Deeplinks Blog posts about Coders' Rights Project
As the European Parliament considers passing a directive that would target hacking, EFF has submitted comments urging the legislators not to create legal woes for researchers who expose security flaws.
In a potentially troublesome decision, a federal district court has found that a start-up violated anti-spam and computer crime laws by creating and marketing a browser to let users view their social networking accounts in one place. The case demonstrates the difficulties facing those who seek to empower users to interact with closed services like Facebook in new and innovative ways.
As the year draws to a close, EFF is looking back at the major trends influencing digital rights on 2011 and discussing where we are in the fight for free expression, innovation, fair use, and privacy.
Today mobile software company Carrier IQ withdrew (pdf) a bogus legal threat to a security researcher who published an analysis of the company's software, as well as training materials on which he based his research.
Last week, Trevor Eckhart published a detailed article pointing out that Carrier IQ's software logs a great deal of information about users' activities without their knowledge. Attempting to suppress his research, Carrier IQ fired off a baseless cease-and-desist demand (pdf) claiming that Eckhart infringed the company's copyrights and made "false allegations" about their software.
Last week, security researcher Trevor Eckhart posted an analysis of software produced by Carrier IQ, which describes itself as "the world's leading provider of Mobile Service Intelligence solutions." Eckhart concluded that the software, which comes by default on many mobile devices and runs quietly in the background, logs extensive details about users' activities. Eckhart not only documented the functionality of the software, but learned even more about how it works through training materials posted on the Carrier IQ website. Fearing the company would take the files offline after he posted his analysis, he mirrored the training materials to let others independently verify his conclusions.
Pages
Subscribe to EFF Updates
Deeplinks Archives
Deeplinks Topics
- Analog Hole
- Anonymity
- Anti-Counterfeiting Trade Agreement
- Biometrics
- Bloggers Under Fire
- Bloggers' Rights
- Broadcast Flag
- Broadcasting Treaty
- CALEA
- CDA 230
- Cell Tracking
- Coders' Rights Project
- Content Blocking
- Copyright Trolls
- Council of Europe
- Cyber Security Legislation
- CyberSLAPP
- Development Agenda
- Digital Books
- Digital Radio
- Digital Video
- DMCA
- DMCA Rulemaking
- Do Not Track
- DRM
- E-Voting Rights
- EFF Europe
- EFF Software Projects
- FAQs for Lodsys Targets
- File Sharing
- FOIA
- Free Speech
- FTAA
- Hollywood v. DVD
- How Patents Hinder Innovation (Graphic)
- Innovation
- Intellectual Property
- International
- International Privacy Standards
- Internet Blacklist Legislation
- Internet Governance Forum
- Locational Privacy
- Mandatory Data Retention
- Mass Surveillance Technologies
- National Security Letters
- Net Neutrality
- No Downtime for Free Speech
- NSA Spying
- OECD
- Online Behavioral Tracking
- Patent Busting Project
- Patent Trolls
- Patents
- PATRIOT Act
- Pen Trap
- Policy Analysis
- Printers
- Privacy
- Reading Accessibility
- Real ID
- RFID
- Search Engines
- Search Incident to Arrest
- Security
- Social Networks
- Terms Of (Ab)Use
- Test Your ISP
- The Global Network Initiative
- Trans-Pacific Partnership Agreement
- Transparency
- Travel Screening
- Trusted Computing
- Uncategorized
- Video Games
- Wikileaks
- WIPO
- Broadcast Flag