Skip to main content
EFFecting Change: How to Disenshittify the Internet on May 14

Our Work

Our Work

ICANN's Special Privileges for Trademark Owners are The.Worst

If gaining control of hundreds of Internet domains that resemble your business name at a single stroke sounds like a trademark lawyer's wet dream, you may be surprised to learn that this is just one of the special powers that brand owners have under a little-known ICANN mechanism, the...

EFF Applauds Amazon For Pushing Back on Request for Echo Data

The number of Internet-enabled sensors in homes across the country is steadily increasing. These sensors are collecting personal information about what’s going on inside the home, and they are doing so in a volume and detail never before possible. The law, of course, has not kept up. There are no...

Digital Privacy at the US Border: A New How-To Guide from EFF

San Francisco - Increasingly frequent and invasive searches at the U.S. border have raised questions for those of us who want to protect the private data on our computers, phones, and other digital devices. A new guide released today by the Electronic Frontier Foundation (EFF) gives travelers the facts...

EFF in Palo Alto

EFF's Shahid Buttar will speak at a Pi Day event intended to rally the tech community with the tools needed to fight for social justice every day. The event seeks to connect technologists to organizations through hackathons, fundraising, mentoring programs, and donating skills/time; as well as to bridge...

2017 Rhode Island District Conference

United States District Court for the District of Rhode Island presents the 2017 District Conference
"THE eLAWYER ERA AND THE COURT - CHALLENGES FOR THE FUTURE"
Thursday, March 23, 2017 - 9:00 a.m. to 4:15 p.m.
EFF Senior Staff Attorney Nate Cardozo will present on a panel...

Secret Court Orders Aren't Blank Checks for General Electronic Searches

Imagine this: the government, for reasons you don't know, thinks you're a spy. You go on vacation and, while you're away, government agents secretly enter your home, search it, make copies of all your electronic devices, and leave. Those agents then turn those devices upside down, looking through decades worth...

Pages

Back to top

JavaScript license information