We’re disappointed that the Supreme Court decided not to take up our case challenging the government’s practice of searching electronic devices at the border without a warrant or any suspicion of wrongdoing.
@EFF We sued DHS nearly four years ago on behalf of a group of travelers to put a stop to this egregious privacy violation. While this case is over, the fight continues to defend digital privacy at the U.S. border
We want to thank our partners @ACLU@ACLU_Mass, and of course our clients. Without their commitment to fight for their constitutional rights, this case would not have happened. @EFF
On the bright side, the Supreme Court declined to hear a similar case, which lets stand a Ninth Circuit ruling that narrowed border device searches to looking for digital contraband. The Ninth Circuit cited EFF’s amicus brief in crafting its new rule. eff.org/deeplinks/2019…@EFF
• • •
Missing some Tweet in this thread? You can try to
force a refresh
The built environment of surveillance—in, over, and under our cities—makes it an entwined problem that must be combatted through entwined solutions. To make it easier to see, we've visualized it in a cross-section of the average city block: eff.org/deeplinks/2021…
We've created downloadable, shareable graphics to show how the varying surveillance technologies and legal authorities overlap, how they disproportionately impact the lives of marginalized communities, and what tools we have at our disposal to halt or mitigate their harms.
It's hard to understand what the many types of surveillance can mean for your daily life—from local and state police, to federal law enforcement, to the growing cooperation between private tech companies and the government.
Share these images to help get the message across.
This is an important victory for the free speech rights of public school students. We’re pleased that the Supreme Court recognized that public school officials are sharply limited in punishing students’ off-campus speech, even when it is vulgar. washingtonpost.com/politics/court…
The Court also rightfully declined to give lesser protection to students’ speech on social media. This is critical, given that public school students, like most young people, use social media to engage in a wide variety of self-expression, political speech, and activism.
In our brief, we wrote that “social media is a central means for young people to express themselves, connect with others, and engage in advocacy surrounding issues they care about.” Justice Breyer acknowledged this in the Court's opinion:
At last, we've got the option to make our friends list private in @Venmo. Here's how to lock down your account, in 8 quick steps:
1: Tap the three lines in the top right corner, select Settings near the bottom. From the settings screen, select Privacy, then Friends List.
2: The settings will look like this by default. Change the privacy setting to Private. If you do not wish to appear in your friends’ own friends lists—after all, they may not set theirs to private—click the toggle off at the bottom. The final result should look like this.
3: Back on the Privacy settings page, make sure your Default privacy settings look like this: set your default privacy option for all future payments to Private.
Colombia's #ParoNacional protests have highlighted main concerns for protecting the ability to use technology and the internet to speak up and organize.
.@Karisma and other groups have pointed to three urgent concerns:
1: The official narrative criminalizing those who protest online as “digital vandals” carrying out “digital terrorism" nacla.org/news/2021/05/1…
2: The use of technical and legal capacities to block Internet access and protest-related content netblocks.org/reports/intern…
Are you tasked with defending your colleagues' devices from ransomware? We've created this handout and phishing art critique activity as part of our free Security Education Companion resource. Some excerpts below. sec.eff.org/materials/malw…
(1/5)
Some definitions of malware and phishing from our sec.eff.org malware handout
(2/5)
Common ways malware is installed, from our sec.eff.org malware handout