Skip to main content

Issues

Issues


Creativity & Innovation

Reclaim Invention

When universities invent, those inventions should benefit everyone. Unfortunately, they sometimes end up in the hands of patent trolls, companies that serve no purpose but to amass patents and demand money from other innovators and inventors.
We’re asking universities around the country to protect their inventions from patent trolls...

Copyright Law Versus Internet Culture

Throughout human history, culture has been made by people telling one another stories, building on what has come before, and making it their own. Every generation, every storyteller puts their own spin on old tales to reflect their own values and changing times.
This creative remixing happens today and...


Free Speech

Free Speech is Only as Strong as the Weakest Link

From Mubarak knocking a country offline by pressuring local ISPs to PayPal caving to political pressure to cut off funding to WikiLeaks, this year has brought us sobering examples of how online speech can be endangered. And it’s not only political speech that is threatened – in the United...

A person holding a megaphone that another person speaks through

Section 230

47 U.S.C. § 230The Internet allows people everywhere to connect, share ideas, and advocate for change without needing immense resources or technical expertise. Our unprecedented ability to communicate online—on blogs, social media platforms, and educational and cultural platforms like Wikipedia and the Internet Archive—is not an accident. Congress recognized that...


International

Shadow Regulation

Shadow Regulations are voluntary agreements between companies (sometimes described as codes, principles, standards, or guidelines) to regulate your use of the Internet, often without your knowledge.
Shadow Regulation has become increasingly popular after the monumental failure of restrictive Internet laws such as ACTA, SOPA and PIPA. This...

Banner Graphic: 

Digital Privacy at the U.S. Border: Protecting the Data On Your Devices and In the Cloud

Digital Privacy at the U.S. Border:Protecting the Data On Your Devices and In the Cloudby Sophia Cope, Amul Kalia, Seth Schoen, and Adam SchwartzDownload the report as a PDF.EXECUTIVE SUMMARYأفادت الحكومة الأمريكية أن عدد حالات تفحص المحتويات الالكترونية على الحدود قد إزداد بمقدار خمسة أضعاف خلال سنة واحدة فقط،...

Border Surveillance Technology

EFF Zine on Surveillance Tech at the Southern Border Shines Light on Ever-Growing Spy Network

SAN FRANCISCO—Sensor towers controlled by AI, drones launched from truck-bed catapults, vehicle-tracking devices disguised as traffic cones—all are part of an arsenal of technologies that comprise the expanding U.S surveillance strategy along the U.S.-Mexico border, revealed in a new EFF zine for advocates, journalists, academics, researchers, humanitarian aid workers, and...


Privacy

Banner Graphic: 

Digital Privacy at the U.S. Border: Protecting the Data On Your Devices and In the Cloud

Digital Privacy at the U.S. Border:Protecting the Data On Your Devices and In the Cloudby Sophia Cope, Amul Kalia, Seth Schoen, and Adam SchwartzDownload the report as a PDF.EXECUTIVE SUMMARYأفادت الحكومة الأمريكية أن عدد حالات تفحص المحتويات الالكترونية على الحدود قد إزداد بمقدار خمسة أضعاف خلال سنة واحدة فقط،...

NSA Spying

The US government, with assistance from major telecommunications carriers including AT&T, has engaged in massive, illegal dragnet surveillance of the domestic communications and communications records of millions of ordinary Americans since at least 2001. Since this was first reported on by the press and discovered by the public in late...

Security

vintage keys in a web of nodes

Encrypting the Web

The web has largely switched from non-secure HTTP to the more secure HTTPS protocol. All web servers use one of these two protocols to get web pages from the server to your browser. HTTP has serious problems that make it vulnerable to eavesdropping and content hijacking. HTTPS fixes most of...

Coders' Rights Project

EFF's Coders' Rights Project protects programmers and developers engaged in cutting-edge exploration of technology. Security and encryption researchers help build a safer future for all of us using digital technologies, but too many legitimate researchers face serious legal challenges that prevent or inhibit their work. These challenges come from laws...


Transparency

FISC Orders on Illegal Government Surveillance

EFF has sued the Department of Justice (DOJ), demanding answers about illegal email and telephone call surveillance at the National Security Agency (NSA).
The FISA Amendments Act (FAA) of 2008 gave the NSA expansive power to spy on Americans’ international email and telephone calls. However, last month, a government...

FOILIES

The Foilies 2018

Recognizing the Year’s Worst in Government TransparencyGovernment transparency laws like the Freedom of Information Act exist to enforce the public’s right to inspect records so we can all figure out what the heck is being done in our name and with our tax dollars. But when a public agency ignores,...

Back to top

JavaScript license information