Deeplinks
Coders have never been more important to the security of the Internet. By identifying and disclosing vulnerabilities, coders are able to improve security for every person who depends on information systems for their daily life and work. Yet this week, the South African's Department of Justice and Constitutional Development is closing its open invitation to comment on a vague and sweeping draft computer crime bill that threatens to create legal woes for security researchers who expose security flaws—and in addition, create disproportionate new penalties for online hate speech and copyright infringement.
Even if your student doesn't use a Chromebook, they may have a Google Apps for Education (GAFE) account, which is essentially a Google account provided by the school. GAFE accounts can be accessed from any browser, and the privacy settings affect your student regardless of which browser they use to log in to GAFE. In order to maximize your child's privacy, we advise changing the settings below.
If your child's school issued them a Chromebook, be sure to also check out our Guide to Chromebook Privacy Settings for Students.
Update December 17, 2015: Added an explanation of how to encrypt Chrome Sync data so that students can take advantage of Chrome Sync without sharing their browsing history and other personal information with Google, and pointed out that enabling autofill and password saving is OK if Chrome Sync is disabled or encrypted.
If your child's school issued them a Chromebook, there are some important settings you can chance to improve their privacy.
Be sure to also check out our Guide to Google Account Privacy Settings for Students.
Open the Chromebook’s settings by clicking on your username in the bottom right-hand corner, then clicking “Settings.”
A Case Study of a California Father Fighting His Daughter’s School District Over Digital Privacy
Katherine W. was seven years old, in the third grade, when her teacher first issued Google Chromebooks to the class.
Katherine’s father, Jeff, was concerned. It wasn’t because he had a problem with technology. In fact, Jeff and his family are technology enthusiasts. “We bought a house in this area primarily because of the school district. And one of the things that excited us about the school was the use of technology,” Jeff explained during a recent interview with EFF.
That enthusiasm waned when the school retired its former laptops and brought in Chromebooks for the students instead, also assigning each third grader a profile in Google Apps for Education, Google’s cloud-based education suite. Chromebooks may have been cheaper, but Jeff feared they might come at the cost of his daughter’s privacy.
The official release of the text of the Trans-Pacific Partnership (TPP) on November 5 not only confirmed our fears about how it would threaten our rights online and over our digital devices, but also kicked off a 90-day countdown to President Obama signing the deal. A few days later, the White House formally requested the International Trade Commission (ITC) to begin its study of the impacts of the TPP on the U.S.
Following the Senate’s September hearing, the House Judiciary Committee today held a hearing on reforming the Electronic Communications Privacy Act, the federal law that regulates government access to private communications records stored by online service providers.
Congress is considering a pair of identical bills that would create a warrant requirement for any government entity that seeks personal content stored in the cloud: the Senate version is the Electronic Communications Privacy Act Amendments Act (S. 356) while the House calls theirs the Email Privacy Act (H.R. 699).
Yesterday, in Backpage.com v. Dart a unanimous panel of the Seventh Circuit Court of Appeals in a lively opinion ordered Thomas Dart, the sheriff of Cook County, Illinois, to end his “campaign of suffocation” against the website and stop violating its First Amendment rights.
The court of appeals rejected Sheriff Dart’s contention that he was merely expressing his personal distaste for Backpage and not using his position as a government official to coerce Visa and MasterCard into discontinuing business with the website. Rather, the court of appeals held that Sheriff Dart’s actions amounted to an unconstitutional prior restraint on Backpage’s speech.
Many media reports on (as well as at least one response to) the FTC complaint we submitted yesterday about Google’s violation of the Student Privacy Pledge have focused heavily on one issue—Google’s use of Chrome Sync data for non-educational purposes. This is an important part of our complaint, but we want to clarify that Google has other practices which we are just as concerned about, if not more so.
