debanqued

joined 3 years ago
 

The two situations are kind of similar. Whether a friend is using an “Invite a friend” mechanism or they are syncing their address book, either way their shitty choice of controller is getting my personal data. And in both cases the data controller proactively implements code to facilitate the sharing.

Also seems to reinforce my previous conjecture: E-mail fundamentally incompatible with the GDPR

I suppose the difference is that invite-a-friend is purely a data share, whereas other cases are to facilitate the data subject’s use of the service.

[–] debanqued@beehaw.org 1 points 1 month ago* (last edited 1 month ago) (1 children)

I’m surprised no one mentioned emacs. I’ve not done much with version control lately but back when I was coding at a day job, emacs was king. All the important version control functions are mapped to key bindings and macros.

Emacs functions graphically with a mouse for novices, which makes it good for starting off. Then as you get more advanced you memorise bindings for frequent functions so the mouse slows you down less and less. The default keybindings in emacs have become ubiquitous so e.g. many of the emacs bindings work in BASH and other apps. So when you learn emacs, your knowledge becomes portable outside of emacs.

A lot of the same can be said for vi variants. But that’s mostly it. Editors other than emacs and vi are isolated and less powerful -- though I’ve not really looked hard outside of emacs lately so things may have changed.

[–] debanqued@beehaw.org 2 points 1 month ago

I would not interact on a centralised Cloudflare node like LW. But I still appreciate your suggestion because it might inspire me to check with some of these decentralised venues:

  • krabb.org/c/selfhosted
  • europe.pub/c/SelfHosted
  • lemmy.nexus/c/selfhosted
  • lemmy.rmict.nl/c/selfhost
  • selfhosted.forum/c/main
[–] debanqued@beehaw.org 3 points 2 months ago* (last edited 2 months ago) (3 children)

That looks useful for sure. Not sure what it does as far as direct PC-phone transactions but I think it would help with some of my needs.

It apparently uses a server for a lot of things, but in some cases that will be useful, such as reaching heavily restricted websites.

(edit: I don’t find the phone app.. i wonder if the jar file can run on android)

[–] debanqued@beehaw.org 3 points 2 months ago (1 children)

sideload what, exactly?

To get apps, I usually bring a tor-only laptop into a cafe and download apk files, then later sideload them using adb. But this does nothing to solve the problem I described.

[–] debanqued@beehaw.org 4 points 2 months ago* (last edited 2 months ago)

Oh, sorry about the confusion. Indeed I framed it in the context of software we need, then crossposted to relevant groups. I will adjust the title.

I should add that part of the idea is to solicit suggestions from those who have perhaps hacked something together.

 

cross-posted from: https://beehaw.org/post/23925690

the problem

The web is littered with enshitified Tor-hostile resources generally deployed with the naive idea that Tor users are criminals. The Tor community can barely function. The web is broken in countless ways and it’s not always obvious whether Tor users are targeted by the marginalisation because firewalls never state why they are blocking. Sometimes they block based on geolocation or user-agent strings, and sometimes a resource is simply down for everyone. Tor users are left assuming their exit node IP is the culprit.

Also a problem: some people actually have no Internet at home. For some it is temporary and for others it is a permanent way of living a mostly analog life.

the solution (for many cases)

Use the clearnet at a cafe with open access. Of course it’s unreasonable to haul a desktop computer into a cafe or to carry a laptop at all times, so it would be useful to send fetch orders from your PC to your phone. When the phone connects to public Wi-Fi, you tap to execute the queue of fetch orders. Then when back at your PC you download the fulfilled orders from the phone.

This could even be useful within the home, since the block or malfunction can be a number of things. A smartphone could try to execute fetch orders over Orbot, which may or may not fail. And if it fails, it remains an unfulfilled order to retry in a cafe.

Aria2 would be perfect for the underlying heavy lifting because it supports many protocols (HTTP, FTP, bittorrent), and it exists on both the PC and Android. The Android code is apparently just a backend. It’s broken or useless on its own and needs a controller such as the app proposed here.

insufficient alternatives

The usual workarounds have compromises. A VPN may or may not work but it’s still a bit far from anonimity. The VPN provider is essentially like another ISP who can snoop on you.

Download managers already exist on smartphones, but there is no seamless PC interoperability. And (AFAIK) they are just for simple files, not for webpages or Youtube videos.

There is Newpipe but it has no PC interoperability. You must search YT using the Newpipe UI.

