EFF in the News
The EFF has asked that anyone who is willing and able offer their assistance in gathering these profiles. If you have a rooted or jailbroken phone, you have access to your Carrier IQ profile. So, if you can find your Carrier IQ profile, the EFF asks that you email a copy of the profile as well as what device you found it on and where you found it on the device.
At this point we have a fairly good idea of what Carrier IQ is, and which manufacturers and carriers see fit to install it on their phones, but the Electronic Frontier Foundation (EFF) — the preeminent protector of your digital rights — has taken it one step further and reverse engineered some of the program’s code to work out what’s actually going on.
The Electronic Frontier Foundation has begun the project of reverse engineering the CIQ "Profiles," which vary from device to device and carrier to carrier, but on each are the set of instructions that tell the phone what data to collect, when, and how to store it. The profiles do not contain the specific tracking data from each device, just the instructions for collecting it.
The Electronic Frontier Foundation responded in a lengthy e-mail Tuesday evening to a request by the International Business Times to explain why the Internet advocacy organization does not believe Twitter censors or blocks users based on the content of their Tweets.
"#NDAA has generated at least 117,000 tweets in the last seven days. Does that sound like censorship to anyone?" Trevor Timm, an activist with the EFF wrote in the Tuesday email. "Most importantly, Twitter--as official company policy--is vehemently against SOPA. So even if they did censor (which, again, they don't), why would they ever censor its users for expressing the company line?"
The Electronic Frontier Foundation (EFF) put out an open call for developers to help them figure out how the controversial, smartphone-spying Carrier IQ software actually works.
The Electronic Frontier Foundation (EFF) has published “Defending Privacy at the U.S. Border: A Guide for Travelers Carrying Digital Devices.”
But not all social platforms were used equally. Jillian York is director for International Freedom of Expression at the Electronic Frontier Foundation and she says tweets played a limited role in the Arab Spring protests. "This year, we've seen Twitter used primarily to get the word out. People use hashtags to focus around certain topic," she says. So you might see a keyword preceded by a # sign and then follow the link that appears to read all tweets that use that topic. #jan25, for instance, signifies the first major protest in Cairo and was used as a catch-all for Egyptian protests after that.
“The Internet interprets censorship as damage and routes around it,” goes the saying coined by Sun Microsystems coder and EFF founder John Gilmore.
The proposed "anti-piracy" legislation is dangerous and unconstitutional. Congress is contemplating two bills that proponents insist will shut down "rogue foreign websites" bent on wholesale intellectual property infringement. In reality, these bills won't do much to curb online piracy. What they will do is balkanize the Internet, undermine Internet security, and introduce a new, unconstitutional scheme of speech regulation.