The Trolls’ Favorite Template Has Been Retired, but Don’t Get Too Excited
It’s easy to file a patent complaint. All a patent owner has to do is say that they own a patent and that the defendant infringed it. The patent holder doesn’t even need to identify which product of the defendant’s they believe infringes the patent, or specify which claims of the patent they’re asserting. It’s an absurdly simple process, and unscrupulous patent tolls routinely take advantage of that fact.
Today marks a major milestone for the encrypted Web. Let's Encrypt, the free and automated certificate authority, has entered Public Beta. That means it's easier than ever for websites to adopt HTTPS encryption. A huge percentage of the world's daily Internet usage currently takes place over unecrypted HTTP, exposing people to illegal surveillance and injection of unwanted ads, malware, and tracking headers into the websites they visit. EFF's Encrypt the Web project aims to fix that, and Let's Encrypt—a collaboration with Mozilla, the University of Michigan, Cisco, Akamai and many other sponsoring organizations—should be a huge step forward.
Multiple recent reports on serious security vulnerabilities in cable modems and routers paint a dire picture of the state of security of the devices that millions of users depend upon to connect to the Internet. Such vulnerabilities can be exploited to disable our access, snoop on our personal information, or launch malicious attacks on third parties.
The FBI recently opened beta testing of eFOIA, a new online system for filing and tracking requests for records under the Freedom of Information Act (FOIA). On first glance, the project seems like a noble effort to streamline transparency in an agency that is notoriously slow and resistant to releasing public information.
But there’s one feature that we would like to see treated as a bug and excised from the new system: mandatory submission of government-issued identification.
At EFF we put security and privacy first. This means working hard at keeping our members and site visitors safe, as well as the people who use the software we develop. We also dedicate staff time to advising security researchers, maintaining resources like our Coders' Rights Project, and helping groups like Facebook improve their bug reporting policies.
The United States Court of Appeals for the Second Circuit issued an opinion rejecting the government’s attempt to hold an employee criminally liable under the federal hacking statute—the Computer Fraud and Abuse Act (“CFAA”)—for violating his employer-imposed computer use restrictions. The decision is important because it ensures that employers and website owners don’t have the power to criminalize a broad range of innocuous everyday behaviors, like checking personal email or the score of a baseball game, through simply adopting use restrictions in their corporate policies or terms of use.
The court also ruled that the government cannot hold people criminally liable on the basis of purely fantastical statements they make online—i.e., thoughtcrime.
In 1998, the U.S. Patent and Trademark Office issued Patent 5,718,632, on a method for avoiding “unnecessary wastage of time” in video games. What’s transpired in the 17 years since then can best be described as an unnecessary wastage of time.
Namco’s patent covers “auxiliary games” that a player can enjoy while the main game is loading. The patent expired on November 27, which has generated a lot of excitement in the gaming world, and even inspired a Loading Screen Jam where developers create their own loading screen games.
This week, we launched the Power Up Your Donation campaign. For the next few days, donations to EFF through the campaign will be matched by challenge grants from passionate digital rights advocates. Donate today and double your impact on securing networks and devices, stopping illegal government surveillance, fighting censorship, protecting the freedom to tinker, and more!
Congress is in turmoil over the text of CISA, the controversial cybersecurity bill that the EFF community has been fighting against. The Hill reports that "it now appears the final language is unlikely to include notable privacy provisions" and "may confirm opponents’ worst fears."
This corroborates what we've been hearing from our sources in DC: that negotiations over CISA have taken a turn for the worse, and there's a battle happening right now over the final text.
But hope is not lost. Representative Michael McCaul, Chairman of the House Committee on Homeland Security, can still ensure that the hard-fought privacy protections make it into the final text. Unfortunately, Congressional leadership and members of the Intelligence Committee are putting intense pressure on Representative McCaul to strip out these necessary safeguards.
