By EuroDIG Read full newspaper

Thursday, July 8, 2021

EuroDIG News

The EuroDIG2021 Messages are now open for comments! Org Teams, Speaker and Focal Points are invited until 11 July 2021 to review the messages that were prepared in real time during EuroDIG by a team of trained rapporteurs from the Geneva Internet Platform. At the end of each session, the messages were discussed and decided on through rough consensus.

You can find the commenting platform and more information here:

You were a part of EuroDIG2021 as a participant or a session organiser? Let us know how that was for you: Your feedback is much appreciated, we are always looking to improve.

You participated in EuroDIG and found it worthwhile, or you just want to support open, inclusive and community-based discussions on Internet governance? You can make a donation easily and safely:

EuroDIG Secretariat 
Twitter @_eurodig | Facebook @eurodig

Digital trade: Tech industry pushes Europe for WTO data flows deal


thumbnail Documents reveal the lobbying push by Microsoft, Google and other tech giants to influence secretive trade talks that could change the future of the internet.

EU Parliament lets companies look for child abuse on their platforms, with reservations


thumbnail Privacy-conscious lawmakers say the rules are ‘legally flawed’ and endanger privacy.

Dutch court rejects Facebook’s bid to have privacy lawsuit in the Netherlands dismissed


thumbnail The Amsterdam-based Data Privacy Foundation and Dutch consumer advocacy organization Consumentenbond are suing Facebook on behalf of users over what they claim are violations of European Union privac…

Swedish Coop supermarkets shut due to US ransomware cyber-attack


thumbnail Some 500 stores are forced to close due to the ripple effects of a major cyber attack in the US.

The European Cybersecurity Competence Centre and Network is now ready to take off


Together with the Joint Cyber Unit, proposed on 23 June, it is part of the EU Cybersecurity Strategy aimed to ensure that all citizens and businesses are safe from cyber threats, to make physical and…

Coordinated action cuts off access to VPN service used by ransomware groups


thumbnail This week, law enforcement and judicial authorities in Europe, the US and Canada have seized the web domains and server infrastructure of DoubleVPN. This is a virtual private network (VPN) service wh…

US and UK agencies accuse Russia of political cyber-campaign


thumbnail The attackers targets include parliaments and political parties in a continuing operation.

Should Internet Users Pay a Piracy Levy To Ensure Creators Get Paid?


thumbnail Should all buyers of phones, tablets and PCs in the UK pay a levy in order to compensate for supposed losses attributed to pirates?

Dating apps in 2021: technically safer but threats of stalking and doxing still loom


thumbnail From robot companions to AI choosing the perfect partner, technology has become permanently entwined with dating and finding love, especially after a year and a half of lockdown that made digital con…

Internet Use in Switzerland 2011—2019: Trends, Attitudes and Effects


Summary Report from the World Internet Project – Switzerland

Facebook tests prompts that ask users if they're worried a friend is 'becoming an extremist'


thumbnail Some Facebook users in the United States are being served a prompt that asks if they are worried that someone they know might be becoming an extremist. Others are being notified that they may have be…

Why quantum and data protection should go hand in hand -- GCN


thumbnail Identifying and safeguarding infrastructure and critical data in the post-quantum world should be part of an agency’s overall cybersecurity risk management program, current data security practices an…

Navigating ad fraud and consumer privacy abuse in programmatic advertising


thumbnail To capitalize on the promise of video advertising in mobile and CTV, and measure ad efficacy with confidence, business leaders must ensure that they’re reaching customers — not bots.

Top 5 Scam Techniques: What Every User Needs to Know


thumbnail Some of the most common scam techniques exploit our characteristics and heuristics, or things that make us human and fallible.

Read full newspaper