Skip to main content
Privacy’s Defender: My Thirty-Year Fight Against Digital Surveillance

Commentary

Commentary

Ballot Box

Voting with Risk-Limiting Audits: Better, Faster, Cheaper

Election audits ought to be like an annual checkup, not a visit to the emergency roomAfter extensive ups and downs, the election recount efforts in Michigan, Wisconsin, and Pennsylvania have concluded. The main lesson: ballot audits should be less exciting and less expensive. Specifically, we need to make audits...

Investigating Law Enforcement’s Possible Use of Surveillance Technology at Standing Rock

One of the biggest protests of 2016 is still underway at the Standing Rock Sioux Reservation in North Dakota, where Water Protectors and their allies are fighting Energy Transfer Partners’ plans to drill beneath contested Treaty land to finish the Dakota Access Pipeline. While the world has been watching...

Not So Voluntary: White House IP Czar Promotes Shadow Regulation of the Internet

Should IP rights be enforced via shadow regulations that aren’t vetted or endorsed by users? According to a just-released report, the U.S. Intellectual Property Enforcement Coordinator (IPEC) thinks they should. We disagree.
We’ve written here about the danger posed by Internet regulation done through private agreements. These agreements,...

Second Annual Report Rates Mexican Telecoms on how well they Protect User Privacy

Red en Defensa de los Derechos Digitales (R3D)—the leading Mexican digital rights organization—has released the 2016 ¿Quién defiende mis datos? report, which evaluates how well Mexican telecommunications companies protect their customers’ privacy. R3D’s second annual report examines publicly-available policies from eight of the biggest telecommunications companies: AT&T,...

Privacy issue banner, a colorful graphical representation of a padlock

How To Enable Two-Factor Authentication on Outlook.com and Microsoft

The last email service we’ll cover in the 12 Days of 2FA is Outlook.com. If we haven’t covered your email service here, check twofactorauth.org’s more extensive list of email platforms that offer two-factor authentication. If you only enable 2FA for one account, email is a good choice...

Pages

Subscribe to RSS - Commentary

Back to top

JavaScript license information