Digital apartheid in Gaza: Big Tech must reveal their roles in tech used in human rights abuses ~tech amazon google microsoft Article 953 words, published Aug 13 2024 22 votes
Digital apartheid in Gaza: Unjust content moderation at the request of Israel’s cyber unit ~society politics Article 817 words, published Jul 26 2024 14 votes
EFF’s concerns about the UN draft Cybercrime Convention ~tech security.cyber Article 1282 words, published Jul 29 2024 9 votes
Tell San Mateo County: Stop for-profit tech companies denying mail to incarcerated people ~life Article 365 words 23 votes
Sen. Ron Wyden exposes data brokers selling US location data to anti-abortion groups that target abortion seekers ~society politics Article 444 words, published Feb 28 2024 45 votes
Past FBI seizure of Mastodon server should be a reminder to Fediverse users and hosts to protect users privacy ~tech privacy social media Article 1396 words 21 votes
Security and privacy tips for people seeking an abortion ~tech privacy security Article 1114 words 14 votes
Google releases “disable 2g” feature for new Android smartphones ~tech security google Article 499 words 19 votes
2021 was the year lawmakers tried to regulate online speech ~tech internet Article 897 words, published Dec 26 2021 10 votes
Apple's plan to "think different" about encryption opens a backdoor to your private life ~tech apple privacy Article 1937 words 15 votes
EFF Surveillance Self-Defense - Privacy breakdown of mobile phones ~tech privacy security Article 5234 words, published Feb 27 2021 18 votes
Proctoring tools and dragnet investigations rob students of due process ~tech Article 1931 words, published Apr 15 2021 19 votes
Pasco County’s Sheriff must end its targeted child harassment program ~tech privacy Article 1122 words 11 votes
Doxxing: Tips to protect yourself online and how to minimize harm ~tech privacy Article 1498 words 14 votes
Visa wants to buy Plaid, and with it, transaction data for millions of people ~finance Article 2138 words 12 votes
Cover Your Tracks - A new EFF project designed to better uncover the tools and techniques of online trackers and test the efficacy of privacy add-ons (successor to Panopticlick) ~tech privacy Article 471 words 19 votes
Introducing "How to Fix the Internet," a new podcast mini-series from EFF ~tech internet privacy Article 396 words 7 votes
The battle for the soul of digital freedom taking place inside your printer ~tech security Article 1926 words 15 votes
A legislative path to an interoperable internet ~tech google internet Article 3051 words, published Jul 28 2020 9 votes
EARN IT Act introduced in House of Representatives ~tech internet security privacy Article 247 words 37 votes
The Online Content Policy Modernization Act is an unconstitutional mess ~tech internet Article 891 words 7 votes
Human rights and "technical protection measures" (DRM) - Lessons from twenty-two years of the US DMCA ~tech Article 5492 words 9 votes
Victory! ICANN rejects .ORG sale to private equity firm Ethos Capital ~tech internet Article 22 votes
Apple and Google’s COVID-19 exposure notification API: Questions and answers ~health Article 2330 words 4 votes
Twitter removes privacy option, and shows why we need strong privacy laws ~tech privacy social media Article 685 words 17 votes
EFF calls for disclosure of secret financing details behind $1.1 billion .ORG sale including $360 million loan, and asks FTC to scrutinize deal ~tech internet Article 20 votes
Gopher: When adversarial interoperability burrowed under the gatekeepers' fortresses ~tech internet Article 2189 words 8 votes
Amazon Ring updates device security and privacy, including adding mandatory two-factor auth—but continues ignoring larger concerns ~tech amazon privacy security.home Article 904 words 9 votes
Re-evaluating the DMCA twenty-two years later: Let’s think of the users ~tech internet Article 1257 words 13 votes
How Twitter's default settings enabled a security researcher to discover phone numbers for over seventeen million accounts ~tech privacy security social media Article 601 words 10 votes
What to know before you buy or install an Amazon Ring camera ~tech amazon privacy security.home Article 1348 words 8 votes
Ring's doorbell app for Android sends sensitive user data to multiple analytics and marketing companies ~tech privacy amazon android security.home Article 1175 words 10 votes
San Diego to suspend face recognition program, limits ICE access to criminal justice data ~tech Article 475 words 9 votes
Mint: Late-stage adversarial interoperability demonstrates what we had (and what we lost) ~tech Article 1911 words, published Dec 5 2019 17 votes
Behind the one-way mirror: A deep dive into the technology of corporate surveillance ~tech privacy Article 13 070 words 9 votes
The case for fiber to the home, today: Why fiber is a superior medium for 21st century broadband ~tech internet Article 7953 words 11 votes
Facebook's dating service is full of red flags ~tech facebook privacy social media Article 740 words, published Sep 6 2019 19 votes
Interoperability and privacy: Squaring the circle ~tech privacy Article 3156 words, published Aug 13 2019 6 votes
Gotta catch 'em all: Understanding how IMSI-catchers exploit cell networks ~tech privacy security Article 6536 words, published Jun 28 2019 4 votes
Gotta catch 'em all: Understanding how IMSI-catchers exploit cell networks ~tech privacy security Article 6536 words, published Jun 28 2019 6 votes
Who has your back? Censorship edition 2019 - Report by the EFF that assesses major tech companies' content moderation policies ~tech social media Article 9474 words 8 votes