 

cross-posted from: https://beehaw.org/post/23925690

the problem

The web is littered with enshitified Tor-hostile resources generally deployed with the naive idea that Tor users are criminals. The Tor community can barely function. The web is broken in countless ways and it’s not always obvious whether Tor users are targeted by the marginalisation because firewalls never state why they are blocking. Sometimes they block based on geolocation or user-agent strings, and sometimes a resource is simply down for everyone. Tor users are left assuming their exit node IP is the culprit.

Also a problem: some people actually have no Internet at home. For some it is temporary and for others it is a permanent way of living a mostly analog life.

the solution (for many cases)

Use the clearnet at a cafe with open access. Of course it’s unreasonable to haul a desktop computer into a cafe or to carry a laptop at all times, so it would be useful to send fetch orders from your PC to your phone. When the phone connects to public Wi-Fi, you tap to execute the queue of fetch orders. Then when back at your PC you download the fulfilled orders from the phone.

This could even be useful within the home, since the block or malfunction can be a number of things. A smartphone could try to execute fetch orders over Orbot, which may or may not fail. And if it fails, it remains an unfulfilled order to retry in a cafe.

Aria2 would be perfect for the underlying heavy lifting because it supports many protocols (HTTP, FTP, bittorrent), and it exists on both the PC and Android. The Android code is apparently just a backend. It’s broken or useless on its own and needs a controller such as the app proposed here.

insufficient alternatives

The usual workarounds have compromises. A VPN may or may not work but it’s still a bit far from anonimity. The VPN provider is essentially like another ISP who can snoop on you.

Download managers already exist on smartphones, but there is no seamless PC interoperability. And (AFAIK) they are just for simple files, not for webpages or Youtube videos.

There is Newpipe but it has no PC interoperability. You must search YT using the Newpipe UI.

 

cross-posted from: https://beehaw.org/post/23925690

the problem

The web is littered with enshitified Tor-hostile resources generally deployed with the naive idea that Tor users are criminals. The Tor community can barely function. The web is broken in countless ways and it’s not always obvious whether Tor users are targeted by the marginalisation because firewalls never state why they are blocking. Sometimes they block based on geolocation or user-agent strings, and sometimes a resource is simply down for everyone. Tor users are left assuming their exit node IP is the culprit.

Also a problem: some people actually have no Internet at home. For some it is temporary and for others it is a permanent way of living a mostly analog life.

the solution (for many cases)

Use the clearnet at a cafe with open access. Of course it’s unreasonable to haul a desktop computer into a cafe or to carry a laptop at all times, so it would be useful to send fetch orders from your PC to your phone. When the phone connects to public Wi-Fi, you tap to execute the queue of fetch orders. Then when back at your PC you download the fulfilled orders from the phone.

This could even be useful within the home, since the block or malfunction can be a number of things. A smartphone could try to execute fetch orders over Orbot, which may or may not fail. And if it fails, it remains an unfulfilled order to retry in a cafe.

Aria2 would be perfect for the underlying heavy lifting because it supports many protocols (HTTP, FTP, bittorrent), and it exists on both the PC and Android. The Android code is apparently just a backend. It’s broken or useless on its own and needs a controller such as the app proposed here.

insufficient alternatives

The usual workarounds have compromises. A VPN may or may not work but it’s still a bit far from anonimity. The VPN provider is essentially like another ISP who can snoop on you.

Download managers already exist on smartphones, but there is no seamless PC interoperability. And (AFAIK) they are just for simple files, not for webpages or Youtube videos.

There is Newpipe but it has no PC interoperability. You must search YT using the Newpipe UI.

 

the problem

The web is littered with enshitified Tor-hostile resources generally deployed with the naive idea that Tor users are criminals. The Tor community can barely function. The web is broken in countless ways and it’s not always obvious whether Tor users are targeted by the marginalisation because firewalls never state why they are blocking. Sometimes they block based on geolocation or user-agent strings, and sometimes a resource is simply down for everyone. Tor users are left assuming their exit node IP is the culprit.

Also a problem: some people actually have no Internet at home. For some it is temporary and for others it is a permanent way of living a mostly analog life.

the solution (for many cases)

Use the clearnet at a cafe with open access. Of course it’s unreasonable to haul a desktop computer into a cafe or to carry a laptop at all times, so it would be useful to send fetch orders from your PC to your phone. When the phone connects to public Wi-Fi, you tap to execute the queue of fetch orders. Then when back at your PC you download the fulfilled orders from the phone.

