You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
{{ message }}
This repository has been archived by the owner on Feb 8, 2018. It is now read-only.
We've seen one way that Gittip can get caught up in fraudulent activity (stolen credit cards, #329), and we're watching for another (phishing, #374). There's another way Gittip can get caught up in an uncomfortable situation, and that's when a government puts pressure on us to block the flow of funds to some personsa non gratis (e.g., WikiLeaks). We should be watchful for this situation and prepare to respond appropriately.
The text was updated successfully, but these errors were encountered:
This is one area in which a longstanding, uniform, and stated policy that favors privacy-by-design (ie, collecting/storing minimal information) is very helpful.
It's hard to bow to external pressure (government or otherwise) when the information they want simply doesn't exist!
We've seen one way that Gittip can get caught up in fraudulent activity (stolen credit cards, #329), and we're watching for another (phishing, #374). There's another way Gittip can get caught up in an uncomfortable situation, and that's when a government puts pressure on us to block the flow of funds to some personsa non gratis (e.g., WikiLeaks). We should be watchful for this situation and prepare to respond appropriately.
The text was updated successfully, but these errors were encountered: