-work fraud. It was a structured operation involving North Korean IT workers, false identities, and money laundering, with explicit goals of evading sanctions and funding the DPRK regime.
- Over 300 U.S. companies, including Fortune 500s, were unknowingly infiltrated. Some of the targets were strategic industries (aerospace, media, finance).
- Workers didn’t just "do the job", they did it under stolen identities, triggering false tax liabilities and access to internal systems, with implications for both data security and federal compliance.

Calling this “just wage theft” is like calling a phishing campaign "email misunderstandings." It misses the real issue: this was a nation-state operation masked as freelance tech work.

https://ancillary-proxy.atarimworker.io?url=https%3A%2F%2Fwww.justice.gov%2Fusao-d...
https://ancillary-proxy.atarimworker.io?url=https%3A%2F%2Fwww.justice.gov%2Fusao-d...

Comment Re:Delhaze/Ahold always overcharges customers (Score 3, Insightful) 72

Overpricing isn’t illegal, deception is. Shein isn’t under fire for being cheap or expensive, but for violating specific consumer rights: fake discounts, false urgency, misrepresented return policies, and lack of transparency. If Delhaize or Ahold does something similar, they can and should be investigated too, but the comparison only holds if the violations are legally equivalent.

Comment A system eating its own tail (Score 2) 95

The article is technically detailed but misleading: it praises Apple’s BlastDoor for "working as designed," which is true, but misses the point. The real issue is that Apple’s own transcription system injects invalid XHTML into a security-critical pipeline. The ampersand isn’t escaped, breaking XML compliance, so BlastDoor (correctly) discards the message. This isn’t a security topic it’s Apple breaking its own rules, then silently failing. A system eating its own tail.

Comment Re:Because Vietnam is an evil communist dictatorsh (Score 1) 46

Vietnam is indeed authoritarian, and it does target organized dissent, especially when it spreads through public, unmoderated channels like Telegram.
But the ban isn’t just about dissent or encryption. Telegram was also banned for refusing to cooperate in major fraud investigations involving scams, gambling, and financial crime.
Other secure apps like Signal, WhatsApp, Viber and many other are still available in Vietnam, because they don’t combine public virality, anonymity, and total non-cooperation.
So, this isn’t simply about crushing dissent. It’s about a platform that enables large-scale abuse and blocks any path to justice.

Comment Re:Fraud haven (Score 1) 46

Telegram might feel like other chat apps on the surface, but it’s not. Most others don’t offer searchable public channels, anonymous admin structures, bot networks, or mass group forwarding, all without any meaningful moderation. That’s what makes Telegram unique, and uniquely exploitable.

Comment Re:Criminals (Score 1) 46

Because only criminals need encryption?

No, this isn’t about encryption being bad or used only by criminals. It’s about a platform enabling large-scale public abuse and refusing any cooperation, even when harm is real and targeted. Other encrypted apps respect privacy too but they don’t build in tools that scale harm and block justice. That’s not privacy, it’s impunity.

Comment Re:Fraud haven (Score 1) 46

Telegram, in my experience, is one of the worst fraud havens on the planet

Sorry, the correct answer is Youtube.

The OP never claimed Telegram was the worst, just that it’s one of the worst.
So trying to refute it by naming another contender is a misframing ... and that’s where the whataboutism kicks in.

Comment Re:Fraud haven (Score 1) 46

Telegram isn’t just a chat app, it’s a massive, unmoderated broadcasting platform with features like searchable public channels, anonymous admins, bots, and huge groups. The issue isn’t just ignoring court orders, it’s designing a system where abuse scales and justice can’t reach in.

Slashdot Top Deals

It has just been discovered that research causes cancer in rats.

Working...