The Internet is a diverse ecosystem of private and public stakeholders. By excluding a large sector of communities—like security researchers, artists, libraries, and user rights groups—trade negotiators skewed the priorities of the Trans-Pacific Partnership (TPP) towards major tech companies and copyright industries that have a strong interest in maintaining and expanding their monopolies of digital services and content. Negotiated in secret for several years with overwhelming influence from powerful multinational corporate interests, it's no wonder that its provisions do little to nothing to protect our rights online or our autonomy over our own devices. For example, everything in the TPP that increases corporate rights and interests is binding, whereas every provision that is meant to protect the public interest is non-binding and is susceptible to get bulldozed by efforts to protect corporations.
It has been obvious for decades that copyright law is ill-matched for the opportunities and challenges created by the Internet. It's been equally obvious, however, that sensible copyright policies face huge practical barriers, in large part because few are willing to challenge the default assumption of copyright law that every time a copy is made the rightsholder's permission is required. That assumption makes no sense in the digital age, but it's hugely difficult to dislodge, especially at the international stage.
Real Encryption Means Encryption Without Compromises.
Updated 12/9/15
It’s a showdown over encryption, and we need your voice.
The Obama administration just responded to the 104,109 people who asked the president to stand up for strong encryption. The response—penned by Deputy U.S. Chief Technology Officer Ed Felten and Special Assistant to the President and Cybersecurity Coordinator Michael Daniel—acknowledged the importance of the conversation but offered no conclusions. Instead, they asked us to share our thoughts on encryption.
That means we need the help of Internet users worldwide who care about security. You can tell the Obama administration exactly what you think about the importance of encryption by filling out this form.
What does the FBI want when it comes to the encryption “debate”?
It’s been a bad few weeks for the people of Bangladesh, made worse by the ham-handed internet censorship of its government. Their decision to block some online messaging services was a disproportionate and unnecessary attempt to silence all speech on a slapdash list of messenger applications.
Digital analyzer. IMSI catcher. Stingray. Triggerfish. Dirt box. Cell-site simulator. The list of aliases used by the devices that masquerade as a cell phone tower, trick your phone into connecting with them, and suck up your data, seems to grow every day. But no matter what name cell-site simulators go by, whether they are in the hands of the government or malicious thieves, there’s no question that they’re a serious threat to privacy.
That’s why EFF is launching the cell-site simulator section of Street Level Surveillance today.
In an unusually direct attack on online privacy and free speech, the ruling regime of Kazakhstan appears to have mandated the country's telecommunications operators to intercept citizens' Internet traffic using a government-issued certificate starting on January 1, 2016. The press release announcing the new measure was published last week by Kazakhtelecom JSC, the nation's largest telecommunications company, but appears to have been taken down days later—the link above comes courtesy of the Internet Archive, which never forgets. It is unclear whether the retracted press release indicates that Kazakhstan's ruling regime has abandoned the plan in response to widespread criticism, or is simply planning to carry it out at some later date, once attention has died down.
In a victory for millions of people in the U.S. who have placed telephone calls to locations overseas, EFF and Human Rights Watch have confirmed that the Drug Enforcement Administration’s practice of collecting those records in bulk has stopped and that the only bulk database of those records has been destroyed.
From the 1990s to 2013, the DEA secretly and illegally collected billions of records of Americans’ international calls to hundreds of countries around the world. In April 2015, we filed a lawsuit on behalf of our client, Human Rights Watch, challenging the constitutionality of the program and seeking to have the records purged from the government’s possession.
One of the basic tenets of a civilized society is that the punishment should be proportionate with the crime. What essentially amounts to vandalism should not result in even the remote possibility of a 25-year jail sentence. But that very possibility is on the table in the government’s case against journalist Matthew Keys, whose sentencing hearing is about one month off. The case is an illustration of prosecutorial discretion run amok—and once again shows why reform of the federal anti-hacking statute, the Computer Fraud and Abuse Act (CFAA), is long overdue.
From Mary Shelley to George Orwell to H.G. Wells to William Gibson, science fiction has been the most enduring, most convincing way for artists to engage in tech policy issues.
