mastouille.fr est l'un des nombreux serveurs Mastodon indépendants que vous pouvez utiliser pour participer au fédiverse.
Mastouille est une instance Mastodon durable, ouverte, et hébergée en France.

Administré par :

Statistiques du serveur :

573
comptes actifs

#computermisuseact

0 message0 participant0 message aujourd’hui
Annemarie Bridy<p>The hits keep coming! <a href="https://mastodon.lawprofs.org/tags/InternetRegulation" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>InternetRegulation</span></a> <a href="https://mastodon.lawprofs.org/tags/BadIdeas" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>BadIdeas</span></a></p><p>*****</p><p>UK government consulting on a law enforcement power to "seize IP addresses" (also domain names, but I know how that works) and have their traffic tunnelled. Is that even technically possible? Consultation on <a href="https://mastodon.lawprofs.org/tags/ComputerMisuseAct" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ComputerMisuseAct</span></a> till 6/4/23 at <a href="https://www.gov.uk/government/consultations/computer-misuse-act-1990-call-for-information/outcome/review-of-the-computer-misuse-act-1990-consultation-and-response-to-call-for-information#proposals-for-legislative-change" rel="nofollow noopener noreferrer" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">gov.uk/government/consultation</span><span class="invisible">s/computer-misuse-act-1990-call-for-information/outcome/review-of-the-computer-misuse-act-1990-consultation-and-response-to-call-for-information#proposals-for-legislative-change</span></a></p><p><a href="https://scholar.social/@Janet_LegReg/109862814507008200" rel="nofollow noopener noreferrer" target="_blank"><span class="invisible">https://</span><span class="ellipsis">scholar.social/@Janet_LegReg/1</span><span class="invisible">09862814507008200</span></a></p>
Andrew Cormack<p>UK government consulting on a law enforcement power to "seize IP addresses" (also domain names, but I know how that works) and have their traffic tunnelled. Is that even technically possible? Consultation on <a href="https://scholar.social/tags/ComputerMisuseAct" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ComputerMisuseAct</span></a> till 6/4/23 at <a href="https://www.gov.uk/government/consultations/computer-misuse-act-1990-call-for-information/outcome/review-of-the-computer-misuse-act-1990-consultation-and-response-to-call-for-information#proposals-for-legislative-change" rel="nofollow noopener noreferrer" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">gov.uk/government/consultation</span><span class="invisible">s/computer-misuse-act-1990-call-for-information/outcome/review-of-the-computer-misuse-act-1990-consultation-and-response-to-call-for-information#proposals-for-legislative-change</span></a></p>