You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: content/sessions/2020/mini-summits/dec/Schrems-II/schrems-ii-finding-workable-solutions.md
+1-25Lines changed: 1 addition & 25 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -19,8 +19,7 @@ organizers :
19
19
- Dinis Cruz
20
20
- James Bore
21
21
- David Clarke
22
-
- Adam Leon Smith
23
-
- Carey Lening
22
+
- Adam Leon Smith
24
23
- Mark Potkewitz
25
24
26
25
---
@@ -29,26 +28,3 @@ We will continue talking about Schrems II, its impact and measures that can
29
28
be taken to make personal data transfers work legally.
30
29
31
30
Please check the November event for context: https://post-summit-sessions.heysummit.com/talks/main-session-security-labels-schrems-ii
32
-
33
-
## chat from the session
34
-
35
-
```
36
-
18:37:03 From Mark Potkewitz : For those who have just joined, here’s a link to the live document we’re introducing/talking around: https://docs.google.com/document/d/12dGTMmo0298kUigJNBMyZah7oXeuJ33c7wftVKUkH1k/edit?usp=sharing
37
-
18:49:55 From Didar Gelici : feel free to contribute at any time
38
-
19:01:45 From Mark Potkewitz : Guinness is Irish. Bushmills in Northern Irish. :)
39
-
19:02:20 From Carey Lening : 'processing' means any operation or set of operations which is performed on personal data or on sets of personal data, whether or not by automated means, such as collection, recording, organisation, structuring, storage, adaptation or alteration, retrieval, consultation, use, disclosure by transmission, dissemination or otherwise making available, alignment or combination, restriction, erasure or destruction;
40
-
19:20:53 From Jeff J : Data inventories, classifications, flows and pretty much required by GDPR for real compliance.
41
-
19:29:14 From Didar Gelici : internet should be canceled altogether ..
42
-
19:31:35 From James Bore : The idea of laying out 'here are your risk scenarios, make a choice' sounds very familiar.
43
-
19:51:45 From Carey Lening : "Tutanota uses a standardized, hybrid method consisting of a symmetrical and an asymmetrical algorithm - AES with a length of 128 bit and RSA with 2048 bit.[19][20][dead link][non-primary source needed] To external recipients who do not use Tutanota a notification is sent with a link to a temporary Tutanota account. After entering a previously exchanged password, the recipient can read the message and reply end-to-end encrypted"
44
-
19:52:48 From Carey Lening : Also, womp womp : "German e2e encrypted email provider Tutanota has been ordered by a regional court to develop a function that allows it to monitor an individual account."
45
-
19:53:33 From Jeff J : I use Tutanota - they claim they are working on encrypted calendar. -Had forgotten about that.
46
-
19:53:41 From James Bore : https://wiki.bitmessage.org//
47
-
19:57:05 From Arlene McDaid : https://www.theregister.com/2020/12/08/tutanota_backdoor_court_order/
48
-
20:02:38 From David Clarke @1davidclarke : Thanks great event, sorry have to drop off
49
-
20:07:29 From Mark Potkewitz : Hi, folks — this has been great. I need to run, but I”ll catch up in the doc and w/the rest of the group later. Thanks everybody!
50
-
20:08:12 From Carey Lening : Seeya all
51
-
20:13:09 From Didar Gelici : wrapping up in 10mins?
52
-
20:14:13 From Jeff J : is there value in having encryption at both client AND process/ID layer?
53
-
20:21:27 From Didar Gelici : can we talk about this in the next?
0 commit comments