Big Tech to EU: "Drop Dead"

There's just one wrinkle: the Big Tech companies don't want that future, and they're trying their damndest to strangle it in its cradle.
Right from the start, it was obvious that the tech giants were going to war against the DMA, and the freedom it promised to their users.
Take Apple, whose tight control over which software its customers can install was a major concern of the DMA from its inception.
iOS devices will refuse to run software unless it comes from Apple's App Store, and that control over Apple's customers means that Apple can exert tremendous control over app vendors, too.
Apple charges app vendors a whopping 30 percent commission on most transactions, both the initial price of the app and everything you buy from it thereafter.
To maintain those high commissions, Apple also restricts its vendors from informing their customers about the existence of other ways of paying and at various times has also banned its vendors from offering discounts to customers who complete their purchases without using the app.
Apple is adamant that it needs this control to keep its customers safe, but in theory and in practice, Apple has shown that it can protect you without maintaining this degree of control, and that it uses this control to take away your security when it serves the company's profits to do so.
Apple is worth between two and three trillion dollars.
Investors prize Apple's stock in large part due to the tens of billions of dollars it extracts from other businesses that want to reach its customers.
Companies like Apple were given over a year to prepare for the DMA, and were told to produce compliance plans by March of this year.
Apple's compliance plan falls very short of the mark: between a blizzard of confusing junk fees and onerous conditions, the plan in no way satisfies the EU's goal of fostering competition in app stores.
That's just scratching the surface of Apple's absurd proposal: Apple's customers will have to successfully navigate a maze of deeply buried settings just to try another app store, and Apple will disable all your third-party apps if you take your phone out of the EU for 30 days.
The DMA includes new enforcement tools to finally apply the General Data Privacy Regulation to US tech giants.
Just like Apple, Meta is behaving as though the DMA permits it to carry on its worst behavior, with minor cosmetic tweaks around the margins.
Just like Apple, Meta is daring the EU to enforce its democratically enacted laws, implicitly promising to pit its billions against Europe's institutions to preserve its right to spy on us.
After decades of regulatory indifference to tech monopolization, competition authorities all over the world are taking on Big Tech.
If the EU successfully forces tech to play fair, it will serve as a starting gun for a global race to the top, in which tech's ill-gotten gains - of data, power and money - will be returned to the users and workers from whom that treasure came.
They've announced investigations into Apple, Google and Meta, threatening fines of 10 percent of the companies' global income, which will double to 20 percent if the companies don't toe the line.
It's not just Big Tech that's playing for all the marbles - it's also the systems of democratic control and accountability.
If Apple can sabotage the DMA's insistence on taking away its veto over its customers' software choices, that will spill over into the US Department of Justice's case over the same issue, as well as the cases in Japan and South Korea, and the pending enforcement action in the UK..


This Cyber News was published on www.eff.org. Publication date: Mon, 13 May 2024 17:43:04 +0000


Cyber News related to Big Tech to EU: "Drop Dead"

