Deeplinks Blog posts about Anonymity
Today, Verizon reached an agreement with the FCC to acquire affirmative consent before injecting their UIDH tracking header into their customers' web activity on non-Verizon owned sites. This is exactly what we asked them to do in November 2014, and is a huge win for Internet privacy. ISPs are trusted carriers of our communications. They should be supporting individuals' privacy rights, not undermining them.
In response to feedback from activist groups, including the Electronic Frontier Foundation, Facebook announced Tuesday that it would change some aspects of its real names policy. As it currently stands, the policy requires users to register what Facebook calls their “authentic identity,”—or how friends and family know them—in order to use the social network. The policy also allows users to report other users registered under alias names and gives Facebook the ability to suspend any accounts where the identity of a user is found to be “fraudulent.” This abuse system has been used to silence a broad range of users, from drag queens to Vietnamese pro-democracy activists.
Facebook has responded to an October 5 open letter from a global coalition, including EFF, about its broken “authentic name policy.” Facebook’s response is a step in the right direction. It's also not the last change to the policy we’ll see, since Facebook notes “we’re making changes now and in the future.” Facebook says it “want[s] to reduce the # of people asked to verify ID.” Facebook and the Nameless Coalition share that goal, and these suggestions will help achieve it. But they still leave some users out in the cold.
What happens when ICANN's rules that require domain name registrars to publish domain owners' personal data in a public database, conflict with the data protection laws in countries where those registrars operate?
As of this month, 567 relays from our 2014 Tor Challenge are still up and running—more than were established during the entire inaugural Tor Challenge back in 2011. To put that number in perspective, these nodes represent more than 8.5% of the roughly 6,500 public relays currently active on the entire Tor network, a system that supports more than 2-million directly connecting clients worldwide.
Pages
Subscribe to EFF Updates
Deeplinks Archives
Deeplinks Topics
- Fair Use and Intellectual Property: Defending the Balance
- Free Speech
- Innovation
- International
- Know Your Rights
- Privacy
- Trade Agreements and Digital Rights
- Security
- State-Sponsored Malware
- Abortion Reporting
- Analog Hole
- Anonymity
- Anti-Counterfeiting Trade Agreement
- Biometrics
- Bloggers' Rights
- Broadcast Flag
- Broadcasting Treaty
- CALEA
- Cell Tracking
- Coders' Rights Project
- Computer Fraud And Abuse Act Reform
- Content Blocking
- Copyright Trolls
- Council of Europe
- Cyber Security Legislation
- CyberSLAPP
- Defend Your Right to Repair!
- Development Agenda
- Digital Books
- Digital Radio
- Digital Video
- DMCA
- DMCA Rulemaking
- Do Not Track
- DRM
- E-Voting Rights
- EFF Europe
- Electronic Frontier Alliance
- Encrypting the Web
- Export Controls
- FAQs for Lodsys Targets
- File Sharing
- Fixing Copyright? The 2013-2016 Copyright Review Process
- FTAA
- Genetic Information Privacy
- Hollywood v. DVD
- How Patents Hinder Innovation (Graphic)
- ICANN
- International Privacy Standards
- Internet Governance Forum
- Law Enforcement Access
- Legislative Solutions for Patent Reform
- Locational Privacy
- Mandatory Data Retention
- Mandatory National IDs and Biometric Databases
- Mass Surveillance Technologies
- Medical Privacy
- National Security and Medical Information
- National Security Letters
- Net Neutrality
- No Downtime for Free Speech
- NSA Spying
- OECD
- Offline : Imprisoned Bloggers and Technologists
- Online Behavioral Tracking
- Open Access
- Open Wireless
- Patent Busting Project
- Patent Trolls
- Patents
- PATRIOT Act
- Pen Trap
- Policy Analysis
- Printers
- Public Health Reporting and Hospital Discharge Data
- Reading Accessibility
- Real ID
- RFID
- Search Engines
- Search Incident to Arrest
- Section 230 of the Communications Decency Act
- Social Networks
- SOPA/PIPA: Internet Blacklist Legislation
- Student Privacy
- Stupid Patent of the Month
- Surveillance and Human Rights
- Surveillance Drones
- Terms Of (Ab)Use
- Test Your ISP
- The "Six Strikes" Copyright Surveillance Machine
- The Global Network Initiative
- The Law and Medical Privacy
- TPP's Copyright Trap
- Trans-Pacific Partnership Agreement
- Travel Screening
- TRIPS
- Trusted Computing
- Video Games
- Wikileaks
- WIPO
- Transparency
- Uncategorized