This could even be useful within the home, since the block or malfunction can be a number of things. A smartphone could try to execute fetch orders over Orbot, which may or may not fail. And if it fails, it remains an unfulfilled order to retry in a cafe.

Aria2 would be perfect for the underlying heavy lifting because it supports many protocols (HTTP, FTP, bittorrent), and it exists on both the PC and Android. The Android code is apparently just a backend. It’s broken or useless on its own and needs a controller such as the app proposed here.

insufficient alternatives

The usual workarounds have compromises. A VPN may or may not work but it’s still a bit far from anonimity. The VPN provider is essentially like another ISP who can snoop on you.

Download managers already exist on smartphones, but there is no seamless PC interoperability. And (AFAIK) they are just for simple files, not for webpages or Youtube videos.

There is Newpipe but it has no PC interoperability. You must search YT using the Newpipe UI.

[–] debanqued@beehaw.org 1 points 4 months ago* (last edited 4 months ago)

It means that for more than 30 days, you’ll be unable to send or receive emails that have to do with that email provider.

I’m not sure how you arrive at that. Whether you file a GDPR Art.77 complaint is independent of how you ultimately decide to reach the other party.

This is not what I would do but this is what most activists would do:

  1. Use a residential dynamic IP address to attempt to send an email to a recipient whose data processor (email provider) is Microsoft.
  2. Keep the logs of the MS server refusing you.
  3. File an Art.77 GDPR complaint against MS.
  4. In parallel, use a different webmail account to email your correspondent. Ideally wait a week or two after filing the GDPR complaint.

The fact that your webmail provider can reach MS does not obviate your Art.77 complaint.

Personally, I have indeed quit sending email. When I need to reach an MS recipient, I use fax or snail mail and I do not give them an email address, thus forcing them to respond by snail mail. Most people will not elevate ethics above convenience like that, but to each his own.

but not being able to receive them gets really problematic.

That’s a separate matter and it depends on what email address you supply. You can attempt to send from your own server using any email address you want, even an @gmail.com address if that’s your thing. The email address you share with the other party need not be one that associates to your mail server.

I personally do not even share an email address with MS users, so those users can only reach me by postal mail. But of course this move requires a higher level of discipline on your part.

[–] debanqued@beehaw.org 1 points 4 months ago (2 children)

Thanks. That may indeed be a good answer.

I’m confused because it claims to work offline yet it’s also p2p and uses no centralised server. Perhaps mgs queue up until both parties are simultaneously connected at some point? Guess I’ll have to study it more.

[–] debanqued@beehaw.org 1 points 6 months ago (2 children)

Fighting for your rights… with gdpr, yeah, I’m sometimes doing it, but the problem is, sometimes tcompanies fail to respond … and if they take 30 days… or longer to give a response you’re really at a huge loss

Not sure what you mean by being at a huge loss. Filing a GDPR complaint is gratis, by law. It’s indeed typical that data controllers ignore complaints. After 30 days of ignoring your request, you have a sound case for an art.77 complaint. The DPA will also likely do nothing, but you’re not at a loss for complaining. If the DPA decides to simply contact the data controller, they will dance. The case will still go nowhere, but the data controller will respond to the DPAs inquiry, if they make one.

[–] debanqued@beehaw.org 1 points 6 months ago* (last edited 6 months ago)

The options (1) use black box, (2) start a tech company, as you presented in the bakery case, is a false dichotomy. Managed open source is the middleground.

It’s a false middleground. It is still taking on the burden of tech knowledge. It’s a true dichotomy, as follows:

① use a black box
② become technical

(or trichotomy if you figure the baker can nix email)

You still have to understand what’s going on in the FOSS box even if it’s managed -- otherwise you are in the same position. The point in being managed is to perform the work you don’t understand. That managed box is still likely to use a Spamhaus gatekeeper or the like which the baker has no clue about. The baker is still unlawfully using AIDM, unwittingly, because he just saw the ad for the managed service saying “spam free” -- thinks that’s good but has no idea what questions to ask or how it can go badly. He could just as well ask the relevant questions to the blackbox provider. Just the same, his business carries on uninformed about GDPR infringement.

BTW, you’re also wrong about managed open source services giving you the needed info, even if the customer is highly technical. I use a managed service of FOSS s/w. I can see the source code that runs on the box but I cannot see how it is installed or configured. The account dashboard I get is nannied subset of control. I can do basic tasks like create users, but I cannot see the backend configs or even an inventory of other software running on the host. There could be all kinds of snooping and shenanigans on that host and I have no way of verifying it. It could be littered with AIDM abuses, but I don’t have a root shell account on that host.

