Posts Tagged eff

Car Makers Spying On You And Selling Your Data

From Electronic Frontier Foundation:

In a recent New York Times article, Kashmir Hill reported how everyday moments in your car like these create a data footprint of your driving habits and routine that is, in some cases, being sold to insurance companies. Collection often happens through so-called “safe driving” programs pre-installed in your vehicle through an internet-connected service on your car or a connected car app. Real-time location tracking often starts when you download an app on your phone or tap “agree” on the dash screen before you drive your car away from the dealership lot.

, , , , , , , , , , ,

No Comments

Oppose the Surveillance of the EARN IT Act

From EFF:

While Apple’s plan would have put the privacy and security of its users at risk, the EARN IT Act compromises security and free speech for everyone. The bill would create serious legal risk for business that hosts content—messages, photos stored in the cloud, online backups—and, potentially, even cloud-hosting sites like those using Amazon Web Services, unless they use government-approved scanning tools. 

, , , , , , , , , , , ,

No Comments

Colorado Court Rules Against 3 Month Long Surveillance

From Electronic Frontier Foundation:

Last week, the Colorado Supreme Court ruled, in a case called People v. Tafoya, that three months of warrantless continuous video surveillance outside a home by the police violated the Fourth Amendment. We, along with the ACLU and the ACLU of Colorado, filed an amicus brief in the case.

, , , , , , ,

No Comments

Fight For The Future Discusses Apple Petition Against Phone Scanning

From Fight For The Future:

, , , , , , , , , , , ,

No Comments

Pushing Back Against Surveillance Tech

From Electronic Frontier Foundation:

At work, employee-monitoring “bossware” puts workers’ privacy and security at risk with invasive time-tracking and “productivity” features that go far beyond what is necessary and proportionate to manage a workforce. At school, programs like remote proctoring and social media monitoring follow students home and into other parts of their online lives. And at home, stalkerware, parental monitoring “kidware” apps, home monitoring systems, and other consumer tech monitor and control intimate partners, household members, and even neighbors. In all of these settings, subjects and victims often do not know they are being surveilled, or are coerced into it by bosses, administrators, partners, or others with power over them.

, , , , ,

No Comments

The Fight Against Financial Censorship

From The Electronic Frontier Foundation:

On Thursday, the Office of the Comptroller of the Currency finalized its Fair Access to Financial Services rule, which will prevent banks from refusing to serve entire classes of customers that they find politically or morally unsavory. The rule is a huge win for civil liberties, and for the many sectors who have found themselves in the bad graces of corporate financial services, like cryptocurrency projects, marijuana businesses, sex worker advocacy groups, and others.

, , , , , , , ,

No Comments

Police Can’t Force Your Password

From EFF:

The Pennsylvania Supreme Court issued a forceful opinion today holding that the Fifth Amendment to the U.S. Constitution protects individuals from being forced to disclose the passcode to their devices to the police. In a 4-3 decision in Commonwealth v. Davis, the court found that disclosing a password is “testimony” protected by the Fifth Amendment’s privilege against self-incrimination.

, , , , , ,

No Comments

Sign Petition To Stop Warrantless Spying

From EFF:

The law behind the NSA’s sweeping Internet surveillance programs—Section 702, as enacted by the FISA Amendments Act—is set to expire at the end of 2017. Built-in expiration dates like this force lawmakers to review, debate, and update wide-reaching surveillance laws that impact their constituents’ privacy.

The looming Section 702 sunset gives Congress a chance to rein in the warrantless surveillance of millions of innocent people’s online communications. But some have another, much more dangerous idea.

Sen. Tom Cotton and a group of other Senate Republicans recently introduced a bill (S. 1297) that would not only reauthorize Section 702 without making much-needed changes, but it would also make the law permanent, effectively forfeiting lawmakers’ responsibility to periodically reexamine Section 702 and the impact it has on their constituents.

It would be unacceptable for Congress to ignore our privacy concerns and hand off their obligation to review surveillance law.

Sign our petition and tell Congress to oppose S. 1297.

, , , , , ,

No Comments

Operation Choke Point Under Scrutiny

From Electronic Frontier Foundation:

EFF recently received dozens of pages of documents in response to a FOIA request we submitted about Operation Choke Point, a Department of Justice project to pressure banks and financial institutions into cutting off service to certain businesses. Unfortunately, the response from the Department of Justice leaves many questions unanswered.