—Cory Doctorow
In the public battle for strong encryption, EFF has championed the voice of everyday Internet users. After all, if we can’t rely on the security of our digital communications, how can the Web continue to grow and thrive?
Now the fight has moved to the Oval Office. EFF, Access Now, over a dozen nonprofits and tech companies, and over 100,0000 concerned Internet users joined forces to ask President Obama to stand up for uncompromised encryption.
We definitely got his attention.
Online harassment is a serious problem. As we’ve repeatedly explained in the past, laws that address it must be carefully written to protect people from the real harms caused by online harassment, without unduly restricting free speech or invading people’s privacy.
Copyright Lawsuits Won’t Stop People from Sharing Research
In principle, everyone in the world should have access to the same body of knowledge. The UN Declaration of Human Rights says that everyone deserves the right “to share in scientific advancement and its benefits.”
The reality is a bit messier. Institutional subscriptions to academic databases don’t cover every article someone would ever need. When scholars and professors find a reference to an article that they don’t have access to, they’ll often turn to less orthodox approaches: asking for the paper on Twitter or Facebook, emailing a friend at another institution, or even asking the author directly. For a lot of people, research amounts to a patchwork of sources culled together through authorized and unauthorized methods.
The First Amendment protects the right of everyone to use the Internet to criticize government officials–including people on supervised release from prison.
Take the case of Darren Chaker, whose supervised release was revoked earlier this year because he criticized a law enforcement officer in a blog post. Specifically, he wrote that the officer had been “forced out” by a police agency. The government argues that Chaker violated the terms of his release, which instructed him not to “harass” anyone else, including “defaming a person’s character on the internet.” To us, this is a classic example of political speech that should be subject to the highest level of First Amendment protection.
The language in the Trans-Pacific Partnership (TPP) on Internet Service Provider (ISP) liability—which governs the legal liability of Internet intermediaries and platforms for communications of their users—resides in an annex in the trade agreement's Intellectual Property chapter and was one of the most contentious parts of its copyright enforcement rules. This is because the United States was pushing to export a version of the liability regime that exists under its Digital Millennium Copyright Act (DMCA), which has been notoriously problematic in facilitating the censorship of online content through bogus copyright claims.
Today we're launching version 2.0 of our tracking and fingerprinting detection tool, Panopticlick. This version brings new tests to our existing tool, such as canvas and touch-capability fingerprinting, updating its ability to uniquely identify browsers with current techniques. In addition, we're adding a brand new suite of tests that detect how well your browser and extensions are protecting you from (1) tracking by ads; (2) from tracking by invisible beacons; and also (3) whether they encourage compliance with the Do Not Track policy, which EFF and a coalition of allies launched earlier this year.
Today Public Knowledge, Engine, and EFF filed an amicus brief in the Supreme Court about patent damages. This guest post is by former EFF apprentice legal intern Charles Duan, now the Director of Public Knowledge’s Patent Reform Project. It is cross-posted from Public Knowledge’s blog.
Today, House leadership released text of the 2016 "Omnibus package." The legislative package is supposed to deal exclusively with funding the federal government through 2016; however, leadership also managed to include a dangerous cybersecurity "information sharing" bill. The cybersecurity bill is a combination of three bad cybersecurity bills passed by Congress this year: two pieces of legislation in the House and another--called the Cybersecurity Information Sharing Act (CISA)--in the Senate.
EFF has filed a brief in Defense Distributed v. Department of State, a case that could push forward recognition for the hard fought principle that publishing computer files that communicate information, even in an esoteric format, is speech protected by the First Amendment. In our brief, we argue that the government has gone too far by restricting online speech generally about certain technologies, and requiring would-be publishers to ask for a license to speak—in a process with no binding standards or meaningful government deadlines and no judicial oversight.