It’s the same problem in the end. The data processors have no legal accountability for the logic that they control. At the same time, they are not even required to disclose the AIDM logic, or even the existence of it, to the data controller. Yet the controller is exclusively liable for what they potentially do not control -- or even have awareness of. This is all still possible if the processor runs a managed open source service.

[–] debanqued@beehaw.org 1 points 6 months ago* (last edited 6 months ago) (2 children)

Exactly: don’t use the black box.

That is not what I said. I never said don’t use it. I said black boxes bring problems that require sensible policy.

Of course it makes sense to use black boxes. Someone running a bakery does not have the competency and resources to deploy an email service. Outsourcing email is the only option that makes the business case viable, unless they discard email entirely, in which case they lose business from customers who insist on emailing orders. From there, all processors are black boxes. There is no email provider who gives you the keys to castle. And even if they did, as a baker you wouldn’t know what you’re looking at anyway. Your choice is, use the black box or get into the tech business.

Not even Microsoft can handle email alone. They outsource to Spamhaus, another black box. And Spamhaus outsources to Cloudflare -- yet another black box.

 

Ireland has their own data protection act which largely mirrors the GDPR. I first have to wonder why. Why rewrite an EU regulation, if not to do something twisted? IIUC, Ireland is part of the EU thus automatically obligated to enforce the full GDPR as-is. (Unlike Great Britain, who left the union but decided voluntarily to keep the GDPR, so they had to mirror it and rewrite some parts that are irrelevant to an EU outsider). Or is Ireland somehow outside the EU too, yet with the Euro?

Art.18, the right to restriction of processing, has been expanded from a ½ page to several pages full of loopholes and exceptions watered down to the point of data subjects not really getting this right.

Art.21, the right to object, has been torn out completely (not mirrored at all), but there is a blurb about removing the right to object specifically giving policians an exemption on election matters, and postal service matters.

If they add a restriction on the right and say nothing more on it, then I suppose that implies the art.21 right is otherwise in force, correct? It’s bizarre because other GDPR sections have been redundantly rewritten to very similarly reflect the GDPR. So I’m trying to make sense of what it means when redundancy is in place sometimes and not others. And what happens when a redundant section of code has a silent omission with no language to explicitly state intent to dishonor the omitted part.

There are some peculiar omissions from the duty of data processors as well.

I have not read it completely but I did not notice any Irish law that strengthens data protection. I only see shenanigans that work against data subjects.

Is it fair to say that tech giants love Ireland and put their HQ there for tax purposes, where the EU’s version of Silicon Valley is expected to be established, which then effectively pressures Ireland to weaken the GDPR as much as possible to maintain that attraction?

[–] debanqued@beehaw.org 1 points 6 months ago* (last edited 6 months ago) (4 children)

It’s a black box. You can’t know what you don’t know when the information is concealed. Blackboxes can be tested (we call it blackbox testing). But it is inferior to clearbox testing. It’s too costly and ineffecient to wholly rely on. The giant processor has the resources to disclose their use of AIDM. The micro-controller (as in small data controller) does not have the resources to exhaustively simulate hundreds or thousands of demographics of people. They don’t even have the competency to be aware of all the demographics. It’s guesswork and it’s a non-starter. If the controller had that kind of resources, they would not be outsourcing the first place. Not only is it impractical, it’s also inefficient. To have thousands of small businesses and agencies carry out duplicated tests is an extremely wasteful use of resources and manpower. It just makes no sense. The processor already knows who they discriminate against.

The blackbox testing happens to some extent regardless. But there is no incentive to do the testing before deployment. The shitshow we call /GDPR enforcement/ ensures that data controllers do their testing on the public. Which means people are harmed in the process of testing because it’s cheaper for the controller (who knows their chances are low of getting penalised by DPAs who are up to their necks in 10× the workload they can handle).

[–] debanqued@beehaw.org 1 points 6 months ago* (last edited 6 months ago) (6 children)

They should! That’s the point! They shouldn’t use bad products, regardless of if it’s home made, from a small 3rd party, or a large 3rd party.