Holistic Approach To Privacy and Security in Tech - In this article, I would like to explain how I tackle privacy and security issues that are specific for large scale web and mobile applications and Big Tech. First, let's outline some of the biggest challenges Big Tech companies deal with in terms of ...
6 months ago Feeds.dzone.com
Big Tech to EU: "Drop Dead" - There's just one wrinkle: the Big Tech companies don't want that future, and they're trying their damndest to strangle it in its cradle. Right from the start, it was obvious that the tech giants were going to war against the DMA, and the freedom it ...
1 month ago Eff.org
Wearable Tech Future: Where Fashion Meets Function - From fitness trackers and smartwatches to augmented reality glasses, the future of wearable tech is full of potential. In this article, we will explore the current benefits and challenges of wearable technology, uncover its different types and ...
6 months ago Securityzap.com
Internationalizing Efforts to Counter Tech Support Scams - The Central Bureau of Investigation, India's federal enforcement agency, recently conducted a series of criminal raids against illegal call centers across the country in an attempt to clamp down on tech support fraud. These raids were the result of a ...
6 months ago Darkreading.com
CVE-2017-12757 - Certain Ambit Technologies Pvt. Ltd products are affected by: SQL Injection. This affects iTech B2B Script 4.42i and Tech Business Networking Script 8.26i and Tech Caregiver Script 2.71i and Tech Classifieds Script 7.41i and Tech Dating Script 3.40i ...
5 years ago
F5 Developing Fix for BIG-IP Vulnerability That Could Cause Denial of Service and Allow for Code Execution - F5 has warned of a serious format string vulnerability in BIG-IP that could allow an authenticated attacker to cause a denial-of-service and potentially execute malicious code. This security issue, tracked as CVE-2023-22374, affects iControl SOAP, an ...
1 year ago Securityweek.com
The Dark Side of Digital Reading: E-Books as Corporate Surveillance Tools - Americans are reading digital books at a rate of three out of ten. In a market where the majority of readers are subject to both Big Publishing's greed and those of Big Tech, it is no surprise that these readers are subject to both the greed of Big ...
6 months ago Cysecurity.news
Tech workers fear being left unprepared for the future - While tech workers want to learn and organizations are spending thousands of dollars per employee on learning technology, it is not translating into improved on-the-job performance for 4 out of 10 IT employees, according to Skillable. Inadequate ...
6 months ago Helpnetsecurity.com
The Future of IT: Info-Tech 2024 Conference - PRESS RELEASE. TORONTO, Jan. 9, 2024 /PRNewswire/ - Info-Tech Research Group, a global leader in IT research and advisory, has announced that its flagship annual conference, Info-Tech LIVE, will be hosted this year at Bellagio in Las Vegas from ...
5 months ago Darkreading.com
CVE-2015-7393 - dcoep in BIG-IP LTM, Analytics, APM, ASM, and Link Controller 11.2.0 through 11.6.0 and 12.0.0 before 12.0.0 HF1, BIG-IP AAM 11.4.0 through 11.6.0 and 12.0.0 before 12.0.0 HF1, BIG-IP AFM and PEM 11.3.0 through 11.6.0 and 12.0.0 before 12.0.0 HF1, ...
8 years ago
Tech Support Scammers Are Still At It: What To Look Out For - Tech scams are unfortunately still an issue in 2021, with technological advancements leading cybercriminals to find more creative ways to gain access to your data or charge you for services you don't need. As such, it's important to be aware of the ...
1 year ago Welivesecurity.com
Enhancing Home Privacy with Technology: Your Digital Shield - In an ever-evolving world, technology has become increasingly integral to home privacy. Smart lock systems, video doorbells, motion sensors, security cameras, and automated privacy settings are some of the popular home privacy tech options available. ...
6 months ago Securityzap.com