In response to feedback from activist groups, including the Electronic Frontier Foundation, Facebook announced Tuesday that it would change some aspects of its real names policy. As it currently stands, the policy requires users to register what Facebook calls their “authentic identity,”—or how friends and family know them—in order to use the social network. The policy also allows users to report other users registered under alias names and gives Facebook the ability to suspend any accounts where the identity of a user is found to be “fraudulent.” This abuse system has been used to silence a broad range of users, from drag queens to Vietnamese pro-democracy activists.
For the last four years, EFF has greeted the holiday season by publishing a list of things we'd like to see happen in the coming year. Sometimes these are actions we'd like to see taken by companies, and sometimes our wishes are aimed at governments, but we also include actions everyday people can take to advance our digital civil liberties. This year has seen a few wishes come true. For example, our FOIA lawsuit against the NSA led them to disclose the (redacted) details of their Vulnerabilities Equities Process.
We were disappointed today to learn that a federal appeals court in Pasadena declined to consider EFF’s appeal of a ruling in Jewel v. NSA, our long-running lawsuit battling unconstitutional mass surveillance of Internet and phone communications. While we are disappointed that government’s stall tactics prevailed here, the case still lives on. We look forward to litigating back in the lower court, making it clear that Internet backbone spying is unconstitutional.
The United States Court of Appeal for the Seventh Circuit today struck down an overbroad permanent injunction against online speech issued by a lower court in a defamation case. The lower court had enjoined future speech that the jury had not specifically found to be defamatory, and the Seventh Circuit held that this violated the First Amendment.
All too often, new police surveillance tools are initially applied to only the “worst of the worst” and then slowly—but surely—expanded to include an ever-growing number of less culpable individuals. We’ve seen it with DNA collection. And now we’re starting to see it with GPS tracking. That’s why last week EFF filed an amicus brief with the United States Court of Appeal for the Seventh Circuit urging the court to strike down a Wisconsin statute that required certain individuals—including individuals who already fully served their criminal sentences—to wear GPS ankle bracelets every day for the rest of their lives.
Gracias a Hiperderecho por la traducción.
Getting a patent demand letter from a troll can be a scary experience. The letters often include a lot of legal jargon, not to mention a patent that is often impenetrable (at least, not without hiring an expensive lawyer to translate it for you).
But suppose you are concerned that the patent may impact your business. After trying to reach an agreement with the patent owner and failing, you may be told by your lawyer that the next step is to go to court.
Unfortunately, thanks to a 1998 court case, you often can’t go to your local courthouse and get things figured out. Instead, you may be forced to go to a courthouse across the country, in a small corner of a state that you have little to no connection to.
We are pleased to welcome Sarah Deutsch back to EFF’s Board of Directors. Until her retirement earlier this year, Sarah was Vice President and Deputy General Counsel at Verizon Communications, where she spent over 23 years in the legal department. She was responsible for Verizon's global IP practice, including copyrights, trademarks, patent licensing, and unfair competition. In the course of her career, Sarah also managed Verizon's privacy practice, and worked on a broad set of global intellectual property policy issues, including Internet policy, online liability, and advocacy.
Earlier this fall, EFF and MIT co-hosted the Freedom to Innovate Summit, bringing together student researchers from around the country to discuss threats to research and how universities can better support students. Video from several sessions recently became available online.
The Summit featured several noteworthy speakers, including students who had been forced to confront overzealous law enforcement authorities and prosecutors. One whose story gripped participants was former MIT Electrical Engineering and Computer Science student Star Simpson.
From John Oliver quizzing Edward Snowden on whether the NSA is collecting our "dick pics" to EFF’s legal team obliterating the patent that was used to go after podcaster Adam Carolla, digital rights issues have been in the public spotlight this year. For the most part, 2015 found us winning hard-fought battles to advance our freedoms online.
In recent years, the stock photo industry has sent out thousands of boiler plate demand letters asking Internet users to pay for photos that appear on blogs and other websites. In many cases, the industry appears to be leveraging the threat of litigation to extract settlements well beyond any actual harm. At other times, these demand letters have carelessly targeted licensed uses and fair uses. Today EFF is helping a website owner respond to an improper attack on fair use by License Compliance Services, Inc. (LCS).
