<?xml version="1.0" encoding="utf-8" ?><rss version="2.0" xml:base="https://www.eff.org/rss/updates.xml" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:atom="http://www.w3.org/2005/Atom">
  <channel>
    <title>Deeplinks</title>
    <link>https://www.eff.org/rss/updates.xml</link>
    <description>EFF&#039;s Deeplinks Blog: Noteworthy news from around the internet</description>
    <language>en</language>
     <atom:link href="https://www.eff.org/rss/updates.xml" rel="self" type="application/rss+xml" />
      <item>
    <title>🔒 A Win for Encrypted Messaging | EFFector 38.10</title>
    <link>https://www.eff.org/deeplinks/2026/05/encrypted-apple-android-texts-effector-3810</link>
    <description>&lt;div class=&quot;field field--name-body field--type-text-with-summary field--label-hidden&quot;&gt;&lt;div class=&quot;field__items&quot;&gt;&lt;div class=&quot;field__item even&quot;&gt;&lt;p&gt;When it comes to keeping our texts, chats, and other digital messages safe from prying eyes, we have a powerful tool: end-to-end encryption. Used correctly, end-to-end encryption turns our conversations online into secret messages that can only be decoded by their intended recipients. In our &lt;a href=&quot;https://eff.org/effector/38/10&quot;&gt;latest EFFector newsletter&lt;/a&gt;, we&#039;re covering new developments in this tool, and how you can use it to prevent tech companies, governments, and other eavesdroppers from listening in.&lt;/p&gt;
&lt;p class=&quot;take-action&quot;&gt;&lt;a href=&quot;https://www.eff.org/effector/&quot;&gt;JOIN OUR NEWSLETTER&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;span&gt;For over 35 years, &lt;a href=&quot;https://eff.org/effector&quot;&gt;EFFector&lt;/a&gt; has been your guide to understanding the intersection of technology, civil liberties, and the law. This latest issue covers the shaky science backing &lt;a href=&quot;https://www.eff.org/deeplinks/2026/05/science-not-settled-how-weak-evidence-fueling-national-push-ban-social-media-youth&quot;&gt;social media bans&lt;/a&gt;, Canada&#039;s surveillance &lt;a href=&quot;https://www.eff.org/deeplinks/2026/05/canadas-bill-c-22-repackaged-version-last-years-surveillance-nightmare&quot;&gt;nightmare bill&lt;/a&gt;, and a victory for &lt;a href=&quot;https://www.eff.org/deeplinks/2026/05/victory-end-end-encrypted-rcs-comes-apple-and-android-chats&quot;&gt;keeping private messages private&lt;/a&gt;.&lt;br /&gt;&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;Prefer to listen in? EFFector is now available on all major podcast platforms. This time, we&#039;re chatting with EFF Senior Security and Privacy Activist Thorin Klosowski on an important step forward for encrypted messaging—as well as a notable disappointment. You can find the episode and subscribe&lt;span&gt; &lt;/span&gt;&lt;a href=&quot;https://effector.simplecast.com/&quot;&gt;on your podcast platform of choice&lt;/a&gt;:&lt;/p&gt;
&lt;div class=&quot;mytube&quot;&gt;
&lt;div class=&quot;mytube&quot; style=&quot;width: 100%px;&quot;&gt;
  &lt;div class=&quot;mytubetrigger&quot; tabindex=&quot;0&quot;&gt;

    &lt;img src=&quot;https://www.eff.org/sites/all/modules/custom/mytube/play.png&quot; class=&quot;mytubeplay&quot; alt=&quot;play&quot; style=&quot;top: 70px; left: 20px;&quot; /&gt;
    &lt;div hidden class=&quot;mytubeembedcode&quot;&gt;%3Ciframe%20height%3D%22200px%22%20width%3D%22100%25%22%20frameborder%3D%22no%22%20scrolling%3D%22no%22%20seamless%3D%22%22%20src%3D%22https%3A%2F%2Fplayer.simplecast.com%2Fcb903071-798d-429d-91dc-52ae77015a7d%3Fdark%3Dfalse%22%20allow%3D%22autoplay%22%3E%3C%2Fiframe%3E&lt;/div&gt;
  &lt;/div&gt;
  &lt;div class=&quot;mytubetext&quot;&gt;
    &lt;span&gt;&lt;a href=&quot;https://www.eff.org/deeplinks/2008/02/embedded-video-and-your-privacy&quot; rel=&quot;noreferrer&quot; target=&quot;_blank&quot;&gt;Privacy info.&lt;/a&gt;&lt;/span&gt;
    &lt;span&gt;This embed will serve content from &lt;em&gt;&lt;a rel=&quot;nofollow&quot; href=&quot;https://player.simplecast.com/cb903071-798d-429d-91dc-52ae77015a7d?dark=false&quot;&gt;simplecast.com&lt;/a&gt;&lt;/em&gt;&lt;br /&gt;&lt;/span&gt;
  &lt;/div&gt;
&lt;/div&gt;
&lt;div class=&quot;mytubetext&quot;&gt;&lt;br /&gt;&lt;span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;/div&gt;
&lt;p&gt;&lt;span&gt;&lt;i&gt;&lt;a href=&quot;https://open.spotify.com/show/6Q48ICplENdQ4ZarUIgfLZ&quot; target=&quot;_blank&quot; rel=&quot;noopener noreferrer&quot;&gt;&lt;img src=&quot;https://www.eff.org/files/2021/11/01/spotify-podcast-badge-blk-wht-330x80.png&quot; alt=&quot;Listen on Spotify Podcasts Badge&quot; width=&quot;198&quot; height=&quot;48&quot; /&gt;&lt;/a&gt; &lt;a href=&quot;https://podcasts.apple.com/us/podcast/effector/id1882562931&quot; target=&quot;_blank&quot; rel=&quot;noopener noreferrer&quot;&gt;&lt;img src=&quot;https://www.eff.org/files/2021/11/01/applebadge2.png&quot; alt=&quot;Listen on Apple Podcasts Badge&quot; width=&quot;195&quot; height=&quot;47&quot; /&gt;&lt;/a&gt; &lt;a href=&quot;https://music.amazon.com/podcasts/83be1062-f511-47b3-bd2b-fc44e831c3ad&quot; target=&quot;_blank&quot; rel=&quot;noopener noreferrer&quot;&gt;&lt;img height=&quot;47&quot; width=&quot;195&quot; src=&quot;https://eff.org/files/styles/kittens_types_wysiwyg_small/public/2024/02/15/us_listenon_amazonmusic_button_charcoal.png?itok=YFXPE4Ii&quot; /&gt;&lt;/a&gt; &lt;a href=&quot;https://feeds.eff.org/effector&quot; target=&quot;_blank&quot; rel=&quot;noopener noreferrer&quot;&gt;&lt;img src=&quot;https://www.eff.org/files/2021/11/01/subscriberss.png&quot; alt=&quot;Subscribe via RSS badge&quot; width=&quot;194&quot; height=&quot;50&quot; /&gt;&lt;/a&gt;&lt;/i&gt;&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span&gt;Want to protect your private conversations? Sign up for &lt;a href=&quot;https://eff.org/effector&quot;&gt;EFF&#039;s EFFector newsletter&lt;/a&gt; for updates, ways to take action, and new merch drops. You can also fuel the fight for privacy and free speech online when you &lt;a href=&quot;https://eff.org/join&quot;&gt;support EFF today&lt;/a&gt;!&lt;/span&gt;&lt;/p&gt;

&lt;/div&gt;&lt;/div&gt;&lt;/div&gt;</description>
     <pubDate>Wed, 20 May 2026 15:03:33 +0000</pubDate>
 <guid isPermaLink="false">112080 at https://www.eff.org</guid>
 <dc:creator>Christian Romero</dc:creator>
 <enclosure url="https://www.eff.org/files/banner_library/effector-green-web.png" alt="" type="image/png" length="78242" />
  </item>
  <item>
    <title>Microsoft Took a Step Toward Human Rights Accountability. Google and Amazon (and Others) Should Pay Attention!</title>
    <link>https://www.eff.org/deeplinks/2026/05/microsoft-took-step-toward-human-rights-accountability-google-and-amazon-and</link>
    <description>&lt;div class=&quot;field field--name-body field--type-text-with-summary field--label-hidden&quot;&gt;&lt;div class=&quot;field__items&quot;&gt;&lt;div class=&quot;field__item even&quot;&gt;&lt;p&gt;For years, civil society organizations, workers, journalists, and human rights experts have warned that major technology companies risk enabling grave human rights abuses when they provide cloud computing, AI, and surveillance infrastructure to governments implicated in violations of international and humanitarian law. While many companies pay lip service to evaluating customers and contracts for human rights implications (lip service Exhibit A: &lt;a href=&quot;https://www.eff.org/deeplinks/2026/04/palantir-has-human-rights-policy-its-ice-work-tells-different-story&quot;&gt;Palantir&lt;/a&gt;!), too often those processes fail to provide any meaningful accountability when their standards are not met or are simply ignored. But recent developments at Microsoft suggest that accountability for failing to uphold the human rights standards that a company itself sets, even if incomplete, is possible. &lt;/p&gt;
&lt;p&gt;According to &lt;a href=&quot;https://en.globes.co.il/en/article-microsoft-israel-chief-leaves-amid-ethical-controversy-1001542602&quot;&gt;recent reporting&lt;/a&gt;, Microsoft’s Israel chief has departed amid an escalating ethical controversy surrounding the company’s business relationships with the Israeli Ministry of Defense. The move follows months of scrutiny, internal dissent, and sustained pressure from inside the organization along with press and civil society, especially after a &lt;a href=&quot;https://www.theguardian.com/world/2025/aug/06/microsoft-israeli-military-palestinian-phone-calls-cloud&quot;&gt;report&lt;/a&gt; by The Guardian revealed that Microsoft technologies were used in systems connected to mass surveillance and military targeting operations in Gaza in ways that appeared to violate Microsoft’s own standards. This did not happen overnight.&lt;/p&gt;
&lt;p&gt;In September 2025, &lt;a href=&quot;https://blogs.microsoft.com/on-the-issues/2025/09/25/update-on-ongoing-microsoft-review/&quot;&gt;Microsoft reportedly&lt;/a&gt; suspended certain services after initial investigations raised serious concerns about how its cloud and AI infrastructure may have been used. That alone distinguished Microsoft from many of its peers. Rather than simply dismissing mounting concerns or hiding behind vague claims of neutrality, Microsoft appeared to recognize that providing technology in conflict settings creates real human rights responsibilities. Now, after additional investigation and continued public scrutiny, it appears the company has taken another step, one that should send a strong signal to others that violating Microsoft’s human rights commitments could cost you your job. This is important. &lt;/p&gt;
&lt;p&gt;There is still much more Microsoft should do, of course. The company has yet to fully disclose the scope of its findings, explain exactly which services were suspended, or clarify what safeguards remain in place to prevent its technologies from contributing to human rights abuses in the future. We shouldn’t have to infer the connection between this employment action and the company’s investigation. &lt;/p&gt;
&lt;p&gt;Just prior to reports that Microsoft had fired its Israel Country General Manager, EFF joined Access Now, Amnesty International, Fight for the Future, and 7amleh in &lt;a href=&quot;https://www.accessnow.org/press-release/joint-letter-to-microsoft-regarding-israeli-military-use-of-azure-cloud-and-ai-services/&quot;&gt;a joint May 7, 2026 letter&lt;/a&gt; to Microsoft leadership calling on the company to publicly release the findings of its investigation, suspend business relationships tied to serious human rights abuses, and implement meaningful safeguards to prevent its technologies from contributing to further harm. The letter detailed allegations regarding Microsoft’s reported provision of Azure cloud and AI services to Israeli military and intelligence units involved in surveillance and targeting operations, while also pressing the company to take concrete human rights due diligence measures going forward. Those demands remain urgent, even as Microsoft appears to be taking some of the steps we urged.&lt;/p&gt;
&lt;p&gt;But even as we push for more, it is important to recognize when a company takes steps in the right direction. Because this is what it means to put human rights commitments into practice. It means acknowledging that human rights policies are not just branding exercises or transparency reports. It means accepting that companies providing cloud infrastructure and AI services have responsibilities when credible evidence emerges that their technologies may be enabling violations of international law. And it means taking concrete action when those risks become known.&lt;/p&gt;
&lt;p&gt;The allegations facing Microsoft are serious. Human rights organizations and investigative reporting have documented claims that Microsoft Azure services were used by Israeli military and intelligence units to process large-scale surveillance data, support AI-assisted targeting systems, and sustain military cloud infrastructure during the war in Gaza. The concerns raised extend beyond ordinary business risk; they implicate potential complicity in violations of international humanitarian and human rights law.&lt;/p&gt;
&lt;p&gt;Faced with these allegations, Microsoft could have chosen the path many tech companies take: deny everything, attack critics, suppress worker dissent, and continue business as usual. Instead, the company appears to have begun responding to the evidence.&lt;/p&gt;
&lt;p&gt;Technology companies are not powerless bystanders. Cloud providers and AI companies make choices every day about who gets access to their infrastructure, under what conditions, and with what oversight. When companies claim to uphold human rights principles, those commitments should have operational consequences. Too many companies, in both international and domestic policing contexts, provide technology to institutions that violate people’s human rights and civil liberties, then fall back on the claim that they are merely providing a service that their customers can use how they see fit. This is an ethical failing that falls short of most companies’ publicly expressed commitments. Microsoft’s recent actions suggest that sustained public pressure, worker organizing, investigative journalism, and civil society advocacy can force even the world’s largest technology companies to respond.&lt;/p&gt;
&lt;p&gt;Google and Amazon should especially see this as a clear example to follow. Both companies also provide services to the Israeli Ministry of Defense and have faced &lt;a href=&quot;https://www.eff.org/deeplinks/2024/12/amazon-and-google-must-keep-their-promises-project-nimbus&quot;&gt;years&lt;/a&gt; &lt;a href=&quot;https://www.eff.org/deeplinks/2025/02/google-wrong-side-history&quot;&gt;of&lt;/a&gt; &lt;a href=&quot;https://www.eff.org/deeplinks/2026/04/google-and-amazon-acknowledged-risks-and-ignored-responsibilities&quot;&gt;criticism&lt;/a&gt; over those contracts and services, including from EFF. Yet neither has demonstrated the level of responsiveness or accountability that Microsoft has shown. If Microsoft can suspend services, investigate allegations, and make leadership changes amid mounting evidence and ethical concerns, then other cloud giants can no longer pretend that meaningful action is impossible.&lt;/p&gt;
&lt;p&gt;The technology industry has spent years insisting that ethics and human rights matter. The real test has always been whether those principles survive when profits, government contracts, and geopolitical pressure are on the line. Microsoft’s recent steps are not the end of that story, but they may mark the beginning of what real accountability can look like.&lt;/p&gt;
&lt;p&gt;We’re looking at you, Amazon and Google. If Microsoft can do it, why can’t you?&lt;/p&gt;

&lt;/div&gt;&lt;/div&gt;&lt;/div&gt;</description>
     <pubDate>Tue, 19 May 2026 21:03:40 +0000</pubDate>
 <guid isPermaLink="false">112082 at https://www.eff.org</guid>
 <category domain="https://www.eff.org/issues/surveillance-human-rights">Surveillance and Human Rights</category>
 <category domain="https://www.eff.org/issues/mass-surveillance-technologies">Surveillance Technologies</category>
 <category domain="https://www.eff.org/issues/international">International</category>
 <category domain="https://www.eff.org/issues/privacy">Privacy</category>
 <dc:creator>Betty Gedlu</dc:creator>
 <dc:creator>Cindy Cohn</dc:creator>
 <enclosure url="https://www.eff.org/files/banner_library/np-logo-banner.png" alt="Necessary &amp;amp; Proportionate logo" type="image/png" length="18895" />
  </item>
  <item>
    <title>Your Privacy Shouldn&#039;t Be A Corporate Decision</title>
    <link>https://www.eff.org/deeplinks/2026/05/your-privacy-shouldnt-be-corporate-decision</link>
    <description>&lt;div class=&quot;field field--name-body field--type-text-with-summary field--label-hidden&quot;&gt;&lt;div class=&quot;field__items&quot;&gt;&lt;div class=&quot;field__item even&quot;&gt;&lt;blockquote&gt;&lt;p&gt;“&lt;em&gt;We will launch during a dynamic political environment where many civil society groups that we would expect to attack us would have their resources focused on other concerns.&lt;/em&gt;”-Meta Internal Document on face recognition software for smart glasses, 2025&lt;/p&gt;&lt;/blockquote&gt;
&lt;p&gt;It’s unsurprising that a company would plan to release yet another privacy-invasive product. What is surprising is that they think we aren’t watching. &lt;a href=&quot;https://supporters.eff.org/donate/spring--DL4 &quot;&gt;You can help us keep them in check.&lt;/a&gt;&lt;/p&gt;
&lt;p class=&quot;take-action&quot;&gt;&lt;a href=&quot;https://supporters.eff.org/donate/spring--DL4 &quot;&gt;JOIN EFF&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;Meta isn&#039;t the only company actively &lt;a href=&quot;https://www.eff.org/deeplinks/2026/02/seven-billion-reasons-facebook-abandon-its-face-recognition-plans&quot;&gt;eroding your privacy&lt;/a&gt;. We found that Google has &lt;a href=&quot;https://www.eff.org/deeplinks/2026/04/google-broke-its-promise-me-now-ice-has-my-data&quot;&gt;broken its promise&lt;/a&gt; to some users to inform them about government surveillance. And Palantir is &lt;a href=&quot;https://www.eff.org/deeplinks/2026/04/palantir-has-human-rights-policy-its-ice-work-tells-different-story&quot;&gt;completely failing&lt;/a&gt; to live up to its purported human rights commitments.&lt;/p&gt;
&lt;p&gt;Corporations bear responsibility for violating user trust and human rights, and &lt;a href=&quot;https://supporters.eff.org/donate/spring--DL4 &quot;&gt;EFF is holding them accountable with your support&lt;/a&gt;.&lt;/p&gt;
&lt;h2&gt;Watching the Watchers&lt;/h2&gt;
&lt;p&gt;We&#039;re suing DHS and ICE to reveal their efforts to &lt;a href=&quot;https://www.eff.org/press/releases/eff-sues-dhs-and-ice-records-subpoenas-seeking-unmask-online-critics-0&quot;&gt;unmask online critics&lt;/a&gt;, creating &lt;a href=&quot;https://www.eff.org/deeplinks/2025/09/rayhunter-what-we-have-found-so-far&quot;&gt;privacy-enhancing free software&lt;/a&gt;, and pushing for &lt;a href=&quot;https://www.eff.org/deeplinks/2026/05/secure-data-act-not-serious-piece-privacy-legislation&quot;&gt;stronger privacy laws&lt;/a&gt; for everyone. This is all thanks to over 30,000 EFF members—&lt;a href=&quot;https://supporters.eff.org/donate/spring--DL4 &quot;&gt;a community you can join today&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;&lt;/p&gt;&lt;div class=&quot;caption caption-center&quot;&gt;&lt;div class=&quot;caption-width-container&quot;&gt;&lt;div class=&quot;caption-inner&quot;&gt;&lt;a href=&quot;https://supporters.eff.org/donate/spring--DL4%20&quot;&gt;&lt;img src=&quot;/files/2026/05/15/claw_fs.jpg&quot; width=&quot;1200&quot; height=&quot;600&quot; alt=&quot;&quot; /&gt;&lt;/a&gt;&lt;p class=&quot;caption-text&quot;&gt;Claw back your privacy with EFF&#039;s new member t-shirt!&lt;/p&gt;&lt;/div&gt;&lt;/div&gt;&lt;/div&gt;
&lt;p&gt;We’ve seen collective action rein in companies and bring them back on track to protect users. With you by our side, we can do it again.&lt;/p&gt;
&lt;p&gt;&lt;a href=&quot;https://supporters.eff.org/donate/spring--DL4 &quot;&gt;Join EFF today and be part of the community making this work possible.&lt;/a&gt;&lt;/p&gt;
&lt;div class=&quot;panel-pane pane-entity-view pane-node&quot;&gt;&lt;br /&gt;
&lt;div class=&quot;node__content&quot;&gt;
&lt;div class=&quot;field field--name-body field--type-text-with-summary field--label-hidden&quot;&gt;
&lt;div class=&quot;field__items&quot;&gt;
&lt;div class=&quot;field__item even&quot;&gt;
&lt;p&gt;____________________&lt;/p&gt;
&lt;p&gt;&lt;em&gt;&lt;span data-contrast=&quot;none&quot; lang=&quot;EN-US&quot; class=&quot;TextRun SCXW4268908 BCX0&quot; xml:lang=&quot;EN-US&quot;&gt;&lt;span class=&quot;NormalTextRun SCXW4268908 BCX0&quot;&gt;EFF is a member-supported U.S. 501(c)(3) organization. &lt;/span&gt;&lt;span class=&quot;NormalTextRun CommentStart CommentHighlightPipeRest CommentHighlightRest SCXW4268908 BCX0&quot;&gt;We&#039;ve&lt;/span&gt;&lt;span class=&quot;NormalTextRun CommentHighlightRest SCXW4268908 BCX0&quot;&gt; received top rati&lt;/span&gt;&lt;span class=&quot;NormalTextRun CommentHighlightRest SCXW4268908 BCX0&quot;&gt;ngs &lt;/span&gt;&lt;span class=&quot;NormalTextRun CommentHighlightRest SCXW4268908 BCX0&quot;&gt;from the nonprofit watchdog Charity Navigator since 2013!&lt;/span&gt;&lt;span class=&quot;NormalTextRun CommentHighlightPipeRest SCXW4268908 BCX0&quot;&gt; Your donation is tax-deductible as allowed by law.&lt;/span&gt;&lt;/span&gt;&lt;/em&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;/div&gt;
&lt;/div&gt;
&lt;div class=&quot;field field--name-field-disable-stretch field--type-list-boolean field--label-hidden&quot;&gt;
&lt;div class=&quot;field__items&quot;&gt;
&lt;div class=&quot;field__item even&quot;&gt;&lt;/div&gt;
&lt;/div&gt;
&lt;/div&gt;
&lt;/div&gt;
&lt;p&gt;&lt;/p&gt;&lt;/div&gt;

&lt;/div&gt;&lt;/div&gt;&lt;/div&gt;</description>
     <pubDate>Tue, 19 May 2026 15:06:13 +0000</pubDate>
 <guid isPermaLink="false">112076 at https://www.eff.org</guid>
 <dc:creator>Mario Trujillo</dc:creator>
 <dc:creator>Christian Romero</dc:creator>
 <enclosure url="https://www.eff.org/files/banner_library/2026-membership-campaign-mobile-donate-frame2.png" alt="The words &amp;quot;Mass Surveillance&amp;quot; with red claw marks through them." type="image/png" length="18618" />
  </item>
  <item>
    <title>We Updated Our Privacy Policy. Here&#039;s What Changed and Why. </title>
    <link>https://www.eff.org/deeplinks/2026/05/we-updated-our-privacy-policy-heres-what-changed-and-why</link>
    <description>&lt;div class=&quot;field field--name-body field--type-text-with-summary field--label-hidden&quot;&gt;&lt;div class=&quot;field__items&quot;&gt;&lt;div class=&quot;field__item even&quot;&gt;&lt;p&gt;We recently updated our privacy policy for the first time since 2022. Most of the changes are clarifications, reorganizations, and improvements in transparency, particularly around how third-party tools that run parts of our site operate. But one change is substantive enough that we want to address it directly.&lt;/p&gt;
&lt;h4&gt;The Change You Should Know About: Opt-In Email Tracking&lt;/h4&gt;
&lt;p&gt;We want to know how we’re doing with our advocacy: which campaigns get your attention and which do not, which topics you are very interested in, which less so, and which not at all. It helps us to do our work better and to prioritize or rethink our strategies as we push to build support for freedom, justice and innovation around the world.&lt;/p&gt;
&lt;p&gt;So, to give us a rough picture of how we’re doing, we are introducing &lt;strong&gt;the option&lt;/strong&gt; for you to provide &lt;strong&gt;explicit, opt-in consent&lt;/strong&gt; for us to see how you interact with the emails we send you. That includes whether you open emails, and whether you click on the links inside them.&lt;/p&gt;
&lt;p&gt;We know what you’re thinking: Doesn’t EFF strongly oppose nonconsensual tracking? You bet we do. Sneaky email tracking is ubiquitous on the web and EFF’s opposition to it remains unchanged. We have never used email tracking pixels and we’re not changing that. We’re not building profiles and we’re not sharing the data and we’re definitely not selling it.&lt;/p&gt;
&lt;p&gt;But we do want to give you the option of allowing us to learn about how our communications are landing with you. Here’s how consent will work. We will ask, and if you say yes, we’ll be able to see whether you opened an email or not, and whether you clicked on any links. That&#039;s it.&lt;/p&gt;
&lt;p&gt;If you say no, or ignore the ask entirely, nothing will change and we’ll do no tracking.&lt;/p&gt;
&lt;p&gt;If you say yes, you can change your mind and opt out at any time by clicking an opt-out link in any future email or by contacting &lt;a href=&quot;mailto:membership@eff.org&quot;&gt;membership@eff.org&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;We have heard many EFF members say that EFF is one of the only organizations that they trust with consent to track their emails. That trust is important, and we do not take it lightly. But it led us to think that if we ask, enough of you would agree that we could have a better picture of how our campaigns and other emails to you are landing and that, in turn, could help us decide what to double down on and what to change.&lt;/p&gt;
&lt;p&gt;By giving you a real ability to consent, EFF is taking a very different path than most of the web. Asking isn’t the norm; it’s more or less never an option to say no and dark patterns often make it hard even if it looks like you can. Unfortunately, &lt;a href=&quot;https://www.bbc.com/news/technology-56071437&quot; target=&quot;_blank&quot; rel=&quot;noopener noreferrer&quot;&gt;estimates have shown that&lt;/a&gt; 2/3s of emails received by users contain tracking, regardless of whether the senders received explicit consent at the time when a recipient signs up to receive their mailings. &lt;strong&gt;Automatic, nonconsensual tracking doesn’t have to be the default, and it shouldn’t be.&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;We hope our approach works and it inspires others. It shouldn’t be an abnormality that users are not tracked by default, and that only users who feel comfortable doing so choose to consent to tracking. We hope that our example will show mailing platforms, organizations, and users that a privacy-protective approach is better and worth doing and can still give an email sender a solid understanding what campaigns and other messages resonate with recipients. We weighed this decision carefully. We know that email tracking is something we&#039;ve criticized when used covertly or without meaningful consent and that many people don’t like at all. For EFF, an opt-in requirement isn&#039;t a formality. It&#039;s the key distinction between a sneaky strategy and an aboveboard relationship with you. And to us, it’s just a common sense approach based on respect.&lt;/p&gt;
&lt;p&gt;It’s also consistent with our advocacy and approach to technology. We have said for many years that strong consumer privacy laws must require real opt-in consent before data is collected. And we have walked our talk in other ways as well, including in pushing for Do Not Track policies and in Privacy Badger, which protects you from ads and trackers that violate the principle of user consent.&lt;/p&gt;
&lt;p&gt;Again, this behavior has been our suggestion for privacy policies, and privacy laws. In 2022 we released &lt;a href=&quot;https://www.eff.org/pages/online-privacy-nonprofits&quot; target=&quot;_blank&quot; rel=&quot;noopener noreferrer&quot;&gt;a guide for nonprofits&lt;/a&gt; that recommended the following:&lt;/p&gt;
&lt;blockquote&gt;&lt;p&gt;Not tracking email open rates can, unfortunately, sometimes cause list “hygiene” problems, because it becomes difficult to know whether email subscribers on your list are still interested. You can send occasional emails to ensure subscribers want to receive emails, either using open or click tracking, and informing people that the purpose of that specific email is to determine active subscribers. The essential point is to let users know when you are using tracking, and to do it in a limited way when possible.... &lt;br /&gt; &lt;br /&gt;The Internet Archive found that while they preferred to use no open tracking in their emails to subscribers, too many unreachable email addresses had been added to their list over the years, and some email addresses had even become spam traps. To continue working with their email service provider, they needed to activate some tracking. They needed email open data to know whether an email address was still active or not; but they didn’t need or want gender, age, or demographic data. They settled on informing users that their email open rates are being tracked, and offering the alternate option to sign up for plain-text versions of their emails, which won&#039;t transmit any data at all.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;p&gt;In 2019, &lt;a href=&quot;https://www.eff.org/deeplinks/2019/06/effs-recommendations-consumer-data-privacy-laws&quot; target=&quot;_blank&quot; rel=&quot;noopener noreferrer&quot;&gt;we recommended &lt;/a&gt;that all strong consumer privacy laws must include opt-in consent for data collection. We wrote:&lt;/p&gt;
&lt;blockquote&gt;&lt;p&gt;&lt;strong&gt;Right to opt-in consent&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;New legislation should require the operators of online services to obtain opt-in consent to collect, use, or share personal data, particularly where that collection, use, or transfer is not necessary to provide the service.&lt;/p&gt;
&lt;p&gt;Any request for opt-in consent should be easy to understand and clearly advise the user what data the operator seeks to gather, how they will use it, how long they will keep it, and with whom they will share it. This opt-in consent should also be ongoing—that is, the request should be renewed any time the operator wishes to use or share data in a new way, or gather a new kind of data. And the user should be able to withdraw consent, including for particular purposes, at any time.&lt;/p&gt;
&lt;p&gt;Opt-in consent is better than opt-out consent. The default should be against collecting, using, and sharing personal information. Many consumers cannot or will not alter the defaults in the technologies they use, even if they prefer that companies do not collect their information.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;p&gt;We are sticking to those recommendations, which unfortunately are not yet the law, and following our principles.&lt;/p&gt;
&lt;p&gt;We hope that you will feel comfortable opting in, but we also respect that you need to make that decision for yourself, and that you may need to change it as you go. We’ll do our part to make that as clear and easy as possible. And if you do agree, we’ll be grateful for getting a chance to learn a little more about how we’re doing, hopefully in ways that can make us even more effective at ensuring that technology supports freedom, justice and innovation for all the people of the world.&lt;/p&gt;
&lt;h4&gt;Other Changes: Clarity and Stronger Protections&lt;/h4&gt;
&lt;p&gt;The rest of the update is largely about being more precise and provide more transparency into our practices.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Cookies on eff.org:&lt;/strong&gt; The new policy tightens our cookie practices. Previously, we carved out exceptions for &quot;remember me&quot; and logged-in users; now we don&#039;t use persistent ID cookies on the eff.org domain at all. We also clarified that other EFF-operated sites‚ like acteff.org and shopeff.org‚ have their own cookie policies and that our policies aren’t the ones that apply there. We’re not happy that you have to navigate multiple policies like this, but it’s one of the ways that the cookie ecosystem has gotten unfortunately complex. We want to be sure you know that and know where to look for all the information.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Third-party tool transparency:&lt;/strong&gt; Similarly, while the vast majority of EFF’s public-facing websites, online tools and tech projects are created internally, self-hosted, and self-maintained, some of them are not. In this new policy, we are working to be more detailed and explicit in the new policy about those third-party services, and how they operate under their own privacy policies, not solely ours.&lt;/p&gt;
&lt;p&gt;To help you understand exactly what choices you have when using these tools, we&#039;re publishing dedicated Privacy Guides for each of them. The first is live now for our shop, which runs on Shopify: &lt;a href=&quot;https://shopeff.org/pages/effs-guide-to-privacy-on-shopify&quot; target=&quot;_blank&quot; rel=&quot;noopener noreferrer&quot;&gt;EFF Shopify Privacy Guide&lt;/a&gt;. Guides for our other third-party tools are coming soon. As always, we recommend installing &lt;a href=&quot;https://privacybadger.org/&quot; target=&quot;_blank&quot; rel=&quot;noopener noreferrer&quot;&gt;Privacy Badger &lt;/a&gt;to limit exposure from third-party tracking.&lt;/p&gt;
&lt;p&gt;Overall, EFF believes that when a project like the &lt;a href=&quot;https://www.atlasofsurveillance.org/&quot; target=&quot;_blank&quot; rel=&quot;noopener noreferrer&quot;&gt;Atlas of Surveillance &lt;/a&gt;doesn&#039;t exist, and we think it should, we build it and maintain it. But what matters most to us is protecting your digital rights. So the time required to maintain and upgrade the tools we have built has to be weighed against our need to build new projects to fight new fights. And sometimes, a tool that was needed when we built it, like EFF’s Action Center, can be replaced by something that can take some of the weight off our internal staff.&lt;/p&gt;
&lt;p&gt;To help make space for new projects, we carefully investigate services we rely on—like our campaign tools, payment processors, and online shop—and look for third party options that are the best in the industry and offer a level of privacy our users deserve. In this new privacy policy we try to give you as much information about those third-party services as we can.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;GDPR data management:&lt;/strong&gt; We added a clear, dedicated process for users in the EU and elsewhere to request deletion of their personal data. Email info@eff.org with the subject line &quot;GDPR Data Deletion Request&quot; and we&#039;ll respond within the legally required timeframe.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Data retention:&lt;/strong&gt; We reorganized and clarified how long we keep different types of records (communications, financial records, donation paperwork) into a cleaner list. The substance is unchanged, but the structure should make it easier to find what&#039;s relevant to you.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Action Center:&lt;/strong&gt; You may notice that the previous policy included a dedicated section on our Action Center - how we handled your campaign participation data, what we retained, and so on. That section is gone because we&#039;re transitioning our campaign tools to a third-party provider. This is the kind of situation the new third-party transparency language addresses: that provider operates under its own privacy policy, which we&#039;ll link to in its dedicated Privacy Guide. Our commitment to your privacy in those contexts doesn&#039;t change‚ it just lives in a different place now.&lt;/p&gt;
&lt;h4&gt;What Hasn&#039;t Changed&lt;/h4&gt;
&lt;p&gt;The fundamentals remain what they&#039;ve always been: we don&#039;t sell your information, we don&#039;t share it with third parties without your real (not manufactured or dark-patterned) consent, outside of legal requirements we cannot change. We actively push back on legal demands we believe are improper. EFF&#039;s mission is to protect your digital rights, and our own practices will continue to reflect that. The changes we’ve described above will help us in that mission.&lt;/p&gt;
&lt;p class=&quot;take-action&quot;&gt;&lt;a href=&quot;https://supporters.eff.org/donate/spring--DL3&quot;&gt;support EFF&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;You can read the full updated policy at &lt;a href=&quot;https://www.eff.org/policy&quot; target=&quot;_blank&quot; rel=&quot;noopener noreferrer&quot;&gt;eff.org/policy&lt;/a&gt;. If you have questions, we&#039;re always reachable at &lt;a href=&quot;mailto:info@eff.org&quot;&gt;info@eff.org&lt;/a&gt;.&lt;/p&gt;

&lt;/div&gt;&lt;/div&gt;&lt;/div&gt;</description>
     <pubDate>Mon, 18 May 2026 18:03:04 +0000</pubDate>
 <guid isPermaLink="false">112077 at https://www.eff.org</guid>
 <category domain="https://www.eff.org/taxonomy/term/68">Announcement</category>
 <dc:creator>Lena Gunn</dc:creator>
 <enclosure url="https://www.eff.org/files/banner_library/icon-2019-privacy.png" alt="" type="image/png" length="16605" />
  </item>
  <item>
    <title>We Must Not Normalize Digital Surveillance Abuses. EFF’s New Guide Underlines Concrete Steps to Fight Back.</title>
    <link>https://www.eff.org/deeplinks/2026/05/we-must-not-normalize-digital-surveillance-abuses-effs-new-guide-underlines</link>
    <description>&lt;div class=&quot;field field--name-body field--type-text-with-summary field--label-hidden&quot;&gt;&lt;div class=&quot;field__items&quot;&gt;&lt;div class=&quot;field__item even&quot;&gt;&lt;p class=&quot;center-image&quot;&gt;&lt;a href=&quot;https://www.eff.org/document/tackling-arbitrary-digital-surveillance-americas&quot;&gt;&lt;img src=&quot;/files/2026/04/16/wdyd_latam_thumbnail1.png&quot; alt=&quot;&quot; width=&quot;223&quot; height=&quot;300&quot; /&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;span&gt;Poor accountability, feeble control mechanisms, and insufficient legal frameworks have led to systematic human rights violations in the Americas, with no consistent remedy or reparation to victims. What&#039;s needed is to materialize essential guarantees and measures to combat repeated surveillance abuses in the region. To help build a path for solutions, EFF launches the guide &lt;/span&gt;&lt;a href=&quot;https://www.eff.org/wp/tackling-arbitrary-digital-surveillance-americas&quot;&gt;&lt;i&gt;&lt;span&gt;Tackling Arbitrary Digital Surveillance in the Americas&lt;/span&gt;&lt;/i&gt;&lt;/a&gt;&lt;span&gt;, adding to our extensive work leveraging human rights norms to confront state privacy violations.&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span&gt;The document compiles privacy, data protection, and access to information guarantees established within the Inter-American Human Rights System to provide concrete, actionable guidance to governments in the Americas to curb the vicious cycle of state digital surveillance abuses. It outlines the safeguards and institutional measures necessary to protect individuals and details rules, parameters, and standards to overcome current pernicious practices and trends. &lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span&gt;As concerns over national and public security intensify, countries in the region seem to increasingly normalize the pervasiveness of digital surveillance technologies and their arbitrary use by security forces as a distorted form of protection. However, no actual protection can arise from arbitrary surveillance. &lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span&gt;When public security, intelligence, and law enforcement agencies neglect or harm settled rights in the name of national security or public order, they too become a threat. Tolerating rights violations creates the dire situation that the Freedom of Expression Special Rapporteur of the Inter-American Commission on Human Rights thoroughly analyzed in his &lt;/span&gt;&lt;a href=&quot;https://www.oas.org/en/iachr/expression/reports/vigilanciarelecidh.pdf&quot;&gt;&lt;span&gt;report&lt;/span&gt;&lt;/a&gt;&lt;span&gt; about the serious impacts of digital surveillance on freedom of expression in the Americas.&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span&gt;The great majority of states in Latin America have ratified the American Convention on Human Rights. As such, the parameters and rules our new guide describes stem directly from their obligations before international human rights law. State agents and institutions must take the necessary measures to make them a reality.&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span&gt;As EFF’s guide points out, states must implement clear and precise legal frameworks that:&lt;/span&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;span&gt;define surveillance powers and limitations;&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span&gt;ensure all surveillance measures pursue legitimate aims without discriminatory ends;&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span&gt;subject interference with privacy to rigorous necessity and proportionality analysis;&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span&gt;require prior judicial authorization for digital surveillance measures;&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span&gt;maintain detailed records of surveillance operations;&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span&gt;establish independent civilian oversight institutions with technical expertise and enforcement powers;&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span&gt;guarantee individuals&#039; right to informational self-determination and proper notification; and&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span&gt;provide effective remedies and reparation for victims of surveillance abuses.&lt;/span&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;span&gt;States must also put in place the institutional processes and structures to give effect to these legal guarantees. As &lt;/span&gt;&lt;a href=&quot;https://www.eff.org/wp/tackling-arbitrary-digital-surveillance-americas&quot;&gt;&lt;span&gt;we stress in the document&lt;/span&gt;&lt;/a&gt;&lt;span&gt;, States that embrace the guide’s recommendations will not only comply with their international obligations, but will also build more resilient, rights-respecting security architectures capable of addressing genuine threats without sacrificing the freedoms they exist to protect. &lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span&gt;Civil society leaders, activists, legal experts, public defenders, oversight institutions, and state officials committed to human rights must gather and ramp up the fight against the normalization of digital surveillance abuses in the Americas. We hope that EFF’s new guide can serve as a crucial tool in strengthening this fight, one that we have joined since our early days.&lt;/span&gt;&lt;/p&gt;


&lt;/div&gt;&lt;/div&gt;&lt;/div&gt;</description>
     <pubDate>Mon, 18 May 2026 17:15:00 +0000</pubDate>
 <guid isPermaLink="false">112070 at https://www.eff.org</guid>
 <category domain="https://www.eff.org/issues/international">International</category>
 <category domain="https://www.eff.org/issues/privacy">Privacy</category>
 <category domain="https://www.eff.org/issues/surveillance-human-rights">Surveillance and Human Rights</category>
 <category domain="https://www.eff.org/issues/necessary-and-proportionate">Necessary and Proportionate</category>
 <dc:creator>Veridiana Alimonti</dc:creator>
 <enclosure url="https://www.eff.org/files/banner_library/inter-american_court_of_human_rights_columbia_ruling_spying_eye.png" alt="Spying eye with surrounding blue rays " type="image/png" length="915612" />
  </item>
  <item>
    <title>Help EFF Solve an Issue That&#039;s Bigger than Creepy Ads</title>
    <link>https://www.eff.org/deeplinks/2026/05/online-tracking-isnt-just-unethical-its-dangerous</link>
    <description>&lt;div class=&quot;field field--name-body field--type-text-with-summary field--label-hidden&quot;&gt;&lt;div class=&quot;field__items&quot;&gt;&lt;div class=&quot;field__item even&quot;&gt;&lt;p&gt;Millions of people around the world use EFF&#039;s &lt;a href=&quot;https://privacybadger.org&quot; target=&quot;_blank&quot; rel=&quot;noopener noreferrer&quot;&gt;Privacy Badger&lt;/a&gt;. This browser extension blocks the hidden trackers that twist your web browsing into a commodity for Big Tech, advertisers, scammers, and data brokers. But did you know that we’re trying to solve an issue that’s even bigger than creepy ads and user profiling? &lt;a href=&quot;https://supporters.eff.org/donate/spring--DL3&quot;&gt;You can help.&lt;/a&gt;&lt;/p&gt;
&lt;p class=&quot;take-action&quot;&gt;&lt;a href=&quot;https://supporters.eff.org/donate/spring--DL3&quot;&gt;JOIN EFF&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;Online tracking isn&#039;t just creepy and unethical. It also enables government surveillance. &lt;a href=&quot;https://www.eff.org/deeplinks/2025/01/online-behavioral-ads-fuel-surveillance-industry-heres-how&quot;&gt;Widespread commercial surveillance&lt;/a&gt; and weak privacy laws allow data brokers to harvest your data and &lt;a href=&quot;https://www.eff.org/deeplinks/2026/03/targeted-advertising-gives-your-location-government-just-ask-cbp&quot;&gt;sell it to law enforcement agencies&lt;/a&gt; including the FBI, CBP, and ICE. The government exploits this system to buy sensitive information about you that they would ordinarily need a warrant to collect, &lt;a href=&quot;https://www.eff.org/deeplinks/2018/06/victory-supreme-court-says-fourth-amendment-applies-cell-phone-tracking&quot;&gt;like your location over time&lt;/a&gt;. &lt;/p&gt;
&lt;p&gt;With your help, EFF is fighting back. Our team is working to &lt;a href=&quot;https://www.eff.org/deeplinks/2026/05/secure-data-act-not-serious-piece-privacy-legislation&quot; target=&quot;_blank&quot; rel=&quot;noopener noreferrer&quot;&gt;enact stronger laws&lt;/a&gt; to uphold your privacy. We’re advocating for &lt;a href=&quot;https://www.eff.org/press/releases/eff-state-ags-investigate-googles-broken-promise-users-targeted-government&quot; target=&quot;_blank&quot; rel=&quot;noopener noreferrer&quot;&gt;consumer rights&lt;/a&gt; in the courts. We’re investigating how these &lt;a href=&quot;https://www.eff.org/deeplinks/2026/04/california-coastal-community-must-reject-cbps-ai-powered-surveillance-tower&quot; target=&quot;_blank&quot; rel=&quot;noopener noreferrer&quot;&gt;technologies affect our communities&lt;/a&gt;. And we’re cutting off surveillance advertising at the source with tools like Privacy Badger for everyone. &lt;a href=&quot;https://supporters.eff.org/donate/spring--DL3&quot;&gt;You can support this work as an EFF member.&lt;/a&gt;&lt;/p&gt;
&lt;h2&gt;End Mass Surveillance&lt;/h2&gt;
&lt;p&gt;Privacy is a human right because it gives you a fundamental measure of security and freedom. That is why we at EFF focus on your ability to have private conversations and interact with the world using technologies that &lt;em&gt;you&lt;/em&gt; choose. But when tools that many of us must rely on serve corporate surveillance, they also feed government surveillance. We owe it to ourselves to fight the mass spying used to control and intimidate people. Let’s do this.&lt;/p&gt;
&lt;p&gt;&lt;/p&gt;&lt;center&gt;&lt;a href=&quot;https://supporters.eff.org/donate/spring--DL3&quot;&gt;&lt;img src=&quot;/files/2026/05/08/crew_j_squarish.jpg&quot; width=&quot;606&quot; height=&quot;673&quot; alt=&quot;A person wearing a black sweatshirt with an embroidered Privacy Badger mascot on the chest over the characters for ‘privacy” in Traditional Chinese.&quot; title=&quot;Get an embroidered Privacy Badger crewneck when you join EFF.&quot; /&gt;&lt;/a&gt;&lt;/center&gt;
&lt;p&gt;For a limited time, you can join EFF as a &lt;a href=&quot;https://supporters.eff.org/donate/spring--DL3&quot;&gt;monthly&lt;/a&gt; or &lt;a href=&quot;https://supporters.eff.org/donate/springot--otd2&quot;&gt;one-time donor&lt;/a&gt; and pick up a new &lt;a href=&quot;https://supporters.eff.org/donate/spring--DL1&quot; target=&quot;_blank&quot; rel=&quot;noopener noreferrer&quot;&gt;Privacy Badger Crewneck sweatshirt&lt;/a&gt;. The embroidered Privacy Badger mascot appears above Traditional Chinese for &quot;&lt;a href=&quot;https://www.eff.org/files/2026/04/23/embroidery_0.jpg&quot;&gt;privacy&lt;/a&gt;” because human rights are universal.&lt;/p&gt;
&lt;p&gt;You can also get &lt;a href=&quot;https://supporters.eff.org/donate/images/premium/66/GhostieMultisticker-Donate-4.jpg&quot; target=&quot;_blank&quot; rel=&quot;noopener noreferrer&quot;&gt;a set of puffy stickers&lt;/a&gt; as a token of thanks. Our little Ghostie protects privacy in Arabic, English, Japanese, Persian, Russian, and Spanish.&lt;/p&gt;
&lt;p&gt;&lt;a href=&quot;https://supporters.eff.org/donate/images/premium/64/Claw_F_Square.jpg&quot; target=&quot;_blank&quot; rel=&quot;noopener noreferrer&quot;&gt;Claw Back!&lt;/a&gt; This year’s member t-shirt is hot off the press featuring an orange cat swatting at the street-level surveillance equipment multiplying in our communities. You might empathize with him, but there’s a better way. Let’s end the law enforcement contracts, harmful practices, and twisted logic that enable mass spying in the first place.&lt;/p&gt;
&lt;p&gt;You can support our mission for technology in the public interest today. &lt;a href=&quot;https://supporters.eff.org/donate/spring--DL3&quot;&gt;Join the movement and become an EFF member.&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;____________________&lt;/p&gt;
&lt;p&gt;&lt;em&gt;&lt;span data-contrast=&quot;none&quot; lang=&quot;EN-US&quot; class=&quot;TextRun SCXW4268908 BCX0&quot; xml:lang=&quot;EN-US&quot;&gt;&lt;span class=&quot;NormalTextRun SCXW4268908 BCX0&quot;&gt;EFF is a member-supported U.S. 501(c)(3) organization. &lt;/span&gt;&lt;span class=&quot;NormalTextRun CommentStart CommentHighlightPipeRest CommentHighlightRest SCXW4268908 BCX0&quot;&gt;We&#039;ve&lt;/span&gt;&lt;span class=&quot;NormalTextRun CommentHighlightRest SCXW4268908 BCX0&quot;&gt; received top rati&lt;/span&gt;&lt;span class=&quot;NormalTextRun CommentHighlightRest SCXW4268908 BCX0&quot;&gt;ngs &lt;/span&gt;&lt;span class=&quot;NormalTextRun CommentHighlightRest SCXW4268908 BCX0&quot;&gt;from the nonprofit watchdog Charity Navigator since 2013!&lt;/span&gt;&lt;span class=&quot;NormalTextRun CommentHighlightPipeRest SCXW4268908 BCX0&quot;&gt; Your donation is tax-deductible as allowed by law.&lt;/span&gt;&lt;/span&gt;&lt;/em&gt;&lt;/p&gt;

