Skip to main content

Deeplinks Blog

Deeplinks Blog

The shadow of a police officer looms in front of a Ring device on a closed door.

Amazon’s Ring Is a Perfect Storm of Privacy Threats

Doors across the United States are now fitted with Amazon’s Ring, a combination doorbell-security camera that records and transmits video straight to users’ phones, to Amazon’s cloud—and often to the local police department. By sending photos and alerts every time the camera detects motion or someone rings the doorbell, the...

DEEP DIVE: CBP’s Social Media Surveillance Poses Risks to Free Speech and Privacy Rights

The U.S. Department of Homeland Security (DHS) and one of its component agencies, U.S. Customs and Border Protection (CBP), released a Privacy Impact Assessment [.pdf] on CBP’s practice of monitoring social media to enhance the agency’s “situational awareness.” As we’ve argued in relation to other government social media surveillance...
Defcon 2019 EFF logo banner

DEF CON 27: WISP Leadership Panel

Location: Caesars Palace Suite Join Women in Security and Privacy (WISP), Women in CyberSecurity (WiCyS), and BSides Las Vegas for an informal networking mixer and leadership panel in one of the biggest suites Vegas has to offer. Attendees can expect food, drink, swag, and an opportunity to hear from some...

En Ecuador, la política debe alejarse del caso de Ola Bin

Después de pasar casi una semana en Ecuador estudiando el caso en contra del desarrollador sueco de software libre Ola Bini, quien fue arrestado en Quito, Ecuador, en abril, hemos observado un claro consenso entre los expertos: las consecuencias políticas de su arresto son, al parecer, superiores a cualquier evidencia...
Defcon 2019 EFF logo banner

DEF CON 27: r00tz Asylum Opening Ceremonies

Location: Planet Hollywood, The Studio r00tz Asylum at DEF CON is a safe and creative space for kids to learn white-hat hacking from the leading security researchers from around the world. Through hands-on workshops and contests, DEF CON’s youngest attendees understand how to safely deploy the hacker mindset in today’s...


Back to top

JavaScript license information