Yes they should, but investigative journalists are not a competent way to have that information disclosed. When the processor secretly uses AIDM and conceals that from the controller, holding the controller EXCUSIVELY¹ responsible is reckless because the controller does not have right to inspect the servers and code of the processor. It’s a black box. The GDPR requires processors to disclose a lot of GDPR factors in their contract with the controller. But AIDM is not one of them. It is perfectly legal for a processor to (e.g.) write an algorithm that treats black people different, and not tell the controller. Putting the responsibility on controllers to investigate and discover unlawful practice is not a smart system.

If a restaurant buys nails and puts it in their food, it’s not the nail manufacturer that’s at fault. The argument “but it’s a large nail manufacturer” doesn’t take away one’s own responsibility.

For this analogy to work, the nail mfr would know that the nails are being put in the food. With knowledge comes responsibility. If the nail manufacturer is aware of the misuse, the nail mfr is willfully complicit in the abuse. But also to make the analogy work, the restaurant would have to be also unaware that the nails were ending up in the food (because AIDM is undisclosed in the case that you are trying to make an analogy for).

(update) Europe does not have the machinery to bring thousands of small mom and pop shops into court. It just makes no sense from a logistical standpoint and it’s a non-starter economically. Though I do not oppose controllers having liability. They should retain liability. But processors should also have liability, when you have one giant processor who is the cause of hundreds of thousands of people’s rights being infringed by way of thousands of controllers. To neglect the giant is to fail at data protection.

¹ added that word late! Controllers should be accountable, but not exclusively.

 

cross-posted from: https://beehaw.org/post/21500261

If you’re not in Europe, move along. You’re stuffed and this thread can’t¹ help you.

European email self hosters--

Tech giants screw self-hosters over by crudely blocking email on the sole basis of IP address (e.g. if the IP is residential). Before 2016, we were as fucked as everyone (in fact worse b/c European ISPs tend to block² egress port 25).

Post 2016, we have the GDPR which has an Article 22 that gives us rights against Automated Individual Decision Making. It has become unlawful to profile people on a crude discriminatory basis without human intervention. The motherfuckers “predict” that you’re a baddy/spammer based on your personal information, which wholly consists of nothing more than your IP address. It’s as unsophisticated and prejudiced as it gets. They’re not using anything intelligent like spamassassin (as the cheap bastards want to save money for their greedy shareholders by reducing processing power at your expense).

Why let them get away with it? And unless you’re a boot-licker, you don’t dance for them either. Well, to some extent you may have to implement DKIM, SPF, DMARC, etc, but it’s debatable. Either way, you do you, and if in the end MS or Google or whatever imperial tech giant empire blocks you from sending email to their server on the blunt basis of your IP address, consider filing an Art.77 complaint to the relevant DPA citing Art.22 violations.

¹ Exceptionally, some non-EU regions have created their own variant of the GDPR like Brazil and some US states (e.g. CCPA in California). But AFAIK, they are all very watered down, weak and mostly useless. Just there for show. I don’t imagine that Art.22 sentiment has been adopted outside of Europe but plz correct me if I am wrong.
² If egress port 22 is blocked by your ISP, then you’re probably fucked anyway but there are some tricks to get the block disabled (free and non-free).

 

cross-posted from: https://beehaw.org/post/21500261

If you’re not in Europe, move along. You’re stuffed and this thread can’t¹ help you.

European email self hosters--

Tech giants screw self-hosters over by crudely blocking email on the sole basis of IP address (e.g. if the IP is residential). Before 2016, we were as fucked as everyone (in fact worse b/c European ISPs tend to block² egress port 25).

Post 2016, we have the GDPR which has an Article 22 that gives us rights against Automated Individual Decision Making. It has become unlawful to profile people on a crude discriminatory basis without human intervention. The motherfuckers “predict” that you’re a baddy/spammer based on your personal information, which wholly consists of nothing more than your IP address. It’s as unsophisticated and prejudiced as it gets. They’re not using anything intelligent like spamassassin (as the cheap bastards want to save money for their greedy shareholders by reducing processing power at your expense).

Why let them get away with it? And unless you’re a boot-licker, you don’t dance for them either. Well, to some extent you may have to implement DKIM, SPF, DMARC, etc, but it’s debatable. Either way, you do you, and if in the end MS or Google or whatever imperial tech giant empire blocks you from sending email to their server on the blunt basis of your IP address, consider filing an Art.77 complaint to the relevant DPA citing Art.22 violations.