&lt;/div&gt;&lt;/div&gt;&lt;/div&gt;</description>
     <pubDate>Wed, 13 May 2026 17:10:44 +0000</pubDate>
 <guid isPermaLink="false">112056 at https://www.eff.org</guid>
 <category domain="https://www.eff.org/issues/privacy">Privacy</category>
 <category domain="https://www.eff.org/taxonomy/term/68">Announcement</category>
 <dc:creator>Lena Cohen</dc:creator>
 <dc:creator>Aaron Jue</dc:creator>
 <enclosure url="https://www.eff.org/files/banner_library/2026-membership-campaign-mobile-donate.png" alt="An orange cat climbs an ALPR camera to swat at surveillance drones in a blue night sky." type="image/png" length="212563" />
  </item>
  <item>
    <title>The Science is Not Settled: How Weak Evidence is Fueling a National Push to Ban Social Media for Youth</title>
    <link>https://www.eff.org/deeplinks/2026/05/science-not-settled-how-weak-evidence-fueling-national-push-ban-social-media-youth</link>
    <description>&lt;div class=&quot;field field--name-body field--type-text-with-summary field--label-hidden&quot;&gt;&lt;div class=&quot;field__items&quot;&gt;&lt;div class=&quot;field__item even&quot;&gt;&lt;p&gt;&lt;span&gt;As statehouses ramp up for 2026, we’re seeing a familiar and concerning trend of lawmakers rushing to regulate the internet based on shockingly shaky science. From the &lt;/span&gt;&lt;a href=&quot;https://www.eff.org/deeplinks/2026/04/act-now-stop-californias-paternalistic-and-privacy-destroying-social-media-ban&quot;&gt;&lt;span&gt;California State Assembly&lt;/span&gt;&lt;/a&gt;&lt;span&gt; to the &lt;/span&gt;&lt;a href=&quot;https://malegislature.gov/Bills/194/S2581&quot;&gt;&lt;span&gt;Massachusetts&lt;/span&gt;&lt;/a&gt;&lt;span&gt; and &lt;/span&gt;&lt;a href=&quot;https://www.revisor.mn.gov/bills/94/2026/0/SF/4696/&quot;&gt;&lt;span&gt;Minnesota&lt;/span&gt;&lt;/a&gt; &lt;a href=&quot;https://www.revisor.mn.gov/bills/94/2026/0/HF/4138/?body=house&quot;&gt;&lt;span&gt;legislatures&lt;/span&gt;&lt;/a&gt;&lt;span&gt;, a wave of bills is crashing against the digital lives of young people, with proponents of these measures framing social media access as a &quot;public health epidemic,&quot; or a &quot;mental health crisis,&quot; even though we have yet to see any of the settled science that those labels usually invoke.&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span&gt;As a digital rights organization dedicated to the civil liberties of all users, EFF’s expertise lies in reminding lawmakers that young people enjoy largely the same free speech and privacy rights as adults. EFF is not a social science research shop, but we can read the emerging research. What that research shows is much more nuanced than what is claimed by those proposing to ban young people from social media, and it is clear that research and theories used to justify these sweeping bans is far from settled. The rush to ban access to digital platforms is being fueled by &quot;pop psychology&quot; narratives and a collection of statistically flawed studies that do not meet the rigorous standards required for such a massive infringement on youth autonomy and constitutional rights.&lt;/span&gt;&lt;/p&gt;
&lt;h2&gt;&lt;b&gt;The Lie of A &quot;Settled&quot; Consensus&lt;/b&gt;&lt;/h2&gt;
&lt;p&gt;&lt;span&gt;The current legislative push relies heavily on a specific, media-friendly narrative that &lt;/span&gt;&lt;a href=&quot;https://www.nature.com/articles/d41586-024-00902-2&quot;&gt;&lt;span&gt;the &quot;great rewiring&quot; of the adolescent brain&lt;/span&gt;&lt;/a&gt;&lt;span&gt; is a proven fact. This theory suggests that smartphones and social media are the primary, if not sole, drivers of a global uptick in teen anxiety, depression, eating disorders, self harm, etc. While this narrative makes for a compelling airport-bookstore read, it quickly collapses under the scrutiny of the broader scientific community.&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span&gt;Independent researchers, including developmental psychologists from institutions like the &lt;/span&gt;&lt;a href=&quot;https://www.nature.com/articles/d41586-024-00902-2.pdf&quot;&gt;&lt;span&gt;University of California, Irvine&lt;/span&gt;&lt;/a&gt;&lt;span&gt;, and &lt;/span&gt;&lt;a href=&quot;https://3quarksdaily.com/3quarksdaily/2024/07/why-academics-are-annoyed-with-jonathan-haidt-again.html&quot;&gt;&lt;span&gt;Brown University&lt;/span&gt;&lt;/a&gt;&lt;span&gt;, have repeatedly found that the evidence for such claims is &lt;/span&gt;&lt;a href=&quot;https://link.springer.com/article/10.1007/s00127-019-01825-4&quot;&gt;&lt;span&gt;mixed&lt;/span&gt;&lt;/a&gt;&lt;span&gt;, &lt;/span&gt;&lt;a href=&quot;https://acamh.onlinelibrary.wiley.com/doi/epdf/10.1111/jcpp.13190&quot;&gt;&lt;span&gt;blurry&lt;/span&gt;&lt;/a&gt;&lt;span&gt;, and often &lt;/span&gt;&lt;a href=&quot;https://papers.ssrn.com/sol3/papers.cfm?abstract_id=4053961&quot;&gt;&lt;span&gt;contradictory&lt;/span&gt;&lt;/a&gt;&lt;span&gt;. Large-scale &lt;/span&gt;&lt;a href=&quot;https://pdf.sciencedirectassets.com/308596/1-s2.0-S2352250X21X0005X/1-s2.0-S2352250X21001500/main.pdf?X-Amz-Security-Token=IQoJb3JpZ2luX2VjEFEaCXVzLWVhc3QtMSJHMEUCIAYJQpB5ppKb9ELcxsMEkiNTVrOUM0SWMXNTAxlUXkZGAiEA4AdJBVy9e%2Bg8WPR%2BOegjkvD0NDzziCg%2BolLrHwFfBLgqswUIGhAFGgwwNTkwMDM1NDY4NjUiDIi8jhyqgw8bDaz2YyqQBS%2B8A%2FxvkP07ItdOuhFG8vrhlHteBgwEoWdN5yse1B9ST8fMtgdmK4eBrMCDHplzTUPyfJTdGuXJ1%2F2kvRrNIvPZnLIWW%2FIkJZx95M1fmYwpncC%2FQBVzIBqUJEDFcYQ9QkhSie8Sb%2BK3YZyT3M9wMkj%2FZRt7p3OZoLQLMHcZ6htZr33Bh2nv7777EkHkLU3XmKwF8WNDeaTMVTM1uGTmILze9gzcw3D%2B2M8XFIwYSw0Wt%2BXZvfXXOycFzcuRuq7e9S4tKw1j97P2VziHxlu2fLaiDbhvYyRAR9XYu4%2FJwtn6HykW5Kp2dy%2FaIjBzt031NEoa%2F8pPpjBxnlZh3SRbn1MUK3iH2IoaWUB7j5olUPFOqC80VYQ8qA6baoWmYjbRgPgu2dzXURPXcuf9QztzS8K8GlbG%2BPzW2DPyinAUsk%2FS9Qa99u04Xk5KaDVfGcvwQ0gMjfBsGhe5DNPZPSMPmvsMwEqVnrX5P4RQRwAiyufbiDUdUpRLWKmTwyuXY1hshafOxwMlKlGv%2FI0NZkySFvUNGL5wTxQHJwZ7Fh2xA9bOvxjtZB75eC6bU%2BUrsAys9iH9AWFXfEFcfb4C6OQo8fDOq%2F6Cy%2FCL%2BCEChcM7bKconBIrpoqWmIbg6QMp85DbBz4aYixMufXdvnNdgUW4dP%2BOi4C3zq657SfyEghyG7WMHy2sHERp%2FAo%2BqFRXpcN9ToNFjvBVkNPZZVgcAo6hWCndWFQngsyHgzEDPAJ5oy%2FSwhbEgr%2FML20l09jwkVxiN6dzXsgTfI2s%2Bk4uznNJrbbKm19SblQNsb2yclLzc9p5k2DjZyqvLDPOxLcevc%2FoEF%2BJAfbn3pbpAMWjVqv9sySvuLL%2FYzAUkcwAp8e9QclKMJWSiNAGOrEBPzmHh5YVcXY6uvFU4e1JjRE56pJCu9lii0PTdzzt42Xuu2pYhMoG8sPLDrXDzCLWzdlPcVZtZZ7GfMtOiAjFv5Xm3UWK734EvGFtoZun3n1q5hb156O8F19d3%2B0P2xo2uAKfMZyBv4ik1%2BY0vpsitbmlPmtVE0mUvimUKVsgT0B1pk7HSVkfDUPTG7jOucwuGwTrKAgtw6Z4lEqfszV9X81iSiGgUDZeb4636W6Tvxoa&amp;amp;X-Amz-Algorithm=AWS4-HMAC-SHA256&amp;amp;X-Amz-Date=20260511T172131Z&amp;amp;X-Amz-SignedHeaders=host&amp;amp;X-Amz-Expires=300&amp;amp;X-Amz-Credential=ASIAQ3PHCVTY5SMPSKG6%2F20260511%2Fus-east-1%2Fs3%2Faws4_request&amp;amp;X-Amz-Signature=669642443a0644511a66d78c58f293437d8379afe9f9d1d8a086064531ec7158&amp;amp;hash=414c5ee2d415e632f4b0cf826962a49a40843753191e91c475c388e47d749175&amp;amp;host=68042c943591013ac2b2430a89b270f6af2c76d8dfd086a07176afe7c76c2c61&amp;amp;pii=S2352250X21001500&amp;amp;tid=spdf-966fc183-90fb-41ba-af8d-a7e6cdb25a6b&amp;amp;sid=e92745ea50432741af7a623745d13b8e61c8gxrqa&amp;amp;type=client&amp;amp;tsoh=d3d3LnNjaWVuY2VkaXJlY3QuY29t&amp;amp;rh=d3d3LnNjaWVuY2VkaXJlY3QuY29t&amp;amp;ua=161758070255040153&amp;amp;rr=9fa2dc4c296415ce&amp;amp;cc=us&quot;&gt;&lt;span&gt;meta-analyses&lt;/span&gt;&lt;/a&gt;&lt;span&gt; covering dozens of countries have failed to show a consistent, measurable association between the rollout of social media and a decline in global well-being. In reality, we are seeing a classic case of what many of our middle school science teachers warned us about: &quot;correlation&quot; being sold as “causation.&quot;  &lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span&gt;Additionally, the studies used to support these measures often fail to account for or exclude significant alternative explanations for rising teen anxiety and depression, such as the lasting impact of pandemic-era isolation, the persistent threat of school gun violence, and mounting economic or climate-related stress. By focusing narrowly on social media, these findings frequently overlook the broader societal factors that also impact youth mental health.&lt;/span&gt;&lt;/p&gt;
&lt;h3&gt;The Cult of the &quot;Anxious&quot; Expert&lt;/h3&gt;
&lt;p&gt;&lt;span&gt;The current push for blanket social media bans relies almost exclusively on the work of Jonathan Haidt, particularly his book &lt;/span&gt;&lt;i&gt;&lt;span&gt;The Anxious Generation&lt;/span&gt;&lt;/i&gt;&lt;span&gt;. While Haidt is an amiable and brilliant storyteller, he is not a clinical psychologist or a specialist in child development. He is a &lt;/span&gt;&lt;a href=&quot;https://www.stern.nyu.edu/faculty/bio/jonathan-haidt&quot;&gt;&lt;span&gt;social psychologist&lt;/span&gt;&lt;/a&gt;&lt;span&gt; who writes about moral psychology at a business school. Nonetheless, the book has made it to every &lt;/span&gt;&lt;a href=&quot;https://x.com/JonHaidt/status/1878060919957164246&quot;&gt;&lt;i&gt;&lt;span&gt;Best Seller&lt;/span&gt;&lt;/i&gt;&lt;span&gt; list&lt;/span&gt;&lt;/a&gt;&lt;span&gt;, and with Haidt revered as an expert on podcasts with massive reach, like &lt;/span&gt;&lt;a href=&quot;https://www.oprah.com/book/the-anxious-generation-by-jonathan-haidt?editors_pick_id=84223&quot;&gt;&lt;span&gt;Oprah&lt;/span&gt;&lt;/a&gt;&lt;span&gt;, &lt;/span&gt;&lt;a href=&quot;https://www.youtube.com/watch?v=jOC-RyoBcbQ&quot;&gt;&lt;span&gt;Joe Rogan&lt;/span&gt;&lt;/a&gt;&lt;span&gt;, &lt;/span&gt;&lt;a href=&quot;https://www.youtube.com/watch?v=xKQ5UujtFX0&quot;&gt;&lt;span&gt;Michelle Obama&lt;/span&gt;&lt;/a&gt;&lt;span&gt;, and &lt;/span&gt;&lt;a href=&quot;https://www.youtube.com/watch?v=Ey4XhHqnkuQ&quot;&gt;&lt;span&gt;Trevor Noah&lt;/span&gt;&lt;/a&gt;&lt;span&gt;—his message has been heard by a large subset of society, which primarily relies on: no smartphones or social media before age 16, phone-free schools, and more “unsupervised, real-world independence.”&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span&gt;To highlight Haidt’s reach when it comes to legislation banning social media: the &lt;/span&gt;&lt;a href=&quot;https://leginfo.legislature.ca.gov/faces/billAnalysisClient.xhtml?bill_id=202520260AB1709#&quot;&gt;&lt;span&gt;California committee analysis&lt;/span&gt;&lt;/a&gt;&lt;span&gt; for the proposed California social media ban mentions Haidt 20 times; &lt;/span&gt;&lt;a href=&quot;https://x.com/SpencerJCox/status/1798503704846589977&quot;&gt;&lt;span&gt;the Governor of Utah&lt;/span&gt;&lt;/a&gt;&lt;span&gt; promoted the book as a “must-read” months before &lt;/span&gt;&lt;a href=&quot;https://www.ksl.com/article/news/politics/he-wrote-the-book-on-social-media-and-kids-heres-what-he-said-about-utahs-online-laws/51289239#:~:text=The%20ceremonial%20signing%20included%20several,the%20data%20collected%20by%20social&quot;&gt;&lt;span&gt;signing the nation’s first social media ban&lt;/span&gt;&lt;/a&gt;&lt;span&gt;; Haidt is &lt;/span&gt;&lt;a href=&quot;https://www.flsenate.gov/Session/Bill/2024/3/Analyses/h0003z1.RRS.PDF&quot;&gt;&lt;span&gt;cited in bill analysis&lt;/span&gt;&lt;/a&gt;&lt;span&gt; for the bill banning social media in Florida; his work is mentioned &lt;/span&gt;&lt;a href=&quot;https://www.congress.gov/bill/119th-congress/house-bill/2700/all-info&quot;&gt;&lt;span&gt;in a federal bill&lt;/span&gt;&lt;/a&gt;&lt;span&gt; aiming to ban phones in schools; and he provided formal testimony before the &lt;/span&gt;&lt;a href=&quot;https://www.judiciary.senate.gov/imo/media/doc/Haidt%20Testimony.pdf&quot;&gt;&lt;span&gt;U.S. Senate Judiciary Committee (Subcommittee on Technology, Privacy, and the Law)&lt;/span&gt;&lt;/a&gt;&lt;span&gt; in May 2022. &lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span&gt;While Haidt’s research has been paramount to legislation stripping millions of young people of their rights to expression and connection, his conclusions are not without challenge, and many experts in the field argue that the evidence is less than ironclad. &lt;/span&gt;&lt;/p&gt;
&lt;h2&gt;&lt;strong&gt;The “Bad Science” Fueling Social Media Bans&lt;/strong&gt;&lt;/h2&gt;
&lt;p&gt;&lt;span&gt;While we can admit that Jonathan Haidt’s &quot;great rewiring&quot; theory makes for a gripping narrative, we cannot ignore that independent researchers and statisticians &lt;/span&gt;&lt;a href=&quot;https://holdenthorp.substack.com/p/more-on-the-muddled-science-on-teens&quot;&gt;&lt;span&gt;have identified&lt;/span&gt;&lt;/a&gt; &lt;a href=&quot;https://www.theguardian.com/books/2024/apr/27/anxious-generation-jonathan-haidt&quot;&gt;&lt;span&gt;significant flaws&lt;/span&gt;&lt;/a&gt;&lt;span&gt; in the &lt;/span&gt;&lt;a href=&quot;https://www.platformer.news/anxious-generation-jonathan-haidt-debate-critique/&quot;&gt;&lt;span&gt;data used to justify it&lt;/span&gt;&lt;/a&gt;&lt;span&gt;. Which means we are currently watching policymakers legislate blanket bans based on evidence that would be rejected in almost any other field of public health.&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span&gt;The reality is that research has consistently &lt;/span&gt;&lt;a href=&quot;https://www.techdirt.com/2026/01/21/two-major-studies-125000-kids-the-social-media-panic-doesnt-hold-up/&quot;&gt;&lt;span&gt;disproven&lt;/span&gt;&lt;/a&gt;&lt;span&gt; the oft-assumed link between social media use and poor mental health in youth, and actually&lt;/span&gt;&lt;a href=&quot;https://www.techdirt.com/2026/01/21/two-major-studies-125000-kids-the-social-media-panic-doesnt-hold-up/&quot;&gt;&lt;span&gt; indicates&lt;/span&gt;&lt;/a&gt;&lt;span&gt; that moderate internet use is a net positive for teens’ development, and negative outcomes are usually due to either lack of access or excessive use. In one&lt;/span&gt;&lt;a href=&quot;https://jamanetwork.com/journals/jamapediatrics/article-abstract/2843720&quot;&gt;&lt;span&gt; major study&lt;/span&gt;&lt;/a&gt;&lt;span&gt; of 100,000 adolescents, a “U-shaped association emerged where moderate social media use was associated with the best well-being outcomes, while both no use and highest use were associated with poorer well-being.” We also know that young people’s relationship with social media is complex, as it provides them essential spaces for civic engagement, identity exploration, and community building—particularly for&lt;/span&gt;&lt;a href=&quot;https://www.pewresearch.org/journalism/2025/12/03/young-adults-and-the-future-of-news/&quot;&gt;&lt;span&gt; LGBTQ+&lt;/span&gt;&lt;/a&gt;&lt;span&gt; and&lt;/span&gt;&lt;a href=&quot;https://medicalxpress.com/news/2020-07-marginalized-youth-socially-isolated-previous.html&quot;&gt;&lt;span&gt; marginalized youth&lt;/span&gt;&lt;/a&gt;&lt;span&gt; who may lack support in their physical environments. &lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span&gt;But again, the image Haidt presents in his book is increasingly at odds with the broader academic consensus. As mentioned, critics argue that the evidence for the mental health impacts of social media is &lt;/span&gt;&lt;a href=&quot;https://internet.psych.wisc.edu/wp-content/uploads/532-Master/532-UnitPages/Unit-11/Odgers_Nature_2024.pdf&quot;&gt;&lt;span&gt;mixed, blurry, and often misinterpreted&lt;/span&gt;&lt;/a&gt;&lt;span&gt;. NYU statistics expert Aaron Brown, writing for &lt;/span&gt;&lt;a href=&quot;https://reason.com/2023/03/29/the-statistically-flawed-evidence-that-social-media-is-causing-the-teen-mental-health-crisis/&quot;&gt;&lt;i&gt;&lt;span&gt;Reason&lt;/span&gt;&lt;/i&gt;&lt;/a&gt;&lt;span&gt;, notes that many of the studies in Haidt’s exhaustive reference list are statistically unreliable or fail to show a strong causal link. Prof. &lt;/span&gt;&lt;a href=&quot;https://www.nature.com/articles/d41586-024-00902-2&quot;&gt;&lt;span&gt;Candace Odgers&lt;/span&gt;&lt;/a&gt;&lt;span&gt;, a leading voice in psychological science, explains the &quot;selection effect&quot; that legislators often ignore:&lt;/span&gt;&lt;/p&gt;
&lt;blockquote&gt;&lt;p&gt;&lt;span&gt;“Hundreds of researchers, myself included, have searched for the kind of large effects suggested by Haidt. Our efforts have produced a mix of no, small and mixed associations. Most data are correlative. When associations over time are found, they suggest not that social-media use predicts or causes depression, but that young people who already have mental-health problems use such platforms more often or in different ways from their healthy peers.”&lt;/span&gt;&lt;/p&gt;
&lt;/blockquote&gt;
&lt;p&gt;&lt;span&gt;This raises a fundamental question of legislative responsibility: If the science is not settled, how can legislators confidently &lt;/span&gt;&lt;a href=&quot;https://krcrtv.com/news/nation-world/california-moving-toward-banning-social-media-for-kids-under-16-online-safety-children-social-media-addiction&quot;&gt;&lt;span&gt;declare a “public health crisis”&lt;/span&gt;&lt;/a&gt;&lt;span&gt; to justify stripping away &lt;/span&gt;&lt;a href=&quot;https://www.eff.org/deeplinks/2025/02/eff-ninth-circuit-young-people-have-first-amendment-right-use-social-media-and-all&quot;&gt;&lt;span&gt;young people’s First Amendment rights&lt;/span&gt;&lt;/a&gt;&lt;span&gt;? By bypassing the rigorous, nuanced findings of the scientific community in favor of a more convenient narrative, legislators are choosing emotion over evidence. Before imposing such draconian restrictions on young people’s access to information, policymakers have an obligation to do the heavy lifting: to dig into the actual research and listen to the experts who are sounding the alarm on oversimplified conclusions.&lt;/span&gt;&lt;/p&gt;
&lt;h3&gt;&lt;strong&gt;The Dangers of &quot;Social Contagion&quot; Narrative&lt;/strong&gt;&lt;/h3&gt;
&lt;p&gt;&lt;span&gt;Perhaps the most troubling aspect of Haidt’s crusade is its overlap with ideological rhetoric that pathologizes the identities of marginalized youth, and how that makes its way through efforts to ban social media for youth. A recurring theme in the literature favored by proponents of social media bans is the idea of &quot;&lt;/span&gt;&lt;a href=&quot;https://www.technologyreview.com/2022/08/18/1057135/transgender-contagion-gender-dysphoria/&quot;&gt;&lt;span&gt;social contagion&lt;/span&gt;&lt;/a&gt;&lt;span&gt;&quot;—specifically regarding the rise in young people identifying as transgender or non-binary. Haidt dedicates an entire chapter of his book to this (ch.6, pt 3, p. 165), talking about “Why Social Media Harms Girls More Than Boys,” stating that: &lt;/span&gt;&lt;/p&gt;
&lt;blockquote&gt;&lt;p&gt;&lt;span&gt;“The recent growth in diagnoses of gender dysphoria may also be related in part to social media trends, [...] the fact that gender dysphoria is now being diagnosed among many adolescents who showed no signs of it as children all indicate the social influence and sociogenic transmission may be at work as well.”&lt;/span&gt;&lt;/p&gt;
&lt;/blockquote&gt;
&lt;p&gt;&lt;span&gt;These harmful theories suggesting that social media is &quot;infecting&quot; young people with gender dysphoria are false and &lt;/span&gt;&lt;a href=&quot;https://theconversation.com/why-rapid-onset-gender-dysphoria-is-bad-science-92742&quot;&gt;&lt;span&gt;not supported by peer-reviewed clinical research&lt;/span&gt;&lt;/a&gt;&lt;span&gt;. But by legitimizing &quot;experts&quot; who &lt;/span&gt;&lt;a href=&quot;https://www.assignedmedia.org/breaking-news/jonathan-haidt-social-contagion-rogd-pbs&quot;&gt;&lt;span&gt;promote these debunked theories&lt;/span&gt;&lt;/a&gt;&lt;span&gt;, legislators—especially those in states like California who pride themselves on being a &lt;/span&gt;&lt;a href=&quot;https://calmatters.org/newsletter/transgender-youth-executive-orders-newsletter/&quot;&gt;&lt;span&gt;sanctuary for LGBTQ+ youth&lt;/span&gt;&lt;/a&gt;&lt;span&gt;—are inadvertently platforming the same rhetoric used in other states to ban gender affirming care for youth. This &quot;social contagion&quot; narrative is a tool of exclusion, not a scientific reality, and we must be wary of any &quot;public health&quot; argument that treats community-building and self-discovery among marginalized young people as a &quot;&lt;/span&gt;&lt;a href=&quot;https://urldefense.proofpoint.com/v2/url?u=https-3A__www.pbs.org_wnet_firing-2Dline_video_jonathan-2Dhaidt-2Dxp90dy_&amp;amp;d=DwMFaQ&amp;amp;c=euGZstcaTDllvimEN8b7jXrwqOf-v5A_CdpgnVfiiMM&amp;amp;r=5nWZgKs9GsqBlJwUpRWH-sbmB1pEIHaY61rOUFX52no&amp;amp;m=UHfRjJ5jZBnmmlJC0k3a1oWlIYN5Su_KK1rATAuSpWVb_UU6qyhFL7fkjNUflUu8&amp;amp;s=rAH3wqL9cufYIks68Ioiy5gwNJATU1Fl9PVTDWpl0Po&amp;amp;e=&quot;&gt;&lt;span&gt;purported mental illness&lt;/span&gt;&lt;/a&gt;&lt;span&gt;&quot; spread via TikTok.&lt;/span&gt;&lt;/p&gt;
&lt;h2&gt;&lt;b&gt;A Better Path: Digital Wellness, Not Bans&lt;/b&gt;&lt;/h2&gt;
&lt;p&gt;&lt;span&gt;Fortunately, there is a measured, evidence-based alternative already emerging. &lt;/span&gt;&lt;a href=&quot;https://leginfo.legislature.ca.gov/faces/billTextClient.xhtml?bill_id=202520260AB2071&quot;&gt;&lt;span&gt;California&#039;s A.B. 2071&lt;/span&gt;&lt;/a&gt;&lt;span&gt;, for instance, is a &lt;/span&gt;&lt;a href=&quot;https://edsource.org/2026/social-media-ai-mental-health/755990?fbclid=IwdGRjcARWYJtleHRuA2FlbQIxMQBzcnRjBmFwcF9pZAo2NjI4NTY4Mzc5AAEe6iOvJ_-TeXaFJbJuwzYpe04FGVpm622U54NiwPU87FFjNxzKCOFRmdj2JXw_aem_Vh739k2H4DmT8novhNJy3g&quot;&gt;&lt;span&gt;student-authored&lt;/span&gt;&lt;/a&gt;&lt;span&gt; &quot;digital wellness&quot; bill that offers a measured, evidence-based alternative rather than prohibition. The bill advocates for a curriculum that teaches students how to manage algorithms, recognize cyberbullying, and regulate their own relationship with technology. Instead of trying to completely shield young people from social media, education-based approaches empower young people and have the benefit of providing skills that stay with a young person long after they leave the classroom. &lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;a href=&quot;https://jlusa.org/about/&quot;&gt;&lt;span&gt;JustLeadershipUSA&lt;/span&gt;&lt;/a&gt;&lt;span&gt;, a criminal justice organization, has a slogan that rings true in this instance too: &lt;/span&gt;&lt;i&gt;&lt;span&gt;“Those closest to the problem are closest to the solution.”&lt;/span&gt;&lt;/i&gt;&lt;span&gt; So let’s start listening to what our young people are asking us for—more education—instead of imposing paternalistic, &lt;/span&gt;&lt;a href=&quot;https://www.eff.org/deeplinks/2026/04/act-now-stop-californias-paternalistic-and-privacy-destroying-social-media-ban&quot;&gt;&lt;span&gt;disempowering bans&lt;/span&gt;&lt;/a&gt;&lt;span&gt;.&lt;/span&gt;&lt;/p&gt;
&lt;h2&gt;&lt;b&gt;Legislating With Precision instead of Emotion &lt;/b&gt;&lt;/h2&gt;
&lt;p&gt;&lt;span&gt;Adolescent mental health struggles are a complex, multifaceted crisis. It is a crisis that has existed for as long as time, and has been driven by &lt;/span&gt;&lt;a href=&quot;https://blog.mdpi.com/2023/02/28/recessions-and-mental-health/&quot;&gt;&lt;span&gt;economic instability&lt;/span&gt;&lt;/a&gt;&lt;span&gt;, &lt;/span&gt;&lt;a href=&quot;https://www.nytimes.com/interactive/2025/12/22/opinion/west-virginia-appalachia-opioids-children.html&quot;&gt;&lt;span&gt;the opioid epidemic&lt;/span&gt;&lt;/a&gt;&lt;span&gt;, the &lt;/span&gt;&lt;a href=&quot;https://jamanetwork.com/journals/jamanetworkopen/fullarticle/2785658&quot;&gt;&lt;span&gt;threat of school violence,&lt;/span&gt;&lt;/a&gt;&lt;span&gt; amongst &lt;/span&gt;&lt;a href=&quot;https://www.thetrevorproject.org/blog/study-shows-lgbtq-youth-in-the-u-s-face-high-rates-of-suicidality-and-victimization-worsened-by-anti-lgbtq-politics/&quot;&gt;&lt;span&gt;other issues&lt;/span&gt;&lt;/a&gt;&lt;span&gt;. To pin all of society&#039;s woes on a smartphone app is not just a scientific error; it is a policy failure that ignores the real, material needs of young people both online and off.&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span&gt;Legislators must stop legislating as &quot;anxious parents&quot; and start acting as measured policymakers. Because for some youth, social media platforms are a lifeline. &lt;/span&gt;&lt;a href=&quot;https://www.unicef.org/press-releases/age-restrictions-alone-wont-keep-children-safe-online&quot;&gt;&lt;span&gt;UNICEF&lt;/span&gt;&lt;/a&gt;&lt;span&gt; and other &lt;/span&gt;&lt;a href=&quot;https://www.politico.eu/article/michael-oflaherty-human-rights-council-of-europe-children-social-media-ban/&quot;&gt;&lt;span&gt;global human rights organizations&lt;/span&gt;&lt;/a&gt;&lt;span&gt; have warned that age-related restrictions and blanket bans &lt;/span&gt;&lt;a href=&quot;https://www.eff.org/pages/whos-harmed-age-verification-mandates#main-content&quot;&gt;&lt;span&gt;can backfire&lt;/span&gt;&lt;/a&gt;&lt;span&gt; in three critical ways: isolating marginalized youth (like LGBTQ+ youth, students in rural areas, foster youth, or those with disabilities) who social media is often the only place they can find a &lt;/span&gt;&lt;a href=&quot;https://www.hrc.org/magazine/2021-early-fall/online-communities-early-fall-2021&quot;&gt;&lt;span&gt;supportive community&lt;/span&gt;&lt;/a&gt;&lt;span&gt;; necessitating invasive &lt;/span&gt;&lt;a href=&quot;https://www.eff.org/pages/age-verification-systems-are-surveillance-systems#main-content&quot;&gt;&lt;span&gt;mass collection&lt;/span&gt;&lt;/a&gt;&lt;span&gt; of biometric data or government-issued IDs from all users, including adults; and &lt;/span&gt;&lt;a href=&quot;https://www.theguardian.com/australia-news/2026/mar/14/australia-porn-age-verification-user-experience-vpn-dark-web-ntwnfb&quot;&gt;&lt;span&gt;pushing young people toward&lt;/span&gt;&lt;/a&gt;&lt;span&gt; less-regulated, &quot;darker&quot; corners of the web where content moderation is non-existent and the risks of actual exploitation are significantly higher.&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span&gt;Legislators have a valid interest in protecting children, but that interest must be pursued through tailored, measured approaches. We cannot allow emotions or a collection of flawed data sets to justify a historic rollback of digital rights. &lt;/span&gt;&lt;/p&gt;

&lt;/div&gt;&lt;/div&gt;&lt;/div&gt;</description>
     <pubDate>Wed, 13 May 2026 16:48:05 +0000</pubDate>
 <guid isPermaLink="false">112068 at https://www.eff.org</guid>
 <category domain="https://www.eff.org/issues/age-verification">Age Verification and Age Gating: Resource Hub</category>
 <dc:creator>Rindala Alajaji</dc:creator>
 <enclosure url="https://www.eff.org/files/banner_library/ageverification-banner2-3a.png" alt="two kids on a huge laptop, spied on by an eye in magnifying glass" type="image/png" length="1249014" />
  </item>
  <item>
    <title>Broken Promises: RIP Instagram’s End-to-End Encrypted DMs</title>
    <link>https://www.eff.org/deeplinks/2026/05/broken-promises-rip-instagrams-end-end-encrypted-dms</link>
    <description>&lt;div class=&quot;field field--name-body field--type-text-with-summary field--label-hidden&quot;&gt;&lt;div class=&quot;field__items&quot;&gt;&lt;div class=&quot;field__item even&quot;&gt;&lt;p&gt;&lt;span&gt;Last week, Instagram ended its opt-in, and therefore rarely used, &lt;/span&gt;&lt;a href=&quot;https://help.instagram.com/491565145294150&quot; target=&quot;_blank&quot; rel=&quot;noopener noreferrer&quot;&gt;&lt;span&gt;end-to-end encryption feature&lt;/span&gt;&lt;/a&gt;&lt;span&gt;. Years after publicly promising to provide the privacy protections of end-to-end encryption across its platforms by default, it instead gave up on that technical challenge. Now, we&#039;ve all lost an option for safer conversations on one of the biggest social media platforms in the world.&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span&gt;In an announcement in 2023, &lt;/span&gt;&lt;a href=&quot;https://engineering.fb.com/2023/12/06/security/building-end-to-end-security-for-messenger/&quot; target=&quot;_blank&quot; rel=&quot;noopener noreferrer&quot;&gt;&lt;span&gt;Meta bragged about&lt;/span&gt;&lt;/a&gt;&lt;span&gt; how it had successfully encrypted Messenger, and teased that Instagram was in progress. Even before then, they’d talked about how important encryption was in Messenger and Instagram &lt;/span&gt;&lt;a href=&quot;https://about.fb.com/wp-content/uploads/2021/12/Metas-Approach-to-Safer-Private-Messaging.pdf&quot; target=&quot;_blank&quot; rel=&quot;noopener noreferrer&quot;&gt;&lt;span&gt;in a white paper&lt;/span&gt;&lt;/a&gt;&lt;span&gt; published in 2022, stating: &lt;/span&gt;&lt;/p&gt;
&lt;blockquote&gt;&lt;p&gt;&lt;span&gt;We want people to have a trusted private space that’s safe and secure, which is why we’re taking our time to thoughtfully build and implement e2ee by default across Messenger and Instagram DMs.&lt;/span&gt;&lt;/p&gt;
&lt;/blockquote&gt;
&lt;p&gt;&lt;span&gt;So where did the reversal come from? &lt;/span&gt;&lt;a href=&quot;https://www.theregister.com/security/2026/05/08/meta-u-turns-on-encryption-push-for-instagram-as-dms-go-plaintext/5235705&quot; target=&quot;_blank&quot; rel=&quot;noopener noreferrer&quot;&gt;&lt;span&gt;In a statement&lt;/span&gt;&lt;/a&gt;&lt;span&gt;, Meta claimed that, “Very few people were opting in to end-to-end encrypted messaging in DMs.” This isn’t all that surprising, as turning it on was &lt;/span&gt;&lt;a href=&quot;https://help.instagram.com/1165835007222763/&quot; target=&quot;_blank&quot; rel=&quot;noopener noreferrer&quot;&gt;&lt;span&gt;an optional four-step process&lt;/span&gt;&lt;/a&gt;&lt;span&gt; that few people knew about. Defaults matter, and Meta’s choice to blame people for failing to opt into this feature is proof of how much. In that same statement, the company pointed people to WhatsApp for access to encrypted messaging. Yet if Meta truly wanted people to have a trusted private space to communicate, it would meet them everywhere they are: on WhatsApp, on Messenger, and on Instagram.&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span&gt;But at least Meta was straightforward about the fact that it will not continue to support or work on this feature. That&#039;s rare. Most tech company promises aren’t broken explicitly, they just remain undelivered long enough to be forgotten. &lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span&gt;This is particularly disappointing as other companies take even bigger swings, like Google and Apple working together to &lt;/span&gt;&lt;a href=&quot;https://www.eff.org/deeplinks/2026/05/victory-end-end-encrypted-rcs-comes-apple-and-android-chats&quot;&gt;&lt;span&gt;implement end-to-end encryption over Rich Communication Services (RCS),&lt;/span&gt;&lt;/a&gt;&lt;span&gt; and Signal’s continued work to make its app simpler and easier to use for everyone.&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span&gt;Meta abandoning this principle is disheartening, especially as we are still waiting for other promised features from the company, like &lt;/span&gt;&lt;a href=&quot;https://encryptitalready.org/&quot;&gt;&lt;span&gt;end-to-end encryption in Facebook Messenger group messages&lt;/span&gt;&lt;/a&gt;&lt;span&gt;. Instead of blaming users for not using these sorts of features and then abandoning the promise of delivery, Meta—and other tech companies—should start by enabling strong privacy protective features by default.&lt;/span&gt;&lt;/p&gt;

&lt;/div&gt;&lt;/div&gt;&lt;/div&gt;</description>
     <pubDate>Tue, 12 May 2026 22:11:00 +0000</pubDate>
 <guid isPermaLink="false">112067 at https://www.eff.org</guid>
 <category domain="https://www.eff.org/issues/end-end-encryption">End-to-End Encryption</category>
 <category domain="https://www.eff.org/issues/privacy">Privacy</category>
 <dc:creator>Thorin Klosowski</dc:creator>
 <enclosure url="https://www.eff.org/files/banner_library/OG-Encryption-DefendEncryption.png" alt="" type="image/png" length="35296" />
  </item>
  <item>
    <title>Victory! End-to-End Encrypted RCS Comes to Apple and Android Chats</title>
    <link>https://www.eff.org/deeplinks/2026/05/victory-end-end-encrypted-rcs-comes-apple-and-android-chats</link>
    <description>&lt;div class=&quot;field field--name-body field--type-text-with-summary field--label-hidden&quot;&gt;&lt;div class=&quot;field__items&quot;&gt;&lt;div class=&quot;field__item even&quot;&gt;&lt;p&gt;&lt;span&gt;This week, &lt;/span&gt;&lt;a href=&quot;https://www.apple.com/newsroom/2026/05/end-to-end-encrypted-rcs-messaging-begins-rolling-out-today-in-beta/&quot;&gt;&lt;span&gt;Apple released iOS 26.5&lt;/span&gt;&lt;/a&gt;&lt;span&gt;, an update that supports end-to-end encryption for Rich Communication Services (RCS), meaning conversations between &lt;/span&gt;&lt;a href=&quot;https://blog.google/products-and-platforms/platforms/android/android-ios-end-to-end-encrypted-rcs-messaging/&quot;&gt;&lt;span&gt;Android and iPhone&lt;/span&gt;&lt;/a&gt;&lt;span&gt; will soon be encrypted in the default chat apps. This has been a long time coming, and is a welcome &lt;/span&gt;&lt;a href=&quot;https://encryptitalready.org/&quot;&gt;&lt;span&gt;delivery on a promise both Google and Apple made&lt;/span&gt;&lt;/a&gt;&lt;span&gt;.&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span&gt;With this update, conversations that take place between Apple’s Messages app and Google Messages on Android will be end-to-end encrypted by default, as long as the carrier supports both RCS and encrypted messages (you can find a &lt;/span&gt;&lt;a href=&quot;https://www.apple.com/newsroom/2026/05/end-to-end-encrypted-rcs-messaging-begins-rolling-out-today-in-beta/&quot;&gt;&lt;span&gt;list of carriers here&lt;/span&gt;&lt;/a&gt;&lt;span&gt;). &lt;/span&gt;&lt;a href=&quot;https://www.eff.org/deeplinks/2024/01/what-apples-promise-support-rcs-means-text-messaging&quot;&gt;&lt;span&gt;RCS messages are a replacement for SMS&lt;/span&gt;&lt;/a&gt;&lt;span&gt;, and in 2024 Apple started supporting it, making for a marked improvement in the quality of images and other media shared between Android and iPhones. &lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span&gt;Now, those conversations can also benefit from the increased privacy and security that end-to-end encryption offers, making it so neither Google, Apple, nor the cellular carriers have access to the contents of messages. This feature comes courtesy of both Apple and Google supporting the &lt;/span&gt;&lt;a href=&quot;https://www.gsma.com/solutions-and-impact/technologies/networks/gsma_resources/gsma-rcs-universal-profile-3-0-specifications/&quot;&gt;&lt;span&gt;GSMA RCS Universal Profile 3.0&lt;/span&gt;&lt;/a&gt;&lt;span&gt;, which &lt;/span&gt;&lt;a href=&quot;https://www.gsma.com/solutions-and-impact/technologies/networks/gsma_resources/rcc-16-rich-communication-suite-end-to-end-encryption-specification/&quot;&gt;&lt;span&gt;implements the Messaging Layer Security protocol&lt;/span&gt;&lt;/a&gt;&lt;span&gt; for encryption. &lt;/span&gt;&lt;a href=&quot;https://ssd.eff.org/module/why-metadata-matters&quot;&gt;&lt;span&gt;Metadata will likely&lt;/span&gt;&lt;/a&gt;&lt;span&gt; still be collected and stored for these conversations, making &lt;/span&gt;&lt;a href=&quot;https://ssd.eff.org/module/how-to-use-signal&quot;&gt;&lt;span&gt;alternatives like Signal&lt;/span&gt;&lt;/a&gt;&lt;span&gt; still a better option for many conversations. Likewise, if you back up those conversations to the cloud, they may be stored unencrypted unless you enable &lt;/span&gt;&lt;a href=&quot;https://ssd.eff.org/module/how-encrypt-your-iphone&quot;&gt;&lt;span&gt;Advanced Data Protection on iOS&lt;/span&gt;&lt;/a&gt;&lt;span&gt; (&lt;/span&gt;&lt;a href=&quot;https://www.eff.org/deeplinks/2025/05/back-it-back-it-let-us-begin-explain-encrypted-chat-backups&quot;&gt;&lt;span&gt;Google Messages end-to-end encrypts the text of messages&lt;/span&gt;&lt;/a&gt;&lt;span&gt; in backups, but not the media, so we’d like to see a &lt;/span&gt;&lt;a href=&quot;https://encryptitalready.org/&quot;&gt;&lt;span&gt;similar offering as ADP on Android&lt;/span&gt;&lt;/a&gt;&lt;span&gt;). Still, this is a significant step forward for the privacy of millions of conversations worldwide.&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span&gt;End-to-end encrypted RCS messaging is still marked as beta on Apple devices, likely because the rollout is dependent on carriers as well as the Android phone running the most recent version of Google Messages. &lt;br /&gt;&lt;/span&gt;&lt;br /&gt;&lt;span&gt;It might take some time before you get this feature in your chats and until you do, remember that the conversations are not protected with end-to-end encryption. But once everyone in the conversation is on the right software version &lt;/span&gt;&lt;i&gt;&lt;span&gt;and&lt;/span&gt;&lt;/i&gt;&lt;span&gt; the carrier support is implemented, you will see a lock icon and the text, “Encrypted” at the top of the conversation for any chats you have over RCS, as seen here: &lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span&gt;&lt;img src=&quot;/files/2026/05/12/apple-rcs-messaging-beta_quick-read-16x9.jpg.large_2x.jpg&quot; width=&quot;5120&quot; height=&quot;2880&quot; alt=&quot;&quot; /&gt;&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span&gt;We applaud Apple and Google for getting this across the finish line and &lt;a href=&quot;https://encryptitalready.org/&quot;&gt;Encrypting It Already&lt;/a&gt;! More companies should take these sorts of difficult but necessary steps to protect the privacy of our conversations and our data.&lt;/span&gt;&lt;/p&gt;

&lt;/div&gt;&lt;/div&gt;&lt;/div&gt;</description>
     <pubDate>Tue, 12 May 2026 16:48:16 +0000</pubDate>
 <guid isPermaLink="false">112065 at https://www.eff.org</guid>
 <category domain="https://www.eff.org/issues/end-end-encryption">End-to-End Encryption</category>
 <category domain="https://www.eff.org/issues/privacy">Privacy</category>
 <dc:creator>Thorin Klosowski</dc:creator>
 <enclosure url="https://www.eff.org/files/banner_library/encrypt_banner-animated-loop.gif" alt="animated image of the text &amp;quot;encrypt it already&amp;quot; turning from text into circles" type="image/gif" length="127662" />
  </item>
  <item>
    <title>EFF Launches New Offline Campaign for Saudi Wikipedian Osama Khalid</title>
    <link>https://www.eff.org/deeplinks/2026/05/eff-launches-new-offline-campaign-saudi-wikipedian-osama-khalid</link>
    <description>&lt;div class=&quot;field field--name-body field--type-text-with-summary field--label-hidden&quot;&gt;&lt;div class=&quot;field__items&quot;&gt;&lt;div class=&quot;field__item even&quot;&gt;&lt;p&gt;&lt;a href=&quot;https://www.eff.org/offline/osama-khalid&quot;&gt;&lt;span&gt;Osama Khalid&lt;/span&gt;&lt;/a&gt;&lt;span&gt; was just twelve years old when he began contributing to Wikipedia Arabic. In the height of the blogging era, he became a prolific blogger, publishing writings on his home country of Saudi Arabia, meetups he attended, and his opinions and observations about open source technology and freedom of expression. He advocated for internet freedom, contributed time and translations to various projects—including EFF’s &lt;/span&gt;&lt;a href=&quot;https://www.eff.org/https-everywhere&quot;&gt;&lt;span&gt;HTTPS Everywhere&lt;/span&gt;&lt;/a&gt;&lt;span&gt;—and was a thoughtful presence at the conferences he attended around the world…all while training to become a pediatrician.&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span&gt;In July of 2020, he was detained amid a wave of arbitrary arrests carried out by the Saudi authorities during the Covid-19 lockdown and initially given a five-year prison sentence. That sentence was later increased on appeal to 32 years, then reduced in 2023 to 25 years, and again to 14 years this past September. In a &lt;/span&gt;&lt;a href=&quot;https://www.alqst.org/en/post/ngos-call-for-immediate-release-of-saudi-wikipedian-osama-khalid-whose-14-year-sentence-was-upheld&quot;&gt;&lt;span&gt;joint letter&lt;/span&gt;&lt;/a&gt;&lt;span&gt; that we signed on to in April, the Saudi human rights organization &lt;a href=&quot;https://alqst.org/&quot;&gt;ALQST&lt;/a&gt;, which has been leading the campaign for Osama’s release, wrote: “The huge discrepancy between sentences handed down at different stages in the case underscores the arbitrary manner in which sentencing is carried out in the Saudi judicial system.”&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span&gt;So, what was his “crime”? Sharing information online that conflicted with official narratives. Osama’s Wikipedia contributions included pages on critical human rights issues in Saudi Arabia, including the treatment of women’s rights activist &lt;/span&gt;&lt;a href=&quot;https://www.eff.org/cases/alhathloul-v-darkmatter-group&quot;&gt;&lt;span&gt;Loujain al-Hathloul&lt;/span&gt;&lt;/a&gt;&lt;span&gt; (herself an EFF client) and Saudi Arabia’s infamous &lt;/span&gt;&lt;a href=&quot;https://en.wikipedia.org/wiki/Al-Ha%27ir_prison&quot;&gt;&lt;span&gt;al-Ha’ir prison&lt;/span&gt;&lt;/a&gt;&lt;span&gt;. His blog, which has since been taken offline, included articles such as one criticizing government plans for the surveillance of encrypted platforms.&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span&gt;Over the years, we’ve campaigned for the release of a number of individuals imprisoned for their speech. Our contributions to the campaigns of &lt;/span&gt;&lt;a href=&quot;https://www.eff.org/tags/ola-bini&quot;&gt;&lt;span&gt;Ola Bini&lt;/span&gt;&lt;/a&gt;&lt;span&gt;, the Swedish software developer who has been targeted by the government of Ecuador for the past seven years, and &lt;/span&gt;&lt;a href=&quot;https://www.eff.org/offline/alaa-abd-el-fattah&quot;&gt;&lt;span&gt;Alaa Abd El Fattah&lt;/span&gt;&lt;/a&gt;&lt;span&gt;, have had real impact. These cases are reminders that attacks on free expression are rarely confined to borders: governments around the world continue to use vague cybercrime laws, national security claims, and politically motivated prosecutions to silence critics, technologists, journalists, and activists.&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span&gt;Supporting these two—and others we’ve highlighted in our &lt;/span&gt;&lt;a href=&quot;https://www.eff.org/offline&quot;&gt;&lt;span&gt;Offline&lt;/span&gt;&lt;/a&gt;&lt;span&gt; project—has never been about defending only individuals. It has also been about defending the principle that writing code, sharing ideas, criticizing governments, and organizing online should not be treated as crimes. Public pressure, international solidarity, legal advocacy, and sustained campaigning can shift the political cost of repression—and, in some cases, help secure meaningful protections for those targeted.&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span&gt;That’s why we’re highlighting &lt;/span&gt;&lt;a href=&quot;https://www.eff.org/offline/osama-khalid&quot;&gt;&lt;span&gt;Osama’s case&lt;/span&gt;&lt;/a&gt;&lt;span&gt; and will continue to work with partners including ALQST to advocate for his release. Osama Khalid, like so many human rights defenders, journalists, and internet users detained by the Saudi government, deserves to be free.&lt;/span&gt;&lt;/p&gt;

&lt;/div&gt;&lt;/div&gt;&lt;/div&gt;</description>
     <pubDate>Tue, 12 May 2026 16:41:01 +0000</pubDate>
 <guid isPermaLink="false">112064 at https://www.eff.org</guid>
 <category domain="https://www.eff.org/issues/international">International</category>
 <category domain="https://www.eff.org/issues/free-speech">Free Speech</category>
 <category domain="https://www.eff.org/offline">Offline: Imprisoned Bloggers and Technologists</category>
 <dc:creator>Jillian C. York</dc:creator>
 <enclosure url="https://www.eff.org/files/banner_library/offline-osama-banner-1.jpg" alt="illustrated portrait of Osama Khalid" type="image/jpeg" length="30494" />
  </item>
  <item>
    <title>A Hackers Guide to Circumventing Internet Shutdowns </title>
    <link>https://www.eff.org/deeplinks/2026/05/hackers-guide-circumventing-internet-shutdowns</link>
    <description>&lt;div class=&quot;field field--name-body field--type-text-with-summary field--label-hidden&quot;&gt;&lt;div class=&quot;field__items&quot;&gt;&lt;div class=&quot;field__item even&quot;&gt;&lt;p&gt;&lt;span&gt;&lt;/span&gt;&lt;a href=&quot;https://www.eff.org/deeplinks/2026/04/digital-hopes-real-power-rise-network-shutdowns&quot;&gt;&lt;span&gt;Internet shutdowns are devastating&lt;/span&gt;&lt;/a&gt;&lt;span&gt; for &lt;/span&gt;&lt;a href=&quot;https://www.eff.org/deeplinks/2025/06/connectivity-lifeline-not-luxury-telecom-blackouts-gaza-threaten-lives-and-digital&quot;&gt;&lt;span&gt;human rights&lt;/span&gt;&lt;/a&gt;&lt;span&gt;. When people are disconnected from the internet and digital services, it impacts all aspects of their life—from accessing essential information, to seeking medical care, or communicating with loved ones, both in that country and externally. But on January 8th, 2026, the government of &lt;/span&gt;&lt;a href=&quot;https://www.eff.org/deeplinks/2026/01/eff-joins-47-internet-advocates-calling-iranian-government-restore-full-internet&quot;&gt;&lt;span&gt;Iran shut down internet communications&lt;/span&gt;&lt;/a&gt;&lt;span&gt; for the entire country as a rebellion threatened to topple the authoritarian government. The government then proceeded to execute &lt;/span&gt;&lt;a href=&quot;https://www.cbsnews.com/news/woman-iran-sentenced-death-protests-rights-groups/&quot;&gt;&lt;span&gt;as many as 656 dissidents over the next 3 months&lt;/span&gt;&lt;/a&gt;&lt;span&gt;, though the actual number could be much higher. Which is part of the point: shutdowns often precede government acts of violence. &lt;/span&gt;&lt;/p&gt;

&lt;p&gt;&lt;span&gt;Iran’s shutdown was hardly an isolated incident. Earlier this month, the U.S. military invaded Venezuela and kidnapped the Venezuelan president shortly after US cyber forces &lt;/span&gt;&lt;a href=&quot;https://securityaffairs.com/186509/intelligence/what-is-happening-to-the-internet-in-venezuela.html&quot;&gt;&lt;span&gt;shut down all internet access&lt;/span&gt;&lt;/a&gt;&lt;span&gt; and power grids for the capital city of Caracas. India routinely &lt;/span&gt;&lt;a href=&quot;https://www.reuters.com/world/living-stone-age-offline-18-months-indian-kashmir--trfn-2022-09-29/&quot;&gt;&lt;span&gt;shuts off internet access in the Kashmir region&lt;/span&gt;&lt;/a&gt;&lt;span&gt;, and Syria &lt;/span&gt;&lt;a href=&quot;https://www.eff.org/deeplinks/2015/06/research-shows-internet-shutdowns-and-state-violence-go-hand-hand-syria&quot;&gt;&lt;span&gt;shut down internet communications&lt;/span&gt;&lt;/a&gt;&lt;span&gt; as many as 73 times, most recently in 2025. Even the UK recently had a localized &lt;/span&gt;&lt;a href=&quot;https://pulse.internetsociety.org/en/shutdowns/shutdown-102/&quot;&gt;&lt;span&gt;temporary internet shutdown&lt;/span&gt;&lt;/a&gt;&lt;span&gt;. At the time of this writing there are &lt;/span&gt;&lt;a href=&quot;https://pulse.internetsociety.org/en/shutdowns/&quot;&gt;&lt;span&gt;14 ongoing internet shutdowns&lt;/span&gt;&lt;/a&gt;&lt;span&gt; worldwide.  &lt;/span&gt;&lt;/p&gt;

&lt;p&gt;&lt;span&gt;Government shutdowns aren’t the only reason an entire region or country might lose internet access. Hurricanes, earthquakes, and wildfires can take out internet connections in many regions of the world, and will only increase as climate change ramps up. They can completely disable the communications infrastructure relied upon by victims, their families, first responders, and disaster relief efforts. Having an alternate way to communicate in such times can save lives.  &lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span&gt;&lt;br /&gt;&lt;/span&gt;&lt;span&gt;One way to limit the impact of such shutdowns is to prepare in advance by setting up systems and structure for circumvention and resiliency. &lt;/span&gt;&lt;/p&gt;

&lt;p&gt;&lt;span&gt;To keep people connected during internet shutdowns and blackouts, communication networks must be operational before and after the disaster or shutdown. To be effective, they must be widespread so that people can get access to them reliably, and they must be usable by a majority of the community. And any viable solution must be accessible and sustainable on a community level, not just to people with vast financial resources or technical knowledge. You shouldn’t have to be a tech wizard to be able to communicate with your neighbors!&lt;/span&gt;&lt;/p&gt;
&lt;h2&gt;Radios&lt;/h2&gt;
&lt;p&gt;&lt;span&gt;There are many ways for a community to build their own disaster resilient communications. Radios, for example, are cheap, decentralized, and resilient. Many people with moderate technical skill have set up &lt;/span&gt;&lt;a href=&quot;https://meshtastic.org/&quot;&gt;&lt;span&gt;Meshtastic&lt;/span&gt;&lt;/a&gt;&lt;span&gt; repeaters. Meshtastic is a way to use a common unlicensed radio spectrum and a t&lt;/span&gt;&lt;a href=&quot;https://www.semtech.com/lora/what-is-lora&quot;&gt;&lt;span&gt;echnology called LoRA&lt;/span&gt;&lt;/a&gt;&lt;span&gt; to have peer-to-peer decentralized communications with people in your neighborhood or city. When you buy a Meshtastic device (cheap ones cost around $20) you can link it to your phone and send text messages to people in your area without ever touching the telephone network or the internet. Messages are delivered directly from person to person over public radio waves.&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span&gt;There is also &lt;/span&gt;&lt;a href=&quot;https://www.arrl.org/what-is-ham-radio&quot;&gt;&lt;span&gt;amateur radio,&lt;/span&gt;&lt;/a&gt;&lt;span&gt; also known as ham radio, which has been used in disaster communications for decades. Ham radio requires a license, but allows you to communicate farther than Meshtastic, using repeaters or even bouncing signals off the stratosphere to talk to people on the other side of the planet or even on the International Space Station. It is even possible to access the internet over ham radio. &lt;/span&gt;&lt;/p&gt;
&lt;h2&gt;Peer-to-peer messaging apps &lt;/h2&gt;
&lt;p&gt;&lt;span&gt;Another option for internet communication during a shutdown is peer-to-peer messaging apps. One such project,called &lt;/span&gt;&lt;a href=&quot;https://briarproject.org/&quot;&gt;&lt;span&gt;Briar&lt;/span&gt;&lt;/a&gt;&lt;span&gt;, uses the Bluetooth functionality on phones to route messages from device to device until they reach their destination, even in instances where there is no internet. However, Briar faces the same problems many mesh projects do: almost nobody has the app installed and it’s difficult to use. If a mesh chat app isn’t already widely installed before an internet shutdown, it’s going to be even harder to get people to install it en masse once the shutdown starts. &lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span&gt;A similar effort called &lt;/span&gt;&lt;a href=&quot;https://bitchat.free/&quot;&gt;&lt;span&gt;bitchat&lt;/span&gt;&lt;/a&gt;&lt;span&gt; has &lt;/span&gt;&lt;a href=&quot;https://techcrunch.com/2025/07/29/jack-dorseys-bluetooth-messaging-app-bitchat-now-on-app-store/&quot;&gt;&lt;span&gt;recently gained some attention&lt;/span&gt;&lt;/a&gt;&lt;span&gt;. Bitchat is a peer-to-peer chat system that routes over &lt;/span&gt;&lt;a href=&quot;https://nostr.com/&quot;&gt;&lt;span&gt;Nostr&lt;/span&gt;&lt;/a&gt;&lt;span&gt;, &lt;/span&gt;&lt;a href=&quot;https://www.torproject.org/download/&quot;&gt;&lt;span&gt;Tor&lt;/span&gt;&lt;/a&gt;&lt;span&gt;, and Bluetooth. It is unfortunately tainted in many people’s eyes by being a project by former Twitter CEO Jack Dorsey, but it is open source and runs on both Android and iOS. It was used with some success in &lt;/span&gt;&lt;a href=&quot;https://the-decenter.ghost.io/unplugging-a-nation-iranian-digital-workarounds-in-the-face-of-total-blackout/&quot;&gt;&lt;span&gt;Iran during the latest internet shutdown&lt;/span&gt;&lt;/a&gt;&lt;span&gt;. &lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span&gt;Another option is &lt;/span&gt;&lt;a href=&quot;https://delta.chat/&quot;&gt;&lt;span&gt;Delta Chat&lt;/span&gt;&lt;/a&gt;&lt;span&gt;, which uses PGP for encryption and email for routing, while still being much simpler to use than either technology. Delta Chat is highly regarded in Iran for its ability to route a message through even the tiniest sliver of email access.&lt;/span&gt;&lt;/p&gt;
&lt;h2&gt;&lt;span&gt;Satellite internet &lt;/span&gt;&lt;/h2&gt;
&lt;p&gt;&lt;span&gt;Satellite internet is an internet connection that uses a connection to a satellite dish to reach the internet, such as Starlink. Since there are no wires and no physical connection to infrastructure, satellite internet is harder to shut down. Satellite internet has therefore been used in &lt;/span&gt;&lt;a href=&quot;https://www.bbc.com/news/articles/cvgzk91leweo&quot;&gt;&lt;span&gt;many&lt;/span&gt;&lt;/a&gt; &lt;a href=&quot;https://www.accessnow.org/wp-content/uploads/2025/02/Holding-Space-for-Human-Rights-a-bid-for-better-governance-of-satellite-internet-connectivity.pdf&quot;&gt;&lt;span&gt;cases&lt;/span&gt;&lt;/a&gt;&lt;span&gt; to circumvent internet shutdowns, with people sharing bandwidth with their neighbors. Satellites are harder for governments to shut down unilaterally.  Unfortunately when the satellites are owned by tech oligarchs, such as Starlink (owned by Elon Musk), or by allied governments, the owners of those satellites may willingly &lt;/span&gt;&lt;a href=&quot;https://www.reuters.com/investigations/musk-ordered-shutdown-starlink-satellite-service-ukraine-retook-territory-russia-2025-07-25/&quot;&gt;&lt;span&gt;shut down the network&lt;/span&gt;&lt;/a&gt;&lt;span&gt; anyway. &lt;/span&gt;&lt;/p&gt;
&lt;h2&gt;Dreaming of a better future&lt;/h2&gt;
&lt;p&gt;&lt;span&gt;Ultimately an app that is already widely being used would be the best option for shutdown resistant communication. Imagine if WhatsApp or Signal could fall back to &lt;/span&gt;&lt;a href=&quot;https://www.silabs.com/software-and-tools/bluetooth-mesh-mobile-app?tab=overview&quot;&gt;&lt;span&gt;mesh networking over bluetooth or wifi&lt;/span&gt;&lt;/a&gt;&lt;span&gt;. Even better, imagine if our phones all had LoRA built in so we could have more effective mesh networks! What if our phones all had a connection to a satellite constellation run by an international coalition of hackers? We can dream of a better world and we can build it. &lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span&gt;We can’t rely on tech oligarchs to save us, especially when these same companies and governments are the ones to sever our access to the internet and telecommunications. This is why it&#039;s important to set up communication mechanisms before a disaster happens. &lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span&gt;As hackers, it&#039;s important for us to build these tools and infrastructure of decentralized communication, to help people learn how to use them, and to set up networks before disaster strikes. Get together with others in your city and start setting up resilient off-grid networks and building community now. &lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span&gt;Before you download or use any of the tools mentioned in this guide check with a lawyer in your jurisdiction or country and make sure you understand what legal risks you might be taking on. &lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;i&gt;&lt;span&gt;A previous version of this article appeared in the &lt;/span&gt;&lt;/i&gt;&lt;a href=&quot;https://2600.com/content/spring-issue-2600-released-20&quot;&gt;&lt;i&gt;&lt;span&gt;Spring 2026 issue of 2600 magazine&lt;/span&gt;&lt;/i&gt;&lt;/a&gt;&lt;i&gt;&lt;span&gt;. &lt;/span&gt;&lt;/i&gt;&lt;/p&gt;