EFF has been tracking instances of financial censorship for years to identify how online speech is indirectly silenced or intimidated by shuttering bank accounts, donation platforms, and other financial institutions.  The Wall Street Journal wrote about the Justice Department’s controversial and secretive campaign against financial institutions in 2013, and one Justice Department official quoted in the article stated:

, , , , , , , ,

No Comments

Choosing A Strong Password Is Easier Than You Think

From EFF:

Randomly-generated passphrases offer a major security upgrade over user-chosen passwords. Estimating the difficulty of guessing or cracking a human-chosen password is very difficult. It was the primary topic of my own PhD thesis and remains an active area of research. (One of many difficulties when people choose passwords themselves is that people aren’t very good at making random, unpredictable choices.)

Measuring the security of a randomly-generated passphrase is easy. The most common approach to randomly-generated passphrases (immortalized by XKCD) is to simply choose several words from a list of words, at random. The more words you choose, or the longer the list, the harder it is to crack. Looking at it mathematically, for k words chosen from a list of length n, there are kn possible passphrases of this type. It will take an adversary about kn/2 guesses on average to crack this passphrase. This leaves a big question, though: where do we get a list of words suitable for passphrases, and how do we choose the length of that list?

In general choosing four five-letter words is better than one long word with number substitutions and some weird characters thrown in. It’s easier to remember and vastly harder for a computer to guess.

, , , , , , ,

No Comments

EFF Files Brief In Support Of Defense Distributed’s 3-D Files

From EFF:

The underlying legal ideas stretch back to one of EFF’s earliest major legal victories. Twenty years ago, in Bernstein v. U.S. Department of Justice, a judge articulated that code is speech inrejecting so-called export restrictions on code that implements cryptographic protocols. Daniel Bernstein, a mathematics Ph.D. student, wanted to publish source code for a program to run an algorithm he developed. He objected to the State Department classification of his code as a “munition” and, with EFF’s help, sued to establish his First Amendment right to publish the code without arbitrary restrictions outlined in the International Traffic in Arms Regulations (ITAR) and other laws—restrictions that included registering as an arms dealer and submitting the code for governmental review.

Read EFF’s full amicus brief here.

, , , , , , , , , , , , , ,

No Comments

Tell Congress Not To Authorize Section 215 of PATRIOT Act

From the EFF:

Tell Congress: Stop S. 1357. No reauthorization of Section 215 of the Patriot Act—no matter how short.

Congress has a chance to vote no on the NSA’s mass phone record surveillance under Section 215 of the Patriot Act. But NSA apologists are trying to broker a deal to extend Section 215 for another two months. That’s two more months of the NSA sweeping up millions of people’s phone records unconstitutionally. With your help, we can stop Congress from simply rubber-stamping this reauthorization. Tell Congress: no reauthorization of Section 215, no matter how short.

, , , , , ,

No Comments

EFF Launches Surveillance Self Defense Site

Surveillance Self Defense will teach you how to use technology and software to protect yourself and your data online.

This is a project of the Electronic Frontier Foundation

, , , , , , ,

No Comments

Regulations Proposed to Control Bitcoin

From the Electronic Frontier Foundation:

The State of New York has proposed BitLicense, a sprawling regulatory framework that would mandate licenses for a wide range of companies that interact with digital currencies. The proposal creates expensive and vague new obligations for startups and infringes on the privacy rights of both Bitcoin businesses and casual users. And we have only four days before public comments on the proposal close. Speak out now.

This isn’t just about Bitcoin. Any future digital currency protocol would be affected, even if it’s not being used for financial services. As the proposal is currently drafted, innovators who want to use these protocols for smart contracts, to track digital assets, or for any other purpose would still be affected.

 

, , , , , ,

No Comments

What The Snowden Leaks Have Revealed

From the EFF:

It’s been one year since the Guardian first published the Foreign Intelligence Surveillance Court order, leaked by former NSA contractor Edward Snowden, that demonstrated that the NSA was conducting dragnet surveillance on millions of innocent people. Since then, the onslaught of disturbing revelations, from disclosures, admissions from government officials, Freedom of Information Act requests, and lawsuits, has been nonstop. On the anniversary of that first leak, here are 65 things we know about NSA spying that we did not know a year ago:

1. We saw an example of the court orders that authorize the NSA to collect virtually every phone call record in the United States—that’s who you call, who calls you, when, for how long, and sometimes where.

2. We saw NSA Powerpoint slides documenting how the NSA conducts “upstream” collection, gathering intelligence information directly from the infrastructure of telecommunications providers.

Full Article

, , , , , , ,

No Comments