Skip to main content

Deeplinks Blog

An Over-The-Top Approach to Internet Regulation in Developing Countries

Increased smartphone usage and availability of wireless broadband has propelled the use of Internet based platforms and services that often compete with similar services based on older technologies. For example services like Facebook, Skype and WhatsApp that offer voice or video calls over the Internet compete with traditional SMS and...
Security Education

KRACK Vulnerability: What You Need To Know

This week security researchers announced a newly discovered vulnerability dubbed KRACK, which affects several common security protocols for Wi-Fi, including WPA (Wireless Protected Access) and WPA2. This is a bad vulnerability in that it likely affects billions of devices, many of which are...

Expanding E-Verify is a Privacy Disaster in the Making

E-Verify is a massive federal data system used to verify the eligibility of job applicants to work in the United States. The U.S. Department of Homeland Security (DHS), U.S. Citizenship and Immigration Services (USCIS), and the U.S. Social Security Administration (SSA) administer E-Verify. Until now, the federal government has not...
702 Spying

Whistleblower Protections in USA Liberty Act Not Enough

The USA Liberty Act fails to safeguard whistleblowers—both as federal employees and contractors—because of a total lack of protection from criminal prosecution. These shortcomings—which exist in other whistleblower protection laws—shine a light on much-needed Espionage Act reform, a law that has been used to stifle anti-war speech and punish...

Pass the Protecting Data at the Border Act

This blog post was first published in The Hill on September 28, 2017. The federal government sees the U.S. border as a Constitution-free zone. The Department of Homeland Security (DHS) claims that border officers—from Customs and Border Protection (CBP) and Immigration and Customs Enforcement (ICE)—can freely ransack travelers’ smartphones...

Pages

JavaScript license information