&lt;/div&gt;&lt;/div&gt;&lt;/div&gt;</description>
     <pubDate>Tue, 12 May 2026 15:45:04 +0000</pubDate>
 <guid isPermaLink="false">112063 at https://www.eff.org</guid>
 <category domain="https://www.eff.org/issues/free-speech">Free Speech</category>
 <category domain="https://www.eff.org/issues/international">International</category>
 <dc:creator>Cooper Quintin</dc:creator>
 <enclosure url="https://www.eff.org/files/banner_library/free-speech-cat3.jpg" alt="EFF Cat Speaking Freely" type="image/jpeg" length="46271" />
  </item>
  <item>
    <title>Canada’s Bill C-22 Is a Repackaged Version of Last Year’s Surveillance Nightmare</title>
    <link>https://www.eff.org/deeplinks/2026/05/canadas-bill-c-22-repackaged-version-last-years-surveillance-nightmare</link>
    <description>&lt;div class=&quot;field field--name-body field--type-text-with-summary field--label-hidden&quot;&gt;&lt;div class=&quot;field__items&quot;&gt;&lt;div class=&quot;field__item even&quot;&gt;&lt;p&gt;&lt;span&gt;Last year, the &lt;/span&gt;&lt;a href=&quot;https://www.eff.org/deeplinks/2025/07/canadas-bill-c-2-opens-floodgates-us-surveillance&quot;&gt;&lt;span&gt;Canadian government pushed Bill C-2&lt;/span&gt;&lt;/a&gt;&lt;span&gt;, which would erode Canadian digital rights in the name of “border security.” The bill was so bad it didn’t even make it to committee because of the backlash from the privacy community. Now, the spring’s worst sequel, &lt;/span&gt;&lt;a href=&quot;https://www.parl.ca/DocumentViewer/en/45-1/bill/C-22/first-reading&quot;&gt;&lt;span&gt;Bill C-22&lt;/span&gt;&lt;/a&gt;&lt;span&gt;, aka The Lawful Access Act, is trying it again.&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span&gt;As with most sequels, Bill C-22 makes some tweaks to problematic elements, but largely retains the same problems. The bill forces digital services, which could include telecoms, messaging apps, and more, to record and retain &lt;/span&gt;&lt;a href=&quot;https://ssd.eff.org/module/why-metadata-matters&quot;&gt;&lt;span&gt;metadata&lt;/span&gt;&lt;/a&gt;&lt;span&gt; for a full year, and expands information sharing with foreign governments, including the United States. Metadata can reveal a lot about who you communicate with, where you go, and when you do so. Expanding the collection of metadata would require companies to store even more information about their users than they already do, providing an incentive for bad actors to access that information. &lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span&gt;Worst of all, Bill C-22 erodes the privacy of millions by providing a mechanism for the Minister of Public Safety to demand companies create a backdoor to their services to provide law enforcement access to data, as long as these mandates don’t introduce a “systemic vulnerability.” These widespread surveillance backdoors would likely facilitate even more data breaches than we see already. The bill also bans companies from even revealing the existence of these orders publicly.&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span&gt;The definitions of both “systemic vulnerabilities” and “encryption” are &lt;/span&gt;&lt;a href=&quot;https://www.parl.ca/DocumentViewer/en/45-1/bill/C-22/first-reading#ID0ELBA&quot;&gt;&lt;span&gt;not clear enough in C-22,&lt;/span&gt;&lt;/a&gt;&lt;span&gt; leaving wiggle room for the government to demand that companies circumvent encryption. And the overbroad definitions in the bill can include apps as well as operating systems. Canadian officials have &lt;/span&gt;&lt;a href=&quot;https://www.cbc.ca/news/politics/apple-argues-liberals-lawful-access-bill-could-put-users-personal-data-at-risk-9.7190092&quot;&gt;&lt;span&gt;made it clear&lt;/span&gt;&lt;/a&gt;&lt;span&gt; they believe it’s possible to add surveillance without introducing systemic vulnerabilities, which is just not true. Surveillance of encrypted communications is fundamentally a systemic vulnerability.&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span&gt;This resembles what happened in the UK last year, when &lt;/span&gt;&lt;a href=&quot;https://www.eff.org/deeplinks/2025/02/uks-demands-apple-break-encryption-emergency-us-all&quot;&gt;&lt;span&gt;the government demanded that Apple&lt;/span&gt;&lt;/a&gt;&lt;span&gt; implement this type of backdoor into its optional Advanced Data Protection feature, &lt;/span&gt;&lt;a href=&quot;https://www.eff.org/deeplinks/2025/02/cornered-uks-demand-encryption-backdoor-apple-turns-its-strongest-security-setting&quot;&gt;&lt;span&gt;which then forced Apple to revoke the feature&lt;/span&gt;&lt;/a&gt;&lt;span&gt; for its UK users instead of complying with the request. To this day, UK users still do not have access to this powerful, privacy-protective feature that provides stronger protections for data stored in iCloud. Both Meta and Apple are concerned that C-22 would give the Canadian governments similar powers, and both companies &lt;/span&gt;&lt;a href=&quot;https://www.reuters.com/legal/litigation/apple-warns-canadian-bill-could-force-it-weaken-device-encryption-2026-05-07/&quot;&gt;&lt;span&gt;have come out against the bill&lt;/span&gt;&lt;/a&gt;&lt;span&gt;. The U.S. House Judiciary and Foreign Affairs committees &lt;/span&gt;&lt;a href=&quot;https://justthenews.com/government/congress/exclusive-house-gop-warns-canada-its-new-cybersecurity-bill-could-pose-privacy&quot;&gt;&lt;span&gt;also sent a joint letter&lt;/span&gt;&lt;/a&gt;&lt;span&gt; to Canada’s Minister of Public Safety highlighting the concern around backdoors into encrypted systems.&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span&gt;The dangers of these sorts of backdoors are not theoretical. In 2024, &lt;/span&gt;&lt;a href=&quot;https://www.eff.org/deeplinks/2024/10/salt-typhoon-hack-shows-theres-no-security-backdoor-thats-only-good-guys&quot;&gt;&lt;span&gt;the Salt Typhoon hack&lt;/span&gt;&lt;/a&gt;&lt;span&gt; took advantage of a system built by Internet Service Providers to give law enforcement access to user data. When you build these systems, hackers will come.&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span&gt;Canadians deserve strong privacy protections, transparency into how companies handle user data, and clear safeguards around encrypted data. Bill C-22 provides none of that, instead reaching further into the digital pockets of tech companies to build broad lawful access mechanisms.&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span&gt;Further reading&lt;/span&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href=&quot;https://www.parl.ca/DocumentViewer/en/45-1/bill/C-22/first-reading&quot;&gt;&lt;span&gt;Full text of C-22&lt;/span&gt;&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&quot;https://ccla.org/privacy/coalition-to-mps-scrap-unprecedented-surveillance-measures/&quot;&gt;&lt;span&gt;Canadian Civil Liberties Association statement and letter&lt;/span&gt;&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&quot;https://openmedia.org/press/item/ottawa-repackages-its-surveillance-backdoor-in-bill-c-22&quot;&gt;&lt;span&gt;Open Media blog on C-22&lt;/span&gt;&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&quot;https://www.eff.org/deeplinks/2025/07/canadas-bill-c-2-opens-floodgates-us-surveillance&quot;&gt;&lt;span&gt;EFF’s blog on bill C-2&lt;/span&gt;&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;

&lt;/div&gt;&lt;/div&gt;&lt;/div&gt;</description>
     <pubDate>Mon, 11 May 2026 20:18:14 +0000</pubDate>
 <guid isPermaLink="false">112060 at https://www.eff.org</guid>
 <category domain="https://www.eff.org/issues/end-end-encryption">End-to-End Encryption</category>
 <category domain="https://www.eff.org/issues/privacy">Privacy</category>
 <dc:creator>Thorin Klosowski</dc:creator>
 <enclosure url="https://www.eff.org/files/banner_library/encryption-poc-chelsea-saunders.png" alt="People communicating on devices with encryption, art by Chelsea Saunders" type="image/png" length="194039" />
  </item>
  <item>
    <title>EFF to Fourth Circuit: Electronic Device Searches at the Border Require a Warrant</title>
    <link>https://www.eff.org/deeplinks/2026/05/eff-fourth-circuit-electronic-device-searches-border-require-warrant</link>
    <description>&lt;div class=&quot;field field--name-body field--type-text-with-summary field--label-hidden&quot;&gt;&lt;div class=&quot;field__items&quot;&gt;&lt;div class=&quot;field__item even&quot;&gt;&lt;p&gt;EFF, along with the national ACLU, the ACLU affiliates in Maryland, North Carolina, South Carolina, and Virginia, and the National Association of Criminal Defense Lawyers (NACDL) filed an &lt;a href=&quot;https://www.eff.org/document/2025-10-28-belmonte-cardozo-4th-cir-amicus-brief&quot;&gt;amicus brief&lt;/a&gt; in the U.S. Court of Appeals for the Fourth Circuit urging the court to require a warrant for border searches of electronic devices under the Fourth Amendment, an &lt;a href=&quot;https://www.eff.org/issues/border-searches&quot;&gt;argument&lt;/a&gt; EFF has been making in the &lt;a href=&quot;https://www.eff.org/cases/alasaad-v-duke?type=document#related-content&quot;&gt;courts&lt;/a&gt; and &lt;a href=&quot;https://www.eff.org/deeplinks/2021/10/come-back-warrant-congress-should-pass-protecting-data-border-act&quot;&gt;Congress&lt;/a&gt; for nearly a decade. The Fourth Circuit heard oral arguments on May 8. The Knight Institute at Columbia University and Reporters Committee for Freedom of the Press also filed a helpful brief focusing on the &lt;a href=&quot;https://knightcolumbia.org/cases/united-states-v-belmonte-cardozo&quot;&gt;First Amendment&lt;/a&gt; implications of border searches of electronic devices.&lt;/p&gt;
&lt;p&gt;The case, &lt;a href=&quot;https://www.courtlistener.com/docket/69894626/united-states-v-belmonte-cardozo/&quot;&gt;&lt;em&gt;U.S. v. Belmonte Cardozo&lt;/em&gt;&lt;/a&gt;, involves a U.S. citizen whose cell phone was manually searched after he arrived at Dulles airport near Washington, D.C., following a trip to Bolivia. He had been on the government’s radar prior to his international trip and had been flagged for secondary inspection. Border officers found child sexual abuse material (CSAM) on his phone, and he was later arrested and criminally charged.&lt;/p&gt;
&lt;p&gt;The district court denied the &lt;a href=&quot;https://knightcolumbia.org/documents/hfi9oh14e1&quot;&gt;defendant’s motion to suppress&lt;/a&gt; the images and other data obtained from the warrantless search of his cell phone. He was ultimately &lt;a href=&quot;https://www.ice.gov/news/releases/lorton-man-convicted-child-exploitation-gets-18-year-prison-sentence-following-ice&quot;&gt;convicted&lt;/a&gt; of child pornography and sexual exploitation of minors because he had used social media to entice minors to send him sexually explicit photos of themselves.&lt;/p&gt;
&lt;p&gt;The number of warrantless device searches at the border and the significant invasion of privacy they represent is only increasing. In Fiscal Year 2025, U.S. Customs and Border Protection (CBP) conducted &lt;a href=&quot;https://www.cbp.gov/sites/default/files/2025-10/Border%20Search%20of%20Electronics%20at%20Ports%20of%20Entry%20FY%2025%20Stats.pdf&quot;&gt;55,318 device searches&lt;/a&gt;, both manual (“basic”) and forensic (“advanced”).&lt;/p&gt;
&lt;p&gt;A manual search involves a border officer tapping or mousing around a device. A forensic search involves connecting &lt;a href=&quot;https://sls.eff.org/technologies/forensic-extraction-tools&quot;&gt;another device&lt;/a&gt; to the traveler’s device and using software to extract and analyze the data to create a detailed report the device owner’s activities and communications. However, both search methods are highly privacy-invasive, as border officers can access the same data that can reveal the most personal aspects of our lives, including political affiliations, religious beliefs and practices, sexual and romantic affinities, financial status, health conditions, and family and professional associations.&lt;/p&gt;
&lt;p&gt;In our &lt;a href=&quot;https://www.eff.org/document/2025-10-28-belmonte-cardozo-4th-cir-amicus-brief&quot;&gt;amicus brief&lt;/a&gt;, we argued that the Fourth Circuit should adopt the same legal standard for both manual and forensic searches, and that standard should be a warrant supported by probable cause and issued by a neutral judge. The highly personal nature of the information found on electronic devices is why there should not be &lt;em&gt;different&lt;/em&gt; legal standards for different methods of search, and why a judge should determine whether the government has provided credible preliminary evidence that there’s a likelihood that further evidence will be found on the device indicating wrongdoing by the specific traveler.&lt;/p&gt;
&lt;p&gt;Moreover, we argued that “the process of getting a warrant is not unduly burdensome,” and that “getting a warrant would not impede the efficient processing of travelers. If border officers have probable cause to search a device, they may retain it and let the traveler continue on their way, then get a search warrant. Or, where there is truly no time to go to a judge, the exigent circumstances exception may apply on a case-by-case basis.”&lt;/p&gt;
&lt;p&gt;The Fourth Circuit in prior cases only considered forensic device searches at the border. In &lt;a href=&quot;https://scholar.google.com/scholar_case?case=150597407311153261&quot;&gt;&lt;em&gt;U.S. v. Kolsuz &lt;/em&gt;(2018)&lt;/a&gt;, the court held that the forensic search of the defendant’s cell phone at the border “must be considered a nonroutine border search, requiring some measure of individualized suspicion” of a transnational offense, but the court declined to decide whether the standard is only reasonable suspicion or instead a probable cause warrant. Then in &lt;a href=&quot;https://scholar.google.com/scholar_case?case=8486127174869807366&quot;&gt;&lt;em&gt;U.S. v. Aigbekaen &lt;/em&gt;(2019)&lt;/a&gt;, the court held that a forensic device search at the border in support of a purely domestic law enforcement investigation requires a warrant. The court also reiterated the general &lt;em&gt;Kolsuz&lt;/em&gt; rule for a forensic border-related device search: the “Government must have individualized suspicion of an offense that bears some nexus to the border search exception&#039;s purposes of protecting national security, collecting duties, blocking the entry of unwanted persons, or disrupting efforts to export or import contraband.” Now, manual searches are before the court.&lt;/p&gt;
&lt;p&gt;In urging the Fourth Circuit to adopt a warrant standard for both manual and forensic device searches at the border, we argued that the U.S. Supreme Court’s balancing test in &lt;a href=&quot;https://scholar.google.com/scholar_case?case=8132273445572991924&quot;&gt;&lt;em&gt;Riley v. California &lt;/em&gt;(2014)&lt;/a&gt; should govern the analysis here. In that case, the Court weighed the government’s interests in warrantless and suspicionless access to cell phone data following an arrest, against an arrestee’s privacy interests in the depth and breadth of personal information stored on a cell phone. The Court concluded that the search-incident-to-arrest warrant exception does not apply, and that police need to get a warrant to search an arrestee’s phone.&lt;/p&gt;
&lt;p&gt;The U.S. Supreme Court has recognized for a century a border search exception to the Fourth Amendment’s warrant requirement, allowing not only warrantless but also often suspicionless &lt;a href=&quot;https://scholar.google.com/scholar_case?case=279694717208509367&quot;&gt;“routine” searches&lt;/a&gt; of luggage, vehicles, and other items crossing the border. The primary justification for the border search exception has been to find—in the items being searched—goods smuggled to avoid paying duties (i.e., taxes) and contraband such as drugs, weapons, and other prohibited items, thereby blocking their entry into the country.&lt;/p&gt;
&lt;p&gt;But a traveler’s privacy interests in their suitcase and its contents are minimal compared to those in all the personal data on the person’s cell phone or laptop. And a travelers’ privacy interests in their electronic devices are at least the same as those considered in &lt;em&gt;Riley&lt;/em&gt;. Modern devices, over a decade later, contain even more data that can reveal even more intimate details about our lives.&lt;/p&gt;
&lt;p&gt;We hope that the Fourth Circuit will rise to the occasion and be the first circuit to fully protect travelers’ Fourth Amendment rights at the border.&lt;/p&gt;

&lt;/div&gt;&lt;/div&gt;&lt;/div&gt;</description>
     <pubDate>Mon, 11 May 2026 20:12:50 +0000</pubDate>
 <guid isPermaLink="false">112062 at https://www.eff.org</guid>
 <category domain="https://www.eff.org/issues/border-searches">Border Searches</category>
 <dc:creator>Sophia Cope</dc:creator>
 <enclosure url="https://www.eff.org/files/banner_library/border-search-1_3.png" alt="" type="image/png" length="8426" />
  </item>
  <item>
    <title>EFF Stands in Solidarity With RightsCon and the Global Digital Rights Community</title>
    <link>https://www.eff.org/deeplinks/2026/05/eff-stands-solidarity-rightscon-and-global-digital-rights-community</link>
    <description>&lt;div class=&quot;field field--name-body field--type-text-with-summary field--label-hidden&quot;&gt;&lt;div class=&quot;field__items&quot;&gt;&lt;div class=&quot;field__item even&quot;&gt;&lt;p&gt;&lt;span&gt;When governments shut down spaces for dialogue, dissent, and collective organizing, the damage extends far beyond a single event. The &lt;/span&gt;&lt;a href=&quot;https://www.techpolicy.press/rightscon-canceled-after-zambia-requires-full-alignment-with-national-values/&quot;&gt;&lt;span&gt;abrupt cancellation&lt;/span&gt;&lt;/a&gt;&lt;span&gt; of &lt;/span&gt;&lt;a href=&quot;https://www.rightscon.org/&quot;&gt;&lt;span&gt;RightsCon&lt;/span&gt;&lt;/a&gt;&lt;span&gt; 2026—the world’s largest annual global digital rights conference—is not just a logistical disruption for thousands of researchers, journalists, technologists, and activists—it is part of a growing global pattern of shrinking civic space and increasing hostility toward free expression and independent civil society.&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span&gt;Just days before the conference was set to begin and as participants had begun to arrive in Lusaka, organizers &lt;/span&gt;&lt;a href=&quot;https://www.rightscon.org/rc26-statement/&quot;&gt;&lt;span&gt;announced&lt;/span&gt;&lt;/a&gt;&lt;span&gt; that RightsCon would no longer proceed in Zambia or online after mounting political pressure and demands that would have excluded vulnerable communities and constrained discussion. The U.N.’s World Press Freedom Day, which was set to take place just prior to the conference, was scaled down in light of the events, and its press freedom prize ceremony &lt;/span&gt;&lt;a href=&quot;https://www.semafor.com/article/05/01/2026/zambia-cancels-tech-and-rights-summit-over-taiwan-participation&quot;&gt;&lt;span&gt;postponed&lt;/span&gt;&lt;/a&gt;&lt;span&gt; to a later date.&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span&gt;RightsCon has long served as one of the few truly global convenings where civil society groups, grassroots organizers, technologists, and policymakers can meet on equal footing to confront some of the most urgent human rights challenges of the digital age—from censorship and surveillance to internet shutdowns, platform accountability, and the safety of marginalized communities online. EFF has had a presence at RightsCon since its inception in 2011, and had planned to meet with and learn from international partners and present our work during several sessions in Lusaka.&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span&gt;The cancellation is especially devastating because of what RightsCon represents. For many advocates—particularly those from the global majority—&lt;/span&gt;&lt;a href=&quot;https://www.theguardian.com/global-development/2026/may/02/zambia-cancels-rightscon-summit-largest-human-rights-technology-conference&quot;&gt;&lt;span&gt;it is not merely another conference&lt;/span&gt;&lt;/a&gt;&lt;span&gt;. It is a rare opportunity to build solidarity across borders, form lasting partnerships, learn from other regions’ experiences, secure funding and support for local work, and ensure that the people most impacted by digital repression have a seat at the table. Holding the event in southern Africa carried particular significance, promising to elevate regional voices and strengthen local digital rights networks.&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span&gt;What happened in Zambia sends a chilling message. According to &lt;/span&gt;&lt;a href=&quot;https://www.rightscon.org/rc26-statement/&quot;&gt;&lt;span&gt;organizers&lt;/span&gt;&lt;/a&gt;&lt;span&gt; and &lt;/span&gt;&lt;a href=&quot;https://www.wired.com/story/the-chinese-government-pressured-zambia-to-cancel-the-worlds-largest-digital-rights-conference/&quot;&gt;&lt;span&gt;multiple&lt;/span&gt;&lt;/a&gt;&lt;span&gt; reports, the pressure surrounding the event included Chinese government demands to exclude Taiwanese participants and moderate discussions around politically sensitive topics. At a moment when governments around the world are increasingly restricting protest, targeting journalists, cutting funds for human rights work, banning young people from online communities, censoring speech, and criminalizing civil society activity, the cancellation of RightsCon reflects the broader erosion of democratic space online and offline.&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span&gt;Organizations from the digital rights community have spoken out forcefully against the government’s cancellation of the conference, making clear that these attacks on civic participation will not pass unnoticed. &lt;/span&gt;&lt;a href=&quot;https://www.rightscon.org/rc26-statement/&quot;&gt;&lt;span&gt;Access Now&lt;/span&gt;&lt;/a&gt;&lt;span&gt; described the decision as evidence of “the far reach of transnational repression targeting civil society.” &lt;/span&gt;&lt;a href=&quot;https://www.indexoncensorship.org/2026/04/zambia-censors-an-international-conferenceon-censorship/&quot;&gt;&lt;span&gt;Index on Censorship&lt;/span&gt;&lt;/a&gt;&lt;span&gt;’s response warned that the move represents a dangerous escalation in attempts to suppress open dialogue, while &lt;/span&gt;&lt;a href=&quot;https://ifex.org/rightscon-2026-cancellation-is-a-blow-to-civil-society-free-expression-and-the-right-to-assembly-everywhere/&quot;&gt;&lt;span&gt;IFEX&lt;/span&gt;&lt;/a&gt;&lt;span&gt; rightly described the cancellation as a blow not just to one conference, but to freedom of expression and assembly everywhere.&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span&gt;We are also heartened to see statements from members of the international community—including &lt;/span&gt;&lt;a href=&quot;https://akademie.dw.com/en/righscon-cancelled-this-is-going-to-spread-on-the-african-continent-like-a-veld-fire/a-77048428&quot;&gt;&lt;span&gt;Tabani Moyo&lt;/span&gt;&lt;/a&gt;&lt;span&gt;, who spoke about the impact on the southern African community, and Taiwanese participant &lt;/span&gt;&lt;a href=&quot;https://www.eff.org/pages/speaking-freely-shin-yang&quot;&gt;&lt;span&gt;Shin Yang&lt;/span&gt;&lt;/a&gt;&lt;span&gt;, who &lt;/span&gt;&lt;a href=&quot;https://lezismore.org/rightscon2026-statement/&quot;&gt;&lt;span&gt;emphasized&lt;/span&gt;&lt;/a&gt;&lt;span&gt; the importance of preserving spaces where marginalized communities can safely organize and speak—underscoring that attempts to silence civil society only reinforce the importance of defending open, global spaces for organizing and debate.&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span&gt;Even as this cancellation represents a serious setback, it is important to remember that the digital rights community has always adapted under pressure. Around the world, advocates continue to organize in increasingly difficult environments, &lt;/span&gt;&lt;a href=&quot;https://www.techpolicy.press/rightscon-organizers-take-stock-of-whats-next-after-zambia/&quot;&gt;&lt;span&gt;finding new ways to connect&lt;/span&gt;&lt;/a&gt;&lt;span&gt;, collaborate, and resist censorship and repression. Upcoming events like the &lt;/span&gt;&lt;a href=&quot;https://gathering.digitalrights.community/&quot;&gt;&lt;span&gt;Global Gathering&lt;/span&gt;&lt;/a&gt;&lt;span&gt; and &lt;/span&gt;&lt;a href=&quot;https://internetfreedom.africa/&quot;&gt;&lt;span&gt;FIFAfrica&lt;/span&gt;&lt;/a&gt;&lt;span&gt;—both of which EFF plans to attend—will bring together members of the community to tackle tough issues. And in the meantime, groups from all over the world are working together to &lt;/span&gt;&lt;a href=&quot;http://eff.org/deeplinks/2026/01/dsa-human-rights-alliance-publishes-principles-calling-dsa-enforcement-1&quot;&gt;&lt;span&gt;incorporate global perspectives into platform regulations&lt;/span&gt;&lt;/a&gt;&lt;span&gt;, &lt;/span&gt;&lt;a href=&quot;https://www.eff.org/deeplinks/2026/05/eff-and-18-organizations-urge-uk-policymakers-prioritize-addressing-roots-online&quot;&gt;&lt;span&gt;oppose age verification laws&lt;/span&gt;&lt;/a&gt;&lt;span&gt;, &lt;/span&gt;&lt;a href=&quot;https://www.amnesty.org/en/latest/news/2014/04/questions-and-answers-coalition-against-unlawful-surveillance-exports-cause/&quot;&gt;&lt;span&gt;protect against surveillance&lt;/span&gt;&lt;/a&gt;&lt;span&gt;, and &lt;/span&gt;&lt;a href=&quot;https://www.accessnow.org/campaign/keepiton/&quot;&gt;&lt;span&gt;fight internet shutdowns&lt;/span&gt;&lt;/a&gt;&lt;span&gt;, among many other efforts.&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span&gt;RightsCon itself emerged from a recognition that defending human rights in the digital age requires international solidarity—and that need has not disappeared.&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span&gt;The conversations that were supposed to happen in Lusaka will continue elsewhere: in community spaces, online gatherings, encrypted chats, and future convenings yet to come. Governments may close venues, restrict participation, or attempt to narrow the boundaries of acceptable speech, but they cannot erase the global movement working to defend a free and open internet.&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span&gt;RightsCon will not go on in Zambia, but we remain heartened and inspired by the strength of the global digital rights community, stand with them in solidarity, and look forward to seeing our allies at the next RightsCon and other upcoming events.&lt;/span&gt;&lt;/p&gt;

&lt;/div&gt;&lt;/div&gt;&lt;/div&gt;</description>
     <pubDate>Mon, 11 May 2026 17:37:05 +0000</pubDate>
 <guid isPermaLink="false">112059 at https://www.eff.org</guid>
 <category domain="https://www.eff.org/issues/international">International</category>
 <category domain="https://www.eff.org/issues/free-speech">Free Speech</category>
 <category domain="https://www.eff.org/issues/privacy">Privacy</category>
 <dc:creator>Electronic  Frontier Foundation</dc:creator>
 <enclosure url="https://www.eff.org/files/banner_library/og-protesters.png" alt="" type="image/png" length="17929" />
  </item>
  <item>
    <title>Congress Narrowed the GUARD Act, But Serious Problems Remain</title>
    <link>https://www.eff.org/deeplinks/2026/05/congress-narrowed-guard-act-serious-problems-remain</link>
    <description>&lt;div class=&quot;field field--name-body field--type-text-with-summary field--label-hidden&quot;&gt;&lt;div class=&quot;field__items&quot;&gt;&lt;div class=&quot;field__item even&quot;&gt;&lt;p&gt;&lt;span&gt;&lt;/span&gt;&lt;span&gt;Following criticism, lawmakers have narrowed the &lt;a href=&quot;https://www.judiciary.senate.gov/imo/media/doc/496d2b5e-f099-39eb-317d-d8ab2704ee82/OLL26484_Mgrs.pdf&quot;&gt;GUARD Act&lt;/a&gt;, a bill aimed at restricting minors’ access to certain AI systems. The &lt;/span&gt;&lt;a href=&quot;https://www.eff.org/deeplinks/2026/04/guard-act-isnt-targeting-dangerous-ai-its-blocking-everyday-internet-use&quot;&gt;&lt;span&gt;earlier version could have applied broadly&lt;/span&gt;&lt;/a&gt;&lt;span&gt; to nearly every AI-powered chatbot or search tool. The amended bill focuses more narrowly on so-called “AI companions”—conversational systems designed to simulate emotional or interpersonal interactions with users. &lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span&gt;That change does address some of the broadest concerns raised about the original proposal, though some questions about the bill’s reach remain. Bottom line: the revised bill still creates serious problems for privacy, online speech, and parental choice.&lt;/span&gt;&lt;/p&gt;
&lt;p class=&quot;take-action&quot;&gt;&lt;a href=&quot;https://act.eff.org/action/tell-congress-oppose-the-guard-act&quot; target=&quot;_blank&quot; rel=&quot;noopener noreferrer&quot;&gt;TAKE ACTION&lt;/a&gt;&lt;/p&gt;
&lt;p class=&quot;take-explainer&quot;&gt;&lt;a href=&quot;https://act.eff.org/action/tell-congress-oppose-the-guard-act&quot; target=&quot;_blank&quot; rel=&quot;noopener noreferrer&quot;&gt;Tell Congress: oppose the guard act&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;span&gt;The new GUARD Act still requires companies offering AI companions to implement burdensome age-verification systems tied to users’ real-world identities. Even parents who specifically want their teenagers to use these systems would still face significant hurdles. A family might decide that a conversational AI tool helps an isolated teenager practice social interaction, or engage in harmless creative roleplay. A parent deployed in the military might set up a persistent AI storyteller for a younger child. Under the revised bill, those users could still face mandatory age checks tied to sensitive personal or financial information before they or their children can use these services.&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span&gt;The revised bill also leaves important definitions unclear while sharply increasing penalties for developers and companies that get those judgments wrong. Congress narrowed the GUARD Act. But it is still trying to solve a complicated social problem with vague legal standards, heavy liability, and privacy-invasive verification systems.&lt;/span&gt;&lt;/p&gt;
&lt;h3&gt;&lt;b&gt;Intrusive Age-Verification Remains In The Bill&lt;/b&gt;&lt;/h3&gt;
&lt;p&gt;&lt;span&gt;The revised GUARD Act still requires companies offering AI companions to verify that users are adults through a “reasonable age verification” system. The bill allows a broader set of verification methods than the earlier version, but they are still tied to a user’s real-world identity—such as financial records, or age-verified accounts for a mobile operating system or app store. &lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span&gt;That approach still raises serious privacy and access concerns. Millions of Americans do not have current government ID, accounts at major banks, or stable access to the kinds of digital identity systems the bill contemplates. Even for those who do, requiring identity-linked verification to access online speech tools creates real risks for privacy, anonymity, and data security. Many people are &lt;/span&gt;&lt;a href=&quot;https://www.eff.org/pages/age-verification-systems-are-surveillance-systems#main-content&quot;&gt;&lt;span&gt;rightly creeped out&lt;/span&gt;&lt;/a&gt;&lt;span&gt; by age-verification systems, and may simply forgo using these services rather than compromise their privacy and security.&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span&gt;The revised definition of “AI companion” is also narrower than before, but it’s unclear at the margins. The bill now focuses on systems that “engage in interactions involving emotional disclosures” from the user, or present a “persistent identity, persona or character.” &lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span&gt;EFF appreciates that the authors recognized that the prior definition could reach a variety of AI systems that are not chatbots, including internet search engines. But the narrowed definition could be read to also apply to a variety of chat tools that are not AI companions. For example, many modern online conversational systems increasingly recognize and respond to users’ emotions. Customer service systems, including completely human-powered ones that existed long before AI chatbots, have long been designed to recognize frustration and respond empathetically. As conversational AI becomes more emotionally responsive, a customer service chatbot’s efforts to empathize may sweep it within the bill’s definition. &lt;/span&gt;&lt;/p&gt;
&lt;h3&gt;&lt;b&gt;Bigger Penalties, Bigger Incentives To Restrict Access&lt;/b&gt;&lt;/h3&gt;
&lt;p&gt;&lt;span&gt;The revised bill also sharply increases penalties. Instead of $100,000 per violation, companies—including small developers—can face fines of up to $250,000 per violation, enforced by both federal and state officials.&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span&gt;That kind of liability creates incentives to over-restrict access, especially for minors. Smaller developers, in particular, may decide it is safer to block younger users entirely, disable conversational features, or avoid developing certain tools at all, rather than risk severe penalties under vague standards.&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span&gt;The concerns driving this bill are real. Some AI systems have engaged in troubling interactions with vulnerable users, including minors. But the right answer to that is targeted enforcement against bad actors, and privacy laws that protect us all. The revised GUARD Act instead responds with a privacy-invasive system that burdens the right to speak, read, and interact online.&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span&gt;Congress did improve this bill, but EFF’s core speech, privacy, and security issues remain.&lt;/span&gt;&lt;/p&gt;
&lt;p class=&quot;take-action&quot;&gt;&lt;a href=&quot;https://act.eff.org/action/tell-congress-oppose-the-guard-act&quot; target=&quot;_blank&quot; rel=&quot;noopener noreferrer&quot;&gt;TAKE ACTION&lt;/a&gt;&lt;/p&gt;
&lt;p class=&quot;take-explainer&quot;&gt;&lt;a href=&quot;https://act.eff.org/action/tell-congress-oppose-the-guard-act&quot; target=&quot;_blank&quot; rel=&quot;noopener noreferrer&quot;&gt;Tell Congress: oppose the guard act&lt;/a&gt;&lt;/p&gt;

&lt;/div&gt;&lt;/div&gt;&lt;/div&gt;</description>
     <pubDate>Fri, 08 May 2026 23:24:31 +0000</pubDate>
 <guid isPermaLink="false">112058 at https://www.eff.org</guid>
 <category domain="https://www.eff.org/issues/privacy">Privacy</category>
 <dc:creator>Joe Mullin</dc:creator>
 <enclosure url="https://www.eff.org/files/banner_library/age_verification-cell_phone-access_denied.png" alt="A blue hand holding a cellphone showing a verification screen and ACCESS DENIED in the background" type="image/png" length="990456" />
  </item>
  <item>
    <title>Free Signal Guide</title>
    <link>https://www.eff.org/deeplinks/2026/05/free-sginal-guide</link>
    <description>&lt;div class=&quot;field field--name-body field--type-text-with-summary field--label-hidden&quot;&gt;&lt;div class=&quot;field__items&quot;&gt;&lt;div class=&quot;field__item even&quot;&gt;&lt;p&gt;&lt;span data-contrast=&quot;none&quot;&gt;EFF friend Guy Kawasaki* has written a book: &lt;/span&gt;&lt;i&gt;&lt;span data-contrast=&quot;none&quot;&gt;Everybody Has Something to Hide: Why and How to Use Signal to Preserve Your Privacy, Security, and Well-Being.&lt;/span&gt;&lt;/i&gt;&lt;span data-contrast=&quot;none&quot;&gt; This guide is now available in Spanish and English as an ebook in the EPUB format that you can download here. Take a look and consider sharing it with anyone who you know who uses (or should use) Signal.&lt;/span&gt;&lt;span data-ccp-props=&quot;{}&quot;&gt; &lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span data-contrast=&quot;auto&quot;&gt;And don&#039;t forget: EFF has two short guides on using Signal on our Surveillance Self-Defense site. An intro&lt;/span&gt;&lt;span data-contrast=&quot;none&quot;&gt; &lt;/span&gt;&lt;a href=&quot;https://ssd.eff.org/module/how-to-use-signal&quot;&gt;&lt;span data-contrast=&quot;none&quot;&gt;How to Use Signal&lt;/span&gt;&lt;/a&gt;&lt;span data-contrast=&quot;none&quot;&gt; &lt;/span&gt;&lt;span data-contrast=&quot;auto&quot;&gt;guide, and a guide on&lt;/span&gt;&lt;span data-contrast=&quot;none&quot;&gt; &lt;/span&gt;&lt;a href=&quot;https://ssd.eff.org/module/creating-and-managing-signal-groups&quot;&gt;&lt;span data-contrast=&quot;none&quot;&gt;Managing Signal Groups&lt;/span&gt;&lt;/a&gt;&lt;span data-contrast=&quot;none&quot;&gt;.&lt;/span&gt;&lt;span data-ccp-props=&quot;{}&quot;&gt; &lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;i&gt;&lt;span data-contrast=&quot;none&quot;&gt;Everybody Has Something to Hide: Why and How to Use Signal to Preserve Your Privacy, Security, and Well-Being&lt;/span&gt;&lt;/i&gt;&lt;span data-contrast=&quot;none&quot;&gt; courtesy of Guy Kawasaki.&lt;/span&gt;&lt;span data-ccp-props=&quot;{}&quot;&gt; &lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span data-ccp-props=&quot;{}&quot;&gt;*Guy Kawasaki is an EFF donor.&lt;/span&gt;&lt;/p&gt;

&lt;/div&gt;&lt;/div&gt;&lt;/div&gt;</description>
     <pubDate>Fri, 08 May 2026 17:23:00 +0000</pubDate>
 <guid isPermaLink="false">112055 at https://www.eff.org</guid>
 <category domain="https://www.eff.org/issues/privacy">Privacy</category>
 <category domain="https://www.eff.org/issues/end-end-encryption">End-to-End Encryption</category>
 <dc:creator>Allison Morris</dc:creator>
 <enclosure url="https://www.eff.org/files/banner_library/signal-logo-3b.jpg" alt="The Signal logo on a screen" type="image/jpeg" length="94846" />
  </item>
  <item>
    <title>Milestone 1.0.0 Release of APK Downloader `apkeep` Powers Research on Android Apps</title>
    <link>https://www.eff.org/deeplinks/2026/05/milestone-100-release-apk-downloader-apkeep-powers-research-android-apps</link>
    <description>&lt;div class=&quot;field field--name-body field--type-text-with-summary field--label-hidden&quot;&gt;&lt;div class=&quot;field__items&quot;&gt;&lt;div class=&quot;field__item even&quot;&gt;&lt;p&gt;&lt;span&gt;Last week, we released &lt;/span&gt;&lt;a href=&quot;https://github.com/EFForg/apkeep&quot;&gt;&lt;span&gt;apkeep&lt;/span&gt;&lt;/a&gt;&lt;span&gt; version &lt;/span&gt;&lt;a href=&quot;https://github.com/EFForg/apkeep/releases/tag/1.0.0&quot;&gt;&lt;span&gt;1.0.0&lt;/span&gt;&lt;/a&gt;&lt;span&gt;, the latest edition of our command-line Android package downloading software. Rather than indicating major changes for the project, this milestone instead signifies arriving at a relatively stable and mature place after gradual iteration on the project over the course of over four years.&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt;What’s New in &lt;/b&gt;&lt;a href=&quot;https://github.com/EFForg/apkeep/releases/tag/1.0.0&quot;&gt;&lt;b&gt;1.0.0&lt;/b&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;span&gt;We do have a few fresh features we’ve packed into this latest release, though—all focused on the Google Play Store: &lt;/span&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;span&gt;You &lt;/span&gt;&lt;a href=&quot;https://github.com/EFForg/apkeep/pull/221&quot;&gt;&lt;span&gt;can now download&lt;/span&gt;&lt;/a&gt;&lt;span&gt; a &lt;/span&gt;&lt;a href=&quot;https://source.android.com/docs/core/runtime/configure&quot;&gt;&lt;span&gt;dex metadata&lt;/span&gt;&lt;/a&gt;&lt;span&gt; file associated with an app containing a &lt;/span&gt;&lt;a href=&quot;https://docs.cloud.google.com/profiler/docs&quot;&gt;&lt;span&gt;Cloud Profile&lt;/span&gt;&lt;/a&gt;&lt;span&gt;, which provides information on app performance based on real usage. &lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span&gt;You can now provide a token generated by the &lt;/span&gt;&lt;a href=&quot;https://store.auroraoss.com/&quot;&gt;&lt;span&gt;Aurora Store’s&lt;/span&gt;&lt;/a&gt; &lt;a href=&quot;https://gitlab.com/AuroraOSS/aurora-dispenser&quot;&gt;&lt;span&gt;dispenser&lt;/span&gt;&lt;/a&gt;&lt;span&gt; to log in anonymously for app downloads. &lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span&gt;Users can &lt;/span&gt;&lt;a href=&quot;https://github.com/EFForg/apkeep/commit/7aa5af6ca5dd1435188820749399cfdc3cd7f708&quot;&gt;&lt;span&gt;specify their own&lt;/span&gt;&lt;/a&gt; &lt;a href=&quot;https://auroraoss.com/config-generator&quot;&gt;&lt;span&gt;device profiles&lt;/span&gt;&lt;/a&gt;&lt;span&gt; when downloading apps from Google Play, which the store uses to deliver the app variant which works for your particular device specifications. &lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span&gt;We’ve also &lt;/span&gt;&lt;a href=&quot;https://github.com/EFForg/rs-google-play/commit/fc64b7ff834280cb310578a9204e4a88a3cd1e8c&quot;&gt;&lt;span&gt;fixed&lt;/span&gt;&lt;/a&gt;&lt;span&gt; an authentication bug introduced by the Play Store API.&lt;/span&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;span&gt;In addition to the various Linux, Windows, and Android environments we support, we’re also happy to announce that since the last release in October we’ve been &lt;/span&gt;&lt;a href=&quot;https://formulae.brew.sh/formula/apkeep&quot;&gt;&lt;span&gt;included in Homebrew&lt;/span&gt;&lt;/a&gt;&lt;span&gt; for macOS users!&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt;How Researchers Use &lt;/b&gt;&lt;b&gt;apkeep&lt;/b&gt;&lt;b&gt; to Understand the Android App Landscape&lt;/b&gt;&lt;/p&gt;
&lt;p&gt;&lt;span&gt;Researchers and users contributed most of the features of this release, including downloading dex metadata containing Google’s Cloud Profiles. This feature helps them use the tool in &lt;/span&gt;&lt;a href=&quot;https://themoep.at/research/2025-profile-coverage.pdf&quot;&gt;&lt;span&gt;their own research&lt;/span&gt;&lt;/a&gt;&lt;span&gt; of highlighting how these Android compilation profiles can be a vital source of information for evaluating dynamic testing. Numerous other projects have cited &lt;/span&gt;&lt;span&gt;apkeep&lt;/span&gt;&lt;span&gt; usage in their own workflows. For example, &lt;/span&gt;&lt;a href=&quot;https://exodus-privacy.eu.org/en/&quot;&gt;&lt;span&gt;Exodus Privacy&lt;/span&gt;&lt;/a&gt;&lt;span&gt; uses it to power the &lt;/span&gt;&lt;a href=&quot;https://reports.exodus-privacy.eu.org/en/&quot;&gt;&lt;span&gt;εxodus&lt;/span&gt;&lt;/a&gt;&lt;span&gt; tool’s downloads when they monitor the privacy properties of apps. Various research &lt;/span&gt;&lt;a href=&quot;https://arxiv.org/pdf/2604.27830&quot;&gt;&lt;span&gt;teams&lt;/span&gt;&lt;/a&gt; &lt;a href=&quot;https://martina.lindorfer.in/files/papers/cct_secweb22.pdf&quot;&gt;&lt;span&gt;have&lt;/span&gt;&lt;/a&gt; &lt;a href=&quot;https://ieeexplore.ieee.org/stamp/stamp.jsp?arnumber=11193830&quot;&gt;&lt;span&gt;noted&lt;/span&gt;&lt;/a&gt;&lt;span&gt; their own use of the tool in whitepapers, including one team who &lt;/span&gt;&lt;a href=&quot;https://s3.eurecom.fr/docs/asiaccs24_ruggia.pdf&quot;&gt;&lt;span&gt;used the tool&lt;/span&gt;&lt;/a&gt;&lt;span&gt; to download 21,154 apps in a widespread study of Android evasive malware. We are proud to provide a reliable tool in the toolbox they use to power their work.&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt;What’s in Store fo&lt;/b&gt;&lt;strong&gt;r apkeep?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;&lt;span&gt;Our goals with &lt;/span&gt;&lt;span&gt;apkeep&lt;/span&gt;&lt;span&gt; have remained constant: provide a reliable, fast, and safe way to download apps from multiple app providers, not just the Google Play Store. While we’ve focused on it as the major Android app provider of choice across much of the world, we’ve expanded support to other stores as well, such as &lt;/span&gt;&lt;a href=&quot;https://f-droid.org/&quot;&gt;&lt;span&gt;F-Droid&lt;/span&gt;&lt;/a&gt;&lt;span&gt; for &lt;/span&gt;&lt;a href=&quot;https://github.com/EFForg/apkeep/blob/master/USAGE-fdroid.md&quot;&gt;&lt;span&gt;downloading&lt;/span&gt;&lt;/a&gt;&lt;span&gt; open source apps. We’d like to continue broadening &lt;/span&gt;&lt;span&gt;apkeep&lt;/span&gt;&lt;span&gt;’s list of supported providers, to make it easy to do comparative analysis of apps provided in different contexts. For this, &lt;/span&gt;&lt;a href=&quot;https://github.com/EFForg/apkeep&quot;&gt;&lt;span&gt;we’d love your contributions&lt;/span&gt;&lt;/a&gt;&lt;span&gt;.&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt;How You Can Help&lt;/b&gt;&lt;/p&gt;
&lt;p&gt;&lt;span&gt;If you’re using &lt;/span&gt;&lt;span&gt;apkeep&lt;/span&gt;&lt;span&gt; as part of your own toolbox (whether using it to do malware analysis, auditing apps, or simply using it as an app archiving tool), &lt;/span&gt;&lt;a href=&quot;https://github.com/EFForg/apkeep/issues/202&quot;&gt;&lt;span&gt;let us know&lt;/span&gt;&lt;/a&gt;&lt;span&gt;! And if you like what we do, please consider &lt;/span&gt;&lt;a href=&quot;https://supporters.eff.org/donate/&quot;&gt;&lt;span&gt;donating to EFF&lt;/span&gt;&lt;/a&gt;&lt;span&gt; to support our work.&lt;/span&gt;&lt;/p&gt;

&lt;/div&gt;&lt;/div&gt;&lt;/div&gt;</description>
     <pubDate>Wed, 06 May 2026 22:44:48 +0000</pubDate>
 <guid isPermaLink="false">112054 at https://www.eff.org</guid>
 <category domain="https://www.eff.org/taxonomy/term/68">Announcement</category>
 <dc:creator>Bill Budington</dc:creator>
 <enclosure url="https://www.eff.org/files/banner_library/apkeep-logo-final-banner_0.jpg" alt="File folder with two bugs and a magnifying glass" type="image/jpeg" length="172948" />
  </item>
  <item>
    <title>👎 California&#039;s Terrible, No Good, Very Bad Social Media Ban | EFFector 38.9</title>
    <link>https://www.eff.org/deeplinks/2026/05/californias-terrible-no-good-very-bad-social-media-ban-effector-389</link>
    <description>&lt;div class=&quot;field field--name-body field--type-text-with-summary field--label-hidden&quot;&gt;&lt;div class=&quot;field__items&quot;&gt;&lt;div class=&quot;field__item even&quot;&gt;&lt;p&gt;We&#039;d all like the internet to be a better place—for kids and adults alike. But in the name of online safety, governments around the world are racing to impose a dangerous new system of control. &lt;span&gt;Are age gates the silver bullet to the internet&#039;s problems they&#039;re being promoted as? Or are we being sold a bill of goods? We&#039;re answering this question and more in &lt;a href=&quot;https://www.eff.org/effector/38/9&quot;&gt;our latest EFFector newsletter&lt;/a&gt;.&lt;/span&gt;&lt;/p&gt;
&lt;p class=&quot;take-action&quot;&gt;&lt;a href=&quot;https://www.eff.org/effector/&quot;&gt;JOIN OUR NEWSLETTER&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;span&gt;For over 35 years, &lt;a href=&quot;https://eff.org/effector&quot;&gt;EFFector&lt;/a&gt; has been your guide to understanding the intersection of technology, civil liberties, and the law. This latest issue covers a&lt;span&gt;n attack on &lt;a href=&quot;https://www.eff.org/deeplinks/2026/04/utahs-new-law-regulating-vpns-goes-effect-next-week&quot;&gt;VPNs in Utah&lt;/a&gt;, a livestream on &lt;a href=&quot;https://www.eff.org/event/effecting-change-enshittification&quot;&gt;how to disenshittify the internet&lt;/a&gt;, and California&#039;s proposed &lt;a href=&quot;https://www.eff.org/deeplinks/2026/04/act-now-stop-californias-paternalistic-and-privacy-destroying-social-media-ban&quot;&gt;social media ban&lt;/a&gt; that could set a dangerous new precedent for online censorship.&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;Prefer to listen in? EFFector is now available on all major podcast platforms. This time, we&#039;re having a conversation with EFF Legislative Analyst Molly Buckley &lt;span&gt;on why social media bans can&#039;t sidestep the U.S. constitution&lt;/span&gt;. You can find the episode and subscribe&lt;span&gt; &lt;/span&gt;&lt;a href=&quot;https://effector.simplecast.com/&quot;&gt;on your podcast platform of choice&lt;/a&gt;:&lt;/p&gt;
&lt;p&gt;&lt;div class=&quot;mytube&quot; style=&quot;width: 100%px;&quot;&gt;
  &lt;div class=&quot;mytubetrigger&quot; tabindex=&quot;0&quot;&gt;

    &lt;img src=&quot;https://www.eff.org/sites/all/modules/custom/mytube/play.png&quot; class=&quot;mytubeplay&quot; alt=&quot;play&quot; style=&quot;top: 70px; left: 20px;&quot; /&gt;
    &lt;div hidden class=&quot;mytubeembedcode&quot;&gt;%3Ciframe%20height%3D%22200px%22%20width%3D%22100%25%22%20frameborder%3D%22no%22%20scrolling%3D%22no%22%20seamless%3D%22%22%20src%3D%22https%3A%2F%2Fplayer.simplecast.com%2F07b61711-d8ff-4483-aee3-21daa5a3ea22%3Fdark%3Dfalse%22%20allow%3D%22autoplay%22%3E%3C%2Fiframe%3E&lt;/div&gt;
  &lt;/div&gt;
  &lt;div class=&quot;mytubetext&quot;&gt;
    &lt;span&gt;&lt;a href=&quot;https://www.eff.org/deeplinks/2008/02/embedded-video-and-your-privacy&quot; rel=&quot;noreferrer&quot; target=&quot;_blank&quot;&gt;Privacy info.&lt;/a&gt;&lt;/span&gt;
    &lt;span&gt;This embed will serve content from &lt;em&gt;&lt;a rel=&quot;nofollow&quot; href=&quot;https://player.simplecast.com/07b61711-d8ff-4483-aee3-21daa5a3ea22?dark=false&quot;&gt;simplecast.com&lt;/a&gt;&lt;/em&gt;&lt;br /&gt;&lt;/span&gt;
  &lt;/div&gt;
&lt;/div&gt;
&lt;/p&gt;
&lt;p&gt;&lt;span&gt;&lt;i&gt;&lt;a href=&quot;https://open.spotify.com/show/6Q48ICplENdQ4ZarUIgfLZ&quot; target=&quot;_blank&quot; rel=&quot;noopener noreferrer&quot;&gt;&lt;img src=&quot;https://www.eff.org/files/2021/11/01/spotify-podcast-badge-blk-wht-330x80.png&quot; alt=&quot;Listen on Spotify Podcasts Badge&quot; width=&quot;198&quot; height=&quot;48&quot; /&gt;&lt;/a&gt; &lt;a href=&quot;https://podcasts.apple.com/us/podcast/effector/id1882562931&quot; target=&quot;_blank&quot; rel=&quot;noopener noreferrer&quot;&gt;&lt;img src=&quot;https://www.eff.org/files/2021/11/01/applebadge2.png&quot; alt=&quot;Listen on Apple Podcasts Badge&quot; width=&quot;195&quot; height=&quot;47&quot; /&gt;&lt;/a&gt; &lt;a href=&quot;https://music.amazon.com/podcasts/83be1062-f511-47b3-bd2b-fc44e831c3ad&quot; target=&quot;_blank&quot; rel=&quot;noopener noreferrer&quot;&gt;&lt;img height=&quot;47&quot; width=&quot;195&quot; src=&quot;https://eff.org/files/styles/kittens_types_wysiwyg_small/public/2024/02/15/us_listenon_amazonmusic_button_charcoal.png?itok=YFXPE4Ii&quot; /&gt;&lt;/a&gt; &lt;a href=&quot;https://feeds.eff.org/effector&quot; target=&quot;_blank&quot; rel=&quot;noopener noreferrer&quot;&gt;&lt;img src=&quot;https://www.eff.org/files/2021/11/01/subscriberss.png&quot; alt=&quot;Subscribe via RSS badge&quot; width=&quot;194&quot; height=&quot;50&quot; /&gt;&lt;/a&gt;&lt;/i&gt;&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span&gt;Want to help push back on these misguided regulations? Sign up for &lt;a href=&quot;https://eff.org/effector&quot;&gt;EFF&#039;s EFFector newsletter&lt;/a&gt; for updates, ways to take action, and new merch drops. You can also fuel the fight for privacy and free speech online when you &lt;a href=&quot;https://eff.org/join&quot;&gt;support EFF today&lt;/a&gt;!&lt;/span&gt;&lt;/p&gt;

