Consumer Rights Wiki:Article suggestions: Difference between revisions

Underscore (talk | contribs)
List of incidents not yet covered: deconfiguration guides needed
List of incidents not yet covered: Added suggestion for article on malicious compliance. Also fixed a minor typo.
Line 146: Line 146:
|<ref>{{cite web|title=ACCC Report Revelations Of Scams And Cyber Crime Not Surprising |website=Tech Business News |url=https://www.techbusinessnews.com.au/news/accc-report-revelations-of-scams-and-cyber-crime-not-surprising/ |publication-date=29 April 2024 |access-date=20 July 2025 |quote="Whilst there exists the Protective Security Policy Framework (PSPF) and the Information Security Manual (ISM) which direct government and critical industry to use NAID AAA certified recyclers to destroy and sanitise data at end of life, there remains confusion over ownership of accountability."}}</ref>
|<ref>{{cite web|title=ACCC Report Revelations Of Scams And Cyber Crime Not Surprising |website=Tech Business News |url=https://www.techbusinessnews.com.au/news/accc-report-revelations-of-scams-and-cyber-crime-not-surprising/ |publication-date=29 April 2024 |access-date=20 July 2025 |quote="Whilst there exists the Protective Security Policy Framework (PSPF) and the Information Security Manual (ISM) which direct government and critical industry to use NAID AAA certified recyclers to destroy and sanitise data at end of life, there remains confusion over ownership of accountability."}}</ref>
|-
|-
|Nor applicable
|Not applicable
|Users are being forced by law to violate their privacy to access adult websites, when numerous sites that won't follow the law exist and are unsafe.
|Users are being forced by law to violate their privacy to access adult websites, when numerous sites that won't follow the law exist and are unsafe.
|<ref>{{Cite web |last=Ortutay |first=Barbara |date=27 Jun 2025 |title=What to know about online age verification laws {{!}} AP News |url=https://apnews.com/article/internet-age-verification-supreme-court-def346d7bf299566a3687d8c4f224fec |url-status=live |access-date=19 Jul 2025}}</ref><ref>{{Cite web |date=28 Jun 2025 |title=The Scam of Age Verification {{!}} PORNBIZ.COM |url=https://pornbiz.com/post/17/the_scam_of_age_verification/en#5 |url-status=live |access-date=19 Jul 2025}}</ref>
|<ref>{{Cite web |last=Ortutay |first=Barbara |date=27 Jun 2025 |title=What to know about online age verification laws {{!}} AP News |url=https://apnews.com/article/internet-age-verification-supreme-court-def346d7bf299566a3687d8c4f224fec |url-status=live |access-date=19 Jul 2025}}</ref><ref>{{Cite web |date=28 Jun 2025 |title=The Scam of Age Verification {{!}} PORNBIZ.COM |url=https://pornbiz.com/post/17/the_scam_of_age_verification/en#5 |url-status=live |access-date=19 Jul 2025}}</ref>
Line 153: Line 153:
|Microsoft uses software engineers based in China to work on US Defense Department systems with laughably ineffective precautions. I think this is relevant in the context of Microsoft's attitude towards cloud security. In the past, master keys have been stolen by Chinese hackers and from my understanding, it's not even clear to what extent those groups still have access to Microsoft's internal systems, and by extension, Microsoft customers'. This needs more research though.
|Microsoft uses software engineers based in China to work on US Defense Department systems with laughably ineffective precautions. I think this is relevant in the context of Microsoft's attitude towards cloud security. In the past, master keys have been stolen by Chinese hackers and from my understanding, it's not even clear to what extent those groups still have access to Microsoft's internal systems, and by extension, Microsoft customers'. This needs more research though.
|<ref>{{Cite web |last=Dudley |first=Renee |date=2025-07-15 |title=A Little-Known Microsoft Program Could Expose the Defense Department to Chinese Hackers |url=https://www.propublica.org/article/microsoft-digital-escorts-pentagon-defense-department-china-hackers |website=ProRepublica}}</ref>
|<ref>{{Cite web |last=Dudley |first=Renee |date=2025-07-15 |title=A Little-Known Microsoft Program Could Expose the Defense Department to Chinese Hackers |url=https://www.propublica.org/article/microsoft-digital-escorts-pentagon-defense-department-china-hackers |website=ProRepublica}}</ref>
|-
|Not applicable
|[[Malicious Compliance]]
Companies like Apple comply with regulations such as those imposed by the EU by trying to follow the wording, but not the spirit of the legislation. For instance, there were early reports that Apple would support USB-C, but only with Apple certified devices and cables, allowing them to continue the lucrative "Made for iPhone" certification programme. They only backtracked when the EU indicated this would not be considered compliant with the USB-C mandate.
|<ref>{{Cite web |title=Malicious Compliance |url=https://en.wikipedia.org/wiki/Malicious_compliance |website=Wikipedia}}</ref>
|}
|}