"The concepts driving today’s net neutrality debate caught on because the internet used to operate differently—and because they were easy for consumers to understand. In many respects, these
concepts were vitally important to the evolution of the internet over the past decades. But in today’s world, they don’t address the real issue with the country’s ISPs, and if we spend too much time
worried about fast lanes, we could hurt the net’s progress rather than help it."
"63. […] the answer to the question referred is that Article 5 of Directive 2001/29 must be interpreted as meaning that the on-screen copies and the cached copies made by an end-user in the
course of viewing a website satisfy the conditions that those copies must be temporary, that they must be transient or incidental in nature and that they must constitute an integral and essential part of
a technological process, as well as the conditions laid down in Article 5(5) of that directive, and that they may therefore be made without the authorisation of the copyright holders."
"Modern cell phones are not just another technological convenience. With all they contain and all they may reveal, they hold for many Americans ‘the privacies of life,’ […]. The fact that
technology now allows an individual to carry such information in his hand does not make the information any less worthy of theprotection for which the Founders fought. Our answer to the question of what
police must do before searching a cell phone seized incident to an arrest is accordingly simple - get a warrant."
"Cell site simulators, also known as ‘stingrays,’ are devices that trick cellphones into reporting their locations and identifying information. They do so by mimicking cellphone towers and sending out electronic cues that allow the police to enlist cellphones as tracking devices, thus revealing people’s movements with great precision. The equipment also sends intrusive electronic signals through the walls of private homes and offices, learning information about the locations and identities of phones inside."
"Newly uncovered components of a digital surveillance tool used by more than 60 governments worldwide provide a rare glimpse at the extensive ways law enforcement and intelligence agencies use
the tool to surreptitiously record and steal data from mobile phones."
"What do Egypt, Kenya, Turkey, Guinea, and Sweden have in common? Despite having a Constitutional right to privacy, they are adopting and enforcing policies that directly challenge this human
right. These states are also up for a Universal Periodic Review this year before the United Nations Human Rights Council. UPRs are a mechanism within the Council aimed at improving the human rights
situation in all countries and address human rights violations wherever they occur. […] This year, we submitted reports on Egypt, Kenya, Guinea, Sweden, and Turkey, and will make a submission on the US
and Belgium later in the year. We hope that the Human Rights Council within the UPR process will address the privacy concerns raised by Privacy International and its partners of the need to protect
privacy rights in these countries."
"The 2014 EMC Privacy Index surveyed 15,000 people in 15 countries to produce a ranking of nations based on consumer perceptions and attitudes about data privacy, and their willingness to trade privacy for greater convenience and benefits online."
"Google thinks I’m interested in parenting, superhero movies, and shooter games. The data broker Acxiom thinks I like driving trucks. My data doppelgänger is made up of my browsing history, my
status updates, my GPS locations, my responses to marketing mail, my credit card transactions, and my public records.Still, it constantly gets me wrong, often to hilarious effect. I take some comfort that
the system doesn’t know me too well, yet it is unnerving when something is misdirected at me. Why do I take it so personally when personalization gets it wrong?"
"In this paper, we will discuss a select group of academic articles often referenced in support of the myth that de-identification is an ineffective tool to protect the privacy of individuals.
While these articles raise important issues concerning the use of proper de-identification techniques, reported findings do not suggest that de-identification is impossible or that de-identified data
should be classified as personally identifiable information. We then provide a concrete example of how data may be effectively de-identified — the case of the U.S. Heritage Health Prize. This example
shows that in some cases, de-identification can maximize both privacy and data quality, thereby enabling a shift from zero-sum to positive-sum thinking — a key principle of Privacy by
”[…] smartphones are actually spy phones. But they don’t need to be. If we had enough open wireless networks available, we could change that. Startup companies—and open source projects—could
make devices that used the open networks without reporting your location and communications to phone companies. Devices that skip smoothly from one open wireless network to another don’t provide the kind
of granular information about your intimate activities that the current single-carrier systems do. We have two choices: let mobile privacy stay dead forever, or build an alternative open wireless
"We have built PlayDrone, a system that uses various hacking techniques to circumvent Google security to successfully crawl Google Play. […] We further show that […] Android applications
contain thousands of leaked secret authentication keys which can be used by malicious users to gain unauthorized access to server resources through Amazon Web Services and compromise user accounts on
Facebook. We worked with service providers, including Amazon, Facebook, and Google, to identify and notify customers at risk, and make the Google Play store a safer place."
"We study Facebook Connect’s permissions system using crawling, experimentation, and surveys and determine that it works differently than both users and developers expect in several ways. We
show that more permissions can be granted than the developer intended. In particular, permissions that allow a site to post to the user’s profile are granted on an all-or-nothing basis. We evaluate how
the requested permissions are presented to the user and find that, while users generally understand what data sites can read from their profile, they generally do not understand the many different things
the sites can post. In the case of write permissions, we show that user expectations are influenced by the identity of the requesting site which in reality has no impact on what is enforced. We also find
that users generally do not understand the way Facebook Connect permissions interact with Facebook’s privacy settings. Our results suggest that users understand detailed, granular messages better than
those that are broad and vague."
"75. […] It is irrelevant that Mr. Schrems cannot show that his own personal data was accessed in this fashion by the NSA, since what matters is the essential inviolability of the personal
data itself. The essence of that right would be compromised if the data subject had reason to believe that it could be routinely accessed by security authorities on a mass andundifferentiated basis. 76.
Third, the evidence suggests that personal data of data subjects is routinely accessed on a mass and undifferentiated basis by the US security authorities."
From ‘1) What is the case about and what did the Court rule?’:
"In 2010 a Spanish citizen lodged a complaint against a Spanish newspaper with the national Data Protection Agency and against Google Spain and Google Inc. The man complained that an auction
notice of his repossessed home on Google’s search results infringed his privacy rights because the proceedings concerning him had been fully resolved for a number of years and hence the reference to these
was entirely irrelevant. He requested, first, that the newspaper be required either to remove or alter the pages in question so that the personal data relating to him no longer appeared; and second, that
Google Spain or Google Inc. be required to remove the personal data relating to him, so that it no longer appeared in the search results. The Spanish court referred the case to the Court of Justice of the
European Union asking: (a) whether the EU’s 1995 Data Protection Directive applied to search engines such as Google; (b) whether EU law (the Directive) applied to Google Spain, given that the company’s
data processing server was in the United States; (c) whether an individual has the right to request that his or her personal data be removed from accessibility via a search engine (the ‘right to be
"EFF recently kicked off our second Tor Challenge, an initiative to strengthen the Tor network for online anonymity and improve one of the best free privacy tools in existence. The campaign -
which we’ve launched with partners at the Freedom of the Press Foundation, the Tor Project, and the Free Software Foundation - is already off to a great start. In just the first few days, we’ve seen over
600 new or expanded Tor nodes—more than during the entire first Tor Challenge. This is great news, but how does it affect you? To understand that, we have to dig into what Tor actually is, and what people
can do to support it. Support can come in many forms, too. Even just using Tor is one of the best and easiest things a person can do to preserve privacy and anonymity on the Internet."