&lt;/div&gt;&lt;/div&gt;&lt;/div&gt;</description>
     <pubDate>Wed, 06 May 2026 16:11:44 +0000</pubDate>
 <guid isPermaLink="false">112044 at https://www.eff.org</guid>
 <dc:creator>Christian Romero</dc:creator>
 <enclosure url="https://www.eff.org/files/banner_library/effector-green-web.png" alt="" type="image/png" length="78242" />
  </item>
  <item>
    <title>The SECURE Data Act is Not a Serious Piece of Privacy Legislation </title>
    <link>https://www.eff.org/deeplinks/2026/05/secure-data-act-not-serious-piece-privacy-legislation</link>
    <description>&lt;div class=&quot;field field--name-body field--type-text-with-summary field--label-hidden&quot;&gt;&lt;div class=&quot;field__items&quot;&gt;&lt;div class=&quot;field__item even&quot;&gt;&lt;p&gt;The federal &lt;a href=&quot;https://d1dth6e84htgma.cloudfront.net/SECURE_Data_Act_for_introduction_7c80a347ac.pdf&quot;&gt;SECURE Data Act&lt;/a&gt; is not a serious consumer privacy bill, and its provisions—if enacted—would be a retreat from already insufficient state protections.&lt;/p&gt;
&lt;p&gt;Republicans on the &lt;a href=&quot;https://energycommerce.house.gov/posts/committees-on-energy-and-commerce-and-financial-services-introduce-pair-of-privacy-bills-to-establish-comprehensive-data-protections-for-all-americans&quot;&gt;House Energy and Commerce Committee&lt;/a&gt; released a draft of the bill late last month without bipartisan support. The bill is weaker than &lt;a href=&quot;https://www.eff.org/deeplinks/2024/04/americans-deserve-more-current-american-privacy-rights-act&quot;&gt;congressional&lt;/a&gt; &lt;a href=&quot;https://www.eff.org/deeplinks/2022/07/americans-deserve-more-current-american-data-privacy-protection-act&quot;&gt;proposals&lt;/a&gt; in prior years, as well as most of the &lt;a href=&quot;https://iapp.org/resources/article/us-state-privacy-legislation-tracker&quot;&gt;21 state consumer privacy laws&lt;/a&gt; already on the books.&lt;/p&gt;
&lt;p class=&quot;pull-quote&quot;&gt;&lt;span&gt;The bill could wipe out hundreds of  state privacy protections.&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;Most troubling for EFF: the bill would &lt;a href=&quot;https://www.eff.org/deeplinks/2022/07/federal-preemption-state-privacy-law-hurts-everyone&quot;&gt;preempt&lt;/a&gt; dozens, if not hundreds, of state laws that regulate related topics, and it would not allow consumers to sue to protect their own rights (commonly called a &lt;a href=&quot;https://www.eff.org/deeplinks/2019/01/you-should-have-right-sue-companies-violate-your-privacy&quot;&gt;private right of action&lt;/a&gt;). And it comes nowhere close to &lt;a href=&quot;https://www.eff.org/deeplinks/2022/03/ban-online-behavioral-advertising&quot;&gt;banning online behavioral advertising&lt;/a&gt;—a practice that fuels technology companies’ always increasing hunt for personal data.&lt;/p&gt;
&lt;p&gt;The bill also suffers from many other flaws including weak opt-out defaults, inadequate data minimization requirements, and large definitional loopholes for companies.&lt;/p&gt;
&lt;h3&gt;Key Provisions&lt;/h3&gt;
&lt;p&gt;The bill would give consumers some rights to take action to control their personal data— like access, correction, deletion, and limited portability. These rights have become standard in all data privacy proposals in recent years.&lt;/p&gt;
&lt;p&gt;The bill would also require companies to obtain your consent before processing your sensitive data, or using any of your personal data for a previously undisclosed purpose. Absent your consent, a company couldn’t do these things.&lt;/p&gt;
&lt;p&gt;Further, the bill would allow you to opt out of (1) targeted third-party advertising, (2) the sale of your personal data, and (3) profiling of you that has a legal, healthcare, housing, or employment effect. Unfortunately, a company could keep doing these invasive things to you, unless you opted out.&lt;/p&gt;
&lt;p&gt;The bill would also require data brokers that make at least 50 percent of their profits from the sale of personal data to register in a public database maintained by the Federal Trade Commission (FTC).&lt;/p&gt;
&lt;h3&gt;Preemption of Too Many State Laws&lt;/h3&gt;
&lt;p&gt;Federal privacy laws &lt;a href=&quot;https://www.eff.org/deeplinks/2024/04/americans-deserve-more-current-american-privacy-rights-act&quot;&gt;should allow states to build ever stronger rights&lt;/a&gt; on top of the federal floor. Many federal privacy laws allow this, including the Health Insurance Portability and Accountability Act, the Video Privacy Protection Act, and the Electronic Communications Privacy Act.&lt;/p&gt;
&lt;p&gt;The SECURE Data Act would not do that. Instead, it would wipe out dozens, if not hundreds, of existing state privacy protections. Section 15 of the bill would preempt any “law, rule, regulation, requirement, standard, or other provision [that] relates to the provisions of this Act.” This would kill the &lt;a href=&quot;https://iapp.org/resources/article/us-state-privacy-legislation-tracker&quot;&gt;21 state consumer privacy laws&lt;/a&gt; passed in the past few years. These state bills aren’t strong enough, but they are still better than this federal proposal. For example, California maintains a &lt;a href=&quot;https://privacy.ca.gov/drop/&quot;&gt;data broker deletion tool&lt;/a&gt; and requires companies to comply with &lt;a href=&quot;https://www.eff.org/gpc-privacy-badger&quot;&gt;automatic opt-out signals&lt;/a&gt;—including one that is built into EFF’s &lt;a href=&quot;https://privacybadger.org/#What-is-Global-Privacy-Control&quot;&gt;Privacy Badger&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;Because the &lt;span&gt;S&lt;/span&gt;&lt;span&gt;ECURE&lt;/span&gt; Data Act has provisions that relate to data privacy and security, it could preempt &lt;a href=&quot;https://www.ncsl.org/technology-and-communication/security-breach-notification-laws&quot;&gt;all 50 state data breach laws&lt;/a&gt; and &lt;a href=&quot;https://www.congress.gov/crs-product/R48667&quot;&gt;many others&lt;/a&gt;. It could also preempt state laws related to specific pieces of sensitive data, like bans on the sale of &lt;a href=&quot;https://www.ilga.gov/Legislation/ILCS/Articles?ActID=3004&amp;amp;ChapterID=57&quot;&gt;biometric&lt;/a&gt; or &lt;a href=&quot;https://www.doj.state.or.us/consumer-protection/id-theft-data-breaches/privacy/privacy-law-faqs-for-consumers/&quot;&gt;location&lt;/a&gt; information. Some &lt;a href=&quot;https://leginfo.legislature.ca.gov/faces/codes_displaySection.xhtml?lawCode=CONS&amp;amp;sectionNum=SECTION%201.&amp;amp;article=I&quot;&gt;states like California&lt;/a&gt; have constitutional provisions that protect an individual’s right to privacy, which can be enforced &lt;a href=&quot;https://btlj.org/wp-content/uploads/2025/01/39-2_Ozer.pdf&quot;&gt;against companies&lt;/a&gt;. That constitutional provision, as well as &lt;a href=&quot;https://scholarship.law.bu.edu/faculty_scholarship/628/&quot;&gt;state privacy torts&lt;/a&gt;, could also be in danger if this bill passed.&lt;/p&gt;
&lt;h3&gt;No Private Enforcement, A New Cure Period, and Vague Security Powers&lt;/h3&gt;
&lt;p&gt;Strong consumer privacy laws should allow consumers to take companies to court to defend their own rights. This is essential because regulators do not have the &lt;a href=&quot;https://www.eff.org/deeplinks/2024/07/texas-wins-14-billion-biometric-settlement-against-meta-it-would-have-happened&quot;&gt;resources&lt;/a&gt; to catch every violation, and &lt;a href=&quot;https://www.theguardian.com/us-news/2025/mar/28/trump-firings-ftc-alvaro-bedoya&quot;&gt;federal consumer enforcement agencies&lt;/a&gt; have been gutted during the current administration.&lt;/p&gt;
&lt;p&gt;The SECURE Data Act does not have a private right of action. The FTC, along with state attorneys general, have primary enforcement authority. The law also gives companies 45 days to “cure” any violation with no penalty after they are caught.&lt;/p&gt;
&lt;p&gt;Moreover, Section 8 of the bill creates a vaguely defined self-regulatory scheme in which companies can apply to be audited by an “independent organization” that will apply a “code of conduct.” Following this code of conduct would give companies a presumption that they are complying with the law. This provision is an implicit acknowledgement that the bill does not provide regulators with any new resources to enforce new protections.&lt;/p&gt;
&lt;p&gt;Section 9 of the bill would give the Secretary of Commerce broad power to “take any action necessary and appropriate to support the international flow of personal data,” including assessing “security interests of the United States.” The scope of this amorphous provision is unclear, but it likely does not belong in a consumer protection bill.&lt;/p&gt;
&lt;h3&gt;Weak Privacy Defaults&lt;/h3&gt;
&lt;p&gt;Your online privacy should not depend on whether you have the time, patience, and knowledge to navigate a website and turn off invasive tracking. Good privacy laws build in data minimization requirements—meaning there should be a default standard that prevents companies from processing your data for purposes that are not needed to provide you with the service you asked for.&lt;/p&gt;
&lt;p&gt;The &lt;span&gt;S&lt;/span&gt;&lt;span&gt;ECURE&lt;/span&gt; Data Act puts the burden on you to opt out of invasive company practices, like targeted third-party advertising, the sale of your personal data, and profiling. The bill at least requires companies to obtain your consent before processing your sensitive data (like selling your precise location). These consent requirements, however, are often an invitation for companies to &lt;a href=&quot;https://www.eff.org/deeplinks/2021/05/help-bring-dark-patterns-light&quot;&gt;trick you&lt;/a&gt; into clicking a button to give away your rights in hard-to-read policies. Indeed, few people would &lt;a href=&quot;https://www.ftc.gov/news-events/news/press-releases/2025/01/ftc-finalizes-order-prohibiting-gravy-analytics-venntel-selling-sensitive-location-data&quot;&gt;knowingly agree&lt;/a&gt; to let a company sell their personal data to a broker who turns around and sells it to the government.&lt;/p&gt;
&lt;p&gt;Section 3 of the bill uses the term “data minimization,” but it is done in name only. The provision does not limit a company’s processing of data to only what is necessary to provide the customer with the good or service they asked for. Instead, the provision limits processing of data to only what a company “disclosed to the customer”—meaning if it is in the confusing privacy policy that nobody reads, it is okay.&lt;/p&gt;
&lt;p&gt;And the bill would not even allow you to restrict certain uses of your data. As companies seek more data for AI systems, many internet users do not want their private personal data to be used to train those models. However, the bill makes clear that “nothing in this Act may be construed to restrict” a company from collecting, using, or retaining your data to “develop” or “improve” a new technology.&lt;/p&gt;
&lt;h3&gt;Other Flawed Definitions and Loopholes&lt;/h3&gt;
&lt;p&gt;The bill has numerous loopholes that technology companies would exploit if the bill were to become law. Below is just a sampling:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;u&gt;Government contractors&lt;/u&gt;: Under Section 13(b)(2), government contractors are exempt from the bill, which could be wrongly interpreted to exempt certain data brokers from sale restrictions when those sales are made to the government. This type of exemption could benefit surveillance companies like Clearview AI, which &lt;a href=&quot;https://storage.courtlistener.com/recap/gov.uscourts.ilnd.372790/gov.uscourts.ilnd.372790.56.0.pdf&quot;&gt;previously argued&lt;/a&gt; it was exempt from Illinois’ strict biometric law using a similar contractor exception. This is likely not the authors’ intention, since the definition of sale includes those made “to a government entity.”&lt;br /&gt;&lt;u&gt;Sale definition&lt;/u&gt;: The definition in Section 16(28) is defined too narrowly. A sale should mean any exchange for monetary “or other valuable” consideration, as in some other privacy laws.&lt;u&gt;&lt;/u&gt;&lt;/li&gt;
&lt;li&gt;&lt;u&gt;Biometric information definition&lt;/u&gt;: The definition in Section 16(4) excludes data generated from a photo or video, and the definition excludes face scans not meant to “identify a specific individual.” This could be wrongly interpreted to allow biometric identification from &lt;a href=&quot;https://www.eff.org/deeplinks/2025/11/legal-case-against-rings-face-recognition-feature&quot;&gt;security camera footage&lt;/a&gt;, or biometric use for sentiment or &lt;a href=&quot;https://www.eff.org/deeplinks/2025/01/face-scans-estimate-our-age-creepy-af-and-harmful&quot;&gt;demographic&lt;/a&gt; analysis.&lt;/li&gt;
&lt;li&gt;&lt;u&gt;Personal data definition&lt;/u&gt;: The definition in Section 16(21) exempts “de-identified data” from the definition of personal data, which could allow companies to do anything with de-identified data because that data is not protected by the law. The problem with de-identified data is that &lt;a href=&quot;https://www.eff.org/deeplinks/2023/11/debunking-myth-anonymous-data&quot;&gt;many times it is not&lt;/a&gt;.&lt;/li&gt;
&lt;li&gt;&lt;u&gt;Deletion requests&lt;/u&gt;: With regard to data that a company obtained from a third-party, Section 2(d)(5) would treat a consumer’s deletion request merely as an opt-out request. And even if a customer requested deletion, a company might be able to retain the data for research purposes under section 11(a)(9)(A).&lt;/li&gt;
&lt;li&gt;&lt;u&gt;Profiling definition&lt;/u&gt;: Under the definition in Section 16(25), companies could profile so long as the profiling is not “solely automated.” The flimsiest human review would exempt highly automated profiling.&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;Congress is long overdue to enact a strong comprehensive consumer data privacy law, and we have &lt;a href=&quot;https://www.eff.org/wp/privacy-first-better-way-address-online-harms#Legislation&quot;&gt;sketched what it should look like&lt;/a&gt;. But the &lt;span&gt;S&lt;/span&gt;&lt;span&gt;ECURE&lt;/span&gt; Data Act is woefully inadequate. In fact, it would cause even more corporate surveillance of our personal information, by wiping out state laws that are more protective than this federal bill. Even worse, this bill would block state legislatures from protecting their residents from the privacy threats of tomorrow that are unforeseeable today. &lt;/p&gt;

&lt;/div&gt;&lt;/div&gt;&lt;/div&gt;</description>
     <pubDate>Wed, 06 May 2026 14:38:02 +0000</pubDate>
 <guid isPermaLink="false">112043 at https://www.eff.org</guid>
 <category domain="https://www.eff.org/issues/privacy">Privacy</category>
 <dc:creator>Mario Trujillo</dc:creator>
 <enclosure url="https://www.eff.org/files/banner_library/privacy-o-meter.jpg" alt="A meter that gauges a level of privacy from yikes to meh to tight" type="image/jpeg" length="133792" />
  </item>
  <item>
    <title>EFF and 18 Organizations Urge UK Policymakers to Prioritize Addressing the Roots of Online Harm</title>
    <link>https://www.eff.org/deeplinks/2026/05/eff-and-18-organizations-urge-uk-policymakers-prioritize-addressing-roots-online</link>
    <description>&lt;div class=&quot;field field--name-body field--type-text-with-summary field--label-hidden&quot;&gt;&lt;div class=&quot;field__items&quot;&gt;&lt;div class=&quot;field__item even&quot;&gt;&lt;p&gt;&lt;span&gt;EFF joins 18 organizations in writing a letter to UK policymakers urging them to address the root causes of online harm—rather than undermining the open web through blunt restrictions.&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span&gt;The coalition, which includes Mozilla, Tor Project, and Open Rights Group, warns that proposed measures following the passage of the Children’s Wellbeing and Schools Bill risk fundamentally reshaping the internet in harmful ways. Chief among these proposals are sweeping age-gating requirements and access restrictions that would apply not only to young people, but effectively to all users.&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span&gt;While framed as efforts to protect children online, these policies rely heavily on age assurance technologies that are either inaccurate, privacy-invasive, or both. As the letter notes, mandating such systems across a wide range of services—from social media and video games to VPNs and even basic websites—would force users to verify their identity simply to access the web. This creates serious risks, including expanded surveillance, data breaches, and the erosion of anonymity.&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span&gt;Beyond privacy concerns, the signatories argue that these measures threaten the core architecture of the open internet. Age-gating at scale could fragment the web into a patchwork of restricted jurisdictions, limit access to information, and entrench the dominance of powerful gatekeepers like app stores and platform ecosystems. In doing so, policymakers risk weakening the very qualities—interoperability, accessibility, and openness—that have made the internet a global public resource.&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span&gt;The letter also emphasizes what’s missing from the current policy approach: meaningful efforts to address the underlying drivers of online harm. Many digital platforms are designed to maximize engagement and profit through pervasive data collection and targeted advertising, often at the expense of user safety and autonomy. Rather than imposing access bans, the coalition calls on UK policymakers to hold companies accountable for these systemic practices and to prioritize user rights by design.&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span&gt;Importantly, the signatories highlight that the internet remains a vital space for young people: offering access to information, support networks, and opportunities for expression that may not exist offline. Policies that restrict access risk cutting off these lifelines without meaningfully reducing harm.&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span&gt;The message is clear: protecting users online requires more than heavy-handed restrictions. It demands thoughtful, rights-respecting policies that tackle the business models and design choices driving harm, while preserving the open, global nature of the web.&lt;/span&gt;&lt;/p&gt;

&lt;/div&gt;&lt;/div&gt;&lt;/div&gt;</description>
     <pubDate>Tue, 05 May 2026 10:41:15 +0000</pubDate>
 <guid isPermaLink="false">112040 at https://www.eff.org</guid>
 <category domain="https://www.eff.org/issues/free-speech">Free Speech</category>
 <category domain="https://www.eff.org/issues/privacy">Privacy</category>
 <category domain="https://www.eff.org/issues/international">International</category>
 <dc:creator>Jillian C. York</dc:creator>
 <enclosure url="https://www.eff.org/files/banner_library/ageverificationbanner.png" alt="Purple padlock with an 18+ only symbol and a combination lock requiring Day, Month, and Year. Surrounded by abstract purple dashed lines." type="image/png" length="1291379" />
  </item>
  <item>
    <title>Shut Down Turnkey Totalitarianism</title>
    <link>https://www.eff.org/deeplinks/2026/04/claw-back</link>
    <description>&lt;div class=&quot;field field--name-body field--type-text-with-summary field--label-hidden&quot;&gt;&lt;div class=&quot;field__items&quot;&gt;&lt;div class=&quot;field__item even&quot;&gt;&lt;p&gt;William Binney, the NSA surveillance architect-turned-whistleblower, called it the &quot;&lt;a href=&quot;https://www.eff.org/deeplinks/2012/03/nsa-chief-denies-ability-warrantlessly-wiretap-despite-evidence&quot; target=&quot;_blank&quot; rel=&quot;noopener noreferrer&quot;&gt;turnkey totalitarian state&lt;/a&gt;.&quot; Whoever sits in power gains access to a boundless surveillance empire that scorns privacy and crushes dissent. Politicians will come and go, but you can help us claw the tools of oppression out of government hands.&lt;/p&gt;
&lt;p class=&quot;take-action&quot;&gt;&lt;a href=&quot;https://supporters.eff.org/donate/spring--DL1&quot;&gt;JOIN EFF&lt;/a&gt;&lt;/p&gt;
&lt;p class=&quot;take-explainer&quot;&gt;Become a Monthly Sustaining Donor&lt;/p&gt;
&lt;p&gt;We must stand strong to uphold your privacy and free expression as democratic principles. With members around the world, EFF is empowered to use its trusted voice and formidable advocacy to protect your rights online. Whether giving &lt;a href=&quot;https://supporters.eff.org/donate/spring--DL1&quot;&gt;monthly&lt;/a&gt; or &lt;a href=&quot;https://supporters.eff.org/donate/springot--otd1&quot;&gt;one-time donations&lt;/a&gt;, members have helped EFF:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;
&lt;p&gt;Sue to stop &lt;a href=&quot;https://www.eff.org/press/releases/lawsuit-challenges-san-joses-warrantless-alpr-mass-surveillance&quot; target=&quot;_blank&quot; rel=&quot;noopener noreferrer&quot;&gt;warrantless searches of Automated License Plate Reader (ALPR) records&lt;/a&gt;, which reveal millions of drivers’ private habits, movements, and associations.&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;Launch &lt;a href=&quot;https://www.eff.org/deeplinks/2025/03/meet-rayhunter-new-open-source-tool-eff-detect-cellular-spying&quot; target=&quot;_blank&quot; rel=&quot;noopener noreferrer&quot;&gt;Rayhunter&lt;/a&gt;, an open source tool that empowers you to help search out cell-site simulators capable of tracking the movements of protestors, journalists, and more.&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;Help journalists see through the spin of &quot;copaganda&quot; by breaking down how policing technology companies often market their tools with misleading claims with &lt;a href=&quot;https://www.eff.org/press/releases/new-report-helps-journalists-dig-deeper-police-surveillance-technology&quot;&gt;our Selling Safety report&lt;/a&gt;.&lt;/p&gt;
&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;span data-contrast=&quot;none&quot;&gt;Right now, U.S. Congress is on the edge of renewing &lt;a href=&quot;https://www.eff.org/deeplinks/2026/04/congress-must-reject-new-insufficient-702-reauthorization-bill&quot; target=&quot;_blank&quot; rel=&quot;noopener noreferrer&quot;&gt;the international mass spying program known as Section 702&lt;/a&gt;, affecting millions. EFF is rallying to cut through the politics and give ordinary people a chance to stop this oppressive surveillance. &lt;/span&gt;&lt;span data-contrast=&quot;none&quot;&gt;It’s only possible with help from supporters like you, &lt;a href=&quot;https://supporters.eff.org/donate/spring--DL1&quot;&gt;so join EFF today&lt;/a&gt;.&lt;/span&gt;&lt;/p&gt;
&lt;h2&gt;The New EFF Member Gear&lt;/h2&gt;
&lt;p&gt;&lt;a href=&quot;https://supporters.eff.org/donate/spring--DL1&quot;&gt;&lt;img title=&quot;Get a Claw Back t-shirt at the Copper member level and above!&quot; src=&quot;/files/2026/04/30/claw_fb_1200.png&quot; width=&quot;1200&quot; height=&quot;635&quot; alt=&quot;Two people wear EFF Claw Back member t-shirts. The front shows a cat swatting at spy cameras and the back says “Mass Surveillance” with red claw marks through it.&quot; /&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;a href=&quot;https://supporters.eff.org/donate/spring--DL1&quot;&gt;Get this year’s new member t-shirt when you join EFF.&lt;/a&gt; Aptly titled &quot;Claw Back,&quot; the design features an orange boy swatting at the street-level surveillance equipment multiplying in our communities. You might empathize with him, but there’s a better way. &lt;em&gt;Let’s end the law enforcement contracts, harmful practices, and twisted logic that enable mass spying in the first place.&lt;/em&gt;&lt;/p&gt;
&lt;p&gt;&lt;a href=&quot;https://supporters.eff.org/donate/spring--DL1&quot;&gt;&lt;img src=&quot;/files/2026/04/30/ghostiemultisticker-donate-4_0.jpg&quot; width=&quot;1200&quot; height=&quot;600&quot; alt=&quot;Puffy privacy Ghostie stickers on a keyboard&quot; title=&quot;Choose a Puffy Multisticker Sheet set when you join EFF.&quot; /&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;You can also get brand new set of eleven soft and supple &lt;strong&gt;polyglot puffy stickers&lt;/strong&gt; as a token of thanks. Whether you&#039;re a kid or a kid at heart, these nostalgic stickers are perfect for digital devices, lunchboxes, and notebooks alike. Our little Ghostie protects privacy in six languages&lt;span&gt;: Arabic, English, Japanese, Persian, Russian, and Spanish.&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;a href=&quot;https://supporters.eff.org/donate/spring--DL1&quot;&gt;&lt;img src=&quot;/files/2026/04/30/crew_embroidery.png&quot; width=&quot;1200&quot; height=&quot;600&quot; alt=&quot;Person wearing a black crewneck sweater with the Privacy Badger logo on the chest&quot; title=&quot;Privacy Badger Crewneck sweaters available for a limited time.&quot; /&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;And for a limited time, get a &lt;strong&gt;Privacy Badger Crewneck sweater&lt;/strong&gt; to help you browse the web with confidence. The embroidered Privacy Badger mascot appears above &lt;span&gt;Traditional Chinese for&lt;/span&gt; &quot;privacy” because human rights are universal. &lt;span data-contrast=&quot;none&quot; lang=&quot;EN-US&quot; class=&quot;TextRun SCXW69724891 BCX0&quot; xml:lang=&quot;EN-US&quot;&gt;&lt;span class=&quot;NormalTextRun SCXW69724891 BCX0&quot;&gt;Millions of people around the world use &lt;a href=&quot;https://privacybadger.org&quot;&gt;Privacy Badger&lt;/a&gt;&lt;/span&gt;&lt;a href=&quot;https://privacybadger.org&quot;&gt;&lt;span class=&quot;NormalTextRun SCXW69724891 BCX0&quot;&gt;,&lt;span&gt; EFF&#039;s&lt;/span&gt;&lt;/span&gt;&lt;span class=&quot;NormalTextRun SCXW69724891 BCX0&quot;&gt; free browser extention that &lt;/span&gt;&lt;/a&gt;&lt;span class=&quot;NormalTextRun SCXW69724891 BCX0&quot;&gt;&lt;a href=&quot;https://privacybadger.org&quot;&gt;blocks hidden trackers&lt;/a&gt; that twist your web browsing into a commodity for Big Tech, advertisers, scammers, and data brokers.&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span class=&quot;EOP SCXW69724891 BCX0&quot; data-ccp-props=&quot;259}&quot;&gt;Privacy is a human right because it gives you a fundamental measure of security and freedom. We owe it to ourselves to fight the mass surveillance used to control and intimidate people. Let’s do this. &lt;a href=&quot;https://supporters.eff.org/donate/spring--DL1&quot;&gt;Join EFF today with a monthly donation&lt;/a&gt; &lt;/span&gt;or &lt;a href=&quot;https://supporters.eff.org/donate/springot--otd1&quot;&gt;one-time donation&lt;/a&gt; and help claw back your privacy.&lt;/p&gt;
&lt;p&gt;____________________&lt;/p&gt;
&lt;p&gt;&lt;em&gt;&lt;span data-contrast=&quot;none&quot; lang=&quot;EN-US&quot; class=&quot;TextRun SCXW4268908 BCX0&quot; xml:lang=&quot;EN-US&quot;&gt;&lt;span class=&quot;NormalTextRun SCXW4268908 BCX0&quot;&gt;EFF is a member-supported U.S. 501(c)(3) organization. &lt;/span&gt;&lt;span class=&quot;NormalTextRun CommentStart CommentHighlightPipeRest CommentHighlightRest SCXW4268908 BCX0&quot;&gt;We&#039;ve&lt;/span&gt;&lt;span class=&quot;NormalTextRun CommentHighlightRest SCXW4268908 BCX0&quot;&gt; received top rati&lt;/span&gt;&lt;span class=&quot;NormalTextRun CommentHighlightRest SCXW4268908 BCX0&quot;&gt;ngs &lt;/span&gt;&lt;span class=&quot;NormalTextRun CommentHighlightRest SCXW4268908 BCX0&quot;&gt;from the nonprofit watchdog Charity Navigator since 2013!&lt;/span&gt;&lt;span class=&quot;NormalTextRun CommentHighlightPipeRest SCXW4268908 BCX0&quot;&gt; Your donation is tax-deductible as allowed by law.&lt;/span&gt;&lt;/span&gt;&lt;/em&gt;&lt;/p&gt;

&lt;/div&gt;&lt;/div&gt;&lt;/div&gt;</description>
     <pubDate>Tue, 05 May 2026 07:11:54 +0000</pubDate>
 <guid isPermaLink="false">111977 at https://www.eff.org</guid>
 <dc:creator>Aaron Jue</dc:creator>
 <enclosure url="https://www.eff.org/files/banner_library/2026-membership-campaign-mobile-donate.png" alt="An orange cat climbs an ALPR camera to swat at surveillance drones in a blue night sky." type="image/png" length="212563" />
  </item>
  <item>
    <title>EFF Submission to UK Consultation on Digital ID  </title>
    <link>https://www.eff.org/deeplinks/2026/05/eff-submission-uk-consultation-digital-id</link>
    <description>&lt;div class=&quot;field field--name-body field--type-text-with-summary field--label-hidden&quot;&gt;&lt;div class=&quot;field__items&quot;&gt;&lt;div class=&quot;field__item even&quot;&gt;&lt;p&gt;&lt;b&gt;&lt;/b&gt;&lt;span&gt;Last September, the United Kingdom’s Prime Minister Keir Starmer &lt;/span&gt;&lt;a href=&quot;https://www.gov.uk/government/news/new-digital-id-scheme-to-be-rolled-out-across-uk&quot;&gt;&lt;span&gt;announced&lt;/span&gt;&lt;/a&gt;&lt;span&gt; plans to introduce a new digital ID scheme in the country. The scheme aims to make it easier for people to prove their identities by creating a virtual ID on personal devices with information like names, date of birth, nationality or residency status, and a photo to verify their right to live and work in the country. &lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span&gt;Since then, EFF has joined UK-based civil society organizations in urging the government to reconsider this proposal. In one joint letter from December, ahead of Parliament’s debate around a &lt;/span&gt;&lt;a href=&quot;https://petition.parliament.uk/petitions/730194&quot;&gt;&lt;span&gt;petition&lt;/span&gt;&lt;/a&gt;&lt;span&gt; signed by 2.9 million people calling for an end to the &lt;/span&gt;&lt;a href=&quot;https://www.gov.uk/government/news/new-digital-id-scheme-to-be-rolled-out-across-uk&quot;&gt;&lt;span&gt;government’s plans&lt;/span&gt;&lt;/a&gt;&lt;span&gt; to roll out a national digital ID, EFF and 12 other civil society organizations &lt;/span&gt;&lt;a href=&quot;https://bigbrotherwatch.org.uk/wp-content/uploads/2025/12/NGO-Joint-Digital-ID-Debate-Briefing.pdf&quot;&gt;&lt;span&gt;wrote to politicians&lt;/span&gt;&lt;/a&gt;&lt;span&gt; in the country urging MPs to reject the Labour government’s proposal.&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span&gt;Nevertheless, politicians have continued to explore ways to build out a digital ID system in the country, &lt;/span&gt;&lt;a href=&quot;https://www.eff.org/deeplinks/2025/11/uk-has-it-wrong-digital-id-heres-why&quot;&gt;&lt;span&gt;often fluctuating&lt;/span&gt;&lt;/a&gt;&lt;span&gt; between different ideas and conceptualisations for such a scheme. In their search for clarity, the government launched a consultation, &lt;/span&gt;&lt;a href=&quot;https://www.gov.uk/government/consultations/making-public-services-work-for-you-with-your-digital-identity&quot;&gt;&lt;span&gt;&lt;span&gt;‘&lt;/span&gt;Making public services work for you with your digital identity,’&lt;/span&gt;&lt;/a&gt;&lt;span&gt; seeking views on a proposed national digital ID system in the UK. &lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span&gt;EFF &lt;/span&gt;&lt;a href=&quot;https://www.eff.org/document/eff-submission-uk-government-consultation-digital-id&quot;&gt;&lt;span&gt;submitted comments&lt;/span&gt;&lt;/a&gt;&lt;span&gt; to this consultation, focusing on six interconnected issues:&lt;/span&gt;&lt;/p&gt;
&lt;ol&gt;
&lt;li&gt;&lt;span&gt;Mission creep&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span&gt;Infringements on privacy rights &lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span&gt;Serious security risks&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span&gt;Reliance on inaccurate and unproven technologies&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span&gt;Discrimination and exclusion&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span&gt;The deepening of entrenched power imbalances between the state and the public.&lt;/span&gt;&lt;/li&gt;
&lt;/ol&gt;
&lt;p&gt;&lt;span&gt;Even the strongest recommended safeguards cannot resolve these issues, and the fundamental &lt;/span&gt;&lt;a href=&quot;https://www.eff.org/deeplinks/2025/11/uk-has-it-wrong-digital-id-heres-why&quot;&gt;&lt;span&gt;core problem&lt;/span&gt;&lt;/a&gt;&lt;span&gt; that a mandatory digital ID scheme that shifts power dramatically away from individuals and toward the state. They are pursued as a technological solution to offline problems but instead allow the state to determine what you can access, not just verify who you are, by functioning as a key to opening—or closing—doors to essential services and experiences. &lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span&gt;No one should be coerced—technically or socially—into a digital system in order to participate fully in public life. It is essential that the UK government &lt;/span&gt;&lt;a href=&quot;https://petition.parliament.uk/petitions/730194&quot;&gt;&lt;span&gt;listen to people&lt;/span&gt;&lt;/a&gt;&lt;span&gt; in the country and say no to digital ID. &lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span&gt;Read our submission in full &lt;/span&gt;&lt;a href=&quot;https://www.eff.org/document/eff-submission-uk-government-consultation-digital-id&quot;&gt;&lt;span&gt;here&lt;/span&gt;&lt;/a&gt;&lt;span&gt;.&lt;/span&gt;&lt;/p&gt;

&lt;/div&gt;&lt;/div&gt;&lt;/div&gt;</description>
     <pubDate>Mon, 04 May 2026 18:35:53 +0000</pubDate>
 <guid isPermaLink="false">112038 at https://www.eff.org</guid>
 <category domain="https://www.eff.org/issues/privacy">Privacy</category>
 <dc:creator>Paige Collings</dc:creator>
 <enclosure url="https://www.eff.org/files/banner_library/mobile-privacy.png" alt="" type="image/png" length="23559" />
  </item>
  <item>
    <title>Getting Digital Fairness Right: EFF&#039;s Recommendations for the EU&#039;s Digital Fairness Act</title>
    <link>https://www.eff.org/deeplinks/2026/04/dos-and-donts-eus-digital-fairness-act-effs-recommendation-regulating-digital</link>
    <description>&lt;div class=&quot;field field--name-body field--type-text-with-summary field--label-hidden&quot;&gt;&lt;div class=&quot;field__items&quot;&gt;&lt;div class=&quot;field__item even&quot;&gt;&lt;h3&gt;&lt;b&gt;&lt;span data-contrast=&quot;auto&quot;&gt;Digital Fairness in the EU&lt;/span&gt;&lt;/b&gt;&lt;/h3&gt;
&lt;p&gt;&lt;span data-contrast=&quot;auto&quot;&gt;The next few years will be decisive for EU digital policymaking. With major laws like the Digital Services Act, the Digital Markets Act, and the AI Act now in place, the EU is entering an enforcement era that will show whether these rules are rights-respecting or drift toward overreach and corporate control. With the proposed &lt;a href=&quot;https://commission.europa.eu/law/law-topic/consumer-protection-law/review-eu-consumer-law_en&quot;&gt;EU’s Digital Fairness Act&lt;/a&gt; (DFA), the Commission is now turning to increasingly visible risks for users, such as dark patterns and exploitative personalization. Its “&lt;a href=&quot;https://commission.europa.eu/document/707d7404-78e5-4aef-acfa-82b4cf639f55_en&quot;&gt;Digital Fairness Fitness Check&lt;/a&gt;” makes clear that existing consumer rules need updating to reflect how digital markets operate today.&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span data-contrast=&quot;auto&quot;&gt;But not all proposed solutions point in the right direction. Regulators are already flirting with measures that rely on expanded surveillance, such as &lt;a href=&quot;https://www.eff.org/issues/age-verification&quot;&gt;&lt;span data-contrast=&quot;none&quot;&gt;age verification&lt;/span&gt;&lt;/a&gt; mandates—surface-level fixes that risk undermining fundamental rights while offering little more than a false sense of protection.&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;For EFF, digital fairness means addressing the root causes of harm, not requiring platforms to exert &lt;em&gt;more&lt;/em&gt; control over their users.&lt;/strong&gt; It means safeguarding privacy, freedom of expression, and the rights of users and developers.&lt;/p&gt;
&lt;p&gt;If the DFA is to make a real difference, it must tackle structural imbalances. Lawmakers should focus on two interlocking principles. &lt;strong&gt;First&lt;/strong&gt;, prioritize privacy. Reforms should address harms driven by surveillance-based business models, alongside deceptive design practices that impair informed choices. &lt;strong&gt;Second&lt;/strong&gt;, strengthen user sovereignty, which is also a necessary precondition for European digital sovereignty more broadly. Strengthening user sovereignty means taking measures that address user lock-in, coercive contract terms, and manipulative defaults that limit users’ ability to freely choose how they use digital products and services.&lt;/p&gt;
&lt;p&gt;&lt;span data-contrast=&quot;auto&quot;&gt;Together, these principles would support the EU’s objectives of consistent consumer protection, fair markets, and a more coherent legal framework. If implemented properly, the EU could address power imbalances and build trust in Europe’s digital economy.&lt;/span&gt;&lt;/p&gt;
&lt;h3&gt;&lt;b&gt;&lt;span data-contrast=&quot;none&quot;&gt;Ban Dark Patterns&lt;/span&gt;&lt;/b&gt;&lt;/h3&gt;
&lt;p&gt;&lt;span data-contrast=&quot;auto&quot;&gt;Dark patterns are practices that impair users’ ability to make informed and autonomous decisions. Many companies deploy these tactics through interface design to steer choices and influence behavior. Their impact goes beyond poor consumer decisions. &lt;/span&gt;&lt;strong&gt;&lt;span data-contrast=&quot;auto&quot;&gt;Dark patterns push users to share personal data they would not otherwise disclose and undermine autonomy&lt;/span&gt;&lt;/strong&gt;&lt;span data-contrast=&quot;auto&quot;&gt; by making alternatives harder to access.&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span data-contrast=&quot;auto&quot;&gt;The DFA should address this by clearly prohibiting misleading interfaces that distort user choice in commercial contexts. While the Digital Services Act introduced a definition, it only partially bans such practices and leaves gaps across existing consumer law rules. The DFA should close these gaps by, at the very least, introducing explicit prohibitions and clearer enforcement rules, without resorting to design mandates.&lt;/span&gt;&lt;/p&gt;
&lt;h3&gt;&lt;b&gt;&lt;span data-contrast=&quot;none&quot;&gt;Tackle Commercial Surveillance&lt;/span&gt;&lt;/b&gt;&lt;/h3&gt;
&lt;p&gt;&lt;span data-contrast=&quot;auto&quot;&gt;At the core of digital unfairness lies the pervasive collection and use of personal data. Surveillance and profiling drive many of the harms regulators are trying to address, from dark patterns to exploitative personalization. The DFA should tackle these incentives directly by reducing reliance on surveillance-based business models. These practices are fundamentally incompatible with privacy and fairness, and they distort digital markets by rewarding data exploitation rather than quality of service. At a minimum, the DFA should address unfair profiling and surveillance advertising by strengthening privacy rights and banning pay-for-privacy schemes. &lt;strong&gt;Users should not have to trade their data or pay extra to avoid being tracked.&lt;/strong&gt;&lt;/span&gt; &lt;span data-contrast=&quot;auto&quot;&gt;Accordingly, the DFA should support the &lt;/span&gt;&lt;a href=&quot;https://www.eff.org/deeplinks/2025/12/eus-new-digital-package-proposal-promises-red-tape-cuts-guts-gdpr-privacy-rights&quot;&gt;&lt;span data-contrast=&quot;none&quot;&gt;recognition of automated privacy signals&lt;/span&gt;&lt;/a&gt;&lt;span data-contrast=&quot;auto&quot;&gt; by web browsers and mobile operating systems, which give users a better way to reject tracking and exercise their rights. Practices that override such signals through banners or interface design should be considered unfair.&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span data-contrast=&quot;auto&quot;&gt;Addressing surveillance and profiling also protects children, since many online harms are tied to the collection and exploitation of their data. Systems that serve ads or curate content often rely on intrusive profiling practices, raising concerns about privacy and fairness, particularly when applied to minors. Rather than turning to invasive &lt;/span&gt;&lt;a href=&quot;https://www.eff.org/deeplinks/2025/04/digital-identities-and-future-age-verification-europe&quot;&gt;&lt;span data-contrast=&quot;none&quot;&gt;age verification&lt;/span&gt;&lt;/a&gt;&lt;span data-contrast=&quot;auto&quot;&gt;, the focus should be on limiting data use by default.&lt;/span&gt;&lt;/p&gt;
&lt;h3&gt;&lt;b&gt;&lt;span data-contrast=&quot;none&quot;&gt;Strengthen User Sovereignty&lt;/span&gt;&lt;/b&gt;&lt;/h3&gt;
&lt;p&gt;&lt;span data-contrast=&quot;auto&quot;&gt;There is a major gap in how EU law addresses user autonomy in digital markets: many digital products and services still restrict what people can do with what they pay for through opaque or one-sided licensing terms, technical protection measures, and remote controls. These mechanisms increasingly limit lawful use, modification, or access after purchase, allowing providers to revoke access, disable functionalities, or degrade performance over time. In practice, this turns ownership into a conditional rental.&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span data-contrast=&quot;auto&quot;&gt;Consumers must be able to use and resell digital goods without hidden limitations and with clear licensing terms.&lt;/span&gt; &lt;strong&gt;&lt;span data-contrast=&quot;auto&quot;&gt;Too often, technical and contractual lock-ins, including remote lockouts and unilateral restrictions on functionality, erode that control.&lt;/span&gt;&lt;/strong&gt; &lt;span data-contrast=&quot;auto&quot;&gt;Recent legal reforms show that progress is possible. Rules such as those under the Digital Markets Act have begun to curb technical and contractual barriers and promote user choice. However, many &lt;a href=&quot;https://storage02.forbrukerradet.no/media/2026/02/breaking-free-pathways-to-a-fair-technological-future.pdf&quot;&gt;restrictions persist&lt;/a&gt;.&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span data-contrast=&quot;auto&quot;&gt;The DFA must address these practices by targeting unfair post-sale restrictions and strengthening users’ ability to control and switch services. This means setting clear limits on unfair terms and misleading practices, alongside robust transparency on how digital services function over time. It should also strengthen interoperability and support user control, allowing people to access third-party applications and to let trusted applications act on their behalf, reducing lock-in and expanding meaningful choice in how users interact with digital services.&lt;/span&gt;&lt;/p&gt;

&lt;/div&gt;&lt;/div&gt;&lt;/div&gt;</description>
     <pubDate>Mon, 04 May 2026 15:33:51 +0000</pubDate>
 <guid isPermaLink="false">112020 at https://www.eff.org</guid>
 <category domain="https://www.eff.org/issues/eu-policy">EU Policy</category>
 <category domain="https://www.eff.org/issues/privacy">Privacy</category>
 <category domain="https://www.eff.org/issues/international">International</category>
 <category domain="https://www.eff.org/type-blog-post/policy-analysis">Policy Analysis</category>
 <dc:creator>Christoph Schmon</dc:creator>
 <enclosure url="https://www.eff.org/files/banner_library/dsa-principle-4.png" alt="European Union flag with icon of person with a heart in center" type="image/png" length="56017" />
  </item>
  <item>
    <title>A Bridge to Somewhere: How to Link Your Mastodon, Bluesky, or Other Federated Accounts</title>
    <link>https://www.eff.org/deeplinks/2026/04/bridge-somewhere-how-link-your-mastodon-bluesky-or-other-federated-accounts</link>
    <description>&lt;div class=&quot;field field--name-body field--type-text-with-summary field--label-hidden&quot;&gt;&lt;div class=&quot;field__items&quot;&gt;&lt;div class=&quot;field__item even&quot;&gt;&lt;p&gt;One of the central promises of open social media services is interoperability—the idea that wherever you personally decide to post doesn’t require others to be there just to follow what you have to say. Think of it like a radio broadcast: you want to reach people and don&#039;t care where they are or what device they&#039;re using. For example, in theory, a Bluesky user can follow someone on Mastodon or Threads without having to create a Mastodon or Threads account. But these systems are still a work in progress, and you might need to tweak a few things to get it working correctly.&lt;/p&gt;&lt;p&gt;Right now, broadcasting your message across social platforms can be a funky experience at best, deliberately broken up by oligopolists. The idea of the open web was baked into the internet via protocols like HTML and RSS that made it easy for anyone to visit a website or follow most blogs. The fact social media isn’t similarly open reflects an intentional choice to privatize the internet. &lt;/p&gt;&lt;p&gt;Bridging and managing your posts so they’re viewable outside a singular source is part of the broader &lt;a href=&quot;https://indieweb.org/POSSE&quot;&gt;philosophy of POSSE&lt;/a&gt;, short for Post Own Site Syndicate Elsewhere (sometimes its Post Own Site, Share Everywhere). Instead of managing several accounts across different services, you post once to one primary site (which might be your personal website, or just one social media account), then set it up so it automatically publishes everywhere else. This way, it doesn’t matter where you or your audience is, and they&#039;re not walled off by account registration requirements. &lt;/p&gt;&lt;p&gt;We’ll come back around to POSSE at the end of this post, but for now, let’s assume you just want your current main open social media account to actually have a chance to reach the most people it can. &lt;/p&gt;&lt;h3&gt;Why Post to the Open Social Web&lt;/h3&gt;&lt;p&gt;Because the &lt;a href=&quot;https://www.eff.org/deeplinks/2024/06/whats-difference-between-mastodon-bluesky-and-threads&quot;&gt;Fediverse and ATmosphere use different protocols&lt;/a&gt;, we need to use a third-party tool so accounts can communicate with each other. For that, we’ll need a bridge. As the name suggests, a bridge can connect one social media account to another, so you can post once and spread your message across several places. This isn’t just some niche concept: major blogging platforms like Wordpress and Ghost integrate posting to the Fediverse.&lt;/p&gt;&lt;p&gt;Bridging is an important facet of POSSE, but also something more people should consider, even if they don’t run their own websites. For example, if you don’t want to create a Threads account just to interact with your one friend who uses that platform, you shouldn’t have to. The good news is, you don’t. There are several bridging services, like &lt;a href=&quot;https://github.com/msonnb/fedisky&quot;&gt;Fedisky&lt;/a&gt;, &lt;a href=&quot;https://rss-parrot.net/&quot;&gt;RSS Parrot&lt;/a&gt;, and &lt;a href=&quot;https://fietkau.software/pinhole&quot;&gt;pinhole&lt;/a&gt;, but &lt;a href=&quot;https://fed.brid.gy/&quot;&gt;Bridgy Fed&lt;/a&gt; is currently the simplest to use, so we’ll focus on that. &lt;/p&gt;&lt;h3&gt;How to Post to Bluesky from Mastodon&lt;/h3&gt;&lt;p&gt;From your Mastodon account (or other Fediverse account, for simplicity’s sake we’ll stick to Mastodon throughout), search for the username &lt;code&gt;@bsky.brid.gy@bsky.brid.gy&lt;/code&gt; and follow that account. Once you do, the account will follow you back and you’ll be bridged and people can find you from their Bluesky account. You should also get a DM with your bridged username. If you don’t see the &lt;code&gt;@bsky.brid.gy@bsky.brid.gy&lt;/code&gt; user when you search, your Mastodon instance may be blocking the bridging tool. &lt;/p&gt;&lt;p&gt;Threads users who have enabled Fediverse sharing will be able to find you with your standard Mastodon username (ie, &lt;code&gt;@your_user_name@mastodon.social&lt;/code&gt;), but if they haven’t enabled sharing, they will not be able to see your account. While this search is still a beta feature, you might find it easier to share the full URL, which would look like this: &lt;code&gt;https://www.threads.net/fediverse_profile/@your_user_name@mastodon.social&lt;/code&gt;&lt;/p&gt;&lt;p&gt;&lt;strong&gt;People on Bluesky can find you by&lt;/strong&gt;: Either searching for your Mastodon username, or if that doesn’t work, &lt;code&gt;@your_user_name.instance.ap.brid.gy&lt;/code&gt;. For example, if your username is &lt;code&gt;@eff@mastodon.social&lt;/code&gt;, it would appear as &lt;code&gt;@eff.mastodon.social.ap.brid.gy&lt;/code&gt;.&lt;/p&gt;&lt;p&gt;&lt;/p&gt;&lt;div class=&quot;caption caption-center&quot;&gt;&lt;div class=&quot;caption-width-container&quot; style=&quot;width: 1202px;&quot;&gt;&lt;div class=&quot;caption-inner&quot;&gt;&lt;img title=&quot;an example of a mastodon user profile viewed from threads&quot; src=&quot;/files/2026/04/30/masto_to_bluesky.png&quot; alt=&quot;an example of a mastodon user profile viewed from threads&quot; width=&quot;1202&quot; height=&quot;464&quot; /&gt;&lt;p class=&quot;caption-text&quot;&gt;An example of a Mastodon username from the Bluesky web client.&lt;/p&gt;&lt;/div&gt;&lt;/div&gt;&lt;/div&gt;&lt;h3&gt;How to Post to Mastodon and Bluesky from Threads&lt;/h3&gt;&lt;p&gt;Yes, Threads is technically on the Fediverse, and you can bridge your Threads account to Mastodon or Bluesky (&lt;a href=&quot;https://help.instagram.com/760878905943039&quot;&gt;unless you’re in Europe&lt;/a&gt;, where the feature is disabled), but it’s a different process than on Bluesky and Mastodon.&lt;/p&gt;&lt;ul&gt;&lt;li&gt;Open &lt;strong&gt;&lt;em&gt;Settings&lt;/em&gt;&lt;/strong&gt; &amp;gt; &lt;strong&gt;&lt;em&gt;Account&lt;/em&gt;&lt;/strong&gt; &amp;gt; &lt;strong&gt;&lt;em&gt;Fediverse Sharing&lt;/em&gt;&lt;/strong&gt; and set the option to “On.” This will make your posts visible to Mastodon (or other Fediverse) users, and vice versa. &lt;/li&gt;&lt;li&gt;Once the Fediverse sharing is enabled, you’ll likely need to &lt;a href=&quot;https://fed.brid.gy/docs#troubleshooting&quot;&gt;wait a week&lt;/a&gt;, then you can bridge to Bluesky. Search for and follow the &lt;code&gt;@bsky.brid.gy@bsky.brid.gy&lt;/code&gt; account (it may take some digging to find it, but if that doesn’t work you can try visiting the &lt;a href=&quot;https://threads.com/fediverse_profile/bsky.brid.gy@bsky.brid.gy&quot;&gt;profile page directly&lt;/a&gt;. &lt;/li&gt;&lt;/ul&gt;&lt;p&gt;&lt;strong&gt;People on Mastodon (or other Fediverse accounts) and Bluesky can find you by&lt;/strong&gt;: Mastodon users can find you at, &lt;code&gt;@your_threads_username@threads.net&lt;/code&gt; while Bluesky users will find you at, &lt;code&gt;@your_threads_username.threads.net.ap.brid.gy&lt;/code&gt; (seriously, that will be the username). Note that some Mastodon instances may block Threads users entirely.&lt;/p&gt;&lt;p&gt;&lt;/p&gt;&lt;div class=&quot;caption caption-center&quot;&gt;&lt;div class=&quot;caption-width-container&quot; style=&quot;width: 1204px;&quot;&gt;&lt;div class=&quot;caption-inner&quot;&gt;&lt;img title=&quot;an example of a threads post viewed from mastodon&quot; src=&quot;/files/2026/04/30/threads_to_masto.png&quot; alt=&quot;an example of a threads post viewed from mastodon&quot; width=&quot;1204&quot; height=&quot;442&quot; /&gt;&lt;p class=&quot;caption-text&quot;&gt;An example of a Threads username from the Mastodon web client.&lt;/p&gt;&lt;/div&gt;&lt;/div&gt;&lt;/div&gt;&lt;p&gt;&lt;/p&gt;&lt;div class=&quot;caption caption-center&quot;&gt;&lt;div class=&quot;caption-width-container&quot; style=&quot;width: 1214px;&quot;&gt;&lt;div class=&quot;caption-inner&quot;&gt;&lt;img title=&quot;an example of a threads user profile viewed from bluesky&quot; src=&quot;/files/2026/04/30/threads_to_bluesky.png&quot; alt=&quot;an example of a threads user profile viewed from bluesky&quot; width=&quot;1214&quot; height=&quot;402&quot; /&gt;&lt;p class=&quot;caption-text&quot;&gt;An example of a Threads username from the Bluesky web client.&lt;/p&gt;&lt;/div&gt;&lt;/div&gt;&lt;/div&gt;&lt;h3&gt;How to Post to Mastodon and Threads from Bluesky&lt;/h3&gt;&lt;p&gt;From your Bluesky (or other ATProto) account, search for the username, “@ap.brid.gy” and follow that account. Once you do, the account will follow you back and you’ll be bridged, so people can follow you from Mastodon or other Fediverse accounts. You should also get a DM with your bridged username.&lt;/p&gt;&lt;p&gt;&lt;strong&gt;People on Mastodon (or other Fediverse account) and Threads can find you by: &lt;/strong&gt;Your username will appear as &lt;code&gt;@your_bluesky_username@bsky.brid.gy&lt;/code&gt;. For example, if your Bluesky username is &lt;code&gt;@eff@bsky.social&lt;/code&gt;, it would appear as &lt;code&gt;@eff.bksy.social@bsky.brid.gy&lt;/code&gt;.&lt;/p&gt;&lt;p&gt;&lt;/p&gt;&lt;div class=&quot;caption caption-center&quot;&gt;&lt;div class=&quot;caption-width-container&quot; style=&quot;width: 1198px;&quot;&gt;&lt;div class=&quot;caption-inner&quot;&gt;&lt;img title=&quot;an example of a bluesky user profile viewed from mastofon&quot; src=&quot;/files/2026/04/30/bluesky_to_masto.png&quot; alt=&quot;an example of a bluesky user profile viewed from mastofon&quot; width=&quot;1198&quot; height=&quot;440&quot; /&gt;&lt;p class=&quot;caption-text&quot;&gt;An example of a Bluesky username from the Mastodon web client.&lt;/p&gt;&lt;/div&gt;&lt;/div&gt;&lt;/div&gt;&lt;h3&gt;How to Post Everywhere from Your Own Website&lt;/h3&gt;&lt;p&gt;You can bridge more than social media accounts. If you have your own website, you can bridge that too (as long as it supports &lt;a href=&quot;https://microformats.org/wiki/microformats2&quot;&gt;microformats&lt;/a&gt; and &lt;a href=&quot;https://webmention.net/&quot;&gt;webmention&lt;/a&gt;, or an Atom or RSS feed. If you have a blog, there’s a good chance you’re already good to go). When you do so, the bridged account will either post the full text (or image) of whatever you post to your personal site, or a link to that content,  depending on &lt;a href=&quot;https://fed.brid.gy/docs#web-which-parts&quot;&gt;how your website is set up&lt;/a&gt;. You’ll also probably want to log into your &lt;a href=&quot;https://fed.brid.gy/user-page&quot;&gt;Bridgy user page&lt;/a&gt; so you can manage the account. &lt;/p&gt;&lt;p&gt;&lt;strong&gt;Where people can find your bridged account&lt;/strong&gt;: Usually, a user can just search for your website’s URL on their decentralized social network of choice, or enter it on the &lt;a href=&quot;https://fed.brid.gy/web-site&quot;&gt;Bridgy Fed page&lt;/a&gt;. But if that doesn’t work, they can try &lt;code&gt;@yourdomain.com@web.brid.gy&lt;/code&gt; from Mastodon or &lt;code&gt;@yourdomain.com.web.brid.gy&lt;/code&gt; from Bluesky.&lt;/p&gt;&lt;p&gt;&lt;/p&gt;&lt;div class=&quot;caption caption-center&quot;&gt;&lt;div class=&quot;caption-width-container&quot; style=&quot;width: 1208px;&quot;&gt;&lt;div class=&quot;caption-inner&quot;&gt;&lt;img title=&quot;an example of a website profile viewed from mastodon&quot; src=&quot;/files/2026/04/30/website_to_masto.png&quot; alt=&quot;an example of a website profile viewed from mastodon&quot; width=&quot;1208&quot; height=&quot;460&quot; /&gt;&lt;p class=&quot;caption-text&quot;&gt;An example of a bridged website username in the Mastodon web client.&lt;/p&gt;&lt;/div&gt;&lt;/div&gt;&lt;/div&gt;&lt;h3&gt;How Your Account Username Looks on Each Platform&lt;/h3&gt;&lt;p&gt;   &lt;img title=&quot;Examples of how each social media username looks on other platforms&quot; src=&quot;/files/2026/05/05/screenshot_2026-04-30_at_11.15.35_am-corrected.png&quot; alt=&quot;Examples of how each social media username looks on other platforms&quot; width=&quot;2008&quot; height=&quot;674&quot; /&gt;&lt;/p&gt;&lt;h3&gt;You’re Bound to Run Into Some Quirks&lt;/h3&gt;&lt;ul&gt;&lt;li&gt;Sometimes messages take a little while to crossover between networks, and sometimes they don&#039;t crossover at all.&lt;/li&gt;&lt;li&gt;You can’t log into a bridged account like a regular account, but Bridgy Fed &lt;a href=&quot;https://fed.brid.gy/login&quot;&gt;does provide some tools&lt;/a&gt; to see incoming notifications and recent activity in case they’re not coming through properly.&lt;/li&gt;&lt;li&gt;ActivityPub and ATProto don’t have the same feature set, so you will have certain capabilities for one account you might not have in another. For example, you can edit posts on Mastodon, but not on Bluesky. If you edit a post that’s bridged from Mastodon to Bluesky, the Bluesky post will not be updated. &lt;/li&gt;&lt;li&gt;Replies can sometimes get lost, especially if the person (or people) replying to you doesn’t have sharing turned on.&lt;/li&gt;&lt;li&gt;Ownership of accounts can get weird. For example, if you post to your own website and use a tool like Wordpress or Ghost for federation (more info below), you don’t necessarily get access to a “normal” social media account, with a standard login and password.&lt;/li&gt;&lt;li&gt;And more! This is still a work in progress that has some technical quirks, but it’s improving all the time, and it’s best to keep telling yourself that troubleshooting is part of the fun.&lt;/li&gt;&lt;/ul&gt;&lt;h2&gt;Other Cool Stuff You Can Do&lt;/h2&gt;&lt;p&gt;As mentioned up top, there’s a lot more you can do, and an increasing number of tools are making this process simpler. Bridgy Fed is one way to post to more places from a single account, but it’s far from the only way to do so. Here are just a few examples.&lt;/p&gt;&lt;ul&gt;&lt;li&gt;&lt;a href=&quot;https://micro.blog/about/crosspost&quot;&gt;Micro.blog&lt;/a&gt; is a paid service where you can blog from your own domain name, then post automatically to Mastodon, Bluesky, Threads, Tumblr, Nostr, LinkedIn, Medium, Pixelfed, and Flickr.&lt;/li&gt;&lt;li&gt;&lt;a href=&quot;https://ghost.org/&quot;&gt;Ghost&lt;/a&gt; is a blogging and newsletter platform &lt;a href=&quot;https://ghost.org/changelog/social-web-beta/&quot;&gt;that offers direct integration&lt;/a&gt; with the Fediverse, as well as support for Bluesky. Wordpress offers the option to join the Fediverse through a &lt;a href=&quot;https://wordpress.org/plugins/activitypub/&quot;&gt;community plugin&lt;/a&gt;. Other newsletter platforms, like Buttondown, &lt;a href=&quot;https://buttondown.com/features/integrations/mastodon&quot;&gt;also have&lt;/a&gt; plans for federation. &lt;/li&gt;&lt;li&gt;&lt;a href=&quot;https://surf.social/&quot;&gt;Surf.social&lt;/a&gt; is a landing page and social media utility where you can show off all your various accounts (Federated or not). From the reader point of view, you can follow one publications numerous types of posts in one place. For example, &lt;a href=&quot;https://404media.surf.social/&quot;&gt;404 Media’s Surf.social&lt;/a&gt; feed includes its YouTube feed, podcast feed, and its journalist’s social media posts.&lt;/li&gt;&lt;li&gt;If you think these new handles are a bit ugly, you can use a custom domain for &lt;a href=&quot;https://fed.brid.gy/docs#bluesky-enhanced&quot;&gt;Bluesky&lt;/a&gt; or &lt;a href=&quot;https://fed.brid.gy/docs#fediverse-enhanced&quot;&gt;fediverse account&lt;/a&gt; from your website. &lt;/li&gt;&lt;/ul&gt;&lt;p&gt;Of course, there are plenty of other tools, blogging platforms, and other utilities out there to help facilitate posting and bridging accounts, with new ones coming along every day. &lt;/p&gt;&lt;p&gt;With proper support, time, and effort, eventually we will all be able to seamlessly interact across platforms, take our follows and followers to other services when a platform no longer suits our needs, and interact with a variety of web content regardless of what platform hosts it. Until then, we still need to do some DIY work, support the services we want to succeed, and push for more platforms and services to support federated protocols.&lt;/p&gt;&lt;p&gt;&lt;em&gt;Correction: an earlier version of this blog was missing the full Bluesky username in the account username chart.&lt;/em&gt;&lt;/p&gt;

