Deeplinks Blog posts about Privacy
Throughout 2016, EFF and our civil society partners have been closely following digital rights developments throughout Latin America. You can see some of the results in Unblinking Eyes, our exhaustive survey of surveillance law and practice across the Americas, as well as multiple countries’ localized versions of Who Has Your Back (Mexico, Colombia, and Brazil), our guide to how companies respond to government data requests.
This year has been full of developments in messaging platforms that employ encryption to protect users. 2016 saw an increase in the level of security for some major messaging services, bringing end-to-end encryption to over a billion people. Unfortunately, we’ve also seen major platforms making poor decisions for users and potentially undermining the strong cryptography built into their apps.
"Sharing" or "gig economy" companies like Uber and Airbnb continued to grow in 2016, meaning their data protection and privacy practices came into sharp focus as millions of Americans turned to these young companies for everything from rides to the airport to renting an apartment instead of a hotel room.
Customers are entrusting these companies—including others like Lyft, TaskRabbit, and Instacart—with enormous amounts of sensitive information about their habits and lives. To access the services offered, or to offer services via company apps, individuals are disclosing data about where they live and shop, what they buy, where they sleep, and where they travel.
There's no question that this has been a big year for government hacking. Not a day has gone by without some mention of it in the news. 2016 may forever be remembered as the year when government hacking went so mainstream that Stephen Colbert cracked jokes about Fancy Bear and Cozy Bear on The Late Show. The Obama administration has publicly blamed the Russian government for a series of compromises of U.S. political institutions and individuals in this election year, including the Democratic National Committee, the Republican National Committee, and John Podesta, former Chairman of the Hillary Clinton election campaign. Political espionage is nothing new, but what distinguishes this series of attacks is the element of publication.
Author Malcolm Gladwell recently name-checked the EFF in an article published in The New Yorker. Mr. Gladwell’s piece examines what he sees as the differences between whistle-blowers Edward Snowden and Daniel Ellsberg, and concludes that Snowden doesn’t deserve the respect (or apparently the same legal protection) that Ellsberg does. It’s always nice to be mentioned in respected publications, but as an organization that has actual experience with trying to make change with whistleblower information, we sharply disagree with Mr. Gladwell’s conclusion, and even more so with how he gets there.
Pages
Subscribe to EFF Updates
Deeplinks Archives
Deeplinks Topics
- Fair Use and Intellectual Property: Defending the Balance
- Free Speech
- Innovation
- UK Investigatory Powers Bill
- International
- Know Your Rights
- Privacy
- Trade Agreements and Digital Rights
- Security
- State-Sponsored Malware
- Abortion Reporting
- Analog Hole
- Anonymity
- Anti-Counterfeiting Trade Agreement
- Artificial Intelligence & Machine Learning
- Biometrics
- Bloggers' Rights
- Border Searches
- Broadcast Flag
- Broadcasting Treaty
- CALEA
- Cell Tracking
- Coders' Rights Project
- Computer Fraud And Abuse Act Reform
- Content Blocking
- Copyright Trolls
- Council of Europe
- Cyber Security Legislation
- CyberSLAPP
- Defend Your Right to Repair!
- Development Agenda
- Digital Books
- Digital Radio
- Digital Video
- DMCA
- DMCA Rulemaking
- Do Not Track
- DRM
- E-Voting Rights
- EFF Europe
- Electronic Frontier Alliance
- Encrypting the Web
- Export Controls
- FAQs for Lodsys Targets
- File Sharing
- Fixing Copyright? The 2013-2016 Copyright Review Process
- FTAA
- Genetic Information Privacy
- Government Hacking and Subversion of Digital Security
- Hollywood v. DVD
- How Patents Hinder Innovation (Graphic)
- ICANN
- International Privacy Standards
- Internet Governance Forum
- Law Enforcement Access
- Legislative Solutions for Patent Reform
- Locational Privacy
- Mandatory Data Retention
- Mandatory National IDs and Biometric Databases
- Mass Surveillance Technologies
- Medical Privacy
- Mobile devices
- National Security and Medical Information
- National Security Letters
- Net Neutrality
- No Downtime for Free Speech
- NSA Spying
- OECD
- Offline : Imprisoned Bloggers and Technologists
- Online Behavioral Tracking
- Open Access
- Open Wireless
- Patent Busting Project
- Patent Trolls
- Patents
- PATRIOT Act
- Pen Trap
- Policy Analysis
- Printers
- Public Health Reporting and Hospital Discharge Data
- Reading Accessibility
- Real ID
- Reclaim Invention
- RFID
- Search Engines
- Search Incident to Arrest
- Section 230 of the Communications Decency Act
- Shadow Regulation
- Social Networks
- SOPA/PIPA: Internet Blacklist Legislation
- Student Privacy
- Stupid Patent of the Month
- Surveillance and Human Rights
- Surveillance Drones
- Terms Of (Ab)Use
- Test Your ISP
- The "Six Strikes" Copyright Surveillance Machine
- The Global Network Initiative
- The Law and Medical Privacy
- TPP's Copyright Trap
- Trans-Pacific Partnership Agreement
- Travel Screening
- TRIPS
- Trusted Computing
- Video Games
- Wikileaks
- WIPO
- Transparency
- Uncategorized