What books, TV shows, and movies helped shaped the way EFF staff were thinking about cutting edge issues this year? Each December we like to look back at some of the new and noteworthy media we took in. We don't endorse all the arguments you'll find in them, but we think they at least add something valuable to the discussion. Also, this isn't meant to be an exhaustive list—more of a conversation starter.
Some notes about this list: it's presented in alphabetical order by author's last name, and most links contain our Amazon affiliate code, which means EFF will receive a portion of purchases made through this page. Books reviewed by Cory Doctorow point to his original review. Descriptions are by Parker Higgins except where otherwise specified.
When we look back at 2015, we will remember this as the year we launched our most ambitious technology project to date. EFF, Mozilla, and our partners gave the world the Let's Encrypt certificate authority. Certificates became available to the public on December 3.
Let's Encrypt makes getting a digital certificate for an Internet site fast, free, and easy, so sites can easily enable HTTPS encryption (and some other encrypted protocols). We think this is a vital step in getting Web connections routinely encrypted, by reducing the cost and difficulty of getting a certificate that browsers require when making secure connections.
Pages
Deeplinks Topics
- Fair Use and Intellectual Property: Defending the Balance
- Free Speech
- Innovation
- International
- Know Your Rights
- Privacy
- Trade Agreements and Digital Rights
- Security
- State-Sponsored Malware
- Abortion Reporting
- Analog Hole
- Anonymity
- Anti-Counterfeiting Trade Agreement
- Biometrics
- Bloggers' Rights
- Broadcast Flag
- Broadcasting Treaty
- CALEA
- Cell Tracking
- Coders' Rights Project
- Computer Fraud And Abuse Act Reform
- Content Blocking
- Copyright Trolls
- Council of Europe
- Cyber Security Legislation
- CyberSLAPP
- Defend Your Right to Repair!
- Development Agenda
- Digital Books
- Digital Radio
- Digital Video
- DMCA
- DMCA Rulemaking
- Do Not Track
- DRM
- E-Voting Rights
- EFF Europe
- Encrypting the Web
- Export Controls
- FAQs for Lodsys Targets
- File Sharing
- Fixing Copyright? The 2013-2016 Copyright Review Process
- FTAA
- Genetic Information Privacy
- Hollywood v. DVD
- How Patents Hinder Innovation (Graphic)
- ICANN
- International Privacy Standards
- Internet Governance Forum
- Law Enforcement Access
- Legislative Solutions for Patent Reform
- Locational Privacy
- Mandatory Data Retention
- Mandatory National IDs and Biometric Databases
- Mass Surveillance Technologies
- Medical Privacy
- National Security and Medical Information
- National Security Letters
- Net Neutrality
- No Downtime for Free Speech
- NSA Spying
- OECD
- Offline : Imprisoned Bloggers and Technologists
- Online Behavioral Tracking
- Open Access
- Open Wireless
- Patent Busting Project
- Patent Trolls
- Patents
- PATRIOT Act
- Pen Trap
- Policy Analysis
- Printers
- Public Health Reporting and Hospital Discharge Data
- Reading Accessibility
- Real ID
- RFID
- Search Engines
- Search Incident to Arrest
- Section 230 of the Communications Decency Act
- Social Networks
- SOPA/PIPA: Internet Blacklist Legislation
- Student and Community Organizing
- Student Privacy
- Stupid Patent of the Month
- Surveillance and Human Rights
- Surveillance Drones
- Terms Of (Ab)Use
- Test Your ISP
- The "Six Strikes" Copyright Surveillance Machine
- The Global Network Initiative
- The Law and Medical Privacy
- TPP's Copyright Trap
- Trans-Pacific Partnership Agreement
- Travel Screening
- TRIPS
- Trusted Computing
- Video Games
- Wikileaks
- WIPO
- Transparency
- Uncategorized