&lt;/div&gt;&lt;/div&gt;&lt;/div&gt;</description>
     <pubDate>Fri, 01 May 2026 14:52:09 +0000</pubDate>
 <guid isPermaLink="false">112021 at https://www.eff.org</guid>
 <category domain="https://www.eff.org/issues/public-interest-internet">The Public Interest Internet</category>
 <category domain="https://www.eff.org/issues/innovation">Creativity &amp; Innovation</category>
 <category domain="https://www.eff.org/issues/social-networks">Social Networks</category>
 <dc:creator>Thorin Klosowski</dc:creator>
 <enclosure url="https://www.eff.org/files/banner_library/decentralization-banner.png" alt="Personified mushrooms communicating from underground homes" type="image/png" length="594967" />
  </item>
  <item>
    <title>Utah’s New Law Targeting VPNs Goes Into Effect May 6th</title>
    <link>https://www.eff.org/deeplinks/2026/04/utahs-new-law-regulating-vpns-goes-effect-next-week</link>
    <description>&lt;div class=&quot;field field--name-body field--type-text-with-summary field--label-hidden&quot;&gt;&lt;div class=&quot;field__items&quot;&gt;&lt;div class=&quot;field__item even&quot;&gt;&lt;p&gt;&lt;em&gt;&lt;strong&gt;Update, May 11, 2026: &lt;/strong&gt;Utah has agreed to not enforce the VPN law until Sept. 3, 2026 after Aylo, the parent company of Pornhub.com, challenged the law in court.&lt;/em&gt;&lt;/p&gt;
&lt;p&gt;&lt;span&gt;For the last couple of years, we’ve watched the same predictable cycle play out across the globe: a state (or country) passes a clunky age-verification mandate, and, without fail, &lt;/span&gt;&lt;a href=&quot;https://www.eff.org/pages/vpns-are-not-solution-age-gating-mandates&quot;&gt;&lt;span&gt;Virtual Private Network (VPN) usage&lt;/span&gt;&lt;/a&gt; &lt;a href=&quot;https://www.eff.org/deeplinks/2025/01/vpns-are-not-solution-age-verification-laws&quot;&gt;&lt;span&gt;surges&lt;/span&gt;&lt;/a&gt;&lt;span&gt; as residents scramble to maintain their privacy and anonymity. We&#039;ve seen this everywhere—from states like &lt;/span&gt;&lt;a href=&quot;https://www.cbsnews.com/miami/news/pornhub-florida-vpn-google-searches-skyrocket/&quot;&gt;&lt;span&gt;Florida&lt;/span&gt;&lt;/a&gt;&lt;span&gt;, &lt;/span&gt;&lt;a href=&quot;https://www.techradar.com/vpn/vpn-privacy-security/missouris-search-for-vpns-lifts-off-as-the-first-day-of-age-verification-arrives&quot;&gt;&lt;span&gt;Missouri&lt;/span&gt;&lt;/a&gt;&lt;span&gt;, &lt;/span&gt;&lt;a href=&quot;https://www.vpnmentor.com/news/vpn-demand-surge-texas/&quot;&gt;&lt;span&gt;Texas&lt;/span&gt;&lt;/a&gt;&lt;span&gt;, and &lt;/span&gt;&lt;a href=&quot;https://www.vpnmentor.com/blog/research/vpn-demand-surge-utah/&quot;&gt;&lt;span&gt;Utah&lt;/span&gt;&lt;/a&gt;&lt;span&gt;, to countries like the &lt;/span&gt;&lt;a href=&quot;https://www.wired.com/story/vpn-use-spike-age-verification-laws-uk/&quot;&gt;&lt;span&gt;United Kingdom&lt;/span&gt;&lt;/a&gt;&lt;span&gt;, &lt;/span&gt;&lt;a href=&quot;https://www.techradar.com/vpn/vpn-privacy-security/vpns-surge-in-australia-as-mandatory-age-verification-for-adult-content-begins&quot;&gt;&lt;span&gt;Australia&lt;/span&gt;&lt;/a&gt;&lt;span&gt;, and &lt;/span&gt;&lt;a href=&quot;https://www.techradar.com/vpn/vpn-privacy-security/vpn-interest-surges-in-indonesia-as-under-16-social-media-ban-takes-effect&quot;&gt;&lt;span&gt;Indonesia&lt;/span&gt;&lt;/a&gt;&lt;span&gt;. &lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span&gt;Instead of realizing that mass surveillance and age gates aren&#039;t exactly crowd favorites, Utah lawmakers have decided that &lt;/span&gt;&lt;a href=&quot;https://www.xbiz.com/news/296279/utah-porn-tax-bill-with-vpn-provisions-passes-state-senate&quot;&gt;&lt;span&gt;VPNs themselves are the real issue&lt;/span&gt;&lt;/a&gt;&lt;span&gt;.&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span&gt;On May 6, 2026, Utah will become, to EFF’s knowledge, the first state in the nation to target the use of VPNs to avoid legally mandated age-verification gates. While advocates in states like &lt;/span&gt;&lt;a href=&quot;https://www.cnet.com/tech/services-and-software/wisconsin-reverses-decision-to-ban-vpns-in-age-verification-bill/&quot;&gt;&lt;span&gt;Wisconsin successfully forced the removal of similar provisions&lt;/span&gt;&lt;/a&gt;&lt;span&gt; due to constitutional and technical concerns, Utah is proceeding with a mandate that threatens to significantly undermine digital privacy rights. &lt;/span&gt;&lt;/p&gt;
&lt;h2&gt;&lt;b&gt;What the Bill Does&lt;/b&gt;&lt;/h2&gt;
&lt;p&gt;&lt;span&gt;Formally known as the “Online Age Verification Amendments,” &lt;/span&gt;&lt;a href=&quot;https://le.utah.gov/~2026/bills/static/SB0073.html&quot;&gt;&lt;span&gt;Senate Bill 73 (SB 73)&lt;/span&gt;&lt;/a&gt;&lt;span&gt; was signed by Governor Spencer Cox on March 19, 2026. While the majority of the bill consists of provisions related to a 2% tax on revenues from online adult content that is set to take effect in October, one of the more immediate concerns for EFF is the section regulating VPN access, which goes into effect this coming Wednesday.&lt;/span&gt;&lt;/p&gt;
&lt;h3&gt;The VPN Provisions&lt;/h3&gt;
&lt;p&gt;&lt;span&gt;The new law explicitly addresses VPN use in Section 14, which amends Section 78B-3-1002 of existing Utah statutes in two primary ways:&lt;/span&gt;&lt;/p&gt;
&lt;ol&gt;
&lt;li&gt;&lt;b&gt;Regulation based on physical location:&lt;/b&gt;&lt;span&gt; Under the law, an individual is considered to be accessing a website from Utah if they are physically located there, regardless of whether they use a VPN, proxy server, or other means to disguise their geographic location.&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;b&gt;Ban on sharing VPN instructions:&lt;/b&gt;&lt;span&gt; Commercial entities that host &quot;a substantial portion of material harmful to minors&quot; are now prohibited from facilitating or encouraging the use of a VPN to bypass age checks. This includes providing instructions on how to use a VPN or providing the means to circumvent geofencing.&lt;/span&gt;&lt;/li&gt;
&lt;/ol&gt;
&lt;p&gt;&lt;span&gt;By holding companies liable for verifying the age of anyone physically in Utah, even those using a VPN, the law creates a massive &quot;&lt;/span&gt;&lt;a href=&quot;https://www.techradar.com/vpn/vpn-privacy-security/a-liability-trap-nordvpn-slams-utah-age-verification-law-targeting-vpn-users&quot;&gt;&lt;span&gt;liability trap&lt;/span&gt;&lt;/a&gt;&lt;span&gt;.&quot; Just like &lt;/span&gt;&lt;a href=&quot;https://www.eff.org/deeplinks/2025/11/lawmakers-want-ban-vpns-and-they-have-no-idea-what-theyre-doing&quot;&gt;&lt;span&gt;we argued in the case of the Wisconsin bill&lt;/span&gt;&lt;/a&gt;&lt;span&gt;, if a website cannot reliably detect a VPN user&#039;s true location and the law requires it to do so for all users in a particular state, then the legal risk could push the site to either ban all known VPN IPs, or to mandate age verification for every visitor globally. This would subject millions of users to invasive identity checks or blocks to their VPN use, regardless of where they actually live. &lt;/span&gt;&lt;/p&gt;
&lt;p class=&quot;take-action&quot;&gt;&lt;a href=&quot;https://supporters.eff.org/donate/vpn&quot;&gt;JOIN EFF&lt;/a&gt;&lt;/p&gt;
&lt;p class=&quot;take-explainer&quot;&gt;HELP US STOP THESE VPN BILLS ACROSS THE COUNTRY&lt;/p&gt;
&lt;h2&gt;&lt;b&gt;&quot;Don&#039;t Ask, Don&#039;t Tell&quot;&lt;/b&gt;&lt;/h2&gt;
&lt;p&gt;&lt;span&gt;In practice, SB 73 is different from the &lt;/span&gt;&lt;a href=&quot;https://www.eff.org/deeplinks/2026/02/eff-wisconsin-legislature-vpn-bans-are-still-terrible-idea&quot;&gt;&lt;span&gt;Wisconsin proposal&lt;/span&gt;&lt;/a&gt;&lt;span&gt; in that it stops short of a total VPN ban. Instead, it discourages using VPNs by imposing the liability described above and by muzzling the websites themselves from sharing information about VPNs. This raises significant First Amendment concerns, as it prevents platforms from providing basic, truthful information about a lawful privacy tool to their users. &lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span&gt;Unlike previous drafts seen in other states, SB 73 doesn&#039;t explicitly ban the use of a VPN. Under a &quot;don&#039;t ask, don&#039;t tell&quot; style of enforcement, websites likely only have an obligation to ask for proof of age if they actually learn that a user is physically in Utah and using a VPN. If a site doesn’t know a user is in Utah, their broader obligation to police VPNs remains murky. So, while SB 73 isn’t as extreme as the discarded Wisconsin proposal, it remains a dangerous precedent.&lt;/span&gt;&lt;/p&gt;
&lt;h3&gt;&lt;b&gt;Technical Feasibility&lt;/b&gt;&lt;/h3&gt;
&lt;p&gt;&lt;span&gt;Then there is also the question of technical feasibility: Blocking all known VPN and proxy IP addresses is a technical whack-a-mole that likely no company can win. Providers add new IP addresses constantly, and no comprehensive blocklist exists. Complying with Utah’s requirements would require impossible technical feats.&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span&gt;The internet is built to, and will always, route around censorship. If Utah successfully hampers commercial VPN providers, motivated users will transition to non-commercial proxies, private tunnels through cloud services like AWS, or residential proxies that are virtually indistinguishable from standard home traffic. These workarounds will emerge within hours of the law taking effect. Meanwhile, the collateral damage will fall on businesses, journalists, and survivors of abuse who rely on commercial VPNs for essential data security.&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span&gt;These provisions won&#039;t stop a tech-savvy teenager, but they certainly will impact the privacy of every regular Utah resident who just wants to keep their data out of the hands of brokers or malicious actors.&lt;/span&gt;&lt;/p&gt;
&lt;h2&gt;&lt;b&gt;Uncharted Territory&lt;/b&gt;&lt;/h2&gt;
&lt;p&gt;&lt;span&gt;Lawmakers have watched age-verification mandates fail and, instead of reconsidering the approach, have decided to wage war on privacy itself. &lt;/span&gt;&lt;a href=&quot;https://www.cato.org/blog/policymakers-should-stop-going-after-vpns-enforce-internet-age-restrictions&quot;&gt;&lt;span&gt;As the Cato Institute&lt;/span&gt;&lt;/a&gt;&lt;span&gt; states: &lt;/span&gt;&lt;/p&gt;
&lt;blockquote&gt;&lt;p&gt;&lt;i&gt;&lt;span&gt;“The point is that when an internet policy can be avoided by a relatively common technology that often provides significant privacy and security benefits, maybe the policy is the problem. Age verification regimes do plenty of damage to online speech and privacy, but attacking VPNs to try to keep them from being circumvented is doubling down on this damaging approach.&quot;&lt;/span&gt;&lt;/i&gt;&lt;/p&gt;
&lt;/blockquote&gt;
&lt;p&gt;&lt;span&gt;Attacks on VPNs are, at their core, attacks on the tools that enable digital privacy. Utah is setting a precedent that prioritizes government control over the fundamental architecture of a private and secure internet, and it won’t stop at the state’s borders. Regulators in countries outside the U.S. are still eyeing VPN restrictions, with the UK Children’s Commissioner &lt;/span&gt;&lt;a href=&quot;https://www.bbc.com/news/articles/cn438z3ejxyo&quot;&gt;&lt;span&gt;calling VPNs a&lt;/span&gt;&lt;/a&gt;&lt;span&gt; “loophole that needs closing” and the French Minister Delegate for Artificial Intelligence and Digital Affairs &lt;/span&gt;&lt;a href=&quot;https://www.msn.com/en-us/news/technology/france-might-seek-restrictions-on-vpn-use-in-campaign-to-keep-minors-off-social-media/ar-AA1Vwcws&quot;&gt;&lt;span&gt;saying VPNs are&lt;/span&gt;&lt;/a&gt;&lt;span&gt; “the next topic on my list” after the country enacted a ban on social media for kids under 15.&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span&gt;As this law goes into effect, we are entering uncharted territory. Lawmakers who can’t distinguish between a security tool and a &quot;loophole&quot; are now writing the rules for one of the most complex infrastructures on Earth. And we can assure that the result won&#039;t be a safer internet, only an increasingly less private one.&lt;/span&gt;&lt;/p&gt;
&lt;p class=&quot;take-action&quot;&gt;&lt;a href=&quot;https://supporters.eff.org/donate/vpn&quot;&gt;SUPPORT EFF&lt;/a&gt;  &lt;/p&gt;
&lt;p class=&quot;take-explainer&quot;&gt;BECOME AN EFF MEMBER TODAY&lt;/p&gt;

&lt;/div&gt;&lt;/div&gt;&lt;/div&gt;</description>
     <pubDate>Thu, 30 Apr 2026 23:33:38 +0000</pubDate>
 <guid isPermaLink="false">112024 at https://www.eff.org</guid>
 <category domain="https://www.eff.org/issues/age-verification">Age Verification and Age Gating: Resource Hub</category>
 <category domain="https://www.eff.org/issues/security">Security</category>
 <dc:creator>Rindala Alajaji</dc:creator>
 <enclosure url="https://www.eff.org/files/banner_library/secret-identity-2_0.png" alt="" type="image/png" length="10300" />
  </item>
  <item>
    <title>Open Records Laws Reveal ALPRs’ Sprawling Surveillance. Now States Want to Block What the Public Sees.</title>
    <link>https://www.eff.org/deeplinks/2026/04/open-records-laws-reveal-alprs-sprawling-surveillance-now-states-want-block-what</link>
    <description>&lt;div class=&quot;field field--name-body field--type-text-with-summary field--label-hidden&quot;&gt;&lt;div class=&quot;field__items&quot;&gt;&lt;div class=&quot;field__item even&quot;&gt;&lt;p&gt;&lt;span&gt;Reporters, community advocates, EFF, and others have used public records laws to reveal and counteract abuse, misuse, and &lt;/span&gt;&lt;a href=&quot;https://www.eff.org/deeplinks/2025/10/flock-safety-and-texas-sheriff-claimed-license-plate-search-was-missing-person-it&quot;&gt;&lt;span&gt;fraudulent narratives&lt;/span&gt;&lt;/a&gt;&lt;span&gt; around how law enforcement agencies across the country use and share data collected by automated license plate readers (ALPRs). EFF is alarmed by recent laws in several states that have blocked public access to data collected by ALPRs, including, in some cases, information derived from ALPR data. We do not support pending bills in Arizona and Connecticut that would block the public oversight capabilities that ALPR information offers.&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;a href=&quot;https://www.rcfp.org/open-government-guide/&quot;&gt;&lt;span&gt;Every state&lt;/span&gt;&lt;/a&gt;&lt;span&gt; has laws granting members of the public the right to obtain records from state and local governments. These are often called “freedom of information acts” (FOIAs) or “public records acts” (PRAs). They are a powerful check by the people on their government, and EFF frequently advocates for robust public access and &lt;/span&gt;&lt;a href=&quot;https://www.eff.org/issues/transparency&quot;&gt;&lt;span&gt;uses the laws to scrutinize government surveillance&lt;/span&gt;&lt;/a&gt;&lt;span&gt;. &lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span&gt;But lawmakers across the country, often in response to public scrutiny of police ALPRs, are introducing or enacting measures aimed at excluding broad swaths of ALPR information from disclosure under these public records laws. This could include whole categories of important information: general information about the extent of law enforcement use; details on ALPR sharing across policing agencies; data on the number of license plate scans conducted, where they happened, and how many “hits” for license plates of interest actually occur; analyses on how many false matches or other errors occur; and images taken of individuals’ own vehicles. &lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span&gt;No thanks. Public records and public scrutiny of ALPR programs have shown that people are &lt;/span&gt;&lt;a href=&quot;https://www.eff.org/deeplinks/2024/11/human-toll-alpr-errors&quot;&gt;&lt;span&gt;harmed by these systems&lt;/span&gt;&lt;/a&gt;&lt;span&gt; and that retained ALPR data &lt;/span&gt;&lt;a href=&quot;https://www.eff.org/cases/siren-v-san-jose&quot;&gt;&lt;span&gt;violates people’s privacy&lt;/span&gt;&lt;/a&gt;&lt;span&gt;. In this moment, lawmakers should not be completely cutting off access to public records that document the abuses perpetuated by ALPRs. &lt;/span&gt;&lt;/p&gt;
&lt;h4&gt;&lt;b&gt;Transparency with privacy&lt;/b&gt;&lt;/h4&gt;
&lt;p&gt;&lt;span&gt;To be sure, there are legitimate concerns about wholesale public disclosure of raw ALPR data. After all, many of the harms people experience from these systems are based on the government’s collection, retention, and use of this information. Public transparency rights should not exacerbate the privacy harms suffered by people subjected to ALPR surveillance. But many current proposals do not address legitimate privacy concerns in a measured way, much less seek to harmonize people’s privacy with the public’s right to know.&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span&gt;There is a better path to balancing privacy and transparency rights than outright bans or total disclosure. &lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span&gt;Any legislative proposal concerning public access to ALPR data must start with this reality: ALPR data is deeply revealing about where a person goes, and thus about what they are doing and who they are doing it with. That’s a reason why &lt;/span&gt;&lt;a href=&quot;https://www.eff.org/deeplinks/2025/12/local-communities-are-winning-against-alpr-surveillance-heres-how-2025-review&quot;&gt;&lt;span&gt;EFF&lt;/span&gt;&lt;/a&gt; &lt;a href=&quot;https://www.eff.org/deeplinks/2026/02/op-ed-san-jose-can-protect-immigrants-ending-flock-surveillance-system&quot;&gt;&lt;span&gt;opposes&lt;/span&gt;&lt;/a&gt; &lt;a href=&quot;https://www.eff.org/deeplinks/2025/12/procurement-power-when-cities-realized-they-can-just-say-no-2025-review&quot;&gt;&lt;span&gt;ALPRs&lt;/span&gt;&lt;/a&gt;&lt;span&gt;. It is dangerous that the police have so much of our ALPR information. Even worse for our privacy would be for police to disclose our ALPR information to our bosses, political opponents, and ex-friends. Or to surveillance-oriented corporations that would use our ALPR information to send us targeted ads, or monetize it by selling it to the highest bidder.&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span&gt;On the other hand, EFF’s firsthand experience using public records from ALPR systems demonstrates the strong accountability value of public access to many kinds of ALPR data, including information like data-sharing reports and network audits. For example, in our &lt;/span&gt;&lt;a href=&quot;https://www.eff.org/pages/what-alpr&quot;&gt;&lt;span&gt;“Data Driven” series&lt;/span&gt;&lt;/a&gt;&lt;span&gt;, we used ALPR data-sharing and hit ratio reports to investigate the extent of ALPR data sharing between police departments and to analyze the number of ALPR scans that are ultimately associated with a crime-related vehicle. We have also identified &lt;/span&gt;&lt;a href=&quot;https://www.eff.org/deeplinks/2025/11/license-plate-surveillance-logs-reveal-racist-policing-against-romani-people&quot;&gt;&lt;span&gt;racist uses of ALPR systems&lt;/span&gt;&lt;/a&gt;&lt;span&gt;, &lt;/span&gt;&lt;a href=&quot;https://www.eff.org/deeplinks/2025/11/how-cops-are-using-flock-safetys-alpr-network-surveil-protesters-and-activists&quot;&gt;&lt;span&gt;ALPR surveillance of protestors&lt;/span&gt;&lt;/a&gt;&lt;span&gt;, and &lt;/span&gt;&lt;a href=&quot;https://www.eff.org/deeplinks/2025/10/flock-safety-and-texas-sheriff-claimed-license-plate-search-was-missing-person-it&quot;&gt;&lt;span&gt;ALPR tracking of a person who sought an abortion&lt;/span&gt;&lt;/a&gt;&lt;span&gt;. Across the country, municipalities have been &lt;/span&gt;&lt;a href=&quot;https://www.eff.org/deeplinks/2025/12/local-communities-are-winning-against-alpr-surveillance-heres-how-2025-review&quot;&gt;&lt;span&gt;shutting down their contracts&lt;/span&gt;&lt;/a&gt;&lt;span&gt; for ALPR use, often citing concerns with data sharing with federal and immigration agents. &lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span&gt;These records are not just informational—they are leverage. Communities, journalists, and local officials have used ALPR disclosures to block new deployments, refuse contract renewals, and terminate existing agreements with surveillance vendors whose practices proved too dangerous to continue. &lt;/span&gt;&lt;a href=&quot;https://www.eff.org/deeplinks/2025/12/local-communities-are-winning-against-alpr-surveillance-heres-how-2025-review&quot;&gt;&lt;span&gt;Without this evidentiary record&lt;/span&gt;&lt;/a&gt;&lt;span&gt;, it is far harder for cities to exercise &lt;/span&gt;&lt;a href=&quot;https://www.eff.org/deeplinks/2025/12/procurement-power-when-cities-realized-they-can-just-say-no-2025-review&quot;&gt;&lt;span&gt;their procurement power&lt;/span&gt;&lt;/a&gt;&lt;span&gt; to say no.&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span&gt;It is not always easy to harmonize transparency and privacy when one person wishes to use a public records law to obtain government records that reveal people’s personal information. The best approach is for public records laws to contain a privacy exemption that requires &lt;/span&gt;&lt;i&gt;&lt;span&gt;balancing&lt;/span&gt;&lt;/i&gt;&lt;span&gt;, on a case-by-case basis, of the transparency benefits versus the privacy costs of disclosure. Many do. These provisions of public records laws already accommodate similar concerns about disclosing personal information of private individuals whose information the government may have collected, government employee’s private data, and other personal information. &lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span&gt;The balancing provisions in these laws are often flexible and allow for nuance. For example, if a government record contains a mix of information that does not reveal people’s private information and some that does, agencies and courts can disclose the non-private information while withholding the truly private information. This is often accomplished with blacking out, or redacting, the private information.&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span&gt;Applying this privacy-and-transparency balancing to ALPR records, it will often be appropriate for the government to disclose some information and withhold other information. Everybody should generally have access to records showing &lt;/span&gt;&lt;i&gt;&lt;span&gt;their own&lt;/span&gt;&lt;/i&gt;&lt;span&gt; movements and other information captured by ALPRs, but the privacy protections in public records laws should foreclose a single person’s ability to get a copy of similar records about everyone else. And even with accessing your own data, there are complications with shared vehicles that should be considered when balancing privacy and transparency.&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span&gt;An example of where it may be appropriate to release unredacted data and images would be vehicles engaged in non-sensitive government business. For example, a member of the public might use ALPR scans of garbage trucks to identify gaps in service, which would not reveal private information. On other hand, it would be inappropriate to release the scans of a government social worker visiting their clients. &lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span&gt;Public records laws should allow a requester to obtain some ALPR information about government surveillance of everyone else, in a manner that accommodates the public transparency interest in disclosure and people’s privacy interests. For example, the best public records laws would disclose the times and places that plate data was collected, but not plate data itself. This can be done, for example, by an agency or court finding that &lt;/span&gt;&lt;a href=&quot;https://www.eff.org/press/releases/victory-eff-wins-access-license-plate-reader-data-study-how-law-enforcement-uses&quot;&gt;&lt;span&gt;disclosing aggregated and/or deidentified ALPR data&lt;/span&gt;&lt;/a&gt;&lt;span&gt; protects the privacy or other interests of individuals captured within the data. The best laws recognize that aggregation or de-identification of databases are redactions in service of individual privacy (which responding agencies must do), and are not creating new public records (which responding agencies sometimes need not do). &lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span&gt;Likewise, in a government audit log of police searches of stored ALPR data, it will often be appropriate to disclose an officer’s investigative purposes to conduct a search, and the officer’s search terms – but not the search term if it is a license plate number. Many people do not want the world to know that they are under police investigation, and many public records laws generally limit the disclosure of such sensitive facts because of the reputational and privacy harm inherent in that disclosure.&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span&gt;Aggregate ALPR information about, for example, the amount of data collected and error rates can have important transparency value and impact government policy. Requiring the public release of that kind of data contributes to informed public discussion of how our policing agencies do their jobs. This kind of information has been used to &lt;/span&gt;&lt;a href=&quot;https://www.eff.org/pages/what-alpr&quot;&gt;&lt;span&gt;study&lt;/span&gt;&lt;/a&gt;&lt;span&gt;, &lt;/span&gt;&lt;a href=&quot;https://www.eff.org/deeplinks/2026/03/traffic-violation-license-plate-reader-mission-creep-already-here&quot;&gt;&lt;span&gt;critique&lt;/span&gt;&lt;/a&gt;&lt;span&gt;, and &lt;/span&gt;&lt;a href=&quot;https://www.eff.org/deeplinks/2025/10/flock-safety-and-texas-sheriff-claimed-license-plate-search-was-missing-person-it&quot;&gt;&lt;span&gt;provide oversight of ALPR use&lt;/span&gt;&lt;/a&gt;&lt;span&gt;.&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span&gt;Thus, the wholesale exemption of ALPR information from disclosure under state public records laws would stymie the public’s ability to monitor how their government is using powerful and controversial surveillance technology. EFF cannot support such laws.&lt;/span&gt;&lt;/p&gt;
&lt;h4&gt;&lt;b&gt;Blocking transparency&lt;/b&gt;&lt;/h4&gt;
&lt;p&gt;&lt;span&gt;In Connecticut, &lt;/span&gt;&lt;a href=&quot;https://www.billtrack50.com/billdetail/1962216/&quot;&gt;&lt;span&gt;SB 4&lt;/span&gt;&lt;/a&gt;&lt;span&gt; is a pending bill that would exclude, from that state’s public records law, information “gathered by” an ALPR or “created through an analysis of the information gathered by” an ALPR. This could ultimately harm individual civilians, who would have less ability to protect themselves from law enforcement that indiscriminately collect vehicle information. Other provisions of this bill would limit government use of ALPRs, and regulate data brokers.&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span&gt;In Arizona, &lt;/span&gt;&lt;a href=&quot;https://www.billtrack50.com/billdetail/1925599&quot;&gt;&lt;span&gt;SB 1111&lt;/span&gt;&lt;/a&gt;&lt;span&gt; would restrict public access to ALPR data “collected by” an ALPR. The bill would even make it a felony to access or use data from an ALPR (or disseminate it) in violation of this article, which apparently might apply to a member of the public who obtained ALPR data with a public records request. The bill’s author claims it adds “&lt;/span&gt;&lt;a href=&quot;https://azmirror.com/2026/02/10/senate-panel-advances-bill-that-shields-police-surveillance-cameras-from-public-scrutiny/&quot;&gt;&lt;span&gt;guardrails&lt;/span&gt;&lt;/a&gt;&lt;span&gt;” for ALPR use.&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span&gt;Earlier this year, Washington state &lt;/span&gt;&lt;a href=&quot;https://app.leg.wa.gov/billsummary/?BillNumber=6002&amp;amp;Year=2025&amp;amp;Initiative=false&amp;amp;emci=dc3d90fc-d4f0-f011-8194-000d3a11f903&amp;amp;emdi=def3d9a0-35f2-f011-8194-000d3a11f903&amp;amp;ceid=7827502&quot;&gt;&lt;span&gt;enacted a law&lt;/span&gt;&lt;/a&gt;&lt;span&gt; that will exempt data “collected by” ALPRs from the state’s public records law. While “bona fide research” will still be a way for some people to obtain ALPR data, this may not include journalists and activists who analyze aggregate data to identify policy flaws. Notably, Washington &lt;/span&gt;&lt;a href=&quot;https://www.eff.org/deeplinks/2025/11/washington-court-rules-data-captured-flock-safety-cameras-are-public-records&quot;&gt;&lt;span&gt;courts found&lt;/span&gt;&lt;/a&gt;&lt;span&gt; last year that information generated by ALPR, including images of an individual’s own vehicle, are public records; this new legislation will override that decision, blocking the ability for people to see what photos police have taken of their own vehicles. Other provisions of this new law will limit government use of ALPRs.&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span&gt;A year ago, Illinois’ &lt;/span&gt;&lt;a href=&quot;https://www.billtrack50.com/billdetail/1824301/&quot;&gt;&lt;span&gt;HB 3339&lt;/span&gt;&lt;/a&gt;&lt;span&gt; ended use of that state’s public records law to obtain ALPR information used and collected by the Illinois State Police (ISP), including both information “gathered by an ALPR” and information “created from the analysis of data generated by an ALPR.” This Illinois language for just the ISP is very similar to what is now being considered in Connecticut for all state and local agencies. &lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span&gt;Sadly, the list goes on. Georgia &lt;/span&gt;&lt;a href=&quot;https://law.justia.com/codes/georgia/title-35/chapter-1/section-35-1-22/&quot;&gt;&lt;span&gt;exempted ALPR data&lt;/span&gt;&lt;/a&gt;&lt;span&gt; (both “captured by or derived from” ALPRs) of any government agency from its open records law. Adding insult to injury, Georgia also made it a misdemeanor to knowingly request, use, or obtain law enforcement’s plate data for any purpose other than law enforcement. &lt;/span&gt;&lt;a href=&quot;https://law.justia.com/codes/maryland/2024/public-safety/title-3/subtitle-5/section-3-509/&quot;&gt;&lt;span&gt;Maryland&lt;/span&gt;&lt;/a&gt;&lt;span&gt; exempted “information gathered by” an ALPR from its public information act. &lt;/span&gt;&lt;a href=&quot;https://law.justia.com/codes/oklahoma/title-47/section-47-7-606-1/&quot;&gt;&lt;span&gt;Oklahoma&lt;/span&gt;&lt;/a&gt;&lt;span&gt; exempted from its open records act the ALPR data “collected, retained or shared” by District Attorneys under that state’s Uninsured Vehicle Enforcement Program.&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span&gt;These laws and bills in seven states are an unwelcome national trend.&lt;/span&gt;&lt;/p&gt;
&lt;h4&gt;&lt;strong&gt;Next steps&lt;/strong&gt;&lt;/h4&gt;
&lt;p&gt;&lt;span&gt;We urge legislators to reject efforts to amend state public records laws to wholly exempt ALPR information. This would diminish meaningful oversight over these controversial technologies. Public disclosure of some ALPR information is important. &lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span&gt;There is a better approach for states that want to harmonize privacy and transparency in the context of ALPR data: &lt;/span&gt;&lt;/p&gt;
&lt;ol&gt;
&lt;li&gt;&lt;span&gt; Open records laws should cover, and not exclude, information collected by ALPRs, and also any public records derived from that information.&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span&gt; Open records laws should have a privacy exemption that applies to all records, including information collected or derived from ALPRs. That exemption should require a case-by-case balancing of the transparency benefits and privacy costs of disclosure. These provisions work best when agencies and courts can analyze the context of the particular records, the weight of the privacy interests and public interests at stake, and other specific facts to fashion the best balance between these competing values. &lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span&gt; When a document contains both exempt and non-exempt information, open records laws should require disclosure of the latter and withholding of the former. The best public records laws allow agencies to black out, or redact, specific private information while disclosing non-private information in the same records, threading the privacy and transparency needle.&lt;/span&gt;&lt;span&gt;&lt;br /&gt;&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span&gt; Finally, in the context of a law enforcement ALPR database (including both data collected by ALPRs and audit logs of police searches of stored ALPR data), the law should permit agencies to disclose aggregated and/or deidentified data, while withholding personally identifiable data. Importantly, the law should recognize that the steps an agency takes to protect individual privacy in ALPR databases should not be construed as creating a new public record. &lt;/span&gt;&lt;/li&gt;
&lt;/ol&gt;
&lt;p&gt;&lt;span&gt;FOIA balancing standards are one layer in a larger governance stack, and work best alongside strong guardrails on whether and how governments procure ALPR systems in the first place: public debate over vendor contracts, binding surveillance ordinances, strict data‑retention limits, and clear pathways to end ALPR programs entirely where the risks prove too great.&lt;/span&gt;&lt;/p&gt;

&lt;/div&gt;&lt;/div&gt;&lt;/div&gt;</description>
     <pubDate>Thu, 30 Apr 2026 16:54:10 +0000</pubDate>
 <guid isPermaLink="false">112022 at https://www.eff.org</guid>
 <dc:creator>Beryl Lipton</dc:creator>
 <dc:creator>Aaron Mackey</dc:creator>
 <dc:creator>Adam Schwartz</dc:creator>
 <enclosure url="https://www.eff.org/files/banner_library/foia-og-1.png" alt="FOIA Flashlight" type="image/png" length="11513" />
  </item>
  <item>
    <title>Digital Hopes, Real Power: From Connection to Collective Action</title>
    <link>https://www.eff.org/deeplinks/2026/04/digital-hopes-real-power-connection-collective-action</link>
    <description>&lt;div class=&quot;field field--name-body field--type-text-with-summary field--label-hidden&quot;&gt;&lt;div class=&quot;field__items&quot;&gt;&lt;div class=&quot;field__item even&quot;&gt;&lt;p&gt;&lt;em&gt;This is &lt;i&gt;&lt;span&gt;the fifth and final installment of a blog series reflecting on the global digital legacy of the 2011 Arab uprisings. You can read the rest of the series &lt;a href=&quot;https://eff.org/tags/digitalhopesrealpower&quot;&gt;here&lt;/a&gt;.&lt;/span&gt;&lt;/i&gt;&lt;/em&gt;&lt;/p&gt;
&lt;p&gt;&lt;span&gt;If the Arab Spring was defined by optimism about what the internet could do, the years since have been marked by a more sober understanding of what it takes to defend it. &lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span&gt;Back in 2011, the term “digital rights” was still fairly new. While in the decades prior, open source and hacker communities—as well as a handful of organizations including EFF—had advocated for digital freedoms, it was through the merging of disparate communities from around the world in the 2000s that digital rights came to be more clearly understood as an extension of fundamental human rights.&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span&gt;In 2011, we observed that there were only a few organizations focused on digital rights in the region. Groups like &lt;/span&gt;&lt;a href=&quot;https://nawaat.org/&quot;&gt;&lt;span&gt;Nawaat&lt;/span&gt;&lt;/a&gt;&lt;span&gt;, which emerged from the Tunisian diaspora under the Ben Ali regime; the &lt;/span&gt;&lt;a href=&quot;https://home.adef.xyz/&quot;&gt;&lt;span&gt;Arab Digital Expression Foundation&lt;/span&gt;&lt;/a&gt;&lt;span&gt;, formed to promote the creative use of technology; and &lt;/span&gt;&lt;a href=&quot;https://smex.org/&quot;&gt;&lt;span&gt;SMEX&lt;/span&gt;&lt;/a&gt;&lt;span&gt;, which was initially created to teach journalists and others about social media but has grown to become a powerful force in the region, led the way. Since that time, dozens of organizations have emerged throughout the region to promote freedom of expression, innovation, privacy, and digital security.&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span&gt;Understanding how the digital rights movement evolved in the Middle East and North Africa requires a closer look at the communities that shaped it, and the organizations that are carrying on the fight today. Perspectives from people and organizations that were key to these efforts offer critical insight into how the movement has grown and what challenges lie ahead.&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;a href=&quot;https://www.opentech.fund/otf-people/reem-almasri/&quot;&gt;&lt;span&gt;Reem Almasri&lt;/span&gt;&lt;/a&gt;&lt;span&gt;, a senior researcher and digital sovereignty consultant, says that:&lt;/span&gt;&lt;/p&gt;
&lt;blockquote&gt;&lt;p&gt;&lt;span&gt;‘Digital rights’ emerged as a term around the Arab Spring, when the internet was still a fairly unregulated space, we were still trying to figure out the tech companies’ policies, and force governments to look at the internet as a fundamental right like water and electricity.&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span&gt;But then the need to converge digital rights to everyday rights—economic, political, social rights—and to connect it to geopolitics has started to be thought about, and to be in discussion as well. And to not look at digital rights as a separate field from everything else that’s affecting it, from the geopolitical context.&lt;/span&gt;&lt;/p&gt;
&lt;/blockquote&gt;
&lt;p&gt;&lt;span&gt;Mohamad Najem, who co-founded SMEX in 2008 and has led it to become the largest organization in the region, told me that, at the time, “Nobody gave [social media] a lot of attention in our region.” Their work was “a positive approach to social media, how we can democratize sharing information, how we can share more from civil society, change people’s minds, et cetera.”&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span&gt;“After that phase,” he continues, “we can think about 2012-2013—after the Arab Spring, as an organization we started looking at the infrastructure of the internet, and how freedom of expression and privacy are affected. That’s when we started looking more at what we call digital rights.”&lt;/span&gt;&lt;/p&gt;
&lt;p class=&quot;subhead&quot;&gt;&lt;strong&gt;Towards Tech Accountability&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;In the aftermath of the Arab Spring, social media companies moved from a largely hands-off approach to governance toward more formalized—and often opaque—content moderation systems. Platforms expanded their trust and safety teams and began working more closely with civil society through trusted partnerships in the region and globally. But, Mohamad Najem says:&lt;/p&gt;
&lt;blockquote&gt;&lt;p&gt;After the expansion of tech accountability itself and the adaptation of tech companies, we’ve noticed that it’s not taking us anywhere. Gradually we’ve come to a new phase where it feels like tech accountability is an economy by itself that is not leading to real results. So the next phase for us at least and maybe for others in global majority communities is how we can focus on digital public good, how we can push more governments, private and public institutions to adopt more open source software, to look at the ecosystem and understand the US threats happening now, et cetera.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;p&gt;Another group that has played a key role in the fight for digital rights and tech accountability in the region is &lt;a href=&quot;https://7amleh.org/&quot;&gt;7amleh&lt;/a&gt;, a Palestinian organization that was founded in 2013. At the time, says &lt;a href=&quot;https://ishr.ch/defender-stories/human-rights-defenders-storyjalal-abukhater-from-palestine/&quot;&gt;Jalal Abukhater&lt;/a&gt;:&lt;/p&gt;
&lt;blockquote&gt;&lt;p&gt;&lt;span&gt;[I]t was unique and interesting in Palestinian society to have a human rights organization dedicated fully to the topic of digital rights, you know, human rights in a digital format. However, with the years, we saw various milestones, we saw progress of policy decisions and movements through the Israeli government to influence content moderation in Big Tech companies. We saw problems there as an organization.&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span&gt;7amleh took a leading stance in fighting to preserve the digital rights of Palestinians during a period where there was a very strong influence through the Israeli government. There was actually quite important reporting coming through 7amleh on the situation of online content moderation at a time when it wasn’t really a topic being discussed but it was very clearly a situation where there was major influence by government and political suppression happening as a result.&lt;/span&gt;&lt;/p&gt;
&lt;/blockquote&gt;
&lt;p class=&quot;subhead&quot;&gt;&lt;strong&gt;An Ever-Expanding Ecosystem&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;&lt;span&gt;While in the early days, the digital rights movement attracted specialists, today, people from other fields have recognized how digital rights intersect with their work, and the digital rights community has embraced them.&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span&gt;Almasri says:&lt;/span&gt;&lt;/p&gt;
&lt;blockquote&gt;&lt;p&gt;&lt;span&gt;Because the digital rights movement has been decentralizing and has stopped being a speciality, it stopped being an exclusive thing for digital rights specialists, since of course the internet not only in the Arab region but all over the world has become a fundamental infrastructure for running any kind of sensitive operations, or operations in general…all types of organizations, and companies, and initiatives are thinking about their digital security, about how internet laws are affecting the use of the internet, or putting them at risk, and how surveillance technologies are affecting their operations. &lt;/span&gt;&lt;/p&gt;
&lt;/blockquote&gt;
&lt;p&gt;&lt;span&gt;Abukhater credits the collaborative work that emerged within the region over the years in building the movement’s strength:&lt;/span&gt;&lt;/p&gt;
&lt;blockquote&gt;&lt;p&gt;&lt;span&gt;[Today], civil society and digital civil society have many forums, many coalitions and networks, but it’s always important to remember that this is work that builds over many years of experience, and relationships, and networks—that it’s different parties coming to support each other at different phases to ensure that this kind of work succeeds and that this ecosystem is sustained globally with support from partner organizations which were very crucial in ensuring that this ecosystem is sustained, especially in Palestine.&lt;/span&gt;&lt;/p&gt;
&lt;/blockquote&gt;
&lt;p&gt;&lt;b&gt;Growing Collaborations&lt;/b&gt;&lt;/p&gt;
&lt;p&gt;&lt;span&gt;Conferences like &lt;/span&gt;&lt;a href=&quot;https://breadandnet.org/&quot;&gt;&lt;span&gt;Bread and Net&lt;/span&gt;&lt;/a&gt;&lt;span&gt;, first held in Beirut in 2018, and the &lt;/span&gt;&lt;a href=&quot;https://7amleh.org/post/pdaf-2026-en&quot;&gt;&lt;span&gt;Palestine Digital Activism Forum&lt;/span&gt;&lt;/a&gt;&lt;span&gt; (PDAF), first held in Ramallah in 2017, bring activists, academics, journalists, and other practitioners together to network and learn about each other’s work. The pandemic, conflict, and other barriers haven’t stopped either conference from carrying on: PDAF has become an annual virtual event that draws big-name speakers, while Bread &amp;amp; Net has spaced out its meetings but continues to draw bigger crowds each time. &lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span&gt;Almasri credits these meetings with expanding the movement beyond the traditional techies and activists who first got involved. “You see a wide spectrum of different fields. You see artists, archivists, journalists joining these conversations, which is definitely on the brighter side of things when it comes to this field, or this scene.”&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span&gt;She also credits the emergence of alliances such as the &lt;/span&gt;&lt;a href=&quot;https://madr.network/&quot;&gt;&lt;span&gt;Middle East Alliance for Digital Rights&lt;/span&gt;&lt;/a&gt;&lt;span&gt; (MADR, of which EFF is a member), founded in 2020 by &lt;/span&gt;&lt;a href=&quot;https://madr.network/about-us/&quot;&gt;&lt;span&gt;individuals and organizations&lt;/span&gt;&lt;/a&gt;&lt;span&gt; who had been working together for many years to formalize those collaborations.&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span&gt;“Other than the collaborations at the advocacy level, [MADR] creates a sort of pressure point on Big Tech, on content moderation policies, allows for certain coordination at the level of the UN, et cetera, which I see as really positive because it brings some of the redundant efforts together and helps decide on priorities.”&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt;Looking Forward&lt;/b&gt;&lt;/p&gt;
&lt;p&gt;&lt;span&gt;In thinking about the future of the movement, Almasri and Najem agree that digital rights are no longer a niche. In Najem’s words, “It’s about everything else…it’s about everything.” &lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span&gt;Almasri adds: &lt;/span&gt;&lt;/p&gt;
&lt;blockquote&gt;&lt;p&gt;&lt;span&gt;[W]hen it comes to priorities, things that this scene has been working on, I feel that October 7 [2023] was a big turning point in the way that digital rights activists, researchers, and academics—this field—is looking at digital rights in general. Of course, there is the major question of the need to revise tactics to fight Israel’s tech-enabled genocide that is also empowered by the global economy, big tech, and governments of the world?  What alliances should we start building on a regional and global level?&lt;/span&gt;&lt;/p&gt;
&lt;/blockquote&gt;
&lt;p&gt;&lt;span&gt;She sees ‘digital sovereignty,’ the ability of people and communities to choose, control, and use technology that serves their needs and values, as one of the next big topics for the movement to tackle, as debates over who owns and hosts our data have sharpened amid revelations that U.S. companies have played a role in regional conflicts.&lt;/span&gt;&lt;/p&gt;
&lt;blockquote&gt;&lt;p&gt;&lt;span&gt;There have been pockets of debates on how to achieve digital sovereignty, especially from human rights organizations documenting war crimes … There’s an awareness of how the dependence on US-based providers, cloud storage, even hosting infrastructure is a risk, especially after how using these services has been weaponized against the digital existence of certain organizations in the region that have been deplatformed or had their content removed on platforms like Meta and YouTube because their content doesn’t align with the foreign policy of the United States…so it raises a big question about how we look at digital independence, what is the spectrum of independence that civil society in the region can achieve, and in relation to what’s available as well.&lt;/span&gt;&lt;/p&gt;
&lt;/blockquote&gt;
&lt;p&gt;&lt;span&gt;Almasri also points to the role of researchers in the region:&lt;/span&gt;&lt;/p&gt;
&lt;blockquote&gt;&lt;p&gt;&lt;span&gt;There has been a lot more research on the political economy of surveillance technologies, so not only looking at how governments are using them, but their supply chain, who’s investing in these technologies, and how geopolitical networks empowered their proliferation in the hands of governments.&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span&gt;This is where studies looking at the political economy of AI and the military become important, trying to understand how this field of weapons, the military, and AI grew together as part of this global capitalist system rather than looking at these technologies in silos, that is. Looking at the proliferation of these technologies from a geopolitical point of view, looking at the bigger ecosystem rather than zooming in to the specifics of it. I think this has been a big development in the way that we look at digital rights, and the way that digital rights have been converged and integrated into the geopolitical scene.&lt;/span&gt;&lt;/p&gt;
&lt;/blockquote&gt;
&lt;p&gt;&lt;span&gt;As the global digital rights community continues to expand, it’s clear that the questions at its core are no longer just about access or expression, but about power—who holds it, how it is exercised, and who is left out of its protections. What began as a fight to keep the internet open has become a broader effort to reimagine it—an effort that is grappling with questions of infrastructure, ownership, and the global inequalities embedded in both.&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span&gt;And yet, despite the scale of these challenges, the movement’s strength lies in the solidarity, the ecosystems, and the networks it has spent more than a decade building. From the early days of the blogging and techie communities to the increasingly powerful digital rights community, advocates in the region have gone up against dictators, endured war and repression, yet remain determined to push forward.&lt;/span&gt;&lt;/p&gt;

&lt;/div&gt;&lt;/div&gt;&lt;/div&gt;</description>
     <pubDate>Thu, 30 Apr 2026 07:56:37 +0000</pubDate>
 <guid isPermaLink="false">112019 at https://www.eff.org</guid>
 <category domain="https://www.eff.org/issues/international">International</category>
 <category domain="https://www.eff.org/issues/free-speech">Free Speech</category>
 <category domain="https://www.eff.org/issues/big-tech">Big Tech</category>
 <dc:creator>Jillian C. York</dc:creator>
 <enclosure url="https://www.eff.org/files/banner_library/arabspring-banner2.png" alt="Hands holding up flowers under the word حرية, Arabic for &amp;quot;freedom&amp;quot;" type="image/png" length="1396283" />
  </item>
  <item>
    <title>EFF Submission to UN Report on the Role of Media in the Context of Israel’s Policies Toward Palestinians</title>
    <link>https://www.eff.org/deeplinks/2026/04/eff-submission-un-report-role-media-context-israels-policies-toward-palestinians</link>
    <description>&lt;div class=&quot;field field--name-body field--type-text-with-summary field--label-hidden&quot;&gt;&lt;div class=&quot;field__items&quot;&gt;&lt;div class=&quot;field__item even&quot;&gt;&lt;p&gt;&lt;span&gt;The UN Special Rapporteur on the situation of human rights in the Palestinian territories occupied since 1967 &lt;/span&gt;&lt;a href=&quot;https://www.ohchr.org/en/calls-for-input/2026/call-input-role-media-context-israels-policies-and-practices-toward&quot;&gt;&lt;span&gt;recently announced&lt;/span&gt;&lt;/a&gt;&lt;span&gt; a study addressing the killings and attacks against Palestinian journalists and media workers, the destruction of media infrastructure in Gaza, and the production and dissemination of narratives that may enable, justify, or incite international crimes. &lt;/span&gt;&lt;/p&gt;
&lt;p&gt;As part of this consultation, EFF&lt;span&gt; &lt;/span&gt;&lt;a href=&quot;https://www.eff.org/document/eff-submission-call-input-role-media-context-israels-policies-and-practices-toward&quot;&gt;contributed a submission&lt;/a&gt;&lt;span&gt; &lt;/span&gt;that identifies a significant deterioration of press freedom and free expression in the period since October 2023, including an increase in censorship and wave of killings of journalists; adding to an already pervasive censorship and surveillance regime for Palestinians. &lt;/p&gt;
&lt;p&gt;&lt;span&gt;In particular, concerns raised in our submission relate to:&lt;/span&gt;&lt;/p&gt;
&lt;ol&gt;
&lt;li&gt;&lt;span&gt;Government takedown requests &lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span&gt;Disinformation and content moderation&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span&gt;Attacks on internet infrastructure&lt;/span&gt;&lt;/li&gt;
&lt;/ol&gt;
&lt;p&gt;The concerns about censorship in Palestine are ever increasing, and include multiple international forums. Ending the deliberate digital isolation of the Palestinian people is critical to protecting fundamental human rights.&lt;/p&gt;
&lt;p&gt;&lt;span&gt;Read the briefing in full &lt;a href=&quot;https://www.eff.org/document/eff-submission-call-input-role-media-context-israels-policies-and-practices-toward&quot;&gt;here&lt;/a&gt;.&lt;/span&gt;&lt;/p&gt;

&lt;/div&gt;&lt;/div&gt;&lt;/div&gt;</description>
     <pubDate>Wed, 29 Apr 2026 21:22:55 +0000</pubDate>
 <guid isPermaLink="false">112018 at https://www.eff.org</guid>
 <category domain="https://www.eff.org/issues/free-speech">Free Speech</category>
 <dc:creator>Paige Collings</dc:creator>
 <enclosure url="https://www.eff.org/files/banner_library/gaza-2.jpg" alt="social media icon speaking about refugees, with war image background" type="image/jpeg" length="381027" />
  </item>
  <item>
    <title>Former EFF Activism Director&#039;s New Book, Transaction Denied, Explores What Happens When Financial Companies Act like Censors </title>
    <link>https://www.eff.org/deeplinks/2026/04/former-eff-activism-directors-new-book-transaction-denied-explores-what-happens</link>
    <description>&lt;div class=&quot;field field--name-body field--type-text-with-summary field--label-hidden&quot;&gt;&lt;div class=&quot;field__items&quot;&gt;&lt;div class=&quot;field__item even&quot;&gt;&lt;p&gt;A U.S. citizen who teaches Persian poetry classes online is suddenly unable to receive payments or access funds when his account is flagged and frozen by Paypal and its subsidiary Venmo. A Muslim city councilwoman in New York City has a Venmo payment blocked because she uses the name of a Bangladeshi restaurant in the transaction. Online hubs for erotic storytelling repeatedly lose their payment accounts. Others active in drug legalization fights struggle to keep their bank accounts.&lt;/p&gt;
&lt;p&gt;These may sound like one-off issues, but they are not. They occur with frightening regularity, as former&lt;span&gt; &lt;a href=&quot;https://www.eff.org/about/staff/rainey-reitman-0&quot;&gt;EFF Activism Director and Chief Program Officer, Rainey Reitman&lt;/a&gt;, who left EFF in 2022, describes in her new book, &lt;a href=&quot;https://www.beacon.org/Transaction-Denied-P2455.aspx&quot;&gt;&lt;i&gt;Transaction Denied&lt;/i&gt;&lt;/a&gt;&lt;i&gt;. &lt;/i&gt;The book sheds new light on a serious problem that often hides in the shadows, and pushes us to ask an increasingly important question: &lt;/span&gt;&lt;span&gt;“&lt;/span&gt;&lt;i&gt;&lt;span&gt;Is it ever OK for financial intermediaries to act as the arbiters of online expression?&lt;/span&gt;&lt;/i&gt;&lt;span&gt;&quot;  &lt;/span&gt;&lt;/p&gt;
&lt;p class=&quot;pull-quote&quot;&gt;&lt;span&gt;Both a storyteller and an advocate, Rainey exposes hidden systems of power that shape our choices, our speech, and, ultimately, our society. - Cindy Cohn&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span&gt;&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span&gt;&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span&gt;Reitman makes her case about the impact of financial institutions and payment intermediaries shutting down accounts and inhibiting transactions through compelling individual stories, some of which have not been shared before. The people impacted are diverse: authors, teachers, journalists, elected politicians, and more are suddenly unable to retrieve or receive funds, with little explanation, transparency, or recourse. Reitman shows the reasons are frequently speech-related, resulting often from arbitrary corporate policy, a broad (mis)interpretation of the law, or in response to pressure from anti-speech advocates. &lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span&gt;In the example of the Persian poetry teacher, the blocking is due to the highly risk averse interpretation of U.S. sanctions on Iran—sanctions aimed at deterring weapons development or terrorism instead snared a poetry professor and a New York city councilwoman. Reitman demonstrates how these sanctions, and others, have an outsized impact on Muslims.&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span&gt;But &lt;/span&gt;&lt;i&gt;&lt;span&gt;Transaction Denied &lt;/span&gt;&lt;/i&gt;&lt;span&gt;is also a guide for those interested in fighting for free speech. The book covers over a decade of successful campaigns and shows that advocacy can win the day—and is sometimes necessary to counter pro-censorship campaigns. Reitman offers a behind-the-scenes view of the campaign to help &lt;/span&gt;&lt;a href=&quot;https://www.eff.org/deeplinks/2012/11/payment-provider-stripe-upholds-free-speech-reactivates-nifty-archives&quot;&gt;&lt;span&gt;restore the Stripe account of the Nifty Archive Alliance&lt;/span&gt;&lt;/a&gt;&lt;span&gt;, a nonprofit which supports the Nifty Archive, a hub of erotic storytelling for the queer community since 1992. She covers EFF&#039;s &lt;/span&gt;&lt;a href=&quot;https://www.eff.org/deeplinks/2012/03/free-speech-coalition-calls-paypal-back-misguided-book-censorship-policy&quot;&gt;&lt;span&gt;successful coalition and campaign&lt;/span&gt;&lt;/a&gt;&lt;span&gt; to restore the PayPal account of Smashwords, a hub for self-published fiction. And in what has become a critical moment for free speech and free press, she describes how several EFF staff members and two EFF board members became the seed for a new nonprofit, the &lt;/span&gt;&lt;a href=&quot;https://freedom.press/&quot;&gt;&lt;span&gt;Freedom of the Press Foundation&lt;/span&gt;&lt;/a&gt;&lt;span&gt;, which continues to partner with EFF today in advancing the rights of journalists. &lt;/span&gt;&lt;/p&gt;
&lt;p class=&quot;center-image&quot;&gt;&lt;a href=&quot;https://bookshop.org/a/88573/9780807019115&quot; target=&quot;_blank&quot; rel=&quot;noopener noreferrer&quot;&gt;&lt;span&gt;&lt;img src=&quot;https://images-us.bookshop.org/ingram/9780807019115.jpg?v=5bbc230d90b61a53048bc88edaa47060&quot; alt=&quot;Transaction Denied bookcover&quot; width=&quot;430&quot; height=&quot;645&quot; /&gt;&lt;/span&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;span&gt;It’s a banner time for books by EFF staff members and friends. If you&#039;re concerned about how online privacy has changed over the last three decades, read EFF Executive Director Cindy Cohn&#039;s book, &lt;/span&gt;&lt;a href=&quot;https://www.eff.org/Privacys-Defender&quot;&gt;&lt;span&gt;Privacy Defender&lt;/span&gt;&lt;/a&gt;&lt;span&gt;, released in May. (All proceeds from the sale of hard copies of Privacy’s Defender are being donated to EFF, so your book order will help EFF continue fighting for the principles Cindy holds dear.) If you are worried about the individuals trapped in a system where massive financial companies can shut down their individual accounts, effectively locking up their access to money, based entirely on their speech, grab &lt;/span&gt;&lt;i&gt;&lt;span&gt;Transaction Denied, &lt;/span&gt;&lt;/i&gt;&lt;span&gt;released earlier this month, at &lt;/span&gt;&lt;a href=&quot;https://www.beacon.org/Transaction-Denied-P2455.aspx&quot;&gt;&lt;span&gt;Beacon Press&lt;/span&gt;&lt;/a&gt;&lt;span&gt;, &lt;/span&gt;&lt;a href=&quot;https://www.amazon.com/Transaction-Denied-Finances-Punish-Speech/dp/0807019119/ref=tmm_hrd_swatch_0&quot;&gt;&lt;span&gt;Amazon&lt;/span&gt;&lt;/a&gt;&lt;span&gt;, and &lt;/span&gt;&lt;a href=&quot;https://bookshop.org/a/88573/9780807019115&quot;&gt;&lt;span&gt;Bookshop.org&lt;/span&gt;&lt;/a&gt;&lt;span&gt;. (Half of the author proceeds go to Freedom of the Press Foundation.) &lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span&gt;More likely—you&#039;ll want both books on your shelf. Happy reading! &lt;/span&gt;&lt;/p&gt;