CVE-2015-8099 - F5 BIG-IP LTM, AFM, Analytics, APM, ASM, Link Controller, and PEM 11.3.x, 11.4.x before 11.4.1 HF10, 11.5.x before 11.5.4, 11.6.x before 11.6.1, and 12.x before 12.0.0 HF1; BIG-IP AAM 11.4.x before 11.4.1 HF10, 11.5.x before 11.5.4, 11.6.x before ...
5 years ago
CVE-2016-5022 - F5 BIG-IP LTM, Analytics, APM, ASM, and Link Controller 11.2.x before 11.2.1 HF16, 11.3.x, 11.4.x, 11.5.x before 11.5.4 HF2, 11.6.x before 11.6.1 HF1, and 12.x before 12.0.0 HF3; BIG-IP AAM, AFM, and PEM 11.4.x, 11.5.x before 11.5.4 HF2, 11.6.x ...
5 years ago
CVE-2015-5516 - Memory leak in the last hop kernel module in F5 BIG-IP LTM, GTM, and Link Controller 10.1.x, 10.2.x before 10.2.4 HF13, 11.x before 11.2.1 HF15, 11.3.x, 11.4.x, 11.5.x before 11.5.3 HF2, and 11.6.x before HF6, BIG-IP AAM 11.4.x, 11.5.x before 11.5.3 ...
5 years ago
CVE-2015-7394 - The datastor kernel module in F5 BIG-IP Analytics, APM, ASM, Link Controller, and LTM 11.1.0 before 12.0.0, BIG-IP AAM 11.4.0 before 12.0.0, BIG-IP AFM, PEM 11.3.0 before 12.0.0, BIG-IP Edge Gateway, WebAccelerator, and WOM 11.1.0 through 11.3.0, ...
5 years ago
Ho Ho Home For Christmas? Tips For Avoiding Tech Terrors This Festive Season - With Christmas fast approaching, many of us will be hoping to find some new tech under the tree. From innovative gadgets that spark creativity to interactive devices that bring families together, tech toys can add an extra layer of excitement and ...
6 months ago Itsecurityguru.org
Take a Cisco Store Tech Lab Tour - Around 7,100 visitors came through the Cisco Store, and 396 attendees participated in 23 tours. We walked attendees through key highlights of our Tech Lab, demonstrating how multiple products can work together. We started at our grid wall, displaying ...
3 months ago Feedpress.me
CVE-2016-5021 - The iControl REST service in F5 BIG-IP LTM, AAM, AFM, Analytics, APM, ASM, Link Controller, and PEM 11.5.x before 11.5.4, 11.6.x before 11.6.1, and 12.x before 12.0.0 HF3; BIG-IP DNS 12.x before 12.0.0 HF3; BIG-IP GTM 11.5.x before 11.5.4 and 11.6.x ...
7 years ago
CVE-2016-2084 - F5 BIG-IP LTM, AFM, Analytics, APM, ASM, Link Controller, and PEM 11.3.x, 11.4.x before 11.4.1 build 685-HF10, 11.5.1 before build 10.104.180, 11.5.2 before 11.5.4 build 0.1.256, 11.6.0 before build 6.204.442, and 12.0.0 before build 1.14.628; BIG-IP ...
8 years ago
CVE-2015-3628 - The iControl API in F5 BIG-IP LTM, AFM, Analytics, APM, ASM, Link Controller, and PEM 11.3.0 before 11.5.3 HF2 and 11.6.0 before 11.6.0 HF6, BIG-IP AAM 11.4.0 before 11.5.3 HF2 and 11.6.0 before 11.6.0 HF6, BIG-IP Edge Gateway, WebAccelerator, and ...
5 years ago
When Looking For Cybersecurity Solutions, Don't Shrug Off Startups - Let's say you're looking for some new technology for your business. That's why it's time to start giving startup tech a fair shake. It's nice to stick with a known commodity, especially when you're talking about securing your company's digital ...
6 months ago Cybersecurity-insiders.com
Atos says Airbus acquisition talks on big data biz grounded The Register - Atos' share price sank as much as 20 percent this morning on confirmation that Airbus is no longer interested in buying the big data and security parts of the crumbling tech empire. The pair got round the negotiating table in January to thrash out a ...
3 months ago Go.theregister.com
CVE-2020-5947 - In versions 16.0.0-16.0.0.1 and 15.1.0-15.1.1, on specific BIG-IP platforms, attackers may be able to obtain TCP sequence numbers from the BIG-IP system that can be reused in future connections with the same source and destination port and IP ...
3 years ago
CVE-2016-6876 - The RESOLV::lookup iRule command in F5 BIG-IP LTM, APM, ASM, and Link Controller 10.2.1 through 10.2.4, 11.2.1, 11.4.x, 11.5.x before 11.5.4 HF2, 11.6.x before 11.6.1, and 12.0.0 before HF3; BIG-IP AAM, AFM, and PEM 11.4.x, 11.5.x before 11.5.4 HF2, ...
5 years ago

Cyber Trends (last 7 days)


Trending Cyber News (last 7 days)