¹ Exceptionally, some non-EU regions have created their own variant of the GDPR like Brazil and some US states (e.g. CCPA in California). But AFAIK, they are all very watered down, weak and mostly useless. Just there for show. I don’t imagine that Art.22 sentiment has been adopted outside of Europe but plz correct me if I am wrong.
² If egress port 22 is blocked by your ISP, then you’re probably fucked anyway but there are some tricks to get the block disabled (free and non-free).

 

If you’re not in Europe, move along. You’re stuffed and this thread can’t¹ help you.

European email self hosters--

Tech giants screw self-hosters over by crudely blocking email on the sole basis of IP address (e.g. if the IP is residential). Before 2016, we were as fucked as everyone (in fact worse b/c European ISPs tend to block² egress port 25).

Post 2016, we have the GDPR which has an Article 22 that gives us rights against Automated Individual Decision Making. It has become unlawful to profile people on a crude discriminatory basis without human intervention. The motherfuckers “predict” that you’re a baddy/spammer based on your personal information, which wholly consists of nothing more than your IP address. It’s as unsophisticated and prejudiced as it gets. They’re not using anything intelligent like spamassassin (as the cheap bastards want to save money for their greedy shareholders by reducing processing power at your expense).

Why let them get away with it? And unless you’re a boot-licker, you don’t dance for them either. Well, to some extent you may have to implement DKIM, SPF, DMARC, etc, but it’s debatable. Either way, you do you, and if in the end MS or Google or whatever imperial tech giant empire blocks you from sending email to their server on the blunt basis of your IP address, consider filing an Art.77 complaint to the relevant DPA citing Art.22 violations.

¹ Exceptionally, some non-EU regions have created their own variant of the GDPR like Brazil and some US states (e.g. CCPA in California). But AFAIK, they are all very watered down, weak and mostly useless. Just there for show. I don’t imagine that Art.22 sentiment has been adopted outside of Europe but plz correct me if I am wrong.
² If egress port 22 is blocked by your ISP, then you’re probably fucked anyway but there are some tricks to get the block disabled (free and non-free).

 

Art.22 ¶1 declares:

The data subject shall have the right not to be subject to a decision based solely on automated processing, including profiling, which produces legal effects concerning him or her or similarly significantly affects him or her.

without stating who is liable for infringements. Paragraph 3 says

the data controller shall implement suitable measures to safeguard the data subject's rights and freedoms and legitimate interests, at least the right to obtain human intervention on the part of the controller, to express his or her point of view and to contest the decision.

That assumes the data controller is aware of and in control of the AIDM. Often data processors implement AIDM without the data controller even knowing. Art.28 ¶1 says:

Where processing is to be carried out on behalf of a controller, the controller shall use only processors providing sufficient guarantees to implement appropriate technical and organisational measures in such a manner that processing will meet the requirements of this Regulation and ensure the protection of the rights of the data subject.

Of course what happens in reality is processors either make no guarantee or the guarantee is vague with no mention of AIDM. So controllers hire processors blindly. When the controller is some tiny company or agency and the processor is a tech giant like Microsoft or Amazon, it’s a bit rich to put accountability on the controller and not the processor. The DPAs don’t want to sink micro companies because of some shit Amazon did for which the controller was not even aware.

As a data subject I have little hope that a complaint of unlawful AIDM will play out. It’s like not even having protection from AIDM. Article 29 Working Party wrote AIDM guidelines in 2017, but they make no mention of processors.

 

cross-posted from !gdpr@sopuli.xyz : https://beehaw.org/post/21385410

As I mentioned in another post, many data protection authorities are deadbeats. Knowing that my Art.77 complaints are in vain, my question is how the complaints might be made useful. Suppose we just use the DPA as a prop. We file an Art.77 complaint and CC the data controller a copy of the complaint.

Normally it might be a bad strategy to show the data controller your hand. But when you essentially expect the DPA to be a dead-end anyway, perhaps our best move among shitty options is to use art.77 to get the data controller’s attention on the off chance that the data controller does not know the DPA is a deadbeat.

 

As I mentioned in another post, many data protection authorities are deadbeats. Knowing that my Art.77 complaints are in vain, my question is how the complaints might be made useful. Suppose we just use the DPA as a prop. We file an Art.77 complaint and CC the data controller a copy of the complaint.

Normally it might be a bad strategy to show the data controller your hand. But when you essentially expect the DPA to be a dead-end anyway, perhaps our best move among shitty options is to use art.77 to get the data controller’s attention on the off chance that the data controller does not know the DPA is a deadbeat.

view more: next ›