&lt;/div&gt;&lt;/div&gt;&lt;/div&gt;</description>
     <pubDate>Wed, 29 Apr 2026 19:26:15 +0000</pubDate>
 <guid isPermaLink="false">111972 at https://www.eff.org</guid>
 <category domain="https://www.eff.org/issues/financial-censorship">Financial Censorship</category>
 <category domain="https://www.eff.org/issues/free-speech">Free Speech</category>
 <dc:creator>Jason Kelley</dc:creator>
 <enclosure url="https://www.eff.org/files/banner_library/financial-censorship-piggy2.png" alt="financial censorship" type="image/png" length="48226" />
  </item>
  <item>
    <title>The Open Social Web Needs Section 230 to Survive</title>
    <link>https://www.eff.org/deeplinks/2026/04/open-social-web-needs-section-230-survive</link>
    <description>&lt;div class=&quot;field field--name-body field--type-text-with-summary field--label-hidden&quot;&gt;&lt;div class=&quot;field__items&quot;&gt;&lt;div class=&quot;field__item even&quot;&gt;&lt;p&gt;&lt;span&gt;If you want to overthrow Big Tech, you’ll need Section 230. The paradigm shift being built with the Open Social Web can put communities back in control of social media infrastructure, and finally end our dependency on enshitified corporate giants. But while these incumbents can overcome &lt;/span&gt;&lt;a href=&quot;https://www.npr.org/2025/01/29/nx-s1-5279570/meta-trump-settlement-facebook-instagram-suspensions&quot;&gt;&lt;span&gt;multimillion-dollar lawsuits&lt;/span&gt;&lt;/a&gt;&lt;span&gt;, the small host revolution could be picked off one by one without the protections offered by 230.&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span&gt;The internet as we know it is built on Section 230, a law from the 90s that generally says internet users are legally responsible for their own speech — not the services hosting their speech. The purpose of 230 was to enable diverse forums for speech online, which defined the early internet. These scattered online communities have since been largely captured by a handful of multi-billion dollar companies that found profit in controlling your voice online. While critics are rightly concerned about this new corporate influence and surveillance, some look to diminishing Section 230 as the nuclear option to regain control. &lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span&gt;The thing is, that would be &lt;/span&gt;&lt;a href=&quot;https://www.eff.org/deeplinks/2024/05/wanna-make-big-tech-monopolies-even-worse-kill-section-230&quot;&gt;&lt;span&gt;a huge gift to Big Tech&lt;/span&gt;&lt;/a&gt;&lt;span&gt;, and detrimental to our best shot at &lt;/span&gt;&lt;i&gt;&lt;span&gt;actually&lt;/span&gt;&lt;/i&gt;&lt;span&gt; undermining corporate and state control of speech online. &lt;/span&gt;&lt;/p&gt;
&lt;h3&gt;&lt;span&gt;Dethroning Big Tech&lt;/span&gt;&lt;/h3&gt;
&lt;p&gt;&lt;span&gt;We’re fed up with legacy social media trapping us in &lt;/span&gt;&lt;a href=&quot;https://www.eff.org/deeplinks/2022/11/leaving-twitters-walled-garden&quot;&gt;&lt;span&gt;walled gardens&lt;/span&gt;&lt;/a&gt;&lt;span&gt;, where the world&#039;s biggest companies like Google and Meta call the shots. Our communities, and our voices, are being held hostage as billionaires’ platforms &lt;/span&gt;&lt;a href=&quot;https://www.eff.org/deeplinks/2025/06/protect-yourself-metas-latest-attack-privacy&quot;&gt;&lt;span&gt;surveil&lt;/span&gt;&lt;/a&gt;&lt;span&gt;, &lt;/span&gt;&lt;a href=&quot;https://gizmodo.com/reddit-meta-and-google-voluntarily-gave-dhs-info-of-anti-ice-users-report-says-2000722279&quot;&gt;&lt;span&gt;betray&lt;/span&gt;&lt;/a&gt;&lt;span&gt;, and &lt;/span&gt;&lt;a href=&quot;https://arstechnica.com/tech-policy/2026/02/platforms-bend-over-backward-to-help-dhs-censor-ice-critics-advocates-say/&quot;&gt;&lt;span&gt;censor&lt;/span&gt;&lt;/a&gt;&lt;span&gt; us. We’re not alone in this frustration, and fortunately, people are collaborating globally to build another way forward: the Open Social Web. &lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span&gt;This new infrastructure puts the public’s interest first by reclaiming the principles of &lt;/span&gt;&lt;a href=&quot;https://www.eff.org/deeplinks/2019/10/adversarial-interoperability&quot;&gt;&lt;span&gt;interoperability&lt;/span&gt;&lt;/a&gt;&lt;span&gt; and &lt;/span&gt;&lt;a href=&quot;https://www.eff.org/deeplinks/2024/02/defending-access-decentralized-web&quot;&gt;&lt;span&gt;decentralization&lt;/span&gt;&lt;/a&gt;&lt;span&gt; from the early internet. In short, it puts &lt;/span&gt;&lt;a href=&quot;https://knightcolumbia.org/content/protocols-not-platforms-a-technological-approach-to-free-speech&quot;&gt;&lt;span&gt;protocols over platforms&lt;/span&gt;&lt;/a&gt;&lt;span&gt; and lets people own their connections with others. Whether you choose a Fediverse app like Mastodon or an ATmosphere app like Bluesky, your audience and community stay within reach. It’s a vision of social media akin to our lives offline: you decide who to be in touch with and how, and no central authority can threaten to snuff out those connections. It’s social media for humans, not advertisers and authoritarians.&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span&gt;Behind that vision is a beautiful mess of protocols bringing open social media to life. Each protocol is a unique language for applications, determining how and where messages are sent. While this means there is great variety to these projects, it also means everyone who spins up a server, develops an app, or otherwise hosts others’ speech has skin in the game when it comes to defending Section 230.&lt;/span&gt;&lt;/p&gt;
&lt;h3&gt;&lt;span&gt;What exactly &lt;/span&gt;&lt;i&gt;&lt;span&gt;is&lt;/span&gt;&lt;/i&gt;&lt;span&gt; Section 230?&lt;/span&gt;&lt;/h3&gt;
&lt;p&gt;&lt;span&gt;Section 230 protects freedom of expression online by protecting US intermediaries that make the internet work. Passed in 1996 to preserve new bubbling communities online, 230 enshrined important protections for free expression &lt;/span&gt;&lt;i&gt;&lt;span&gt;and&lt;/span&gt;&lt;/i&gt;&lt;span&gt; the ability to block or filter speech you don’t want on your site. One portion is credited as the “26 words that created the internet”:&lt;/span&gt;&lt;/p&gt;
&lt;blockquote&gt;&lt;p&gt;&lt;i&gt;&lt;span&gt;“No provider or user of an interactive computer service shall be treated as the publisher or speaker of any information provided by another information content provider.” &lt;/span&gt;&lt;/i&gt;&lt;/p&gt;
&lt;/blockquote&gt;
&lt;p&gt;&lt;span&gt;In other words, this bipartisan law recognizes that speech online relies on intermediaries — services that deliver messages between users — and holding them potentially liable for any message they deliver would only stifle that speech. Intuitively, when harmful speech occurs, the speaker should be the one held accountable. The effect is that most civil suits against users and services based on others&#039; speech can quickly be dismissed, avoiding the most expensive parts of civil litigation. &lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span&gt;Section 230 was never a license to host &lt;/span&gt;&lt;i&gt;&lt;span&gt;anything&lt;/span&gt;&lt;/i&gt;&lt;span&gt; online, however. It does not protect companies that create illegal or harmful content. Nor does Section 230 protect companies from &lt;/span&gt;&lt;a href=&quot;https://www.eff.org/deeplinks/2026/04/copyright-and-dmca-best-practices-fediverse-operators&quot;&gt;&lt;span&gt;intellectual property claims&lt;/span&gt;&lt;/a&gt;&lt;span&gt;. &lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span&gt;What Section 230 has enabled is the freedom and flexibility for online communities to self-organize. Without the specter of one bad actor exposing the host(s) to serious legal threats, intermediaries can moderate how they see fit or even defer to volunteers within these communities.&lt;/span&gt;&lt;/p&gt;
&lt;h3&gt;&lt;span&gt;Why the Open Social Web Needs Section 230&lt;/span&gt;&lt;/h3&gt;
&lt;p&gt;&lt;span&gt;The superpower of decentralized systems like the Fediverse is the ability for thousands of small hosts to each shoulder some of the burdens of hosting. No single site can assert itself as a necessary intermediary for everyone; instead, all must collaborate to ensure messages reach the intended audience. The result is something superior to any one design or mandate. It is an ecosystem that is greater than the sum of its parts, resilient to disruptions, and enables free experimentation with different approaches to community governance.&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span&gt;The open social web’s kryptonite though, is the liability participants can face as intermediaries. A greater potential for liability comes with more interference from powerful interests in the form of legal threats, more monetary costs, and less space for nuance in moderation. And in practice, participants may simply stop hosting to avoid those risks. The end result is only the biggest and most resourced options can survive.&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span&gt;This isn’t just about the hosts in the Open Social Web, like &lt;/span&gt;&lt;a href=&quot;https://www.eff.org/deeplinks/2024/06/whats-difference-between-mastodon-bluesky-and-threads&quot;&gt;&lt;span&gt;Mastodon instances or Bluesky PDSes&lt;/span&gt;&lt;/a&gt;&lt;span&gt;. In the U.S., Section 230’s protections extend to internet users when they distribute another person’s speech. For example, Section 230 protects a user who &lt;/span&gt;&lt;a href=&quot;https://www.eff.org/issues/cda230/cases/batzel-v-smith&quot;&gt;&lt;span&gt;forwards an email&lt;/span&gt;&lt;/a&gt;&lt;span&gt; with a defamatory statement. On the open social web, that means when you pass along a message to others through sharing, boosting, and quoting, you’re not liable for the other user’s speech. The alternative would be a web where one misclick could open you up to a defamation lawsuit.&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span&gt;Section 230 also applies to the infrastructure stack, too, like Internet service providers, content delivery networks, and domain or hosting providers. Protections even extend to the new experimental infrastructures of &lt;/span&gt;&lt;a href=&quot;https://www.eff.org/deeplinks/2025/07/radio-hobbyists-rejoice-good-news-lora-mesh?language=vi&quot;&gt;&lt;span&gt;decentralized mesh networks&lt;/span&gt;&lt;/a&gt;&lt;span&gt;.&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span&gt;Beyond the existential risks to the feasibility of indie decentralized projects in the United States, weakening 230 protections would also make services worse. Being able to &lt;/span&gt;&lt;a href=&quot;https://www.eff.org/deeplinks/2024/06/how-clean-your-bluesky-feed&quot;&gt;&lt;span&gt;customize your social media experience&lt;/span&gt;&lt;/a&gt;&lt;span&gt; from highly-curated to totally &lt;/span&gt;&lt;i&gt;&lt;span&gt;laissez-faire&lt;/span&gt;&lt;/i&gt;&lt;span&gt; in the open social web is only possible when the law allows space for private experiments in moderation approaches. The algorithmically driven firehose forced on users by antiquated social media giants is driven by the financial interests of advertisers, and would only be more tightly controlled in a post-230 world.&lt;/span&gt;&lt;/p&gt;
&lt;h3&gt;&lt;span&gt;Defending 230&lt;/span&gt;&lt;/h3&gt;
&lt;p&gt;&lt;span&gt;Laws aimed at changing 230 protections put decentralized projects like the open social web in a uniquely precarious position. That is why we urge lawmakers to take &lt;/span&gt;&lt;a href=&quot;https://www.eff.org/deeplinks/2021/03/rewriting-intermediary-liability-law-what-eff-asks-and-you-should-too&quot;&gt;&lt;span&gt;careful consideration&lt;/span&gt;&lt;/a&gt;&lt;span&gt; of these impacts. It is also why the proponents and builders of a better web must be vigilant defenders of the legal tools that make their work possible. &lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span&gt;The open social web embodies what we are protecting with Section 230. It’s our best chance at building a truly democratic public interest internet, where communities are in control. &lt;/span&gt;&lt;/p&gt;

&lt;/div&gt;&lt;/div&gt;&lt;/div&gt;</description>
     <pubDate>Tue, 28 Apr 2026 20:59:06 +0000</pubDate>
 <guid isPermaLink="false">112013 at https://www.eff.org</guid>
 <category domain="https://www.eff.org/issues/public-interest-internet">The Public Interest Internet</category>
 <category domain="https://www.eff.org/issues/innovation">Creativity &amp; Innovation</category>
 <category domain="https://www.eff.org/issues/cda230">Section 230</category>
 <dc:creator>Rory Mir</dc:creator>
 <enclosure url="https://www.eff.org/files/banner_library/decentralization-banner.png" alt="Personified mushrooms communicating from underground homes" type="image/png" length="594967" />
  </item>
  <item>
    <title>The GUARD Act Isn’t Targeting Dangerous AI—It’s Blocking Everyday Internet Use</title>
    <link>https://www.eff.org/deeplinks/2026/04/guard-act-isnt-targeting-dangerous-ai-its-blocking-everyday-internet-use</link>
    <description>&lt;div class=&quot;field field--name-body field--type-text-with-summary field--label-hidden&quot;&gt;&lt;div class=&quot;field__items&quot;&gt;&lt;div class=&quot;field__item even&quot;&gt;&lt;p&gt;&lt;span&gt;Lawmakers in Congress are moving quickly on the &lt;/span&gt;&lt;a href=&quot;https://www.hawley.senate.gov/wp-content/uploads/2025/10/GUARD-Act-Bill-Text.pdf&quot;&gt;&lt;span&gt;GUARD Act&lt;/span&gt;&lt;/a&gt;&lt;span&gt;, &lt;/span&gt;&lt;a href=&quot;https://www.eff.org/deeplinks/2025/11/surveillance-mandate-disguised-child-safety-why-guard-act-wont-keep-us-safe&quot;&gt;&lt;span&gt;an age-gating bill&lt;/span&gt;&lt;/a&gt;&lt;span&gt; restricting minors’ access to a wide range of online tools, with a key vote expected this week. The proposal is framed as a response to alarming cases involving “AI companions” and vulnerable young users. But the text of the bill goes much further, and could require age gates even for search engines that use AI. &lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span&gt;&lt;/span&gt;&lt;/p&gt;
&lt;p class=&quot;take-action&quot;&gt;&lt;a href=&quot;https://act.eff.org/action/tell-congress-oppose-the-guard-act&quot; target=&quot;_blank&quot; rel=&quot;noopener noreferrer&quot;&gt;TAKE ACTION&lt;/a&gt;&lt;/p&gt;
&lt;p class=&quot;take-explainer&quot;&gt;&lt;a href=&quot;https://act.eff.org/action/tell-congress-oppose-the-guard-act&quot; target=&quot;_blank&quot; rel=&quot;noopener noreferrer&quot;&gt;Tell Congress: oppose the guard act&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;span&gt;If enacted, the GUARD Act won’t just target a narrow category of risky chatbots. It would require companies to verify the age of &lt;/span&gt;&lt;i&gt;&lt;span&gt;every&lt;/span&gt;&lt;/i&gt;&lt;span&gt; user — then block anyone under 18 from interacting with a huge range of online systems. It would block minors from everyday online tools, undermine parental guidance, and force adults to sacrifice their privacy. In the process, it would require services to implement speech-restricting and &lt;/span&gt;privacy-invasive&lt;span&gt; age-verification systems for everyone—not just kids. &lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span&gt;Under the GUARD Act’s broad definitions, a high school student could be barred from asking homework help tools questions about algebra problems. A teenager trying to return a product could be kicked out of a standard customer-service chat. &lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span&gt;The concerns behind this bill are serious. There have been troubling reports of AI systems engaging in harmful interactions with young users, including cases involving self-harm. Those risks deserve attention. But they call for targeted solutions, like better safeguards and enforcement against bad actors, not sweeping restrictions. The bill’s sponsors say they’re targeting worst-case scenarios — but the bill regulates everyday use. &lt;/span&gt;&lt;/p&gt;
&lt;h3&gt;&lt;b&gt;The GUARD Act’s Broad Definitions Reach Everyday Tools&lt;/b&gt;&lt;/h3&gt;
&lt;p&gt;&lt;span&gt;The problem starts with how the bill defines an “AI chatbot.” It covers any system that generates responses that aren’t fully pre-written by the developer or operator. Such a broad definition sweeps in the basic functionality of all AI-powered tools. &lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span&gt;Then there’s the definition of an “AI companion,” which minors are banned from using entirely. An AI companion is any chatbot that produces human-like responses and is designed to “encourage or facilitate” interpersonal or emotional interaction. That may sound aimed at simulated “friends” or therapy chatbots. But in practice, it’s much fuzzier. &lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span&gt;Modern chatbots are designed to be conversational and helpful. A homework helper might say “good question” before walking a student through a problem. A customer service chatbot may respond empathetically to a complaint (“I’m sorry you’re having this problem.”) A general-purpose assistant might ask follow-up questions. All of these could be seen as facilitating “interpersonal” interaction — and triggering the GUARD Act. &lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span&gt;Faced with steep penalties and unclear boundaries, companies are unlikely to take chances on letting young people use their online tools. They’ll block minors entirely or strip their tools down to something less useful for everyone. The result isn’t a narrow safeguard—it’s a broad restriction on everyday online interactions.&lt;/span&gt;&lt;/p&gt;
&lt;h3&gt;&lt;b&gt;Homework Question? Show ID And Call Your Parents&lt;/b&gt;&lt;/h3&gt;
&lt;p&gt;&lt;span&gt;Start with a student getting help with homework. Under the GUARD Act, the service must verify the user’s age using more than a simple checkbox—it must rely on a “reasonable age verification” measure, which could require a government ID or a third-party age-checking system. If the system decides a user is under 18, the company must decide if its tool qualifies as an “AI Companion.” If there’s any risk it does, the safest move is to block access entirely. &lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span&gt;The same logic applies to everyday customer service. A teenager trying to fix an order issue gets routed to a chatbot, and the company faces a choice: build a full age-verification system for a routine interaction, or restrict access to avoid liability. Many will choose the latter.&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span&gt;This isn’t a narrow restriction aimed at a few risky products. It’s a compliance regime that pushes companies to block or limit any product that generates text for minors, across the board. &lt;/span&gt;&lt;/p&gt;
&lt;h3&gt;&lt;b&gt;ID Checks for Everyone&lt;/b&gt;&lt;/h3&gt;
&lt;p&gt;&lt;span&gt;The GUARD Act doesn’t just affect minors. The bill takes a big step towards an internet that only works when users are willing to upload a valid ID or comply with other invasive age-verification schemes. Companies must verify the age of every user—not through a simple self-declaration, but through a “reasonable age verification” system tied to the individual. &lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span&gt;In practice, that means collecting sensitive personal information: government IDs, financial data, or biometric identifiers. Companies can outsource verification, but they remain legally responsible. And the law requires ongoing verification, so this isn’t a one-time check. Worse, &lt;/span&gt;&lt;a href=&quot;https://perma.cc/DL9A-5T8L&quot;&gt;&lt;span&gt;studies consistently show&lt;/span&gt;&lt;/a&gt;&lt;span&gt; that millions of people have outdated information on their IDs, &lt;/span&gt;&lt;a href=&quot;https://perma.cc/X7JS-J7R7&quot;&gt;&lt;span&gt;such as an old address&lt;/span&gt;&lt;/a&gt;&lt;span&gt;, or do not have government ID. Should services require ID, many folks without current or any ID will be shut out. &lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span&gt;And for those who &lt;/span&gt;&lt;i&gt;&lt;span&gt;do&lt;/span&gt;&lt;/i&gt;&lt;span&gt; have compliant ID, turning over this information repeatedly creates obvious risks. Databases of sensitive identity information become &lt;/span&gt;&lt;a href=&quot;https://www.eff.org/deeplinks/2024/06/hack-age-verification-company-shows-privacy-danger-social-media-laws&quot;&gt;&lt;span&gt;targets for breaches&lt;/span&gt;&lt;/a&gt;&lt;span&gt;. Anonymous or pseudonymous use of online tools becomes harder or impossible. &lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span&gt;To keep minors away from certain chatbots, the GUARD Act would require everyone to prove who they are just to use basic online tools. That’s a steep tradeoff. And it doesn’t actually address the specific harms the bill is supposed to solve.&lt;/span&gt;&lt;/p&gt;
&lt;h3&gt;&lt;b&gt;Vague Definitions, Huge Penalties&lt;/b&gt;&lt;/h3&gt;
&lt;p&gt;&lt;span&gt;The GUARD Act’s broad scope is enforced with steep penalties. Companies can face fines of up to $100,000 per violation, enforced by federal and state officials. At the same time, key terms like “AI companion” rely on vague concepts such as “emotional interaction.” That combination will lead to overblocking. Faced with legal uncertainty and serious liability, companies won’t parse small distinctions. They’ll restrict access, limit features, or block minors entirely.&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span&gt;That is the unfortunate result of the GUARD Act, even though the concerns animating it are worthy of fixing. But the GUARD Act’s broad terms will apply far beyond the concerning scenarios. &lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span&gt;In the end, that means a more restricted and more surveilled internet. Teenagers would lose access to tools they rely on for school and everyday tasks. Everyone else faces new barriers, including ID checks. Smaller developers, who aren’t able to absorb compliance costs and legal risk, would be pushed out, leaving the largest companies even more dominant. &lt;/span&gt;&lt;/p&gt;
&lt;p&gt;Young people — and all people — deserve protection from genuinely harmful products. But this bill doesn’t do that. It trades away privacy, access, and useful technology in exchange for a blunt system that misses the mark. &lt;/p&gt;
&lt;p&gt;&lt;span&gt;Congress could act soon. Tell them to reject the GUARD Act. &lt;/span&gt;&lt;/p&gt;
&lt;p class=&quot;take-action&quot;&gt;&lt;a href=&quot;https://act.eff.org/action/tell-congress-oppose-the-guard-act&quot; target=&quot; blank=&quot;&gt;TAKE ACTION&lt;/a&gt;&lt;/p&gt;
&lt;p class=&quot;take-explainer&quot;&gt;&lt;a href=&quot;https://act.eff.org/action/tell-congress-oppose-the-guard-act&quot; target=&quot;_blank&quot; rel=&quot;noopener noreferrer&quot;&gt;Tell Congress: s&lt;/a&gt;ay no to mandatory online id checks&lt;/p&gt;
&lt;p&gt;&lt;b&gt;&lt;/b&gt;&lt;/p&gt;

&lt;/div&gt;&lt;/div&gt;&lt;/div&gt;</description>
     <pubDate>Mon, 27 Apr 2026 23:22:57 +0000</pubDate>
 <guid isPermaLink="false">112014 at https://www.eff.org</guid>
 <dc:creator>Joe Mullin</dc:creator>
 <enclosure url="https://www.eff.org/files/banner_library/ageverificationbanner-3.png" alt="A hand holding a cellphone showing a verification screen and ACCESS DENIED in the background." type="image/png" length="536728" />
  </item>
  <item>
    <title>Congress Must Reject New Insufficient 702 Reauthorization Bill</title>
    <link>https://www.eff.org/deeplinks/2026/04/congress-must-reject-new-insufficient-702-reauthorization-bill</link>
    <description>&lt;div class=&quot;field field--name-body field--type-text-with-summary field--label-hidden&quot;&gt;&lt;div class=&quot;field__items&quot;&gt;&lt;div class=&quot;field__item even&quot;&gt;&lt;p&gt;&lt;span data-contrast=&quot;auto&quot;&gt;Speaker Johnson has introduced a new fig leaf over the American surveillance state, the &lt;/span&gt;&lt;a href=&quot;https://docs.house.gov/billsthisweek/20260427/RCP_S-FISA_xml.pdf&quot;&gt;&lt;span data-contrast=&quot;none&quot;&gt;Foreign Intelligence Accountability Act&lt;/span&gt;&lt;/a&gt;&lt;span data-contrast=&quot;auto&quot;&gt;. Introduced with only days to go before Section 702 of the Foreign Intelligence Surveillance Act (FISA) expires and the U.S. government loses one of its most invasive surveillance programs, the bill does nothing to make &lt;/span&gt;&lt;a href=&quot;https://www.eff.org/deeplinks/2026/04/keep-pushing-we-get-10-more-days-reform-section-702&quot;&gt;&lt;span data-contrast=&quot;none&quot;&gt;any of the substantial changes&lt;/span&gt;&lt;/a&gt;&lt;span data-contrast=&quot;auto&quot;&gt; privacy advocates have been asking for --- most notably, it fails to give us a real warrant requirement for the FBI to snoop through the private conversations of people on U.S. soil. &lt;/span&gt;&lt;span data-ccp-props=&quot;{}&quot;&gt; &lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span data-contrast=&quot;auto&quot;&gt;Section 702 needs to be reauthorized by Congress every few years. These reauthorizations give us a chance to tinker with the language of the law and introduce some much-needed reforms. This attempt at reauthorization has been particularly fraught, but there is still time for Congress to include real protection for Americans’ civil liberties and rights. We need to make sure that when an FBI agent wants to look through Americans’ conversations scooped up as part of a national security intelligence program, they need a warrant signed by a judge just as if they were trying to search your email account or your house.&lt;/span&gt;&lt;span data-ccp-props=&quot;{}&quot;&gt; &lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span data-contrast=&quot;auto&quot;&gt;This new bill mandates that a civil liberties protection officer at the Director of National Intelligence review all queries of U.S. persons made by the FBI under this program to make sure no laws have been broken. It’s bad enough to let the intelligence community &lt;/span&gt;&lt;a href=&quot;https://img.jangomail.com/2537954/Attachments/BCJ%20johnson%20proposal%20two-pager%204-23-26%20final.pdf&quot;&gt;&lt;span data-contrast=&quot;none&quot;&gt;police itself&lt;/span&gt;&lt;/a&gt;&lt;span data-contrast=&quot;auto&quot;&gt;, and what’s more, the assessment for illegality would be made &lt;/span&gt;&lt;i&gt;&lt;span data-contrast=&quot;auto&quot;&gt;after&lt;/span&gt;&lt;/i&gt;&lt;span data-contrast=&quot;auto&quot;&gt; a U.S. person has already been spied on. This is hardly the reform we need and will likely just lead to continued abuse with no real accountability or consequences. &lt;/span&gt;&lt;span data-ccp-props=&quot;{}&quot;&gt; &lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span data-contrast=&quot;auto&quot;&gt;The bill “prohibits targeting United States persons,” but so does current law. This “change” does absolutely nothing to address what’s really happening—which is that surveillance of people in the United States is usually justified as “incidental” because Americans aren’t the “target” of the surveillance. The bill does not create a warrant requirement, it does not create any new transparency requirements, and it does not protect Americans’ privacy. &lt;/span&gt;&lt;span data-ccp-props=&quot;{}&quot;&gt; &lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span data-contrast=&quot;auto&quot;&gt;We urge Congress, and we urge you to&lt;a href=&quot;https://act.eff.org/action/congress-has-until-april-20-to-take-action-on-702-tell-them-not-to-drop-the-ball&quot;&gt; write to your Congresspeople&lt;/a&gt;, to tell them this: Reject the surveillance state’s latest smokescreen known as the &lt;/span&gt;&lt;a href=&quot;https://docs.house.gov/billsthisweek/20260427/RCP_S-FISA_xml.pdf&quot;&gt;&lt;span data-contrast=&quot;none&quot;&gt;Foreign Intelligence Accountability Act&lt;/span&gt;&lt;/a&gt;&lt;span data-contrast=&quot;auto&quot;&gt; and keep pushing for real reforms. &lt;/span&gt;&lt;span data-ccp-props=&quot;{}&quot;&gt; &lt;/span&gt;&lt;/p&gt;

&lt;/div&gt;&lt;/div&gt;&lt;/div&gt;</description>
     <pubDate>Mon, 27 Apr 2026 21:55:28 +0000</pubDate>
 <guid isPermaLink="false">112012 at https://www.eff.org</guid>
 <category domain="https://www.eff.org/nsa-spying">NSA Spying</category>
 <dc:creator>Matthew Guariglia</dc:creator>
 <enclosure url="https://www.eff.org/files/banner_library/og-nsa-1.png" alt="" type="image/png" length="197469" />
  </item>
  <item>
    <title>The Internet Still Works: SmugMug Powers Online Photography</title>
    <link>https://www.eff.org/deeplinks/2026/04/internet-still-works-smugmug-powers-online-photography</link>
    <description>&lt;div class=&quot;field field--name-body field--type-text-with-summary field--label-hidden&quot;&gt;&lt;div class=&quot;field__items&quot;&gt;&lt;div class=&quot;field__item even&quot;&gt;&lt;p&gt;&lt;i&gt;&lt;span&gt;SmugMug is a family-owned photo hosting and e-commerce platform that helps professional photographers run their businesses online. Founded in 2002, the company provides tools for photographers to show their work, deliver client galleries, sell prints, and manage payments. &lt;/span&gt;&lt;/i&gt;&lt;/p&gt;
&lt;p&gt;&lt;i&gt;&lt;span&gt;In 2018, SmugMug purchased Flickr, the long-running photo-sharing community, which added tens of millions of active hobbyist photographers to the company’s user base. &lt;/span&gt;&lt;/i&gt;&lt;/p&gt;
&lt;p&gt;&lt;i&gt;&lt;span&gt;Ben MacAskill is President and COO of SmugMug’s parent company, Awesome, which he co-founded with his family. Awesome also includes the media network This Week in Photo and the nonprofit Flickr Foundation, which focuses on preserving publicly available photography. MacAskill has been an active voice in policy discussions around Section 230 and online platform regulation. &lt;/span&gt;&lt;/i&gt;&lt;em&gt;He was interviewed by &lt;a href=&quot;https://www.eff.org/about/staff/joe-mullin&quot;&gt;Joe Mullin&lt;/a&gt;, a policy analyst on EFF&#039;s Activism Team.&lt;/em&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt;Joe Mullin:  How would you explain Section 230 to a SmugMug photographer who hasn&#039;t heard of it but relies on you to share their work, run their business.&lt;/b&gt;&lt;/p&gt;
&lt;p&gt;&lt;span&gt;Ben MacAskill: Section 230 allows us to run our business. We are a small, family run business. We don’t have the resources to police every single upload, every single comment, or every single engagement that happens on the site. &lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span&gt;That includes photographers who have comments on their sites. Anywhere there’s interaction online, Section 230 protects us. &lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span&gt;It doesn&#039;t absolve us of liability. We can&#039;t run rampant and do anything we want. It  just helps protect us and make it scalable so that we can run our business.&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt;What would you have to change if Section 230 were eliminated or significantly narrowed? &lt;/b&gt;&lt;/p&gt;
&lt;p&gt;&lt;span&gt;Honestly, there&#039;s a high chance that it would bankrupt platforms like ours. They&#039;re not wildly profitable. If Section 230 is done away with, we have to [check] content that goes online to make sure we’re not liable. That means policing tens of millions of uploads per day. &lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span&gt;That would kill the business of a lot of photographers. Can you imagine—you just got married, and you’re waiting for your wedding photos for a week or two because they’re in some moderation queue? &lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span&gt;If we don’t have legal protections, and we get one nefarious customer—if something goes sideways—then I’m liable for that. &lt;/span&gt;&lt;/p&gt;
&lt;p&gt;I don&#039;t, and can&#039;t possibly know, whether every single photo is appropriate or legal, as it&#039;s uploaded. We would literally have to moderate everything before it goes online. I don’t think any business can afford that, period. I guess you could have an offshore call-center type thing. Still, it would change the entire nature of the real-time internet. Imagine posting something to Instagram and having the platform say, “Cool, we’ll get back to you in 8 to 12 days.” &lt;/p&gt;
&lt;p&gt;&lt;b&gt;What kind of content moderation do you do on SmugMug? &lt;/b&gt;&lt;/p&gt;
&lt;p&gt;&lt;span&gt;If a user uploads something illegal, we will report them as soon as we find it. We&#039;re not protecting them. We don’t condone or allow illegal behavior. We work very closely with organizations, nonprofits and governmental agencies to detect CSAM—child exploitative material—and we report that to the National Center for Missing and Exploited Children. We will report users, we eliminate illegal content on our platforms—which is one reason we have such a low prevalence of that problem. &lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span&gt;But that does take effort and time to find, and there is currently no perfect solution. The tech solutions that exist can’t detect it at 100% accuracy, or anywhere close. And with tens of millions of uploads a day, going through them one by one is impossible. &lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt;How do you think more generally about protecting user speech and creative expression? &lt;/b&gt;&lt;/p&gt;
&lt;p&gt;&lt;span&gt;On SmugMug, we’re really focusing on professionals running their business. So we don’t have to [weigh in] on content too much. &lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span&gt;On Flickr, we are big proponents of expression and artistic creativity. Photographers have opinions! But we do draw the line at things like hate speech and harassment. We aggressively maintain a friendly platform. Our community guidelines are very specific, that you cannot harass other customers, you cannot upload stuff classified as hate speech, or threats, or anything along those lines. &lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span&gt;Those rules are generally policed by the community. We do have some text analysis tools, but when community members feel harassed or threatened, reports will come in. We’ll address them on a one-by-one basis and remove harassing material from our platform. &lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span&gt;Our ability to moderate is one of the things that makes Flickr what it is. If we lose the ability to enforce our own moderation rules—or have that legislated for us—then it changes the entire nature of the community. And not in a good way. Losing the ability to moderate would permanently and forever change what we&#039;ve built.&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt;What kind of complaints or takedown requests do you receive, and how do you handle it, both in the U.S. and abroad? &lt;/b&gt;&lt;/p&gt;
&lt;p&gt;&lt;span&gt;Flickr is often referred to as the friendliest community online. You know, we&#039;re not dealing with a lot of hate. We&#039;re not dealing with a lot of threats. &lt;/span&gt;Under other frameworks, like the DMCA, we do takedowns on copyrighted material. &lt;/p&gt;
&lt;p&gt;&lt;span&gt;We’re able to handle it with a fully internal team, and we have a great track record. But the user base and the content base is so large that, if we had to &lt;/span&gt;&lt;i&gt;&lt;span&gt;assume&lt;/span&gt;&lt;/i&gt;&lt;span&gt; that those tens of millions of uploads a day are problematic, the burden would be extreme. &lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span&gt;We have a robust Trust and Safety Team, and we operate in every non-embargoed country on Earth. So we are subject to a lot of different laws and regulations: “likeness” rules and privacy rules in certain countries that don&#039;t exist here in the United States. Even state to state, there’s some varying laws. It’s a complicated framework, but we pay attention to it. &lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span&gt;The globe responds in much the same way that Section 230 is working. That is, we operate on reports and discovery, not on pre-screening everything. &lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt;What do you think that policy makers most often misunderstand about how platforms like yours operate?&lt;/b&gt;&lt;/p&gt;
&lt;p&gt;&lt;span&gt;One misconception is that we are not beholden to any laws. That Section 230 absolves us of any responsibility and any liability, and we can just do whatever we want. They talk about it as “reining in tech companies,” or “holding tech companies accountable.” But I am accountable for the content on my platform. We’re not given this “get out of jail free” card. &lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span&gt;And I think they assume all platforms don’t really care about this, that anything that is done is done begrudgingly. But we’re very proactive about keeping a clean, polite, and friendly community. We are already very aggressively policing our platform. &lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt;And even legal content gets moderated, because it might just not be appropriate for a particular community. &lt;/b&gt;&lt;/p&gt;
&lt;p&gt;&lt;span&gt;We enforce our rules, and much the way that other private in-person businesses will enforce their rules. If you start screaming hateful things at patrons in a coffee shop, they’re going to throw you out. They want a quiet, chill vibe where people can sip their lattes. We’re doing the same sort of things. &lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt;As an independent family owned company you’re in an ecosystem dominated by much larger platforms. How are these issues different for you as a smaller service? &lt;/b&gt;&lt;/p&gt;
&lt;p&gt;&lt;span&gt;I think it&#039;s a much more existential threat for middle and small tech companies. It also shuts off the next generation of these platforms. The computer science student in a dorm room right now won&#039;t have the legal protections to launch, to even try to build something new. At least not here in the United States. &lt;/span&gt;&lt;/p&gt;

&lt;/div&gt;&lt;/div&gt;&lt;/div&gt;</description>
     <pubDate>Mon, 27 Apr 2026 17:44:01 +0000</pubDate>
 <guid isPermaLink="false">111980 at https://www.eff.org</guid>
 <category domain="https://www.eff.org/issues/cda230">Section 230</category>
 <dc:creator>Joe Mullin</dc:creator>
 <enclosure url="https://www.eff.org/files/banner_library/section-230-2c.png" alt="One person holds a megaphone for another, with rainbow stripes" type="image/png" length="403304" />
  </item>
  <item>
    <title>Act Now to Stop California’s Paternalistic and Privacy-Destroying Social Media Ban</title>
    <link>https://www.eff.org/deeplinks/2026/04/act-now-stop-californias-paternalistic-and-privacy-destroying-social-media-ban</link>
    <description>&lt;div class=&quot;field field--name-body field--type-text-with-summary field--label-hidden&quot;&gt;&lt;div class=&quot;field__items&quot;&gt;&lt;div class=&quot;field__item even&quot;&gt;&lt;p&gt;California lawmakers are fast-tracking A.B. 1709—a sweeping bill that would ban anyone under 16 from using social media &lt;em&gt;and&lt;/em&gt; force every user, regardless of age, to submit sensitive personal information before accessing social platforms.&lt;/p&gt;
&lt;p&gt;That means that under A.B. 1709, social media companies will have to enact age gates to prohibit minors from accessing their services. The services may decide that complying with this bill means that Californians have to submit highly sensitive government-issued ID or biometric information to prove they are adults. In the name of “safety,” this bill would destroy online anonymity, expose sensitive personal data to breach and abuse, and replace parental decision-making with state-mandated censorship.&lt;/p&gt;
&lt;p&gt;A.B. 1709 has already passed out of the Assembly Privacy and Judiciary Committees with nearly unanimous support. Its next stop is the Assembly Appropriations Committee, followed by a floor vote—likely within the next week.&lt;/p&gt;
&lt;p class=&quot;take-action&quot;&gt;&lt;a href=&quot;https://act.eff.org/action/stop-california-s-social-media-ban-a-b-1709&quot;&gt;Take action&lt;/a&gt;&lt;/p&gt;
&lt;p class=&quot;take-explainer&quot;&gt;&lt;a href=&quot;https://act.eff.org/action/stop-california-s-social-media-ban-a-b-1709&quot;&gt;Tell Your Representative to OPPOSE A.B. 1709&lt;/a&gt;&lt;/p&gt;
&lt;h3&gt;&lt;strong&gt;California Is About to Set a Dangerous Precedent for Online Censorship&lt;/strong&gt;&lt;/h3&gt;
&lt;p&gt;By banning access to social media platforms for young people under 16, California is emulating Australia, where early results show exactly what EFF and other critics predicted: overblocking by platforms, leaving &lt;a href=&quot;https://thewest.com.au/politics/federal-politics/distressed-teens-turn-to-kids-helpline-following-social-media-ban-saying-theyve-lost-support-networks-c-21237507&quot;&gt;youth without support&lt;/a&gt; and even adults barred from access; major spikes in VPN use and other &lt;a href=&quot;https://www.techspot.com/news/112049-australia-social-media-ban-kids-mostly-isnt-working.html&quot;&gt;workarounds&lt;/a&gt; ranging from clever to desperate; and smaller platforms shutting down rather than attempting costly compliance with these sweeping bills.&lt;/p&gt;
&lt;p&gt;California should not be racing to replicate those failures. After all, when California leads—especially on tech—other states follow. There is no reason for California to lead the nation into an unconstitutional social media ban that destroys privacy and harms youth.&lt;/p&gt;
&lt;p class=&quot;take-action&quot;&gt;&lt;a href=&quot;https://act.eff.org/action/stop-california-s-social-media-ban-a-b-1709&quot;&gt;Take action&lt;/a&gt;&lt;/p&gt;
&lt;p class=&quot;take-explainer&quot;&gt;&lt;a href=&quot;https://act.eff.org/action/stop-california-s-social-media-ban-a-b-1709&quot;&gt;Tell Your Representative to OPPOSE A.B. 1709&lt;/a&gt;&lt;/p&gt;
&lt;h3&gt;&lt;strong&gt;What’s Wrong With A.B. 1709?&lt;/strong&gt;&lt;/h3&gt;
&lt;p&gt;Just about everything.&lt;/p&gt;
&lt;p&gt;A.B. 1709 &lt;a href=&quot;https://www.eff.org/deeplinks/2026/03/rep-finke-was-right-age-gating-isnt-about-kids-its-about-control&quot;&gt;weaponizes&lt;/a&gt; legitimate parental concerns by using them to hand over even more censorship and surveillance power to the government. Beneath its shiny “protect the children” rhetoric, this bill is misguided, unconstitutional, and deeply harmful to users of all ages.&lt;/p&gt;
&lt;h4&gt;&lt;strong&gt;A.B.&lt;/strong&gt;&lt;strong&gt; 1709 Recklessly Violates Free Speech Rights&lt;/strong&gt;&lt;/h4&gt;
&lt;p&gt;The First Amendment protects the right to speak and access information, regardless of age. But by imposing a blanket ban on social media access, A.B. 1709 would cut off lawful speech for millions of California teenagers, while also forcing &lt;em&gt;all &lt;/em&gt;users (adults and kids alike) to verify their ages before speaking or accessing information on social media. This will immensely and unconstitutionally chill Californians’ exercise of their First Amendment.&lt;/p&gt;
&lt;p&gt;These mandates ignore longstanding Supreme Court precedent that protects young people’s speech and consistently find these bans unconstitutional. Banning young people entirely from social media is an extreme measure that doesn’t match the actual risks of online engagement. California simply does not have a valid interest in overriding parents’ and young people’s rights to decide for themselves how to use social media.&lt;/p&gt;
&lt;p&gt;After all, age-verification technology is &lt;a href=&quot;https://www.eff.org/pages/age-verification-systems-are-surveillance-systems#main-content&quot;&gt;far from perfect&lt;/a&gt;. A.B. 1709’s reliance on imperfect age-verification technology will disproportionately silence marginalized communities—those whose IDs don’t match their presentation, those with disabilities, trans and gender non-conforming folks, and people of color—who are most likely to be wrongfully denied access by discriminatory systems.  &lt;/p&gt;
&lt;p&gt;Finally, many people will simply refuse to give up their &lt;a href=&quot;https://www.eff.org/deeplinks/2023/03/age-verification-mandates-would-undermine-anonymity-online&quot;&gt;anonymity&lt;/a&gt; in order to access social media. Our right to anonymity has been a cornerstone of free expression since the founding of this country, and a pillar of online safety since the dawn of the internet. This is for good reason: it allows creativity, innovation, and political thought to flourish, and is essential for those who risk retaliation for their speech or associations. A.B. 1709 threatens to destroy it.&lt;/p&gt;
&lt;h4&gt;&lt;strong&gt;AB 1709 Needlessly Jeopardizes Everyone’s Privacy&lt;/strong&gt;&lt;/h4&gt;
&lt;p&gt;A.B. 1709’s age-gating mandate also creates massive security risks by incentivizing platforms to force all of their users to hand over immutable biometric data and government IDs to third-party vendors. By creating centralized &quot;honeypots&quot; of sensitive information, the bill invites identity theft and permanent surveillance rather than actual safety. If we don’t trust tech companies with our private information now, we shouldn&#039;t pass a law that mandates we give them even more of it. &lt;/p&gt;
&lt;p&gt;We’ve already seen &lt;a href=&quot;https://www.eff.org/deeplinks/2024/06/hack-age-verification-company-shows-privacy-danger-social-media-laws&quot;&gt;repeated&lt;/a&gt; &lt;a href=&quot;https://www.404media.co/women-dating-safety-app-tea-breached-users-ids-posted-to-4chan/&quot;&gt;data&lt;/a&gt; &lt;a href=&quot;https://www.404media.co/the-discord-hack-is-every-users-worst-nightmare/&quot;&gt;breaches&lt;/a&gt; involving age- and identity-verification services. Yet A.B. 1709 would require millions more Californians—including the youth this bill claims to protect—to feed their most sensitive data into this growing surveillance ecosystem. &lt;/p&gt;
&lt;p&gt;This is not the answer to online safety.&lt;/p&gt;
&lt;p class=&quot;take-action&quot;&gt;&lt;a href=&quot;https://act.eff.org/action/stop-california-s-social-media-ban-a-b-1709&quot;&gt;Take action&lt;/a&gt;&lt;/p&gt;
&lt;p class=&quot;take-explainer&quot;&gt;&lt;a href=&quot;https://act.eff.org/action/stop-california-s-social-media-ban-a-b-1709&quot;&gt;Tell Your Representative to OPPOSE A.B. 1709&lt;/a&gt;&lt;/p&gt;
&lt;h4&gt;&lt;strong&gt;AB 1709 Harms the Youth It Claims to Protect&lt;/strong&gt;&lt;/h4&gt;
&lt;p&gt;While framed as a safety measure, this bill serves as a blunt instrument of censorship, severing vital lifelines for California’s young people. Besides being unconstitutional, banning young people from the internet is bad public policy. After all, social media sites are not just sources of entertainment; they provide crucial spaces for young people to explore their identities—whether by creating and sharing &lt;u&gt;art, practicing religion, building community, or&lt;/u&gt; &lt;u&gt;engaging in civic life. &lt;/u&gt;&lt;/p&gt;
&lt;p&gt;Social science &lt;a href=&quot;https://www.techdirt.com/2026/01/21/two-major-studies-125000-kids-the-social-media-panic-doesnt-hold-up/&quot;&gt;indicates&lt;/a&gt; that moderate internet use is a net positive for teens’ development, and negative outcomes are usually due to either lack of access or excessive use. Social media provides essential spaces for civic engagement, identity exploration, and community building—particularly for &lt;a href=&quot;https://www.pewresearch.org/journalism/2025/12/03/young-adults-and-the-future-of-news/&quot;&gt;LGBTQ+&lt;/a&gt; and &lt;a href=&quot;https://medicalxpress.com/news/2020-07-marginalized-youth-socially-isolated-previous.html&quot;&gt;marginalized youth&lt;/a&gt; who may lack support in their physical environments. By replacing access to &lt;a href=&quot;https://www.pewresearch.org/journalism/2025/12/03/young-adults-and-the-future-of-news/&quot;&gt;political news&lt;/a&gt; and &lt;a href=&quot;https://journals.sagepub.com/doi/full/10.1089/jwh.2024.0563&quot;&gt;health&lt;/a&gt; &lt;a href=&quot;https://www.woodhullfoundation.org/press-release/report-age-verification-sex-educators/&quot;&gt;resources&lt;/a&gt; with state-mandated isolation, A.B. 1709 ignores the calls of young people themselves who favor digital literacy and education over restrictive government control.&lt;/p&gt;
&lt;p&gt;Young people have been &lt;a href=&quot;https://www.eff.org/deeplinks/2024/03/thousands-young-people-told-us-why-kids-online-safety-act-will-be-harmful-minors&quot;&gt;loud and clear&lt;/a&gt; that what they want is access and education—not censorship and control. They even &lt;a href=&quot;https://edsource.org/2026/social-media-ai-mental-health/755990&quot;&gt;drafted their own&lt;/a&gt; digital literacy education bill, A.B. 2071, which is currently before the California legislature! Instead of cutting off vital lifelines, we should support education measures that would arm them (and the adults in their lives) with the knowledge they need to explore online spaces safely.&lt;/p&gt;
&lt;h4&gt;&lt;strong&gt;AB 1709 Is Misguided and Won’t Work&lt;/strong&gt;&lt;/h4&gt;
&lt;p&gt;In case you needed more reasons to oppose this bill.&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;strong&gt;A.B. 1709 Replaces Parenting With Government Control. &lt;/strong&gt;Families know there is no one-size-fits-all solution to parenting. But AB 1709 imposes one anyway, overriding parental decision-making with a blanket censorship prohibition. Parents who want to actively guide their children’s online experiences should be empowered, not relegated to the sidelines by a blunt state mandate.&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;A.B. 1709 Strengthens Big Tech Instead of Challenging It. &lt;/strong&gt;Supporters claim that this bill will rein in the major tech companies, but in fact, steep fines and costly compliance regimes &lt;a href=&quot;https://www.eff.org/pages/age-gates-are-windfall-big-tech-and-death-sentence-smaller-platforms#main-content&quot;&gt;disproportionately harm smaller platforms&lt;/a&gt;. Where large corporations can afford to absorb legal risk and shell out for expensive verification systems, smaller forums and emerging platforms cannot. We’ve already seen platforms shut down or geoblock entire states in response to age-gating laws. And when the small platforms shutter, where do all of those users—and their valuable data—go? Straight back to the biggest companies.&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;A.B. 1709 Creates Expensive and Shady Bureaucracy During a Budget Crisis. &lt;/strong&gt;California is facing a massive deficit, but A.B. 1709 would waste taxpayer dollars to fund a shadowy new &quot;e-Safety Advisory Commission&quot; to enforce this ban and dream up new ways to censor the internet. In addition, lawmakers in support of A.B. 1709 have already admitted that this bill is likely to &lt;a href=&quot;https://www.eff.org/pages/age-verification-bills-are-unconstitutional#main-content&quot;&gt;follow the same path&lt;/a&gt; as other recent &quot;child safety&quot; laws that were struck down or blocked in court for First Amendment and privacy reasons. With A.B. 1709, taxpayers are being asked to hand over a blank check for millions in legal fees to defend a law that is unconstitutional on its face.&lt;/li&gt;
&lt;/ul&gt;
&lt;h3&gt;&lt;strong&gt;Californians: Act Now to Kill This Bill&lt;/strong&gt;&lt;/h3&gt;
&lt;p&gt;A.B. 1709 is not an inevitability, as some supporters want you to believe. But we need to act now to support our youth and their right to participate in online public life.&lt;/p&gt;
&lt;p&gt;Your representatives could vote on A.B. 1709 as soon as next week. If you’re a Californian, email your legislators now and tell them to vote NO on AB 1709.&lt;/p&gt;
&lt;p class=&quot;take-action&quot;&gt;&lt;a href=&quot;https://act.eff.org/action/stop-california-s-social-media-ban-a-b-1709&quot;&gt;Take action&lt;/a&gt;&lt;/p&gt;
&lt;p class=&quot;take-explainer&quot;&gt;&lt;a href=&quot;https://act.eff.org/action/stop-california-s-social-media-ban-a-b-1709&quot;&gt;Tell Your Representative to OPPOSE A.B. 1709&lt;/a&gt;&lt;/p&gt;

&lt;/div&gt;&lt;/div&gt;&lt;/div&gt;</description>
     <pubDate>Fri, 24 Apr 2026 23:11:32 +0000</pubDate>
 <guid isPermaLink="false">112004 at https://www.eff.org</guid>
 <category domain="https://www.eff.org/issues/age-verification">Age Verification and Age Gating: Resource Hub</category>
 <category domain="https://www.eff.org/taxonomy/term/69">Call To Action</category>
 <dc:creator>Molly Buckley</dc:creator>
 <enclosure url="https://www.eff.org/files/banner_library/ageverification-banner2-3a.png" alt="two kids on a huge laptop, spied on by an eye in magnifying glass" type="image/png" length="1249014" />
  </item>
  <item>
    <title>EFF Challenges Secrecy In Eastern District of Texas Patent Case </title>
    <link>https://www.eff.org/deeplinks/2026/04/eff-challenges-secrecy-eastern-district-texas-patent-case</link>
    <description>&lt;div class=&quot;field field--name-body field--type-text-with-summary field--label-hidden&quot;&gt;&lt;div class=&quot;field__items&quot;&gt;&lt;div class=&quot;field__item even&quot;&gt;&lt;p&gt;&lt;em&gt;Clinic students Emily Ko and Zoe Lee at the Technology Law and Policy Clinic at the NYU School of Law were the principal authors of this post.&lt;/em&gt;&lt;/p&gt;
&lt;p&gt;Courts are not private forums for business disputes. They are public institutions, and their records belong to the public. But too often, courts forget that and allow for massive over-sealing, especially in patent cases. &lt;/p&gt;
&lt;p&gt;&lt;span&gt;EFF recently discovered another case of this in the Eastern District of Texas, where key court filings about Wi-Fi technology used by billions of people every day were hidden entirely from public view. The public could not see the parties’ arguments about patent ownership, the plaintiff’s standing in court, or licensing obligations tied to standardized technologies.&lt;/span&gt;&lt;/p&gt;
&lt;h3&gt;&lt;b&gt;EFF Seeks to Uncover Sealed Information in &lt;/b&gt;&lt;b&gt;&lt;i&gt;Wilus&lt;/i&gt;&lt;/b&gt;&lt;b&gt; &lt;/b&gt;&lt;/h3&gt;
&lt;p&gt;&lt;span&gt;The case &lt;/span&gt;&lt;i&gt;&lt;span&gt;Wilus Institute of Standards and Technology Inc. v. HP Inc.,&lt;/span&gt;&lt;/i&gt;&lt;span&gt; highlights a recurring transparency problem in patent litigation. &lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span&gt;Wilus claims to own standard essential patents (SEPs) related to Wi-Fi 6 — technology embedded in everyday devices. Wilus&lt;/span&gt; &lt;span&gt;sued Samsung and HP for patent infringement. HP argued that Wilus failed to offer licenses on Fair, Reasonable, and Non-Discriminatory (FRAND) terms, which are required to prevent SEP holders from exploiting their position, by blocking fair access to widely used technologies. &lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span&gt;In reviewing the docket, EFF found that many filings were improperly sealed under a lenient protective order without the required, specific justification needed in a proper motion to seal. Because there is a presumption of public access to court filings, litigants must file a motion to seal and demonstrate compelling reasons for secrecy. This typically requires a document-by-document and line-by-line justification. &lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span&gt;In the Eastern District of Texas, that standard is often not enforced. Instead, district judges allow litigants to hide information using boilerplate justification in a protective order without explaining why specific documents or specific parts in a document should be hidden. &lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span&gt;In &lt;/span&gt;&lt;i&gt;&lt;span&gt;Wilus&lt;/span&gt;&lt;/i&gt;&lt;span&gt;, two sets of documents stood out. &lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span&gt;First, Samsung moved to dismiss the case, arguing Wilus may not have validly obtained the patents — raising doubts about whether they had standing to sue at all. Wilus’s opposition to that motion was filed &lt;/span&gt;&lt;i&gt;&lt;span&gt;completely under seal&lt;/span&gt;&lt;/i&gt;&lt;span&gt;, with no redacted public version available at all. That briefing likely addresses the patent assignment agreements that underpin Wilus’s business model — information the public has an interest in, especially in cases involving &lt;/span&gt;&lt;a href=&quot;https://uk.practicallaw.thomsonreuters.com/4-513-0928?transitionType=Default&amp;amp;contextData=(sc.Default)&quot;&gt;&lt;span&gt;non-practicing entities (NPEs)&lt;/span&gt;&lt;/a&gt;&lt;span&gt; like Wilus. &lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span&gt;Second, filings related to HP’s supplemental briefing on FRAND obligations were also sealed in full, with no redacted versions available to the public. Whether Wilus is bound by FRAND has implications far beyond this case. Companies subject to FRAND must adhere to reasonable licensing terms, while those that are not can charge significantly higher licensing fees. &lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span&gt;In both instances, the public was shut out of arguments that bear directly on how essential technologies are licensed and controlled.&lt;/span&gt;&lt;/p&gt;
&lt;h3&gt;&lt;b&gt;EFF Pushes For Public Access &lt;/b&gt;&lt;/h3&gt;
&lt;p&gt;&lt;span&gt;EFF raised these concerns with Wilus’s counsel and pressed for public access to the sealed records. Wilus ultimately agreed to file redacted versions of several documents now available&lt;/span&gt;&lt;i&gt;&lt;span&gt; as &lt;/span&gt;&lt;/i&gt;&lt;a href=&quot;https://www.courtlistener.com/docket/69161107/wilus-institute-of-standards-and-technology-inc-v-hp-inc/?page=3&quot;&gt;&lt;span&gt;Document Numbers 387, 388, and 389&lt;/span&gt;&lt;/a&gt;&lt;span&gt;. &lt;/span&gt;&lt;/p&gt;
&lt;p&gt;That result is progress, but it shouldn’t require outside intervention. Public versions of court filings should be the default, not something negotiated after outside pressure.&lt;/p&gt;
&lt;p&gt;&lt;span&gt;Even now, these newly filed redacted versions conceal significant portions of the parties’ arguments. The public still cannot fully see how this case about technologies that are used every day is being litigated. &lt;/span&gt;&lt;/p&gt;
&lt;h3&gt;&lt;b&gt;Why Public Access Matters &lt;/b&gt;&lt;/h3&gt;
&lt;p&gt;&lt;span&gt;Sealing court records is designed to be rare. To overcome the presumption of public access, litigants must show compelling reasons for secrecy. That’s because open courts are a distinguishing feature of American democracy. The public, journalists, and policymakers all have the right to observe proceedings and hold both government actors and private litigants accountable. &lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span&gt;Some filings do contain trade secrets or commercially sensitive information. But that doesn’t mean litigants should be able to hide information without explaining why. The Eastern District of Texas allows litigants to bypass the requirement to explain why.&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span&gt;EFF confronted this very same issue in its attempt to intervene in another Eastern District of Texas case, &lt;/span&gt;&lt;a href=&quot;https://www.eff.org/deeplinks/2024/08/eff-presses-federal-circuit-make-patent-case-filings-public&quot;&gt;&lt;i&gt;&lt;span&gt;Entropic v. Charter&lt;/span&gt;&lt;/i&gt;&lt;/a&gt;&lt;span&gt;. The same pattern appeared again in &lt;/span&gt;&lt;i&gt;&lt;span&gt;Wilus&lt;/span&gt;&lt;/i&gt;&lt;span&gt;: instead of narrowly tailored redactions supported by specific reasoning, filings were withheld wholesale. &lt;/span&gt;&lt;/p&gt;
&lt;h3&gt;&lt;b&gt;Courts Must Enforce the Standard&lt;/b&gt;&lt;/h3&gt;
&lt;p&gt;&lt;span&gt;Courts, not third parties, are responsible for protecting the public’s right of access. &lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span&gt;That means enforcing the “compelling reasons” standard, as a matter of course. Parties seeking to seal sensitive information should be required to justify each proposed redaction. The Eastern District of Texas’ current approach falls short. By allowing broad, unsupported sealing through expansive protective orders, it effectively treats judicial records as confidential by default. &lt;/span&gt;&lt;/p&gt;
&lt;p&gt;Heavy caseloads don’t change the rule. Administrative burden cannot override constitutional and common law rights. Judicial records are presumptively public. Courts, including the Eastern District of Texas, should enforce that presumption. &lt;/p&gt;
&lt;h3&gt;&lt;b&gt;Other Federal Courts Get It Right &lt;/b&gt;&lt;/h3&gt;
&lt;p&gt;&lt;span&gt;The Eastern District of Texas is an outlier. In the Northern District of California, judges routinely reject overbroad sealing requests. As &lt;/span&gt;&lt;a href=&quot;https://cand.uscourts.gov/sites/default/files/standing-orders/VC-Civil-Standing-Order-2025-06-27.pdf&quot;&gt;&lt;span&gt;Judge Chhabria’s Civil Standing Order&lt;/span&gt;&lt;/a&gt;&lt;span&gt; explains: &lt;/span&gt;&lt;/p&gt;
&lt;blockquote&gt;&lt;p&gt;&lt;span&gt;[M]otions to seal . . . are almost always without merit. . . . Federal courts are paid for by the public, and the public has the right to inspect court records, subject only to narrow exceptions. &lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span&gt;The filing party must make a specific showing explaining why each document that it seeks to seal may justifiably be sealed . . . Generic and vague references to “competitive harm” are almost always insufficient justification for sealing. &lt;/span&gt;&lt;/p&gt;
&lt;/blockquote&gt;
&lt;p&gt;&lt;span&gt;This approach reflects the law: sealing must be narrowly tailored and specifically justified.&lt;/span&gt;&lt;/p&gt;
&lt;h3&gt;&lt;b&gt;Court Transparency is Fundamental &lt;/b&gt;&lt;/h3&gt;
&lt;p&gt;At first glance, secrecy in patent litigation may not seem alarming. But it signals a broader erosion of transparency. The widespread use of expansive protective orders in the Eastern District of Texas is a practice that risks spreading if courts do not enforce the law. &lt;/p&gt;
&lt;p&gt;&lt;span&gt;These practices allow private parties to obscure information about disputes involving technologies that shape modern life. That undermines a core principle of a free society: transparency regarding the actions of powerful actors. &lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span&gt;Courts are not private forums for business disputes. They are public institutions, and their records belong to the public. &lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span&gt;So long as these practices continue, EFF will keep advocating for transparency and working to vindicate the public’s right to access court records.&lt;/span&gt;&lt;/p&gt;

