Skip to main content

Our Work

Our Work

Packet Forgery By ISPs: A Report on the Comcast Affair

November 2007 By Peter Eckersley, Fred von Lohmann and Seth Schoen{pde,fred,schoen} Comcast is the second largest Internet Service Provider (ISP) in the United States. They run the cable TV and cable Internet networks in many parts of the United States, and many consumers know them as their duopoly or monopoly...
Privacy issue banner, a colorful graphical representation of a padlock

Six Tips to Protect Your Search Privacy

By Peter Eckersley, Seth Schoen, Kevin Bankston, and Derek Slater. Google, MSN Search, Yahoo!, AOL, and most other search engines collect and store records of your search queries. If these records are revealed to others, they can be embarrassing or even cause great harm. Would you want strangers to see...

How to Blog Safely (About Work or Anything Else)

Published April 6, 2005 Updated May 31, 2005 Blogs are like personal telephone calls crossed with newspapers. They're the perfect tool for sharing your favorite chocolate mousse recipe with friends--or for upholding the basic tenets of democracy by letting the public know that a corrupt government official has been paying...

Digital Rights Management: A failure in the developed world, a danger to the developing world

March 2005 For the International Telecommunications Union, ITU-R Working Party 6M Report on Content Protection Technologies Presented by: Electronic Frontier Foundation ( Union for the Public Domain ( Open Knowledge Forum ( IP Justice ( Alternative Law Forum (Bangalore) ( World Blind Union (

Fair Use and Digital Rights Management: Preliminary Thoughts on the (Irreconcilable?) Tension between Them

March 2005 Fred von Lohmann Senior Intellectual Property Attorney Electronic Frontier Foundation Digital rights management (DRM) technologiesare aimed at increasing the kinds and/or scope of control that rights-holderscan assert over their intellectual property assets. In the wake of the DigitalMillennium Copyright Act's (DMCA) ban on the circumvention of DRM technologiesused...

Dangerous Terms: A User's Guide to EULAs

February 2005 By Annalee Newitz We've all seen them – windows that pop up before you install a new piece of software, full of legalese. To complete the install, you have to scroll through 60 screens of dense text and then click an "I Agree" button. Sometimes you don't even...


Back to top

JavaScript license information