Mozilla Leads the Way on Do Not Track
Early Lessons from the Tunisian Revolution
Last week's post about the increasingly draconian and desperate measures the Tunisian government was taking to censor bloggers, journalists, and activists online was rapidly made irrelevant by subsequent events. Over the next few days, Tunisian dictator El Abidine Ben Ali promised not to run for re-election in 2014, then...
Bitcoin - a Step Toward Censorship-Resistant Digital Currency
A few weeks ago, we mentioned a rather unusual technological endeavor to create an online currency. We received a few queries about this subject, so decided to provide a more thorough description of what digital currency is, how this system works, why it's appealing and how it might fall...
Know Before You Go, Part 2: Burning Man Improves Ticket Terms But Retains Takedown Powers
At EFF, we like to give credit where it is due. Over the past few years, we’ve repeatedly called out the Burning Man Organization (BMO) for using online ticket terms to require participants to assign to BMO, in advance, the copyrights to any pictures they took on the...
Sony v. Hotz: Sony Sends A Dangerous Message to Researchers -- and Its Customers
Co-authored by Corynne McSherry and Marcia Hofmann
For years, EFF has been warning that the anti-circumvention provisions of the Digital Millennium Copyright Act can be used to chill speech, particularly security research, because legitimate researchers will be afraid to publish their results lest they be...
FCC Contest Seeks More Data for a Better Net Neutrality
Last week, the FCC announced the "FCC Open Internet Apps Challenge," a contest to attract software that helps ordinary users measure whether their Internet services — both mobile broadband and traditional "fixed" broadband — are consistent with open Internet principles. The FCC is also asking for submissions of "research...
EFF Calls for Immediate Action to Defend Tunisian Activists Against Government Cyberattacks
Demonstrations and protests over unemployment and poor living conditions have been ongoing in Tunisia since the beginning of December, but last week the Tunisian government turned up the heat on bloggers, activists, and dissidents by launching a JavaScript injection attack that siphoned off the usernames and passwords of Tunsians...
What is Traitorware?
Your digital camera may embed metadata into photographs with the camera's serial number or your location. Your printer may be incorporating a secret code on every page it prints which could be used to identify the printer and potentially the person who used it. If Apple puts a...
Wikileaks Mirror Taken Down: Host Buckles Under Demands from Upstream Provider
Wikileaks isn't the only site struggling to stay up these days because service providers are pulling their support. It appears that at least one person who wants to provide mirror access to Wikileaks documents is having the same trouble.
Recently we heard from a user who mirrored the...
Commerce Department's Online Privacy Report a Positive Step, But Self-Regulation Isn't Enough
Online privacy continues to be a hot topic in Washington, D.C. A few weeks ago, the Federal Trade Commission (FTC) issued a staff report calling for greater protection of online consumer privacy. A House subcommittee heard testimony on the increasingly popular idea of “do not track” for the...





