Skip to main content

Updates

Dangerous Terms: A User's Guide to EULAs

February 2005 By Annalee Newitz We've all seen them – windows that pop up before you install a new piece of software, full of legalese. To complete the install, you have to scroll through 60 screens of dense text and then click an "I Agree" button. Sometimes you don't even...

Meditations on Trusted Computing

May 2004 In 1641, in his Meditations on First Philosophy, mathematician and philosopher Rene Descartes asked how it is that we can trust our senses. What if, he asked, everything we experience is actually part of a delusion created by an omnipotent demon bent on deceiving us? It turns out...

Accessibility and Auditability in Electronic Voting

May 2004 Background Nearly one-third of American voters – over 50 million people – live in districts that will use electronic voting terminals to elect the next president. 1 However, widespread reports of voting terminal failures, 2 and growing concern about the security 3 of these machines, are fueling fierce...

Trusted Computing: Promise and Risk

October 2003 Introduction Computer security is undeniably important, and as new vulnerabilities are discovered and exploited, the perceived need for new security solutions grows. "Trusted computing" initiatives propose to solve some of today's security problems through hardware changes to the personal computer. Changing hardware design isn't inherently suspicious, but the...

Unsafe Harbors: Abusive DMCA Subpoenas and Takedown Demands

September 2003 The DMCA has been used to invade the privacy of Internet users, harass Internet service providers, and chill online speech. The subpoena and takedown powers of Section 512 are not limited to cases of proven copyright infringement, and are exercised without a judge's review. The following is a...

Biometrics: Who's Watching You?

September 2003 Introduction Among the many reactions to the September 11 tragedy has been a renewed attention to biometrics. The federal government has led the way with its new concern about border control. Other proposals include the use of biometrics with ID cards and in airports, e.g. video surveillance enhanced...

Digital Rights Management: The Skeptics' View

April 2003 Contact: Fred von Lohmann (415) 436-9333 x123 fred@eff.org A wide variety of technologies travel under the banner of "digital rights management" (DRM). In appropriate circumstances, these technologies can solve real problems for users, technology vendors, and content owners. Some, however, have made more ambitious claims for DRM, suggesting...

Unintended Consequences: Five Years under the DMCA

This is an old and outdated copy of Unintended Consequences. Please see our archive for the most recent version. 1. Executive Summary Since they were enacted in 1998, the "anti-circumvention" provisions of the Digital Millennium Copyright Act ("DMCA"), codified in section 1201 of the Copyright Act, have not been used...

EFF's Top 12 Ways to Protect Your Online Privacy

April 2002 by Stanton McCandlish, EFF Technology Director Vers. 2.0 - Apr. 10, 2002 Note: Mention of specific product, service or company names does not constitute EFF endorsement or recommendation. Examples and links are provided as starting points for readers, who must make up their own minds about how much...

Pages

JavaScript license information