&lt;/div&gt;&lt;/div&gt;&lt;/div&gt;</description>
     <pubDate>Fri, 24 Apr 2026 22:57:05 +0000</pubDate>
 <guid isPermaLink="false">112005 at https://www.eff.org</guid>
 <category domain="https://www.eff.org/issues/patents">Patents</category>
 <dc:creator>Betty Gedlu</dc:creator>
 <enclosure url="https://www.eff.org/files/banner_library/patents-2.png" alt="" type="image/png" length="31203" />
  </item>
  <item>
    <title>California Coastal Community Must Reject CBP&#039;s AI-Powered Surveillance Tower </title>
    <link>https://www.eff.org/deeplinks/2026/04/california-coastal-community-must-reject-cbps-ai-powered-surveillance-tower</link>
    <description>&lt;div class=&quot;field field--name-body field--type-text-with-summary field--label-hidden&quot;&gt;&lt;div class=&quot;field__items&quot;&gt;&lt;div class=&quot;field__item even&quot;&gt;&lt;p&gt;&lt;span&gt;Customs and Border Protection (CBP) is &lt;/span&gt;&lt;a href=&quot;https://takeaction.salsalabs.org/sanclemente&quot;&gt;&lt;span&gt;seeking permission&lt;/span&gt;&lt;/a&gt;&lt;span&gt; from the California city of San Clemente to install an Anduril Industries surveillance tower on a cliff that would allow for constant monitoring of entire coastal neighborhoods. &lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span&gt;The proposed tower is Anduril&#039;s Sentry, part of the Autonomous Surveillance Tower (AST) program. While CBP says it will primarily monitor the coastline for boats carrying migrants, it will actually be installed 1.5 miles inland, overlooking the bulk of the 62,000-resident city. By CBP&#039;s own public statement, the system–which combines video, radar, and computer vision–is &quot;&lt;/span&gt;&lt;a href=&quot;https://www.cbp.gov/frontline/watchful-eye&quot;&gt;&lt;span&gt;constantly scanning&lt;/span&gt;&lt;/a&gt;&lt;span&gt;&quot; for movement and identifying and tracking objects an AI algorithm decides are of interest. Depending on the model–the photos provided by CBP indicate it is a long range maritime model–the camera could see as far as nine miles, which would cover the entire city and potentially see as far as neighboring Dana Point.&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span&gt;&lt;img src=&quot;/files/2026/04/24/san_clemente_map.png&quot; width=&quot;1118&quot; height=&quot;722&quot; alt=&quot;Map of San Clemente showing 1.5 miles between the tower and the coast&quot; title=&quot;Map of San Clemente showing 1.5 miles between the tower and the coast&quot; /&gt;&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span&gt;&quot;The AST utilize advanced computer vision algorithms to autonomously detect, identify, and track items of interest (IoI) as they transit through the towers field of view,&quot; CBP writes in a &lt;/span&gt;&lt;a href=&quot;https://s3.documentcloud.org/documents/25545615/cbp-pta-dhs-use-case-id-dhs-p3-ast-maritime-inactive-use.pdf&quot;&gt;&lt;span&gt;privacy threshold analysis&lt;/span&gt;&lt;/a&gt;&lt;span&gt;. &quot;The system can determine if an IoI is a human, animal, or vehicle without operator intervention. The system then generates and transmits an alert to operators with the location and images of the IoI for adjudication and response.&quot; &lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span&gt;On April 28, local residents and Oakland Privacy, a privacy- and anti-surveillance-focused citizens’ coalition, are holding a town hall to inform the public about the dangers of this technology. We urge people to attend to better understand what&#039;s at stake. &lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span&gt;&quot;The planned deployment of an Anduril tower along a heavily used Orange County coastline 75 miles from the border demonstrates that the militarization of the border region is rapidly moving northwards and across the entire state,&quot; writes Oakland Privacy. &lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span&gt;City officials &lt;/span&gt;&lt;a href=&quot;https://www.sanclemente.gov/AgendaCenter/ViewFile/Item/2129?fileID=12703&quot;&gt;&lt;span&gt;raised concerns&lt;/span&gt;&lt;/a&gt;&lt;span&gt; about resident privacy and proposed that a lease agreement include a prohibition on surveilling neighborhoods. CBP rejected that proposal, instead saying that they would configure the tower to &quot;avoid&quot; scanning residential neighborhoods, but the system would remain capable of tracking human beings in residential areas. According to the staff report: &lt;/span&gt;&lt;/p&gt;
&lt;blockquote&gt;&lt;p&gt;&lt;span&gt;In response to privacy concerns, CBP has stated the system would be configured to avoid scanning residential areas that fall into the scan viewshed, focusing the system on the marine environment. CBP has maintained the purpose of the system is specifically maritime surveillance, and the system would be singularly focused on offshore activities. However, there may be an instance in which there is an active smuggling event, detected by the system at sea, in which the subsequent smuggling event traverses through the residential neighborhoods. In such a case, the system may continue to track and monitor. To restrict this functionality would be contrary to the spirit and intent of the deployment. Therefore, they cannot make such a contractual obligation.&lt;/span&gt;&lt;/p&gt;
&lt;/blockquote&gt;
&lt;p&gt;&lt;span&gt;The Anduril towers retain a variety of data, including images and more. &lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;/p&gt;&lt;div class=&quot;caption caption-center&quot;&gt;&lt;div class=&quot;caption-width-container&quot;&gt;&lt;div class=&quot;caption-inner&quot;&gt;&lt;img src=&quot;/files/2026/04/27/maritime_from_packet.png&quot; width=&quot;456&quot; height=&quot;494&quot; alt=&quot;image of surveillance tower from public records&quot; title=&quot;image of surveillance tower from public records&quot; /&gt;&lt;p class=&quot;caption-text&quot;&gt;The proposed Anduril surveillance tower. Source: City of San Clemente&lt;/p&gt;&lt;/div&gt;&lt;/div&gt;&lt;/div&gt;
&lt;p&gt;&lt;span&gt;&quot;The AST capture and retain imagery which occurs in plan view of the tower sites and is stored as an individual event with a unique event identified allowing replay of the event for further investigation or dismissal based on activity occurring,&quot; according to the private threshold analysis.&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span&gt;The document indicates a potential 30-day retention period for imagery, but then contradicts itself to say that data will be held indefinitely to train algorithms: &quot;AST will also be maintaining learning training data, these records should not be deleted.&quot; This means that taxpayers would be paying for the privilege of having their data turned into fuel for Anduril&#039;s product.&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span&gt;In 2020 CBP said it would work with National Archives and Records Administration (NARA) to develop a retention schedule for training data (i.e., a timeline for deletion). However, when EFF filed a Freedom of Information Act (FOIA) with NARA, the agency said there were no records of these discussions. Likewise, CBP has not provided records in response to the FOIA request EFF filed with them seeking the same records. &lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span&gt;&lt;div class=&quot;caption caption-center&quot;&gt;&lt;div class=&quot;caption-width-container&quot;&gt;&lt;div class=&quot;caption-inner&quot;&gt;&lt;img src=&quot;/files/2026/04/24/anduril_at_border_with_truck_medium.jpg&quot; width=&quot;1000&quot; height=&quot;834&quot; alt=&quot;An Anduril surveillance tower at the borde fence with a Border Patrol vehicle.&quot; title=&quot;An Anduril surveillance tower at the borde fence with a Border Patrol vehicle.&quot; /&gt;&lt;p class=&quot;caption-text&quot;&gt;Anduril Maritime Sentry in San Diego, where the border fence meets the ocean.&lt;/p&gt;&lt;/div&gt;&lt;/div&gt;&lt;/div&gt;&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span&gt;This would not be the first CBP tower placed along the coastline in California. EFF identified one in Del Mar, about 30 miles from the border, and another in San Diego County where the border fence meets the Pacific Ocean. CBP has also &lt;/span&gt;&lt;a href=&quot;https://www.documentcloud.org/projects/212258-california-coastal-commissioncbp-towers/&quot;&gt;&lt;span&gt;applied&lt;/span&gt;&lt;/a&gt;&lt;span&gt; to place towers–although not necessarily the Anduril model–in or near several other coastal locations: Gaviota State Park, Refugio State Park, Vandenberg Air Force Base, Piedras Blancas and Point Vicente. The California coastline isn’t the only coastline dotted with surveillance towers. The &lt;/span&gt;&lt;a href=&quot;https://migrantsrights.org.uk/projects/hostile-office/the-digital-hostile-environment/ai-borders-anduril-autonomous-surveillance-towers/&quot;&gt;&lt;span&gt;Migrant Rights Network&lt;/span&gt;&lt;/a&gt;&lt;span&gt; has also documented numerous Anduril towers along the southeast coast of England. Where the San Clemente tower would differ is that there is a substantial population between the tower and the beach, and because it&#039;s a 360-degree system, it can watch neighborhoods even further from the coast. &lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span&gt;However, this won&#039;t be the first time an Anduril tower has been placed next to a community. EFF has documented numerous Anduril towers in public parks along the Rio Grande in Laredo and Roma, Texas. In Mission, Texas, an Anduril tower was placed outside an RV park: the tower could not even see the border without capturing data from the community. Because AI can swivel the cameras 360 degrees, two churches were within the &quot;viewshed&quot; of that tower. &lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;a href=&quot;https://www.google.com/maps/d/u/1/edit?mid=1bxUGeOT6vVXu0jFQhDLxgktLFLVOKsI&amp;amp;usp=sharing&quot;&gt;&lt;i&gt;&lt;span&gt;Click here&lt;/span&gt;&lt;/i&gt;&lt;/a&gt;&lt;i&gt;&lt;span&gt; to view EFF&#039;s ongoing map of CBP surveillance towers.&lt;/span&gt;&lt;/i&gt;&lt;/p&gt;
&lt;p&gt;&lt;span&gt;Many border surveillance towers are placed on city or county property, requiring a lease to be approved by the local governing body–as is the case with San Clemente. In 2024, EFF and Imperial Valley Equity and Justice &lt;/span&gt;&lt;a href=&quot;https://www.eff.org/deeplinks/2024/05/coalition-calexico-think-twice-about-reapproving-border-surveillance-tower-next&quot;&gt;&lt;span&gt;organized an effort&lt;/span&gt;&lt;/a&gt;&lt;span&gt; to fight the renewal of a Border Patrol&#039;s lease for a tower next to a public park. The coalition lost &lt;/span&gt;&lt;a href=&quot;https://inewsource.org/2024/05/17/ai-concerns-california-border-city-surveillance-tower-at-community-park/&quot;&gt;&lt;span&gt;narrowly&lt;/span&gt;&lt;/a&gt;&lt;span&gt; after a recall election ousted two officials who were critical of the lease.&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span&gt;CBP is rapidly increasing the number of towers at the border and beyond, recently &lt;/span&gt;&lt;a href=&quot;https://www.documentcloud.org/projects/207706-dhs-tech-2022/?q=maintenance&quot;&gt;&lt;span&gt;announcing&lt;/span&gt;&lt;/a&gt;&lt;span&gt; the potential to install 1,500 more towers in the next few years–more than tripling what we&#039;ve documented so far–at a cost of more than $400 million to the public for maintenance alone. This is despite more than &lt;/span&gt;&lt;a href=&quot;https://www.eff.org/deeplinks/2024/10/us-border-surveillance-towers-have-always-been-broken&quot;&gt;&lt;span&gt;20 years of government reports&lt;/span&gt;&lt;/a&gt;&lt;span&gt; that have documented how tower-based systems are ineffective and wasteful.&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span&gt;It&#039;s time to fight back. &lt;/span&gt;&lt;/p&gt;

&lt;/div&gt;&lt;/div&gt;&lt;/div&gt;</description>
     <pubDate>Fri, 24 Apr 2026 20:04:30 +0000</pubDate>
 <guid isPermaLink="false">112002 at https://www.eff.org</guid>
 <category domain="https://www.eff.org/issues/border-surveillance-technology">Border Surveillance Technology</category>
 <dc:creator>Dave Maass</dc:creator>
 <enclosure url="https://www.eff.org/files/banner_library/andurilthroughfence.jpg" alt="" type="image/jpeg" length="301406" />
  </item>
  <item>
    <title>EFF to 9th Circuit (Again): App Stores Shouldn’t Be Liable for Processing Payments for User Content</title>
    <link>https://www.eff.org/deeplinks/2026/04/eff-9th-circuit-again-app-stores-shouldnt-be-liable-processing-payments-user</link>
    <description>&lt;div class=&quot;field field--name-body field--type-text-with-summary field--label-hidden&quot;&gt;&lt;div class=&quot;field__items&quot;&gt;&lt;div class=&quot;field__item even&quot;&gt;&lt;p&gt;EFF filed an &lt;a href=&quot;https://www.eff.org/document/2026-04-17-social-casino-cases-9th-cir-eff-amicus-brief-filed&quot;&gt;amicus brief&lt;/a&gt; for the &lt;a href=&quot;https://www.eff.org/deeplinks/2023/08/eff-9th-circuit-apps-stores-shouldnt-be-liable-processing-payments-user-content&quot;&gt;second time&lt;/a&gt; in the U.S. Court of Appeals for the Ninth Circuit, arguing that allowing cases against the Apple, Google, and Facebook app stores to proceed could lead to greater censorship of users’ online speech.&lt;/p&gt;
&lt;p&gt;Our brief argues that the app stores should not lose &lt;a href=&quot;https://www.eff.org/issues/cda230&quot;&gt;Section 230 immunity&lt;/a&gt; for hosting “social casino” apps just because they process payments for virtual chips within those apps. Otherwise, all platforms that facilitate financial transactions for online content—beyond app stores and the apps and games they distribute—would be forced to censor user content to mitigate their legal exposure.&lt;/p&gt;
&lt;p&gt;Social casino apps are online games where users can buy virtual chips with real money but can’t ever cash out their winnings. The three cases against Apple, Google, and Facebook were brought by plaintiffs who spent large sums of money on virtual chips and even became addicted to these games. The plaintiffs argue that social casino apps violate various state gambling laws.&lt;/p&gt;
&lt;p&gt;At issue on appeal is the part of &lt;a href=&quot;https://www.congress.gov/crs-product/R46751&quot;&gt;Section 230&lt;/a&gt; that provides immunity to online platforms when they are sued for harmful content created by others—in this case, the social casino apps that plaintiffs downloaded from the various app stores and the virtual chips they bought within the apps.&lt;/p&gt;
&lt;p&gt;Section 230 is the foundational law that has, since 1996, created legal breathing room for internet intermediaries (and their users) to publish third-party content. Online speech is largely mediated by these private companies, allowing all of us to speak, access information, and engage in commerce online, without requiring that we have loads of money or technical skills.&lt;/p&gt;
&lt;p&gt;The lower court hearing the case ruled that the companies do not have Section 230 immunity because they allow the social casino apps to use the platforms’ payment processing services for the in-app purchasing of virtual chips.&lt;/p&gt;
&lt;p&gt;However, in our brief we urged the Ninth Circuit to &lt;a href=&quot;https://scholar.google.com/scholar_case?case=3202153596520211343&quot;&gt;reverse the district court&lt;/a&gt; and hold that Section 230 &lt;em&gt;does&lt;/em&gt; apply to the app stores, even when they process payments for virtual chips within the social casino apps. The app stores would undeniably have Section 230 immunity if sued for simply hosting the allegedly illegal social casino apps in their respective stores. Congress made no distinction—and the court shouldn’t recognize one—between hosting third-party content and processing payments for the same third-party content. Both are editorial choices of the platforms that are protected by Section 230.&lt;/p&gt;
&lt;p&gt;We also argued that a rule that exposes internet intermediaries to potential liability for facilitating a financial transaction related to unlawful user content would have huge implications beyond the app stores. All platforms that facilitate financial transactions for third-party content would be forced to censor any user speech that may in any way risk legal exposure for the platform. This would harm the open internet—the unique ability of anyone with an internet connection to communicate with others around the world cheaply, easily, and quickly.&lt;/p&gt;
&lt;p&gt;The plaintiffs argue that the app stores could preserve their Section 230 immunity by simply refusing to process in-app purchases of virtual chips. But the plaintiffs’ position fails to recognize that other platforms don’t have such a choice. Etsy, for example, facilitates purchases of virtual art, while Patreon enables artists to be supported by memberships. Platforms like these would lose Section 230 immunity and be exposed to potential liability simply because they processed payments for user content that a plaintiff argues is illegal. That outcome would threaten the entire business models of these services, ultimately harming users’ ability to share and access online speech.&lt;/p&gt;
&lt;p&gt;The app stores should be protected by Section 230—a law that protects Americans’ freedom of expression online by protecting the intermediaries we all rely on—irrespective of their role as payment processors.&lt;/p&gt;

&lt;/div&gt;&lt;/div&gt;&lt;/div&gt;</description>
     <pubDate>Thu, 23 Apr 2026 22:05:24 +0000</pubDate>
 <guid isPermaLink="false">112001 at https://www.eff.org</guid>
 <category domain="https://www.eff.org/issues/cda230">Section 230</category>
 <category domain="https://www.eff.org/taxonomy/term/72">Legal Analysis</category>
 <dc:creator>Sophia Cope</dc:creator>
 <dc:creator>Aaron Mackey</dc:creator>
 <enclosure url="https://www.eff.org/files/banner_library/section-230-3.png" alt="A person holding a megaphone that another person speaks through" type="image/png" length="22142" />
  </item>
  <item>
    <title>Speaking Freely: Lizzie O&#039;Shea</title>
    <link>https://www.eff.org/deeplinks/2026/04/speaking-freely-lizzie-oshea</link>
    <description>&lt;div class=&quot;field field--name-body field--type-text-with-summary field--label-hidden&quot;&gt;&lt;div class=&quot;field__items&quot;&gt;&lt;div class=&quot;field__item even&quot;&gt;&lt;p&gt;&lt;em&gt;&lt;span&gt;Lizzie O’Shea is an Australian lawyer, author, and the founder and chair of &lt;/span&gt;&lt;a href=&quot;https://digitalrightswatch.org.au/&quot;&gt;&lt;span&gt;Digital Rights Watch&lt;/span&gt;&lt;/a&gt;&lt;span&gt;, which advocates for freedom, fairness, and fundamental rights in the digital age. She sits on the board of &lt;/span&gt;&lt;a href=&quot;https://www.blueprintforfreespeech.net/&quot;&gt;&lt;span&gt;Blueprint for Free Speech&lt;/span&gt;&lt;/a&gt;&lt;span&gt;, and in 2019 was named a &lt;/span&gt;&lt;a href=&quot;https://www.accessnow.org/heroes-villains-awards/&quot;&gt;&lt;span&gt;Human Rights Hero&lt;/span&gt;&lt;/a&gt;&lt;span&gt; by Access Now.&lt;/span&gt;&lt;/em&gt;&lt;/p&gt;
&lt;p&gt;&lt;span&gt;&lt;strong&gt;Interviewer&lt;/strong&gt;: &lt;/span&gt;&lt;strong&gt;&lt;a href=&quot;https://www.eff.org/about/staff/jillian-york&quot;&gt;Jillian York&lt;/a&gt;&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt;Jillian York: &lt;/b&gt;&lt;span&gt;Hi, good morning, or rather, good evening for you.&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt;Lizzie O’Shea: &lt;/b&gt;&lt;span&gt;Hi Jillian, it&#039;s great to be here. &lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt;JY: &lt;/b&gt;&lt;span&gt;I&#039;m going to start with asking a question that I try to kick off every interview with, which is, what does free speech or free expression mean to you?&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt;LO: &lt;/b&gt;&lt;span&gt;Yes, so &lt;/span&gt;&lt;a href=&quot;https://digitalrightswatch.org.au/&quot;&gt;&lt;span&gt;Digital Rights Watch&lt;/span&gt;&lt;/a&gt;&lt;span&gt;, which is the organization I founded and I chair, is focused on fundamental rights and freedoms in the online world. And so freedom of speech is obviously a big part of that. It&#039;s obviously a very vexed right, partly because of its heritage and interpretation in places like the United States, which sometimes sits in contrast culturally to other parts of the world. Certainly, if you ask Australians about it, they do not want to have a culture of free speech that looks like the United States. &lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span&gt;Australians understand that freedom of expression is a really important component of democracy. So one of my jobs is to make the claim that curtailing freedom of speech, including in online settings, can have a real impact on democracy. And I think that&#039;s fundamentally true, and you don&#039;t want to wait until it&#039;s too late to be able to make that argument, to ensure that the policies are in place to protect that freedom. So I think it&#039;s a really important freedom. It&#039;s got a vexed history and expression in the modern online world, but many people still instinctively understand that those in power see speech as something that is important to challenging their authority, and so it can be a really important place to fight back and protect democracy and other rights from being impacted by those who hold power at the moment.&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt;JY: &lt;/b&gt;&lt;span&gt;I want to ask you about your book. You&#039;re a critic of techno-utopianism. Your book, &lt;/span&gt;&lt;a href=&quot;https://www.versobooks.com/products/796-future-histories?srsltid=AfmBOordAsCtGJ2ypBsCJhSYyf_FhzOakblTCniG5swCclq6Snebf8Tl&quot;&gt;&lt;i&gt;&lt;span&gt;Future Histories&lt;/span&gt;&lt;/i&gt;&lt;/a&gt;&lt;span&gt;, came out right before the pandemic, if I recall, and it looks to the past for lessons for our technological and cultural future. I really appreciated your take on Elon Musk. So I guess what I want to ask you about is two things. What, in your view, has changed since you wrote it?&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt;LO: &lt;/b&gt;&lt;span&gt;Yeah, that&#039;s a really interesting question. I must admit, I was thinking about it the other day whether some of what I wrote really holds up. And I think the fundamentals are still true, in the sense that I still believe that a lot of the discussions and debates we have about technology today are presented as fundamentally novel when they are very old, ancient discussions and debates about how power should be distributed through society, and how technology enables that kind of power distribution or works against it, right? So I feel like that fundamental analysis, whatever contribution to the field, is still valid, of course. In some ways though, those technical systems have become more opaque, like the artificial intelligence industry and how that&#039;s been built off the back of years of exploitation of personal information and centralization of power in technology companies. Those things have become more powerful and concentrated and difficult to understand—if you&#039;re not deep in the weeds—beyond an instinctive understanding that something&#039;s going a bit wrong, perhaps. &lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span&gt;So in some ways those trends have exacerbated things in ways that I think many other contributors, yourself included, have brought a really important set of analyses to these discussions. More generally, though, one of my fundamental understandings of how I frame some of these arguments is that there are two sources of power, right? Government power and corporate power that really shape how the online world is developing. And post-pandemic, there&#039;s a lot greater skepticism, criticism, and outright distrust of government authorities seeking to do work to protect people from some of those corporate excesses. Now that&#039;s obviously something that is much more part of American culture as opposed to European culture, and in Australia, we sit somewhere in between. But that skepticism and that mistrust of institutions, I don&#039;t know that that serves us well. I&#039;m somebody who does treat with criticism policies put forward by government, because I think it&#039;s our job as civil society people, as people part of a social movement that want to have rights at the center of our society, to be critical of those in power and make sure that they&#039;re being held accountable. But that mistrust has fundamentally shifted how possible it is to do that in an effective way. And I think that poses real challenges for people who want to see government policy look different to how it is and how you can bring people into a sense of trust, investing in a democratic rights based society, rather than rejection and cynicism being the overriding, overriding kind of factor in how they shape their political arguments. Which is a real challenge, I think, for people like us who rely on some of that mistrust and skepticism in order to fuel the fire of some of these campaigns, but do want to see people still invested in democratic processes.&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt;JY: &lt;/b&gt;&lt;span&gt;Yeah, absolutely. So speaking of policies, you&#039;re in Australia, where the government&#039;s enacted some of the &lt;/span&gt;&lt;a href=&quot;https://www.bbc.com/news/articles/cwyp9d3ddqyo&quot;&gt;&lt;span&gt;strictest social media laws for minors&lt;/span&gt;&lt;/a&gt;&lt;span&gt; in the world, I would say. In one of &lt;/span&gt;&lt;a href=&quot;https://www.eff.org/pages/speaking-freely-jacob-mchangama&quot;&gt;&lt;span&gt;our most recent interviews&lt;/span&gt;&lt;/a&gt;&lt;span&gt;, which was with Jacob Mchangama, we talked about how the comparison of social media to Big Tobacco is spreading, and this idea that there&#039;s no utility in social media for minors, that it&#039;s a net harm. I&#039;m curious what your thoughts are on that, and then we can dive into the more nitty gritty bits of the Australian law.&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt;LO: &lt;/b&gt;&lt;span&gt;I think that&#039;s a great place to start, because the overwhelming sense in how this policy was presented to the public in Australia is that this is a very dangerous place for young people to be, and that desperate times call for desperate measures. “We don&#039;t have time to fix these spaces. We need to just restrict access.” It&#039;s described as a delay. Many, including me, describe it as a ban for under 16 year olds. So what has been very interesting in this discussion is who&#039;s been left out of the conversation. And if you talk to young people—and there are many organizations working with young people—and you talk to them about what they use social media for, they often say that they wish adults understood that they used it for different reasons, or they&#039;re scared about different things than what adults think they might be scared of. And so that kind of fundamental failure of communication, which I suppose is not a surprise, when these people don&#039;t actually have the power to vote, have the power to do things a normal legal person would do, is somewhat unsurprising. &lt;/span&gt;&lt;/p&gt;
&lt;p&gt;But when you&#039;re making policy about these people, that can be quite impactful, it can have very detrimental impacts. And if you take a human rights approach, that is your job to think about the negative impact on human rights, and what you&#039;re going to do about it, it&#039;s not really good enough. And this has been an experiment that Australia has led on, very much, looking for headlines, for a perception of boldness. Some of that claim is legitimate in the sense that they want to be seen to be taking action, and a lot of people feel very concerned that governments aren&#039;t prepared to take action against big tech companies. So, some of that is a valid feeling. But I think in this context, we lose so much when we don&#039;t actually listen to the people affected, and listen to the myriad ways in which they use social media. Some things they&#039;re concerned about, some things they find harmful, some things they&#039;re really sick of. But there&#039;s so many ways in which they use it to find a sense of community, to find a sense of empowerment, to talk to people they would never otherwise be able to access, sometimes because they&#039;re isolated, socially, geographically, whatever it may be, and it&#039;s so disappointing to me that that kind of part of the conversation was not had as we debated this particular policy.&lt;/p&gt;
&lt;p&gt;&lt;b&gt;JY:  &lt;/b&gt;&lt;span&gt;So, what do you think some of the harms are for youth who can&#039;t access social media? What are young people losing out on? Who is harmed by these laws?&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt;LO:  &lt;/b&gt;I&lt;span&gt;t&#039;s a great question. When we do a human rights analysis, we have to think about who&#039;s harmed by a particular policy, even if we think it&#039;s overall justified on a utilitarian ground, say it&#039;s better off for everyone overall who&#039;s harmed, is a really important question, and so much of that has been absent from this discussion. So it&#039;s not just me. It&#039;s like hundreds and hundreds of experts in Australia and organizations that represent many, many people, have provided commentary and input into this process and expressed many concerns about this policy, and there&#039;s a few different ways in which people are harmed. &lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span&gt;So the first thing, of course, is that if you require that age verification occur, you&#039;re engaging in a privacy violation for many people, there are cyber security risks with collecting that kind of information. There&#039;s deterrent effects and the like. Now that may not concern you, or you may think that&#039;s a justifiable kind of infringement on privacy rights, but I think that&#039;s worth mentioning. It is quite significant, especially in a world in which age verification doesn&#039;t tend to work very well on any measure. There are very serious cybersecurity risks that have been associated with age verification processes and the like. So it&#039;s certainly not nothing. The other set of people that are harmed are particularly vulnerable people. &lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span&gt;There&#039;s a variety of people who are still accessing social media. So it looks like about seven in ten of young people on the early data who had social media accounts are still accessing social media now. Now these are early figures, so there&#039;s a lot to be said for looking at how this works in a year&#039;s time, for example. But I think one of the interesting things to think about is when those people, young people, who are on still on social media—in breach of this ban or in defiance of this ban, however you want to put it—might need to engage in help seeking behavior, there may be a deterrent there, because they know that the law is they&#039;re not supposed to be accessing social media. So that is a selection of young people that we&#039;re particularly concerned about. And then, more generally, of course, there&#039;s a whole cohort of people who are particularly vulnerable. Maybe they&#039;re LGBTIQ, maybe they&#039;re in an isolated geographic area, far away from a city. Maybe they&#039;re experiencing harm at home and have no one to talk to about it. There&#039;s all sorts of ways in which young people use social media to manage their own challenges, harms, difficulties, and very effectively. They find people to talk to about their problems when other people may not be available to them. And that is an issue that is hard to map, right? We know that there&#039;s been an increase in calls to things like Kids Helpline, which does what it says on the tin. So those kinds of things have seen an increase. But I think that is something that is harder to map, but still very, very important, and may result in people going to other parts of the internet as well to seek help in different ways that might also not be very safe for them. &lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span&gt;More generally it&#039;s worth remembering that if platforms can say with some confidence, from a policy perspective, that young people are no longer on their platform, there is less incentive to design for them as well, which is another associated problem. Now, it remains unclear as to how platforms are dealing with that issue, especially in light of the most recent data, which suggests that &lt;/span&gt;&lt;a href=&quot;https://www.reuters.com/business/media-telecom/one-fifth-australian-teens-still-use-tiktok-snapchat-after-social-media-ban-2026-03-13/&quot;&gt;&lt;span&gt;a lot of young people remain on the platforms&lt;/span&gt;&lt;/a&gt;&lt;span&gt;. But that&#039;s an issue. Do we then allow platforms to no longer design in a way that respects the autonomy of young people, the safety of them, their security and the like, because they have special needs and interests and all those sorts of things. So that&#039;s another problem. There&#039;s lots of operational problems. There&#039;s lots of conceptual ones. I don&#039;t think many of these have been considered or accounted for in the process.&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt;JY: &lt;/b&gt;&lt;span&gt;Absolutely, those are the same things that worry me as well. Okay, let&#039;s talk about the campaign. So what has the pushback to this, to the law, looked like, and what changes were you calling for?&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt;LO: &lt;/b&gt;&lt;span&gt;Well, if I can Jillian, what I might start with is where the push came from. Because I think that&#039;s quite instructive. One of the key sets of institutions that were pushing for this ban were mainstream news organizations, and we&#039;re learning a bit more about this over time, but the Murdoch press and other large news organizations in Australia—&lt;/span&gt;&lt;a href=&quot;https://www.theguardian.com/media/2024/oct/03/australia-media-concentration-google-meta-funding&quot;&gt;&lt;span&gt;Australia has one of the most concentrated media environments in the world&lt;/span&gt;&lt;/a&gt;&lt;span&gt;—were pushing for this ban. There was a petition run on one of their websites that was gathering tens of thousands of signatures. There were also others. Then there was a lot of advocacy towards specific kinds of political leaders in the country, and then a kind of competitive race to see who could be the most extreme in terms of putting forward a policy. But it&#039;s certainly the case that this very powerful set of actors in our democracy, at least, were a key driver of this campaign for a social media ban for young people. Now, I think there&#039;s a sense of moralism about it, a sense of desperation about it, tapping into genuine fears from parents, you know, and the like. And you know, &lt;/span&gt;&lt;a href=&quot;https://www.anxiousgeneration.com/book&quot;&gt;&lt;i&gt;&lt;span&gt;The Anxious Generation&lt;/span&gt;&lt;/i&gt;&lt;/a&gt;&lt;span&gt;, the book by Jonathan Haidt, has obviously been very influential with many people, but the research is still a bit unclear, right? About what this all means. And lots and lots of researchers will tell you that that book isn&#039;t making a reasonable argument based on the data that we have, right? So, it&#039;s a very febrile environment for this kind of discussion, and those kinds of institutional actors were incredibly important in getting this on the political agenda. &lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span&gt;We then had an electoral campaign, definitely a vision that conservative politics would push for this. So labor politics, you know, center left politics pushed for it, and won the election, right? Not on this issue alone, but it was in that environment in which this policy was developed. There was a very small amount of time for submissions, for policy discussion about it. Initially, the government had said they weren&#039;t going to do it because they were concerned that the age verification technology wasn&#039;t up to scratch. That changed very, very quickly, and then the policy was introduced. I think it was in six days, some very small amount of time. So many different child rights organizations, academics, institutions, filed policy submissions to discuss this, did a lot of advocacy work, but the passage of time between the announcement of the proposal and the passage of the legislation was extremely short, and what followed has been a year of discussion around whether this was a good thing, a year of testing age verification technology, often finding it wanting, but setting up a set of of preferred providers that platforms could use in order to satisfy the legislative requirements. A lot of lobbying from platforms as to whether they&#039;re in or out. There was a big discussion about whether YouTube should be in or out. And a lot of back room dealing between relevant politicians and big tech companies. So the whole thing is very unseemly, and we&#039;re now in the world where it&#039;s been introduced, a lot of failure for it to actually operationalize now. Now, it may be that that changes over time, but that&#039;s quite telling, right? &lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span&gt;It&#039;s telling also because I don&#039;t think all parents particularly like this proposal either. It&#039;s very popular, but there&#039;s certainly a section of parents that are facilitating their children&#039;s continued access to social media. And I think that&#039;s interesting in itself. Part of what it is—something we were talking about actually earlier in our conversation—people don&#039;t like governments telling them how to parent their children. That has taken some very negative expressions in parts of the world, you know, resistance to things like the availability of medicine and treatment for kids who might be trans. But in this context, it&#039;s like, “I&#039;m not going to let the government tell me that I can&#039;t let my kid on social media.” So, I don&#039;t think it&#039;s clarified much in the debate in terms of understanding how platforms behave towards young people, what they could do better, of which there&#039;s many things, and then how we get to the world in which children are able to be online but better protected. I&#039;m not sure this proposal has contributed to that. It&#039;s really muddied the waters about what the government is capable of doing, what it should be doing, and what platforms, you know, what should be the process that platforms go through when thinking about designing for children.&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt;JY: &lt;/b&gt;&lt;span&gt;That&#039;s such a great answer. Thank you. And actually, that brings me to another question, which is so in your ideal world, taking this law, being able to throw it out the window if you want…What would you what would you want to see, not just from social media, but from from the platforms, from governments, both for the sake of youth, but also, you know, for all of us.&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt;LO: &lt;/b&gt;&lt;span&gt;I think that is the exact right question to be asking, and it&#039;s a good time that we&#039;ve managed to talk now, because actually, in the interim, what&#039;s come out is at the first draft that we&#039;ve got of a &lt;/span&gt;&lt;a href=&quot;https://www.oaic.gov.au/privacy/privacy-registers/privacy-codes/childrens-online-privacy-code&quot;&gt;&lt;span&gt;Children&#039;s Online Privacy Code&lt;/span&gt;&lt;/a&gt;&lt;span&gt;. And to me, that is really revealing, because it is designed to apply to all services that might be accessed by children, like all online services, and it has a really kind of sophisticated understanding of what consent might look like, where you need help with getting consent, when it comes to parents or adults that are supportive in your life. And then at different ages that might look a bit different, like you might get notified if consent has been refused by your caregiver, for example, if you&#039;ve wanted to do something. So there&#039;s a more sophisticated understanding of what consent looks like, and a range of different restrictions on when private, when personal information can be collected and used. &lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span&gt;It&#039;s got things in it that I don&#039;t particularly like. I would like to see a prohibition on the commercial exploitation of children&#039;s personal information, because I don&#039;t think any targeted advertising is justified, for example. And I think that kind of measure of that commercial exploitation is hugely problematic. I think we have to think about what deletion looks like. I think you should have a right to deletion, for example. But you know, we also have to respect that children grow into young adults, that making decisions at 16 might look quite different to when they&#039;re three. So what you do with their personal information, how they carry that forward into their adult lives might be different depending on the age and so that kind of privacy reform actually is the fundamental thing. I’m sure your listeners don’t need reminding of this.&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span&gt;That is my favorite right. Because I think restricting access to personal information is a rights-respecting way to improve the online environment for everybody. And what I think is really interesting about this Children&#039;s Online Privacy Code that is still in draft form, is that all these things should be available to adults as well. Like adults in Australia don&#039;t have the right to deletion at the moment. We don&#039;t have a right to comprehensively know where our information has traveled and to delete it. You know, look, we have fewer rights than Californians, for example, certainly fewer rights than Europeans. What this code has highlighted is that, in fact, all people should be enjoying this kind of protection that comes from restricting access and use of personal information and giving people more control over that, because that personal information is the raw material of the business model, and it leads to a very loose approach to its collection and leads to many negative downstream consequences, I would argue, including business models that prioritize engagement, that prioritize and monetize polarizing, extremist content, mis- and disinformation. &lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span&gt;I think we could have a real crack at trying to ameliorate some of these problems, or certainly reduce their impact, if we started that fundamental raw material that fuels the business model. So that, I think, is a really telling alternative that we&#039;re now considering as a society, and I like to think that people will come to an understanding that you can you can find ways to elevate improve the online world, particularly for young people, without restricting their access to that online world in a way that is empowering for them, rather than patronizing or infantilizing. &lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt;JY: &lt;/b&gt;&lt;span&gt;I completely agree, and I think it&#039;s funny that people often see privacy and expression at odds with each other, when actually I think privacy enhances expression.&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt;LO: &lt;/b&gt;&lt;span&gt;I think it makes spaces safer, makes people freer to be able to say what they think, but also to have those discussions in ways that are more meaningful, that can help find connections, even across divisions, rather than exploiting that division for profit, which is so much of the current business model.&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt;JY: &lt;/b&gt;&lt;span&gt;Are there any other things happening in Australia that EFF’s readers should know about?&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt;LO: &lt;/b&gt;&lt;span&gt;Well, we&#039;re about to go through the second tranche of our privacy reform. So we did engage in our first tranche of privacy reform. We have a &lt;/span&gt;&lt;a href=&quot;https://www.oaic.gov.au/privacy/privacy-legislation/the-privacy-act&quot;&gt;&lt;span&gt;Privacy Act&lt;/span&gt;&lt;/a&gt;&lt;span&gt; that was passed in 1988 and hasn&#039;t been meaningfully updated in the decades since. So we got a few small changes, which included the enabling provision to allow a Children&#039;s Online Privacy Code to be developed, which is why we&#039;re getting the benefit of that now. But we&#039;re about to see a range of different privacy laws introduced. What the content is, of course, will be the subject of a lot of discussion and debate. We&#039;re going to argue for the right to deletion, the right to a private right of action for privacy harms, better processes for consent, and improved definitions of personal information to really bring Australia in line with lots of other similar jurisdictions around the world. And we&#039;re really keen to advance that for all the reasons that I just mentioned. &lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span&gt;The other big change that I think is coming is that, you know, which is perhaps more on topic for this conversation, is that we&#039;ve had this online safety policy that is constantly being touted as the first in the world, and world leading and this and that, and it&#039;s really been a very flawed and vexed process working out how we could develop codes that were designed to govern how certain services were provided in the digital age, in line with safety expectations. There’s been a lot of focus on complaints and take down notices and things like that, there&#039;s obviously been that vexed litigation with Elon Musk, &lt;/span&gt;&lt;a href=&quot;https://www.wsj.com/tech/elon-musk-criticizes-australia-for-ordering-removal-of-stabbing-video-56507086?gaa_at=eafs&amp;amp;gaa_n=AWEtsqcJB5ZrkwgLZ8ENY5kclA6JASc0GLc1p2wCisoSuZhBUo2WSqJe1TG6jHJniyY%3D&amp;amp;gaa_ts=69d4eed0&amp;amp;gaa_sig=8GqEUO7Lhr0HLJuwUNYg6s2nAWgB06bYFzZCK8O-GP0QinY40CYqFq4LO9PWPvIVLAAnCUt8WmO5Vr-ZM-xweg%3D%3D&quot;&gt;&lt;span&gt;trying to get him to take down a particular video&lt;/span&gt;&lt;/a&gt;&lt;span&gt;, and ultimately, the failure of our regulators to succeed on that front, I think, probably correctly, because giving a regulator in Australia the right to take down content from anywhere in the world seems to me a very concerning development, if that was allowed to proceed. So this history of online safety, it&#039;s been a big part of successive Australian governments’ identities. We&#039;re about to see the introduction of a digital duty of care. So that&#039;s certainly the stated position of government. What that looks like in practice, I think will be really interesting. &lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span&gt;I like the idea of a digital duty of care. I like the idea of a flexible, overarching concept. What the content is, though, will be really important. So what I would like to see is proactive disclosure of harm or risk of harm, and then actions taken by platforms to do it. So more onus on platforms to provide transparency about what they know about how their online spaces are being used and what might be harmful. I mean, there&#039;s a question around whether we&#039;ll see an introduction of a civil right, something similar following from the litigation that’s taken place in &lt;/span&gt;&lt;a href=&quot;https://www.bbc.com/news/articles/c747x7gz249o&quot;&gt;&lt;span&gt;California&lt;/span&gt;&lt;/a&gt;&lt;span&gt; and &lt;/span&gt;&lt;a href=&quot;https://www.reuters.com/sustainability/boards-policy-regulation/jury-orders-meta-pay-375-mln-new-mexico-lawsuit-over-child-sexual-exploitation-2026-03-24/&quot;&gt;&lt;span&gt;New Mexico&lt;/span&gt;&lt;/a&gt;&lt;span&gt;, and that is going to be leading, really, multiple claims that are being made all around the country in the US, against companies like Meta and Google and other social media platforms. So I think there may be a flow-on effect from that, as in, it might turn into a civil right to sue for failure to meet the requirements of digital duty of care. But I&#039;m really interested to hear from any of your listeners, or anyone who&#039;s working in this space about what the content should be of that digital duty of care, because there&#039;s obviously limits as well. Like it can be not rights-respecting, and we&#039;re interested in making sure that&#039;s not the case. And I think there&#039;s probably a range in which it could be more protective or less and working out how to do that—there are examples from around the world, but that&#039;s going to be something I reckon we could use help with that we want to get right and make use of that opportunity as best we can. &lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span&gt;The last thing I&#039;ll say, I suppose, is that our government is always looking for ways to deal with mis- and disinformation, and that comes with real risks of censorship. And so, I think there&#039;s a strong argument to focus on privacy reform, because it&#039;s a rights-respecting reform as an antidote to mis- and disinformation. Greater transparency on platforms—I think about how they prioritize content in your feed, for example, can be useful, or reporting on what content is really popular, like ad libraries. There&#039;s all sorts of ways in which we can introduce greater transparency, but I do worry that as governments around the world feel emboldened to do so, they might look for more ways to to remove content, to be more involved in content moderation policies that have the real potential to to become censorship if we&#039;re not careful. So that&#039;s the other abiding concern I&#039;ve got about Australian policy at the moment.&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt;JY: &lt;/b&gt;&lt;span&gt;One of my big concerns now too, is all of these authoritarian governments watching Australia, watching the UK, and enacting laws that are modeled on, but much more severe than than the ones in those places? Do you share that concern? &lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt;LO:  &lt;/b&gt;&lt;span&gt;Yeah. I mean, the other way in which it&#039;s come about in Australia, certainly like anti-doxxing laws, which, at the moment, we&#039;ve got laws on our books that came about attached to a privacy reform. I&#039;m hesitant to say it&#039;s a privacy reform, because it&#039;s not, but it&#039;s very egregious. It&#039;s a criminal offense to disclose basic details about someone online, if it&#039;s done with a set of intents and the like, about their particular status as a group, and that, I think you could drive a truck through in terms of how you could interpret it, right? There&#039;s such a wide variance, and bringing a proceeding against someone like prosecuting them for that is such a life altering experience. And I think if governments did want to focus on particular activists. And I&#039;m particularly thinking of, you know, the way it was framed was certainly around the the discussion and debate about the genocide unfolding in Gaza. Like, I think, particularly about that movement, they&#039;re very vulnerable to crackdowns by government for speech that is perceived to be unacceptable by government. &lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span&gt;And I&#039;m not even trying to debate it. I think there&#039;s certainly antisemitic commentary occurring in Australia, and indeed, there have been some people, like genuine Nazis arrested, which, you know is, is a different kettle of fish. But I think progressive movements, not just the defense of Palestine movement, but lots of other progressive movements are a particular risk of those kinds of laws. But I think mis- and disinformation is the other vehicle. So we have to be very careful about giving platforms, giving regulators both the mandate and then the authority to police content based on particular criteria. And often what they talk about, or they talked about in proposals that have now died in Australia, were things like public health issues. So, you know, that&#039;s a particular consent that drives a lot of people who are very concerned about the years of Covid up the wall. So it inspires a lot of reaction to it. But I think there&#039;s lots of ways in which undermining political stability is put forward as a proposal, as a justification for removing content. That&#039;s just so broad that I think you could really start to see censorship. It&#039;s just not good enough. I just don&#039;t think we can tolerate those kinds of proposals. I like to think that&#039;s not the case in Australia, but I just think there&#039;s a tendency among governments now to see this as an opportunity. It&#039;s an anxiety lots people have about mis- and disinformation, and so they draw on that as a mandate to act. And I think we should be very cautious about those proposals.&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt;JY: &lt;/b&gt;&lt;span&gt;Definitely. Okay, I’m going to ask the final question that I ask everyone. Who is your free speech or free expression hero? Or someone from history, or even someone personal who has influenced you?&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt;LO: &lt;/b&gt;&lt;span&gt;There’s a chapter in my book where I talk about the &lt;/span&gt;&lt;a href=&quot;https://en.wikipedia.org/wiki/Paris_Commune&quot;&gt;&lt;span&gt;Paris Commune&lt;/span&gt;&lt;/a&gt;&lt;span&gt;, which happened a long time ago, but I still think it’s a really interesting experiment in applied democracy. This is when a bunch of communauts took over Paris and started doing things differently in a variety of different ways. &lt;/span&gt;&lt;a href=&quot;https://en.wikipedia.org/wiki/Gustave_Courbet&quot;&gt;&lt;span&gt;Gustave Coubert&lt;/span&gt;&lt;/a&gt;&lt;span&gt; is this artist who’s leading the artist collective during this time, and I always found him entertaining because he would paint things that weren’t expected. So, often, nudes that were considered quite scandalous because they were everyday women who weren’t angelic or Madonna-esque in their style, but he’s got a &lt;/span&gt;&lt;a href=&quot;https://www.musee-orsay.fr/en/artworks/lorigine-du-monde-69330&quot;&gt;&lt;span&gt;very famous painting&lt;/span&gt;&lt;/a&gt;&lt;span&gt; of female genitalia—&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt;JY: &lt;/b&gt;&lt;span&gt;Yes! Facebook took it down! [laughs]&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt;LO: &lt;/b&gt;&lt;span&gt;Exactly. It’s always been a very confrontational image. People find it sexist sometimes, because they think it’s very pornographic. I understood it differently. It’s called “The Origin of the World,” so I sort of see it as a force of giving life. Interpret however you like, the point is that Facebook couldn’t tolerate it and took it down. There’s &lt;/span&gt;&lt;a href=&quot;https://news.artnet.com/art-world/lorigine-du-monde-sparks-facebook-legal-battle-230535&quot;&gt;&lt;span&gt;a nice little bit of litigation&lt;/span&gt;&lt;/a&gt;&lt;span&gt; where a schoolteacher had a page where he was teaching people that art, and Facebook could just not tolerate this art. In my mind, it was so telling that a communaut from hundreds of years before was basically revealing, as an expert troll almost, how conservatives—someone like Mark Zuckerberg—view, and how he shapes these platforms. And how they subtly reshape what we think is appropriate, what we think is free, what we think is within the realms of good society. And that you really do need artists telling you that that might not be true, and they’re some of the most effective actors at revealing that about those who hold power, like reshaping our understanding about what acceptable debate is, and how we can show power to be exercised in our online world, where in other circumstances it might be quite okay.&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span&gt;I love that story, and I love the communauts. There’s a lot of beautiful writing about them, there’s a beautiful book called &lt;/span&gt;&lt;a href=&quot;https://www.versobooks.com/products/63-communal-luxury?srsltid=AfmBOopLdzWuQtxDorjRZHCaa6ZG-gRRe3jxxqxvtoTdqMmzxv6s7zDH&quot;&gt;&lt;i&gt;&lt;span&gt;Communal Luxury&lt;/span&gt;&lt;/i&gt;&lt;/a&gt; &lt;span&gt;where they talk about all the different ways in which they were trying to reimagine their society and do it collectively, from things like having the first union of women but also having the design of clothes and furniture look different. I want to see a world in which people take that power in both the micro and macro and start to reshape their society in really creative ways. And I feel like digital technology has the real capability of allowing that to occur and I want to revive that sense of concrete democracy rather than just delegated democracy or deferred representative democracy where you tell someone else what you want but don’t have a say in a lot of decisions. And so, that really grassroots idea of democracy is something, and I think we’re in a world in which that could really occur with the assistance of digital technology. It’s a matter of working out how to bring it into being. And that’s what I see this movement as doing. People with digital rights as being their primary concern are trying to recreate that world so that there’s more communal, collective spaces for discussing what the future should look like.&lt;/span&gt;&lt;/p&gt;

&lt;/div&gt;&lt;/div&gt;&lt;/div&gt;</description>
     <pubDate>Thu, 23 Apr 2026 19:56:20 +0000</pubDate>
 <guid isPermaLink="false">111927 at https://www.eff.org</guid>
 <dc:creator>Jillian C. York</dc:creator>
 <enclosure url="https://www.eff.org/files/banner_library/speaking-freely-lizzie-blog1_0.png" alt="" type="image/png" length="249317" />
  </item>
  <item>
    <title>📁 How ICE Got My Data | EFFector 38.8</title>
    <link>https://www.eff.org/deeplinks/2026/04/how-ice-got-my-data-effector-388</link>
    <description>&lt;div class=&quot;field field--name-body field--type-text-with-summary field--label-hidden&quot;&gt;&lt;div class=&quot;field__items&quot;&gt;&lt;div class=&quot;field__item even&quot;&gt;&lt;p&gt;When we use the internet, we&#039;re entrusting tech companies with some of our most private information. These companies have promised they&#039;ll keep our data safe. But what happens when the government comes knocking at their doors? In &lt;a href=&quot;https://www.eff.org/effector/38/8&quot;&gt;our latest EFFector newsletter&lt;/a&gt;, we hear from an EFF client whose data was given to ICE after Google broke its promise to him.&lt;/p&gt;
&lt;p class=&quot;take-action&quot;&gt;&lt;a href=&quot;https://www.eff.org/effector/&quot;&gt;JOIN OUR NEWSLETTER&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;span&gt;For over 35 years, &lt;a href=&quot;https://eff.org/effector&quot;&gt;EFFector&lt;/a&gt; has been your guide to understanding the intersection of technology, civil liberties, and the law. This latest issue covers the ongoing fight to &lt;a href=&quot;https://www.eff.org/deeplinks/2026/04/keep-pushing-we-get-10-more-days-reform-section-702?utm_source=effector&quot;&gt;reform NSA surveillance&lt;/a&gt;, the many attempts to &lt;a href=&quot;https://www.eff.org/deeplinks/2026/04/dangers-californias-legislation-censor-3d-printing?utm_source=effector&quot;&gt;censor 3D printing&lt;/a&gt;, and the cost of Google&#039;s &lt;a href=&quot;https://www.eff.org/deeplinks/2026/04/google-broke-its-promise-me-now-ice-has-my-data?utm_source=effector&quot;&gt;broken promise&lt;/a&gt; to its users.&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;Prefer to listen in? EFFector is now available on all major podcast platforms. This time, we&#039;re chatting with EFF Senior Staff Attorney F. Mario Trujillo about how state attorneys general can hold Google accountable for failing to protect users targeted by the government. You can find the episode and subscribe &lt;a href=&quot;https://effector.simplecast.com/&quot;&gt;on your podcast platform of choice&lt;/a&gt;:&lt;/p&gt;
&lt;p&gt;&lt;div class=&quot;mytube&quot; style=&quot;width: 100%px;&quot;&gt;
  &lt;div class=&quot;mytubetrigger&quot; tabindex=&quot;0&quot;&gt;

    &lt;img src=&quot;https://www.eff.org/sites/all/modules/custom/mytube/play.png&quot; class=&quot;mytubeplay&quot; alt=&quot;play&quot; style=&quot;top: 70px; left: 20px;&quot; /&gt;
    &lt;div hidden class=&quot;mytubeembedcode&quot;&gt;%3Ciframe%20height%3D%22200px%22%20width%3D%22100%25%22%20frameborder%3D%22no%22%20scrolling%3D%22no%22%20seamless%3D%22%22%20src%3D%22https%3A%2F%2Fplayer.simplecast.com%2Feb78b9d6-fbcf-453f-b55e-77c575b638ef%3Fdark%3Dfalse%22%20allow%3D%22autoplay%22%3E%3C%2Fiframe%3E&lt;/div&gt;
  &lt;/div&gt;
  &lt;div class=&quot;mytubetext&quot;&gt;
    &lt;span&gt;&lt;a href=&quot;https://www.eff.org/deeplinks/2008/02/embedded-video-and-your-privacy&quot; rel=&quot;noreferrer&quot; target=&quot;_blank&quot;&gt;Privacy info.&lt;/a&gt;&lt;/span&gt;
    &lt;span&gt;This embed will serve content from &lt;em&gt;&lt;a rel=&quot;nofollow&quot; href=&quot;https://player.simplecast.com/eb78b9d6-fbcf-453f-b55e-77c575b638ef?dark=false&quot;&gt;simplecast.com&lt;/a&gt;&lt;/em&gt;&lt;br /&gt;&lt;/span&gt;
  &lt;/div&gt;
&lt;/div&gt;
&lt;/p&gt;
&lt;p&gt;&lt;span&gt;&lt;i&gt;&lt;a href=&quot;https://open.spotify.com/show/6Q48ICplENdQ4ZarUIgfLZ&quot; target=&quot;_blank&quot; rel=&quot;noopener noreferrer&quot;&gt;&lt;img src=&quot;https://www.eff.org/files/2021/11/01/spotify-podcast-badge-blk-wht-330x80.png&quot; alt=&quot;Listen on Spotify Podcasts Badge&quot; width=&quot;198&quot; height=&quot;48&quot; /&gt;&lt;/a&gt; &lt;a href=&quot;https://podcasts.apple.com/us/podcast/effector/id1882562931&quot; target=&quot;_blank&quot; rel=&quot;noopener noreferrer&quot;&gt;&lt;img src=&quot;https://www.eff.org/files/2021/11/01/applebadge2.png&quot; alt=&quot;Listen on Apple Podcasts Badge&quot; width=&quot;195&quot; height=&quot;47&quot; /&gt;&lt;/a&gt; &lt;a href=&quot;https://music.amazon.com/podcasts/83be1062-f511-47b3-bd2b-fc44e831c3ad&quot; target=&quot;_blank&quot; rel=&quot;noopener noreferrer&quot;&gt;&lt;img height=&quot;47&quot; width=&quot;195&quot; src=&quot;https://eff.org/files/styles/kittens_types_wysiwyg_small/public/2024/02/15/us_listenon_amazonmusic_button_charcoal.png?itok=YFXPE4Ii&quot; /&gt;&lt;/a&gt; &lt;a href=&quot;https://feeds.eff.org/effector&quot; target=&quot;_blank&quot; rel=&quot;noopener noreferrer&quot;&gt;&lt;img src=&quot;https://www.eff.org/files/2021/11/01/subscriberss.png&quot; alt=&quot;Subscribe via RSS badge&quot; width=&quot;194&quot; height=&quot;50&quot; /&gt;&lt;/a&gt;&lt;/i&gt;&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span&gt;Want to help us hold companies accountable? Sign up for &lt;a href=&quot;https://eff.org/effector&quot;&gt;EFF&#039;s EFFector newsletter&lt;/a&gt; for updates, ways to take action, and new merch drops. You can also fuel the fight for privacy and free speech online when you &lt;a href=&quot;https://eff.org/join&quot;&gt;support EFF today&lt;/a&gt;!&lt;/span&gt;&lt;/p&gt;


