Skip to main content
Join EFF Today for $20!

Our Work

Our Work

Six Tips to Protect Your Search Privacy

By Peter Eckersley, Seth Schoen, Kevin Bankston, and Derek Slater. Google, MSN Search, Yahoo!, AOL, and most other search engines collect and store records of your search queries. If these records are revealed to others, they can be embarrassing or even cause great harm. Would you want strangers to see...

How to Blog Safely (About Work or Anything Else)

Published April 6, 2005 Updated May 31, 2005 Blogs are like personal telephone calls crossed with newspapers. They're the perfect tool for sharing your favorite chocolate mousse recipe with friends--or for upholding the basic tenets of democracy by letting the public know that a corrupt government official has been paying...

Digital Rights Management: A failure in the developed world, a danger to the developing world

March 2005 For the International Telecommunications Union, ITU-R Working Party 6M Report on Content Protection Technologies Presented by: Electronic Frontier Foundation (http://www.eff.org) Union for the Public Domain (http://www.public-domain.org) Open Knowledge Forum (http://www.okfn.org) IP Justice (http://www.ipjustice.org) Alternative Law Forum (Bangalore) (www.altlawforum.org) World Blind Union (http://www.wbu.org...

Fair Use and Digital Rights Management: Preliminary Thoughts on the (Irreconcilable?) Tension between Them

March 2005 Fred von Lohmann Senior Intellectual Property Attorney Electronic Frontier Foundation Digital rights management (DRM) technologiesare aimed at increasing the kinds and/or scope of control that rights-holderscan assert over their intellectual property assets. In the wake of the DigitalMillennium Copyright Act's (DMCA) ban on the circumvention of DRM technologiesused...

Dangerous Terms: A User's Guide to EULAs

February 2005 By Annalee Newitz We've all seen them – windows that pop up before you install a new piece of software, full of legalese. To complete the install, you have to scroll through 60 screens of dense text and then click an "I Agree" button. Sometimes you don't even...

Meditations on Trusted Computing

May 2004 In 1641, in his Meditations on First Philosophy, mathematician and philosopher Rene Descartes asked how it is that we can trust our senses. What if, he asked, everything we experience is actually part of a delusion created by an omnipotent demon bent on deceiving us? It turns out...

Accessibility and Auditability in Electronic Voting

May 2004 Background Nearly one-third of American voters – over 50 million people – live in districts that will use electronic voting terminals to elect the next president.1 However, widespread reports of voting terminal failures,2 and growing concern about the security3 of these machines, are fueling fierce debate over...

Trusted Computing: Promise and Risk

October 2003 Introduction Computer security is undeniably important, and as new vulnerabilities are discovered and exploited, the perceived need for new security solutions grows. "Trusted computing" initiatives propose to solve some of today's security problems through hardware changes to the personal computer. Changing hardware design isn't inherently suspicious, but the...

Pages

Back to top

JavaScript license information