&lt;/div&gt;&lt;/div&gt;&lt;/div&gt;</description>
     <pubDate>Wed, 22 Apr 2026 18:25:51 +0000</pubDate>
 <guid isPermaLink="false">111994 at https://www.eff.org</guid>
 <dc:creator>Christian Romero</dc:creator>
 <enclosure url="https://www.eff.org/files/banner_library/effector-green-web.png" alt="" type="image/png" length="78242" />
  </item>
  <item>
    <title>EFF Sues DHS and ICE For Records on Subpoenas Seeking to Unmask Online Critics</title>
    <link>https://www.eff.org/press/releases/eff-sues-dhs-and-ice-records-subpoenas-seeking-unmask-online-critics-0</link>
    <description>&lt;div class=&quot;field field--name-field-pr-subhead field--type-text field--label-hidden&quot;&gt;&lt;div class=&quot;field__items&quot;&gt;&lt;div class=&quot;field__item even&quot;&gt;Agencies Ignored EFF’s Public-Records Requests Regarding Unlawful Efforts to Locate People Who Criticized the Government or Attended Protests.&lt;/div&gt;&lt;/div&gt;&lt;/div&gt;&lt;div class=&quot;field field--name-body field--type-text-with-summary field--label-hidden&quot;&gt;&lt;div class=&quot;field__items&quot;&gt;&lt;div class=&quot;field__item even&quot;&gt;&lt;p&gt;SAN FRANCISCO – The Electronic Frontier Foundation (EFF) sued the Department of Homeland Security (DHS) and Immigration and Customs Enforcement (ICE) today demanding public records about their use of administrative subpoenas to try to identify their online critics.&lt;br /&gt;&lt;br /&gt;Court records and news reports show that in the past year, DHS has used administrative subpoenas to unmask or locate people who have documented ICE&#039;s activities in their community, criticized the government, or attended protests. The subpoenas are sent to technology companies to demand information about internet users who are often engaged in protected First Amendment activity.&lt;br /&gt;&lt;br /&gt;These subpoenas are dangerous because they don’t require judges’ approval. But they are also unlawful, and the government knows it. When a few users challenged them in court with the help of American Civil Liberties Union affiliates in Northern California and Pennsylvania, DHS withdrew them rather than waiting for a decision.&lt;br /&gt;&lt;br /&gt;DHS and ICE have ignored EFF’s public-records requests for documents about the processes behind these subpoenas, so EFF sued Wednesday in the U.S. District Court for the District of Columbia.&lt;br /&gt;&lt;br /&gt;“DHS and ICE should not be able to first claim that they have the legal authority to unmask critics and then run from court when users challenge these administrative subpoenas,” said EFF Deputy Legal Director Aaron Mackey. “The public deserves to know what laws the agencies believe give them the power to issue these speech-chilling subpoenas.”&lt;br /&gt;&lt;br /&gt;An administrative subpoena cannot be used to obtain the content of communications, but they have been used to try and obtain some basic subscriber information like name, address, IP address, length of service, and session times. If a technology company refuses to comply, an agency’s only recourse is to drop it or go to court and try to convince a judge that the request is lawful.&lt;br /&gt;&lt;br /&gt;EFF and the ACLU of Northern California in February&lt;span&gt; &lt;/span&gt;&lt;a href=&quot;https://www.eff.org/deeplinks/2026/02/open-letter-tech-companies-protect-your-users-lawless-dhs-subpoenas&quot; tabindex=&quot;-1&quot;&gt;​wrote to Amazon, Apple, Discord, Google, Meta, Microsoft, Reddit, SNAP, TikTok, and X​&lt;/a&gt;&lt;span&gt; &lt;/span&gt;to ask that they insist on court intervention and an order before complying with a DHS subpoena; give users as much notice as possible when they are the target of a subpoena, so the users can seek help; and resist gag orders that would prevent the companies from notifying users who are targets of subpoenas.&lt;br /&gt;&lt;br /&gt;And EFF last week&lt;span&gt; &lt;/span&gt;&lt;a href=&quot;https://www.eff.org/press/releases/eff-state-ags-investigate-googles-broken-promise-users-targeted-government&quot; tabindex=&quot;-1&quot;&gt;​asked California’s and New York’s attorneys general to investigate Google​&lt;/a&gt;&lt;span&gt; &lt;/span&gt;for deceptive trade practices for breaking&lt;span&gt; &lt;/span&gt;&lt;a href=&quot;https://policies.google.com/terms/information-requests?hl=en-US&quot; tabindex=&quot;-1&quot;&gt;​its promise​&lt;/a&gt;&lt;span&gt; &lt;/span&gt;to notify users before handing their data to law enforcement, citing the case of a doctoral student who was targeted with an ICE subpoena after briefly attending a pro-Palestine protest.&lt;br /&gt;&lt;br /&gt;EFF in early March filed public-records requests with DHS and ICE for their policies, procedures, guidelines, directives, memos, and legal analyses supporting such use of administrative subpoenas. EFF also requested all Inspector General or oversight records, all approval and issuance procedures for the subpoenas, all records reflecting how many such subpoenas have been issued, all communications with technology companies concerning these demands, all communications regarding specific named targets or programs, and all communications with the Department of Justice regarding such subpoenas.&lt;br /&gt;&lt;br /&gt;DHS and ICE have not responded, even though EFF requested expedited processing of its requests, which requires agencies to get back to requesters within 10 days.&lt;br /&gt;&lt;br /&gt;&lt;span&gt;“&lt;/span&gt;The policies, directives, and authorization records governing the program have not been disclosed,” the complaint notes. “The legal basis asserted by DHS and ICE for using a customs statute to compel disclosure of information about persons engaged in constitutionally protected speech and association has not been made public.”&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;For the complaint:&lt;/strong&gt; &lt;a href=&quot;https://www.eff.org/document/eff-v-dhs-ice-administrative-subpoenas-complaint&quot;&gt;https://www.eff.org/document/eff-v-dhs-ice-administrative-subpoenas-complaint&lt;/a&gt;&lt;br /&gt;&lt;br /&gt;&lt;strong&gt;For EFF’s letter urging tech companies to protect users:&lt;/strong&gt;&lt;span&gt; &lt;/span&gt;&lt;a href=&quot;https://www.eff.org/deeplinks/2026/02/open-letter-tech-companies-protect-your-users-lawless-dhs-subpoenas​&quot; tabindex=&quot;-1&quot;&gt;​https://www.eff.org/deeplinks/2026/02/open-letter-tech-companies-protect-your-users-lawless-dhs-subpoenas​&lt;/a&gt;&lt;br /&gt;&lt;br /&gt;&lt;strong&gt;For EFF’s letter urging state probes of Google:&lt;/strong&gt;&lt;span&gt; &lt;/span&gt;&lt;a href=&quot;https://www.eff.org/press/releases/eff-state-ags-investigate-googles-broken-promise-users-targeted-government​&quot; tabindex=&quot;-1&quot;&gt;​https://www.eff.org/press/releases/eff-state-ags-investigate-googles-broken-promise-users-targeted-government​&lt;/a&gt;&lt;/p&gt;

&lt;/div&gt;&lt;/div&gt;&lt;/div&gt;&lt;div class=&quot;field field--name-field-tags field--type-taxonomy-term-reference field--label-above&quot;&gt;&lt;div class=&quot;field__label&quot;&gt;Tags:&amp;nbsp;&lt;/div&gt;&lt;div class=&quot;field__items&quot;&gt;&lt;div class=&quot;field__item even&quot;&gt;&lt;a href=&quot;/tags/free-speech&quot;&gt;free speech&lt;/a&gt;&lt;/div&gt;&lt;div class=&quot;field__item odd&quot;&gt;&lt;a href=&quot;/tags/privacy&quot;&gt;privacy&lt;/a&gt;&lt;/div&gt;&lt;div class=&quot;field__item even&quot;&gt;&lt;a href=&quot;/tags/anonymity&quot;&gt;anonymity&lt;/a&gt;&lt;/div&gt;&lt;div class=&quot;field__item odd&quot;&gt;&lt;a href=&quot;/tags/dhs&quot;&gt;DHS&lt;/a&gt;&lt;/div&gt;&lt;div class=&quot;field__item even&quot;&gt;&lt;a href=&quot;/tags/ice&quot;&gt;ICE&lt;/a&gt;&lt;/div&gt;&lt;/div&gt;&lt;/div&gt;&lt;div class=&quot;field field--name-field-contact field--type-node-reference field--label-above&quot;&gt;&lt;div class=&quot;field__label&quot;&gt;Contact:&amp;nbsp;&lt;/div&gt;&lt;div class=&quot;field__items&quot;&gt;&lt;div class=&quot;field__item even&quot;&gt;&lt;div  class=&quot;ds-1col node node--profile view-mode-node_embed node--node-embed node--profile--node-embed clearfix&quot;&gt;

  
  &lt;div class=&quot;&quot;&gt;
    &lt;div class=&quot;field field--name-field-profile-first-name field--type-text field--label-hidden&quot;&gt;&lt;div class=&quot;field__items&quot;&gt;&lt;div class=&quot;field__item even&quot;&gt;Aaron&lt;/div&gt;&lt;/div&gt;&lt;/div&gt;&lt;div class=&quot;field field--name-field-profile-last-name field--type-text field--label-hidden&quot;&gt;&lt;div class=&quot;field__items&quot;&gt;&lt;div class=&quot;field__item even&quot;&gt;Mackey&lt;/div&gt;&lt;/div&gt;&lt;/div&gt;&lt;div class=&quot;field field--name-field-profile-title field--type-text field--label-hidden&quot;&gt;&lt;div class=&quot;field__items&quot;&gt;&lt;div class=&quot;field__item even&quot;&gt; Deputy Legal Director/Free Speech and Transparency Litigation Director&lt;/div&gt;&lt;/div&gt;&lt;/div&gt;&lt;div class=&quot;field field--name-field-profile-email field--type-email field--label-hidden&quot;&gt;&lt;div class=&quot;field__items&quot;&gt;&lt;div class=&quot;field__item even&quot;&gt;&lt;a href=&quot;mailto:amackey@eff.org&quot;&gt;amackey@eff.org&lt;/a&gt;&lt;/div&gt;&lt;/div&gt;&lt;/div&gt;  &lt;/div&gt;

&lt;/div&gt;

&lt;/div&gt;&lt;/div&gt;&lt;/div&gt;</description>
     <pubDate>Wed, 22 Apr 2026 15:51:35 +0000</pubDate>
 <guid isPermaLink="false">111991 at https://www.eff.org</guid>
 <dc:creator>Hudson Hongo</dc:creator>
 <enclosure url="https://www.eff.org/files/banner_library/social-media-surveillance-2026.jpg" alt="Security camera screens display logos for Facebook, YouTube, X, TikTok, and Reddit " type="image/jpeg" length="142559" />
  </item>
  <item>
    <title>Copyright and DMCA Best Practices for Fediverse Operators</title>
    <link>https://www.eff.org/deeplinks/2026/04/copyright-and-dmca-best-practices-fediverse-operators</link>
    <description>&lt;div class=&quot;field field--name-body field--type-text-with-summary field--label-hidden&quot;&gt;&lt;div class=&quot;field__items&quot;&gt;&lt;div class=&quot;field__item even&quot;&gt;&lt;p&gt;People building the future of the social web — interoperable and decentralized — need to protect themselves against copyright liability. Like anyone who creates and operates platforms for user-uploaded content, the hosts of the decentralized social web can take preventive measures to reduce their legal exposure when a user posts material that violates someone’s copyright.&lt;/p&gt;
&lt;p&gt;This post gives an overview of the steps to take. It’s meant for operators of Mastodon and other ActivityPub servers, Bluesky hosts, RSS mirrors, and other decentralized social media protocols, and developers of apps for those protocols — but it will apply to other hosts as well. This isn’t legal advice, and can’t substitute for a consultation with a lawyer about your specific circumstances. It focuses on U.S. law — the law may impose different requirements elsewhere. Still, we hope it helps you get started with confidence.&lt;/p&gt;
&lt;h2&gt;Why should I care? Copyright’s Sword of Damocles&lt;/h2&gt;
&lt;p&gt;In some circumstances, the operator of a platform that handles user content can be legally responsible for content that infringes copyright. That can happen when the platform operator is directly involved in copying or distributing the copyrighted material, when they promote or knowingly assist the infringement, or when they benefit financially from infringement while being in a position to supervise it. But these judge-made rules are often difficult and uncertain to apply in practice — and the penalties for being found on the wrong side of the law can be severe. Copyright’s “statutory damages” regime allows for massive, unpredictable financial liability. That’s why it’s important to limit your risk.&lt;/p&gt;
&lt;h2&gt;For Server Operators: Limiting Risk with the DMCA Safe Harbors&lt;/h2&gt;
&lt;p&gt;If you run a social network server, the safe harbor provisions of the &lt;a href=&quot;https://www.eff.org/issues/dmca&quot;&gt;Digital Millennium Copyright Act (DMCA)&lt;/a&gt; are an important way to limit your liability risk. The DMCA shields server operators from nearly all forms of copyright liability that can result from “storage at the direction of a user” — in other words, hosting user-uploaded content. But to qualify for this protection, there are steps a server operator has to take.&lt;/p&gt;
&lt;h3&gt;1. Designate A Contact To Receive Copyright Infringement Notices&lt;/h3&gt;
&lt;p&gt;First, you’ll need to provide contact information for someone who can receive infringement notices (a “designated agent”). That information needs to be posted in at least two places: on your server in a place visible to users (such as a “DMCA” page or post, or as part of your Terms of Service), and in the U.S. Copyright Office’s “Designated Agent Directory.” To post that information to the directory, you have to create an account at &lt;a href=&quot;https://www.copyright.gov/dmca-directory/&quot;&gt;https://www.copyright.gov/dmca-directory/&lt;/a&gt; and pay a small fee. The directory listings expire after three years, and once expired, your safe harbor protection goes away, so it’s important to keep that listing current.&lt;/p&gt;
&lt;h3&gt;2. Respond Promptly to Notices and Counter-notices&lt;/h3&gt;
&lt;p&gt;When you receive infringement notices, it’s important to respond to them promptly. Notices are supposed to identify the copyright holder, the copyrighted work they claim was infringed, and the post they claim is infringing. By deleting or disabling access to the posted material, you protect yourself from liability with respect to that material. &lt;/p&gt;
&lt;p&gt;The theory behind Section 512 is that hosts don’t have to be in a position of deciding whether a post infringes someone’s copyright — it’s up to the poster, the rights holder, and potentially a court to decide that. A host who takes down posts whenever they receive an infringement notice is well-protected. But it’s equally important to recognize that hosts aren’t required to take down content in response to every notice. Infringement notices are frequently wrong, misguided, or abusive, or simply incomplete. Hosts who want to stand up for their users’ speech can choose to disregard infringement notices that seem suspect. While this risks losing the automatic protection of the safe harbor in each instance, it can still be done safely with careful preparation, ideally using a plan crafted with help from a lawyer. Bear in mind that people sending false notices, including by failing to consider whether a post is a fair use before asking a host to take it down, can be liable for damages under the DMCA.&lt;/p&gt;
&lt;p&gt;The DMCA also allows the person who posted the material to send a “counter-notification” asserting that they really did have the right to post and that there’s no copyright infringement. Responding to counter-notifications is a good way for a host to demonstrate that they look out for their users. When a host receives a counter-notification, they should forward it on to the person who sent the original takedown notice and let them know that the post will be restored in 10 business days. Then, after that waiting period has elapsed, the host can restore the posted material. Just like with infringement notices, a host isn’t required to honor a counter-notification that appears to be fraudulent, but there’s no penalty for honoring it anyway.&lt;/p&gt;
&lt;h3&gt;3. Have A Repeat Infringer Policy&lt;/h3&gt;
&lt;p&gt;The next requirement is to have a policy of terminating the accounts of “subscribers and account holders” who are “repeat infringers” in “appropriate circumstances,” and to carry out that policy. Yes, that’s a vague requirement. It doesn’t require a “three strikes” policy or any other sports analogy. It just needs to be reasonable. Be sure your policy is spelled out in your website terms or “DMCA” page. &lt;/p&gt;
&lt;h3&gt;4. Don’t Ignore Known Infringement&lt;/h3&gt;
&lt;p&gt;Hosts need to take down user posts whenever the host actually knows that the post is infringing. In other words, a host isn’t protected if they ignore takedown notices based on technicalities in the notices, or if they learn about the infringement some other way. But hosts don’t need to actively look for infringement on their servers — only to act when someone notifies them.&lt;/p&gt;
&lt;h3&gt;5. Don’t Encourage Infringement&lt;/h3&gt;
&lt;p&gt;Finally, make sure that nothing you post or advertise actively encourages copyright infringement. For example, don’t post examples of users uploading copyrighted music or video without permission, or insinuate that your server is a good place for infringing content. &lt;/p&gt;
&lt;p&gt;There are some other technicalities in the DMCA that can affect the safe harbor, which is why it’s always a good idea to consult with a lawyer. But following these steps will help protect you when you run a social media server — or any other kind of user-uploaded content platform.&lt;/p&gt;

&lt;/div&gt;&lt;/div&gt;&lt;/div&gt;</description>
     <pubDate>Tue, 21 Apr 2026 18:28:17 +0000</pubDate>
 <guid isPermaLink="false">111984 at https://www.eff.org</guid>
 <category domain="https://www.eff.org/issues/dmca">DMCA</category>
 <category domain="https://www.eff.org/issues/innovation">Creativity &amp; Innovation</category>
 <category domain="https://www.eff.org/issues/public-interest-internet">The Public Interest Internet</category>
 <dc:creator>Mitch Stoltz</dc:creator>
 <enclosure url="https://www.eff.org/files/banner_library/decentralization-banner.png" alt="Personified mushrooms communicating from underground homes" type="image/png" length="594967" />
  </item>
  <item>
    <title>Palantir Has a Human Rights Policy. Its ICE Work Tells a Different Story</title>
    <link>https://www.eff.org/deeplinks/2026/04/palantir-has-human-rights-policy-its-ice-work-tells-different-story</link>
    <description>&lt;div class=&quot;field field--name-body field--type-text-with-summary field--label-hidden&quot;&gt;&lt;div class=&quot;field__items&quot;&gt;&lt;div class=&quot;field__item even&quot;&gt;&lt;p&gt;For years, EFF has &lt;a href=&quot;https://www.eff.org/document/human-rights-and-technology-sales&quot;&gt;pushed technology companies&lt;/a&gt; to make real human rights commitments—and to &lt;a href=&quot;https://www.eff.org/deeplinks/2018/07/should-your-company-help-ice-know-your-customer-standards-evaluating-domestic&quot;&gt;live up&lt;/a&gt; to them. In response to growing evidence that Palantir’s tools help power abusive immigration enforcement by ICE, we sent the company a detailed letter asking how the promises in its own human rights framework extends to that work.&lt;/p&gt;
&lt;p&gt;This post explains what we asked, how Palantir responded, and why we believe those responses fall short. EFF is not alone in raising alarms about Palantir; &lt;a href=&quot;https://mijente.net/blog/5-things-you-should-know-to-fight-against-palantir/&quot;&gt;immigrants&#039; rights groups&lt;/a&gt;, &lt;a href=&quot;https://www.amnesty.org/en/documents/amr51/3124/2020/en/&quot;&gt;human rights organizations&lt;/a&gt;, &lt;a href=&quot;https://www.404media.co/elite-the-palantir-app-ice-uses-to-find-neighborhoods-to-raid/&quot;&gt;journalists&lt;/a&gt;, and &lt;a href=&quot;https://www.npr.org/2025/05/05/nx-s1-5387514/palantir-workers-letter-trump&quot;&gt;former employees&lt;/a&gt; have raised similar concerns based on reports of the company&#039;s role in abusive immigration enforcement. We focus here on Palantir’s own human rights promises.&lt;/p&gt;
&lt;p&gt;At the outset, we appreciate that Palantir was willing to engage respectfully, and we recognize that confidentiality and security obligations can limit what it can say. Nonetheless, measured against &lt;a href=&quot;https://www.palantir.com/assets/xrfr7uokpv1b/29IHCTisO8v2pofVMrxtnX/7e91f4f393074f69ae047d01eaebabce/Palantir_Human_Rights_Policy.pdf&quot;&gt;Palantir&#039;s own human rights commitments&lt;/a&gt;, its decision to keep powering ICE with tools used in &lt;a href=&quot;https://www.404media.co/elite-the-palantir-app-ice-uses-to-find-neighborhoods-to-raid/&quot;&gt;dragnet raids and discriminatory detentions&lt;/a&gt; is indefensible. A good-faith application of those commitments should lead Palantir to end its contract with ICE, and refuse new, or end current, contracts with any other agency whose work predictably violates those commitments.&lt;/p&gt;
&lt;h3&gt;&lt;strong&gt;Palantir’s Public Promises&lt;/strong&gt;&lt;/h3&gt;
&lt;p&gt;Palantir has long said it performs &lt;a href=&quot;https://www.palantir.com/assets/xrfr7uokpv1b/29IHCTisO8v2pofVMrxtnX/7e91f4f393074f69ae047d01eaebabce/Palantir_Human_Rights_Policy.pdf&quot;&gt;comprehensive human rights analysis&lt;/a&gt; on its work. It has also worked with ICE for years, apparently in a more limited capacity than today. It has publicly embraced the &lt;a href=&quot;https://www.ohchr.org/sites/default/files/documents/publications/guidingprinciplesbusinesshr_en.pdf&quot;&gt;UN Guiding Principles on Business and Human Rights&lt;/a&gt;, the &lt;a href=&quot;https://www.un.org/en/about-us/universal-declaration-of-human-rights&quot;&gt;Universal Declaration of Human Rights&lt;/a&gt;, and the &lt;a href=&quot;https://www.oecd.org/content/dam/oecd/en/publications/reports/2023/06/oecd-guidelines-for-multinational-enterprises-on-responsible-business-conduct_a0b49990/81f92357-en.pdf&quot;&gt;OECD Guidelines for Multinational Enterprises&lt;/a&gt;&lt;span&gt;.&lt;/span&gt; Additionally, in its response to EFF, Palantir says its legal responsibilities are only “the floor” for broader risk assessments.&lt;/p&gt;
&lt;p&gt;That was the point of our letter. We asked what human rights due diligence Palantir conducted when it first contracted with ICE and DHS; whether it performed the “&lt;a href=&quot;https://www.palantir.com/assets/xrfr7uokpv1b/29IHCTisO8v2pofVMrxtnX/7e91f4f393074f69ae047d01eaebabce/Palantir_Human_Rights_Policy.pdf&quot;&gt;proactive risk scoping&lt;/a&gt;” it advertises, how it reviews work over time, what it has done in response to reports of misuse, and whether it has used “&lt;a href=&quot;https://www.palantir.com/assets/xrfr7uokpv1b/29IHCTisO8v2pofVMrxtnX/7e91f4f393074f69ae047d01eaebabce/Palantir_Human_Rights_Policy.pdf&quot;&gt;every means at [its] disposal&lt;/a&gt;”—including contract provisions, third‑party oversight, and termination—to prevent or mitigate harms.&lt;/p&gt;
&lt;p&gt;For the most part, Palantir did not answer our accountability questions. It did correct one point: Palantir says it does not currently work with CBP, and available evidence supports that, though it also made clear it &lt;em&gt;could &lt;/em&gt;work with CBP in the future.&lt;/p&gt;
&lt;p&gt;Palantir also raised a red herring it often deploys in response to criticism. It &lt;a href=&quot;https://blog.palantir.com/correcting-the-record-response-to-the-eff-january-15-2026-report-on-palantir-4b3a12536cd2&quot;&gt;denied&lt;/a&gt; building a &#039;mega&#039; or &#039;master&#039; database for ICE and denied creating a database of protesters, which some ICE agents have &lt;a href=&quot;https://futurism.com/artificial-intelligence/ice-database-facial-scan&quot;&gt;claimed&lt;/a&gt; to have been built. We call it a red herring because those denials sidestep the central issues: what capabilities Palantir&#039;s tools actually provide to ICE.&lt;/p&gt;
&lt;p&gt;To be clear, EFF has never claimed that Palantir is building a single centralized database. Our concern is grounded in how Palantir’s tools allow ICE to query and analyze data from multiple databases through a unified interface—which from an agent’s perspective can be a distinction without a difference.&lt;/p&gt;
&lt;p&gt;In the sections that follow, we compare Palantir’s account of its work for ICE with evidence about how its tools seem to be used, and explain why legality, internal process, and sustained “engagement with the institutions whose vital tasks exist in tension with certain human rights” are no substitute for real human rights due diligence—because respect for human rights must be measured by outcomes, not just process.&lt;/p&gt;
&lt;h3&gt;&lt;strong&gt;Palantir’s ICE Work Undermines Its Own Standards&lt;/strong&gt;&lt;/h3&gt;
&lt;p&gt;Palantir says ICE uses its ELITE tool for “&lt;a href=&quot;https://blog.palantir.com/correcting-the-record-response-to-the-eff-january-15-2026-report-on-palantir-4b3a12536cd2&quot;&gt;prioritized enforcement&lt;/a&gt;”: to surface likely addresses of specific people, such as individuals with final orders of removal or high‑severity criminal charges. But according to &lt;a href=&quot;https://www.404media.co/elite-the-palantir-app-ice-uses-to-find-neighborhoods-to-raid/&quot;&gt;sworn testimony&lt;/a&gt; in Oregon, ICE agents use ELITE to determine where to conduct deportation sweeps, and the system “pulled from all kinds of sources” to identify locations for raids aimed at mass detentions, including information from the Department of Health and Human Services such as Medicaid data. A &lt;a href=&quot;https://www.404media.co/here-is-the-user-guide-for-elite-the-tool-palantir-made-for-ice/&quot;&gt;leaked ELITE user guide&lt;/a&gt; for &#039;Special Operations&#039; also instructs operators to disable filters to &quot;display all targets within a Special Operations dataset.&quot; Those details directly conflict with Palantir’s narrow description of ELITE’s role.&lt;/p&gt;
&lt;p&gt;Additionally, Palantir&#039;s response leans on legal authority and the Privacy Act. But it does not identify any specific lawful basis for using Medicaid data in this way or explain how its software enables that access. Even if a legal theory exists, turning sensitive medical information into fuel for dragnet sweeps is hard to reconcile with &lt;a href=&quot;https://blog.palantir.com/human-rights-and-technology-38580c5ac379&quot;&gt;its commitments&lt;/a&gt; to privacy, equity, and the rights of impacted communities. Its own human rights framework requires grappling with foreseeable harms its products may enable, not just invoking possible legal authorization.   &lt;/p&gt;
&lt;p&gt;&lt;a href=&quot;https://www.nytimes.com/interactive/2025/12/04/us/ice-arrests-criminal-records-data.html&quot;&gt;Reporting&lt;/a&gt; &lt;a href=&quot;https://www.factcheck.org/2026/01/as-ice-arrests-increased-a-higher-portion-had-no-u-s-criminal-record/&quot;&gt;shows&lt;/a&gt; that many people detained by ICE had no criminal record, much less a serious one, and in many cases no final order of removal. An &lt;a href=&quot;https://www.newsweek.com/map-shows-ice-arrests-country-citizenship-2084043&quot;&gt;overwhelming percentage&lt;/a&gt; of those detained were, or appeared to be, from Central and South America, and &lt;a href=&quot;https://www.cato.org/blog/1/5-ice-arrests-are-latinos-streets-no-criminal-past-or-removal-order&quot;&gt;nearly one in five&lt;/a&gt; ICE arrests were street arrests of a Latine person with neither a criminal history nor a removal order.&lt;/p&gt;
&lt;p&gt;These facts raise obvious questions about discriminatory impact, racial profiling, and whether Palantir&#039;s tools are facilitating detention practices far broader than the company claims. Palantir&#039;s response does not meaningfully engage those questions, despite the &lt;a href=&quot;https://blog.palantir.com/human-rights-and-technology-38580c5ac379&quot;&gt;company&#039;s commitments&lt;/a&gt; to non-discrimination and due process.&lt;/p&gt;
&lt;p&gt;EFF’s letter asked Palantir to explain how it is honoring &lt;a href=&quot;https://www.palantir.com/pcl/principles/&quot;&gt;its commitments to civil liberties&lt;/a&gt; in light of reports linking Palantir-owned systems to facial recognition and other tools used to identify and target people engaged in observing and recording law enforcement, including in connection with the deaths of Renée Good and Alex Pretti. The letter also cites &lt;a href=&quot;https://futurism.com/artificial-intelligence/ice-database-facial-scan&quot;&gt;an incident&lt;/a&gt; in which an officer scanned protesters’ and observers’ faces and threatened to add their biometrics to a “nice little database.” Palantir’s response denies involvement in any such database.&lt;/p&gt;
&lt;p&gt;A narrow denial about a single database does not answer the broader question: if ICE, its customer, claims it has this capability, what has Palantir done to ensure its tools are not used to chill protected speech, retaliate against observers, or facilitate targeting of people engaged in First Amendment‑protected activity? For a company that claims to value democracy and civil liberties, this is not a marginal issue; it goes to the heart of its human rights commitments.&lt;/p&gt;
&lt;h3&gt;&lt;strong&gt;Legality, Process, and Engagement with ICE Are Not Human Rights Standards&lt;/strong&gt;&lt;/h3&gt;
&lt;p&gt;As mentioned above, Palantir leans heavily on legal compliance. It says government data sharing is “subject to, and governed by, data sharing agreements and government oversight” and that any sharing it facilitates is done according to “legal and technical requirements, including those of the Privacy Act of 1974.” It describes its role in ELITE as “data integration,” enabling ICE “to incorporate data sources to which it has access,” including data shared under inter‑agency agreements.&lt;/p&gt;
&lt;p&gt;EFF is very familiar with the Privacy Act—we are &lt;a href=&quot;https://www.eff.org/cases/american-federation-government-employees-v-us-office-personnel-management&quot;&gt;suing&lt;/a&gt; the Office of Personnel Management over it currently. But Palantir’s response does not clarify how ICE legally has access to this information, how Palantir ensures that it follows those legal processes, or how Palantir’s software may have enabled access in the first place. More critically, that is still a legal answer to a human rights question, and legal compliance alone is insufficient as a human rights standard.&lt;/p&gt;
&lt;p&gt;Human rights due diligence requires assessing foreseeable harms, responding to credible evidence of abuse, and changing course when the facts demand it—something Palantir, &lt;a href=&quot;https://www.palantir.com/assets/xrfr7uokpv1b/29IHCTisO8v2pofVMrxtnX/7e91f4f393074f69ae047d01eaebabce/Palantir_Human_Rights_Policy.pdf&quot;&gt;on paper&lt;/a&gt;, recognizes. That’s why it stresses that its legal responsibilities are only “the floor for [its] broader risk assessments,” pointing to the way it built toward GDPR‑style data protection principles and incorporated international humanitarian law principles before those requirements were formalized. If those commitments mean anything, Palantir has to explain how specific practices—like enabling ICE to use Medicaid data in dragnet raids—square with that broader standard.&lt;/p&gt;
&lt;p&gt;Palantir also leans heavily on process. It points to a “layered approach” to risk, frameworks that purportedly examine multiple dimensions of privacy and equity, and “indelible” audit logs that track how its tools are used. Audit logs are not sufficient for protecting human rights. There is a &lt;a href=&quot;https://www.nbcnews.com/id/wbna15791203&quot;&gt;long&lt;/a&gt; &lt;a href=&quot;https://www.auschwitz.org/en/museum/archives/collection/&quot;&gt;history of&lt;/a&gt; &lt;a href=&quot;https://cnu.libguides.com/primaryafrica/rwanda&quot;&gt;authoritarian&lt;/a&gt; &lt;a href=&quot;https://xjdp.aspi.org.au/explainers/the-leaked-documents/&quot;&gt;regimes&lt;/a&gt; keeping extensive logs of their human rights abuses. Those structures can be useful for protecting human rights, but only if they are used to detect harm, trigger reassessment, and lead to changes in design, access, support, or contract enforcement when credible reports of abuse emerge.&lt;/p&gt;
&lt;p&gt;That is why we pressed Palantir to spell out clearly what reports of misuse Palantir has received, what changes it made, and on what timeline. Again, instead of offering specific examples, Palantir points back to its internal framework and its willingness to “move towards the hardest problems” as evidence of effective efforts. But human rights are an outcome, not just a process.&lt;/p&gt;
&lt;p&gt;Human rights due diligence is not a one-time approval at contract signing; under the &lt;a href=&quot;https://www.ohchr.org/sites/default/files/documents/publications/guidingprinciplesbusinesshr_en.pdf&quot;&gt;UN Guiding Principles&lt;/a&gt;, it is supposed to be continuous, with new facts triggering reassessment. Complaints, media reports, leaks, litigation, and sworn testimony are exactly the kinds of events that should prompt review. If Palantir has an account for that work— how often it reviews ICE contracts, who conducts the reviews, what triggers them, and how findings reach the Board— it had every opportunity to describe it. Instead, it offered a generic assurance that it remains committed to human rights without engaging in the specifics. Confidentiality may sometimes limit disclosure, but it is no substitute for accountability.&lt;/p&gt;
&lt;h3&gt;&lt;strong&gt;What Needs to Happen Next  &lt;/strong&gt;&lt;/h3&gt;
&lt;p&gt;Palantir wants credit for “mov[ing] towards the hardest problems” and engaging with institutions whose missions it says are “in tension with certain human rights” while having a human rights framework. But when the record includes &lt;a href=&quot;https://www.404media.co/elite-the-palantir-app-ice-uses-to-find-neighborhoods-to-raid/&quot;&gt;violent raids, dragnet detentions, use of sensitive medical data, discriminatory targeting, retaliation against observers&lt;/a&gt;, and &lt;a href=&quot;https://www.pbs.org/newshour/nation/a-look-at-shootings-by-federal-immigration-officers&quot;&gt;deaths tied to immigration enforcement operations&lt;/a&gt;, pointing to a values page is not enough; it has to reckon with the results.&lt;/p&gt;
&lt;p&gt;Voluntary corporate human rights policies often function as weak accountability mechanisms: companies can tout principles, publish policies, and answer criticism with polished statements while changing very little on the ground. Palantir’s response fits that pattern all too well. EFF will continue to challenge its role in abusive immigration enforcement and demanding more accountability for &lt;a href=&quot;https://www.eff.org/document/2026-03-27-eff-amicus-brief-cisco-v-doe-scotus&quot;&gt;technology vendors&lt;/a&gt; whose tools enable human rights violations. We are also happy to continue a dialogue with Palantir to that end. For now, this much is clear: Palantir needs to reconsider its contract with ICE and with all agencies whose work predictably violate human rights.&lt;/p&gt;

&lt;/div&gt;&lt;/div&gt;&lt;/div&gt;</description>
     <pubDate>Tue, 21 Apr 2026 00:06:29 +0000</pubDate>
 <guid isPermaLink="false">111982 at https://www.eff.org</guid>
 <dc:creator>Cindy Cohn</dc:creator>
 <dc:creator>Betty Gedlu</dc:creator>
 <enclosure url="https://www.eff.org/files/banner_library/palantir-logo-eye.png" alt="Palantir logo with giant eyeball in center" type="image/png" length="74707" />
  </item>
  <item>
    <title>The Internet Still Works: Reddit Empowers Community Moderation</title>
    <link>https://www.eff.org/deeplinks/2026/04/internet-still-works-reddit-empowers-community-moderation</link>
    <description>&lt;div class=&quot;field field--name-body field--type-text-with-summary field--label-hidden&quot;&gt;&lt;div class=&quot;field__items&quot;&gt;&lt;div class=&quot;field__item even&quot;&gt;&lt;p&gt;&lt;i&gt;&lt;span&gt;Section 230 helps make it possible for online communities to host user speech: from restaurant reviews, to fan fiction, to collaborative encyclopedias. But recent debates about the law often overlook how it works in practice. To mark its 30th anniversary, EFF is interviewing leaders of online platforms about how they handle complaints, moderate content, and protect their users’ ability to speak and share information. &lt;/span&gt;&lt;/i&gt;&lt;/p&gt;
&lt;p&gt;&lt;i&gt;&lt;span&gt;Reddit is one of the largest user-generated content platforms on the internet, built around thousands of independent communities known as subreddits. Some subreddits cover everyday interests, while others host discussions about specialized or controversial topics. These communities are created and moderated by volunteers, and the site’s decentralized model means that Reddit hosts a vast range of user speech without relying on centralized editorial control. &lt;/span&gt;&lt;/i&gt;&lt;/p&gt;
&lt;p&gt;&lt;a href=&quot;https://investor.redditinc.com/governance/board-of-directors/person-details/default.aspx?ItemId=c994983e-fef3-4f55-8b65-58e4790fb48a&quot;&gt;&lt;i&gt;&lt;span&gt;Ben Lee&lt;/span&gt;&lt;/i&gt;&lt;/a&gt;&lt;i&gt;&lt;span&gt; is Chief Legal Officer at Reddit, where he oversees the company’s legal strategy and policy work on issues including content moderation and intermediary liability. Before joining Reddit, Lee held senior legal roles at other tech companies including Plaid, Twitter, and Google. At Reddit, he has been closely involved in litigation and policy debates surrounding Section 230, including cases addressing the legal risks faced by platforms and their users and moderators. &lt;/span&gt;&lt;/i&gt;&lt;em&gt;He was interviewed by&lt;span&gt; &lt;/span&gt;&lt;a href=&quot;https://www.eff.org/about/staff/joe-mullin&quot;&gt;Joe Mullin&lt;/a&gt;, a policy analyst on EFF&#039;s Activism Team.&lt;/em&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt;Joe Mullin: When we talk about user rights and Section 230, what rights are most at stake on a platform like Reddit? &lt;/b&gt;&lt;/p&gt;
&lt;p&gt;Ben Lee: Reddit, we often say, is the most human place on the internet. What’s often missing from the debate is that section 230 protects people—not platforms. &lt;/p&gt;
&lt;p&gt;&lt;span&gt;It protects millions of everyday humans and volunteer moderators who participate in online communities. Without it, people could face lawsuits for voting down a post, enforcing community rules, or moderating a discussion. These are foundational activities on Reddit, and frankly, the whole internet.&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt;If you had to describe section 230 to a regular Reddit user without naming the law, what would you say it does for them?&lt;/b&gt;&lt;/p&gt;
&lt;p&gt;&lt;span&gt;Section 230 protects your ability to participate in community moderation.&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span&gt;Even if all you are doing is up-voting or down-voting content, that’s participation. On Reddit, everyone is a content moderator, through voting. Up-voting determines the visibility of content. &lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span&gt;We believe, strongly, this is one of the only models to allow Reddit to scale. You make the community part of the moderation process. They’re invested in the community, making it better. &lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt;How would user speech be affected if Section 230 were eliminated or weakened? &lt;/b&gt;&lt;/p&gt;
&lt;p&gt;&lt;span&gt;We would undermine community self governance—the notion that humans can do content moderation, and take that responsibility for themselves. Whether you’re a small blog or big forum. I like to think of Reddit as composed of this federation of communities that range from the tiny to the humongous. That’s what the internet is! &lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span&gt;The legal risk would discourage people from moderating, or even speaking at all. The kind of speech we’re trying to protect is often critical of powerful people or entities. If a moderation decision leads to litigation from those powerful entities, that’s an expensive proposition to fight. &lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt;Reddit relies on user-run communities and volunteer moderators. Can you walk me through how content moderation and legal complaints actually work in practice, and where section 230 comes into that? &lt;/b&gt;&lt;/p&gt;
&lt;p&gt;&lt;span&gt;We have a tiered structure, like our federal system. Each community is like a state: it has its own rules, and enforces them. The vast majority of content moderation decisions are made by the communities, not by Reddit itself. &lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span&gt;Reddit is built on self-governing communities that are moderated by volunteers, supported by automated tools. Section 230 gives Reddit the freedom to experiment, and lets users shape healthy, interest-based spaces.&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span&gt;Section 230 is fundamental to protecting the moderators from a frivolous lawsuit. A screenwriting community might want to protect their community from scammy competitions—and then they get sued by that competition. &lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span&gt;Or a community wants to keep their conversation civil. And, for example, may not allow Star Trek characters to be called “soy boys,” and they enforce that. Then a person sues. &lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span&gt;I wish these were hypotheticals. But they were actual lawsuits. And we have them, routinely. &lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt;What are policymakers missing about Section 230? &lt;/b&gt;&lt;/p&gt;
&lt;p&gt;&lt;span&gt;The [moderation] decisions being criticized in court, are decisions to try to make the internet &lt;/span&gt;&lt;i&gt;&lt;span&gt;safer&lt;/span&gt;&lt;/i&gt;&lt;span&gt;. In none of the cases that I mentioned is there a moderator saying, “I want to increase harmful content!” These are good-faith decisions about what makes the internet better. &lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span&gt;Section 230 is, at its core, protecting the ability for people to make those choices for their own communities. &lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span&gt;There&#039;s a price to be paid for not having a Section 230. And it will be paid by internet users—not the biggest platforms.&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span&gt;Some see 230 as a way to punish Big Tech. But removing it doesn&#039;t punish Big Tech—it makes them more powerful. It&#039;s startups, community driven platforms, and individual moderators who rely on Section 230 to compete and innovate. Weakening Section 230 will harm the open internet, and reduce the choice, diversity, and resilience of the internet. &lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span&gt;The big guys, they have armies of lawyers. They have the budget to withstand a flood of lawsuits. Weakening Section 230 just entrenches them. &lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt;In &lt;/b&gt;&lt;a href=&quot;https://www.supremecourt.gov/DocketPDF/21/21-1333/252674/20230119145120402_Gonzalez%20-%20Reddit%20bottomside%20amicus%20brief.pdf&quot;&gt;&lt;b&gt;Reddit’s amicus brief&lt;/b&gt;&lt;/a&gt;&lt;b&gt; in the &lt;/b&gt;&lt;b&gt;&lt;i&gt;Gonzalez v. Google &lt;/i&gt;&lt;/b&gt;&lt;b&gt;Supreme Court case, you point out that without Section 230, many moderation decisions wouldn’t be protected. The brief states: “A plaintiff might claim emotional distress from a truthful but hurtful post that gained prominence when a moderator highlighted it as a trending topic. Or, a plaintiff might claim interference with economic relations arising from an honest but very critical two-star restaurant review.” &lt;/b&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt;When you have situations where moderators get threats or litigation, what can you do? &lt;/b&gt;&lt;/p&gt;
&lt;p&gt;&lt;span&gt;We have had cases where our own moderators got sued, along with us. In the “soy boy” case, we worked to help find pro bono counsel for the moderators. &lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span&gt;Someone posted “Wesley Crusher is a soy boy,” and it got removed. I&#039;m enough of a Star Trek fan that I understand both the reference, and why the moderator decided—“hey, it&#039;s gone. I don&#039;t want this here.”&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span&gt;This would not violate our Reddit rules. But the community took it down under its own rules about being civil. It was just not a kind-hearted action, and the community had a right to decide. &lt;/span&gt;&lt;/p&gt;
&lt;p&gt;But the moderator got sued. We got sued, actually, because the poster disagreed with that moderation choice. Section 230 is what allowed us to win that case. &lt;/p&gt;
&lt;p&gt;&lt;span&gt;These are just average people, implicated only because they moderated their own community. They are trying to do the right thing by their community. &lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt;In cases where litigation happens, when does Section 230 come into play? &lt;/b&gt;&lt;/p&gt;
&lt;p&gt;&lt;span&gt;Section 230 is usually one of the first things that&#039;s talked about in the case. It’s usually the most effective way of saying: if you believe someone who defamed you—please go to the person who has defamed you. If you’re looking to the moderator, or to Reddit itself, this is not a great way of getting the justice that you seek. &lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt;Is there a different workflow internationally? &lt;/b&gt;&lt;/p&gt;
&lt;p&gt;&lt;span&gt;There’s a very different workflow. We had a prominent case in France where a company was trying to sue moderators, and of course, we didn&#039;t have section 230 to protect them. So we had to do all sorts of other things to protect them. It got much more complicated. &lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span&gt;The breadth of content that&#039;s considered illegal in certain jurisdictions can be somewhat breathtaking. &lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span&gt;Our goal is always to preserve as much freedom of expression as possible for our community. In the U.S., we look at it through the lens of the First Amendment, and other aspects. Outside the U.S., we rely more on the lens of international human rights. &lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt;How would you characterize legal demands around user content, the ones you see most often? &lt;/b&gt;&lt;/p&gt;
&lt;p&gt;&lt;span&gt;They tend to be: somebody said something mean about me—take this down. Or someone says: you didn’t &lt;/span&gt;&lt;i&gt;&lt;span&gt;allow me&lt;/span&gt;&lt;/i&gt;&lt;span&gt; to say something mean about someone or some entity. It completely runs the spectrum. &lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt;One law that has already passed that weakens Section 230 is &lt;/b&gt;&lt;a href=&quot;https://www.eff.org/deeplinks/2018/03/how-congress-censored-internet&quot;&gt;&lt;b&gt;SESTA/FOSTA&lt;/b&gt;&lt;/a&gt;&lt;b&gt;. From Reddit’s perspective, what changed after that? &lt;/b&gt;&lt;/p&gt;
&lt;p&gt;&lt;span&gt;There&#039;s some &lt;/span&gt;&lt;a href=&quot;https://reason.com/2018/03/22/reddit-bans-escort-subreddits/&quot;&gt;&lt;span&gt;communities we had to shut down&lt;/span&gt;&lt;/a&gt;&lt;span&gt;, in particular, support communities. There was a cost. Every time Section 230 is narrowed, there’s a cost—some types of speech and communities have a harder time staying online. &lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span&gt;The cost may not seem high to some people, because those communities are not for them. But if they visited them, they’d see that these are actual people, interacting in a positive way. If it wasn’t positive, we have rules for that—but that’s a different question. &lt;/span&gt;&lt;/p&gt;

&lt;/div&gt;&lt;/div&gt;&lt;/div&gt;</description>
     <pubDate>Mon, 20 Apr 2026 21:35:21 +0000</pubDate>
 <guid isPermaLink="false">111979 at https://www.eff.org</guid>
 <category domain="https://www.eff.org/issues/cda230">Section 230</category>
 <dc:creator>Joe Mullin</dc:creator>
 <enclosure url="https://www.eff.org/files/banner_library/section-230-banner-lee.png" alt="cartoon of a figure holding a megaphone for another + photo of Ben Lee" type="image/png" length="318815" />
  </item>
  <item>
    <title>Keep Pushing: We Get 10 More Days to Reform Section 702</title>
    <link>https://www.eff.org/deeplinks/2026/04/keep-pushing-we-get-10-more-days-reform-section-702</link>
    <description>&lt;div class=&quot;field field--name-body field--type-text-with-summary field--label-hidden&quot;&gt;&lt;div class=&quot;field__items&quot;&gt;&lt;div class=&quot;field__item even&quot;&gt;&lt;p&gt;&lt;span&gt;In a dramatic middle-of-the-night stand off, a bipartisan set of lawmakers pushing for true reform and privacy protections for Americans bought us some more time to fight! They are holding out for, at a minimum, the requirement of an actual probable cause warrant for FBI access to information collected under the mass spying program known as 702.&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span&gt;&lt;br /&gt;&lt;/span&gt;&lt;span&gt;A reauthorization with virtually no changes was defeated because a core group of lawmakers held strong; they know that people are hungry for real reform that protects the privacy of our communications. &lt;/span&gt;&lt;b&gt;We now have a 10-day extension to continue to push Congress to pass a real reform bill. &lt;/b&gt;&lt;/p&gt;
&lt;p&gt;&lt;span&gt;&lt;br /&gt;&lt;/span&gt;&lt;span&gt;The Lawmakers rallied late Thursday night to reject a &lt;/span&gt;&lt;a href=&quot;https://docs.house.gov/billsthisweek/20260413/RCP%20FINAL_.pdf&quot;&gt;&lt;span&gt;proposed amendment &lt;/span&gt;&lt;span&gt;that &lt;/span&gt;&lt;/a&gt;&lt;span&gt;made gestures at privacy protections, but it would not have improved on the status quo and would have reauthorized Section 702 for five more years to boot. &lt;/span&gt;&lt;/p&gt;
&lt;p class=&quot;take-action&quot;&gt;&lt;a href=&quot;https://act.eff.org/action/congress-has-until-april-20-to-take-action-on-702-tell-them-not-to-drop-the-ball&quot;&gt;Take action&lt;/a&gt;&lt;/p&gt;
&lt;p class=&quot;take-explainer&quot;&gt;&lt;span&gt;TELL congress: 702 Needs Reform&lt;/span&gt;&lt;/p&gt;

&lt;p&gt;&lt;span&gt;Section 702 is rife with problems, loopholes, and compliance issues that need fixing. The National Security Agency collects full conversations being conducted by and with targets overseas – including by and with Americans in the U.S. –  and stores them in massive databases. The NSA then allows other agencies, including the Federal Bureau of Investigation, to access untold amounts of that information. In turn, the FBI takes a “finders keepers” approach to this data: they reason that since it&#039;s already collected under one law, it’s OK for them to see it. &lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span&gt;Under current practice, the&lt;/span&gt;&lt;a href=&quot;https://cdt.org/insights/four-reasons-fisa-702-still-needs-a-warrant-rule-for-us-person-queries/&quot;&gt; &lt;span&gt;FBI can query and even read the U.S. side of that communication without a warrant&lt;/span&gt;&lt;/a&gt;&lt;span&gt;. What’s more, victims of this surveillance  won’t even know and have very few ways of finding out that their communications have been &lt;/span&gt;&lt;span&gt;surveilled&lt;/span&gt;&lt;span&gt;. EFF and other civil liberties advocates have been trying for&lt;/span&gt;&lt;a href=&quot;https://www.eff.org/deeplinks/2022/08/victory-government-finally-releases-secretive-court-rulings-sought-eff&quot;&gt; &lt;span&gt;years to know&lt;/span&gt;&lt;/a&gt;&lt;span&gt; when data collected through Section 702 is used as evidence against them.  &lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span&gt;Reforming Section 702 is even more urgent because of revelations hinted at by Senator Ron Wyden’s public statements concerning a “&lt;/span&gt;&lt;a href=&quot;https://bsky.app/profile/wyden.senate.gov/post/3mjnltkjkuc24&quot;&gt;&lt;span&gt;secret interpretation&lt;/span&gt;&lt;/a&gt;&lt;span&gt;” of the law that enables surveillance of Americans, and a public  &lt;/span&gt;&lt;a href=&quot;https://www.wyden.senate.gov/news/press-releases/wyden-urges-senators-to-reject-handing-donald-trump-unchecked-surveillance-authority-insist-on-reforms-to-fisa-section-702&quot;&gt;&lt;span&gt;“Dear Colleague” letter &lt;/span&gt;&lt;/a&gt;&lt;span&gt;he sent to fellow Senators about FBI abuse of Section 702. &lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span&gt;That’s right—the way the government conducts mass surveillance is so secret and unaccountable even the way they interpret the law is classified. &lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span&gt; &lt;/span&gt;&lt;b&gt;“In many cases these will be law-abiding Americans having perfectly legitimate, often sensitive, conversations,” &lt;/b&gt;&lt;span&gt;Wyden&lt;/span&gt; &lt;span&gt;wrote.&lt;/span&gt;&lt;b&gt; “These Americans could include journalists, foreign aid workers, people with family members overseas - even women trying to get abortion medication from an overseas provider. Congress has an obligation to protect our country from foreign threats and protect the rights of these and other Americans.” &lt;/b&gt;&lt;/p&gt;
&lt;p&gt;&lt;span&gt;We have 10 days to make it clear to Congress: 702 needs real reforms. Not a blanket  reauthorization. Not lip service to change. Real reform. &lt;/span&gt;&lt;/p&gt;
&lt;p class=&quot;take-action&quot;&gt;&lt;a href=&quot;https://act.eff.org/action/congress-has-until-april-20-to-take-action-on-702-tell-them-not-to-drop-the-ball&quot;&gt;Take action&lt;/a&gt;&lt;/p&gt;
&lt;p class=&quot;take-explainer&quot;&gt;&lt;span&gt;TELL congress: 702 Needs Reform&lt;/span&gt;&lt;/p&gt;

&lt;/div&gt;&lt;/div&gt;&lt;/div&gt;</description>
     <pubDate>Fri, 17 Apr 2026 19:26:27 +0000</pubDate>
 <guid isPermaLink="false">111975 at https://www.eff.org</guid>
 <category domain="https://www.eff.org/nsa-spying">NSA Spying</category>
 <dc:creator>Matthew Guariglia</dc:creator>
 <enclosure url="https://www.eff.org/files/banner_library/NSA-eagle-2_0.png" alt="" type="image/png" length="61481" />
  </item>
  <item>
    <title>Stop New York&#039;s Attack on 3D Printing </title>
    <link>https://www.eff.org/deeplinks/2026/04/stop-new-yorks-attack-3d-printing</link>
    <description>&lt;div class=&quot;field field--name-body field--type-text-with-summary field--label-hidden&quot;&gt;&lt;div class=&quot;field__items&quot;&gt;&lt;div class=&quot;field__item even&quot;&gt;&lt;p&gt;&lt;span&gt;New York&#039;s proposed 2026-2027 budget currently includes provisions that will require all 3D printers sold in the state to run print-blocking &lt;/span&gt;&lt;i&gt;&lt;span&gt;censorware&lt;/span&gt;&lt;/i&gt;&lt;span&gt;—software that surveils every print for forbidden designs. This policy would also create felony charges for &lt;/span&gt;&lt;span&gt;possessing or sharing certain design files.&lt;/span&gt;&lt;span&gt; The vote on the state budget could happen as early as next week, so New Yorkers need to act fast and demand that their Assemblymembers and Senators strip this provision from the budget.&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span&gt;&lt;/span&gt;&lt;/p&gt;
&lt;p class=&quot;take-action&quot;&gt;&lt;a href=&quot;https://act.eff.org/action/stop-new-york-s-surveillance-and-censorship-mandate-before-it-s-too-late&quot;&gt;Take action&lt;/a&gt;&lt;/p&gt;
&lt;p class=&quot;take-explainer&quot;&gt;&lt;span&gt;Tell Your Representative to Stand with Creators&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span&gt;State legislators across the US are rushing to regulate 3D-printed firearms under the syllogism &lt;/span&gt;&lt;a href=&quot;https://boingboing.net/2018/03/22/yellow-dots-cubed.html&quot;&gt;&lt;span&gt;&lt;span&gt;“&lt;/span&gt;something must be done; there, I&#039;ve done something.”&lt;/span&gt;&lt;/a&gt;&lt;span&gt; The most reckless of these proposals is a mandate for manufacturers to implement print blocking on all 3D printers. We, and &lt;/span&gt;&lt;a href=&quot;https://blog.adafruit.com/2026/02/03/new-york-wants-to-ctrlaltdelete-your-3d-printer/&quot;&gt;&lt;span&gt;other experts&lt;/span&gt;&lt;/a&gt;&lt;span&gt;, have already pointed out that this &lt;/span&gt;&lt;a href=&quot;https://www.eff.org/deeplinks/2026/04/print-blocking-wont-work-permission-print-part-2&quot;&gt;&lt;span&gt;algorithmic print blocking is simply unfeasible&lt;/span&gt;&lt;/a&gt;&lt;span&gt; and will only serve to &lt;/span&gt;&lt;a href=&quot;https://www.eff.org/deeplinks/2026/04/print-blocking-anti-consumer-permission-print-part-1&quot;&gt;&lt;span&gt;stifle competition, free expression, and privacy&lt;/span&gt;&lt;/a&gt;&lt;span&gt;. While most detrimental to the creative communities lawfully using these printers, every New Yorker will be impacted by this blow to innovation.&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span&gt;This policy is unfortunately buried in Part C of the New York State’s proposed budget for the 2026-2027 fiscal year (&lt;/span&gt;&lt;a href=&quot;https://www.nysenate.gov/legislation/bills/2025/S9005/amendment/B&quot;&gt;&lt;span&gt;S.9005 / A.10005&lt;/span&gt;&lt;/a&gt;&lt;span&gt;), which is urgently moving toward a vote after &lt;/span&gt;&lt;a href=&quot;https://www.nytimes.com/2026/04/01/nyregion/budget-delayed-hochul.html&quot;&gt;&lt;span&gt;facing extensive delays&lt;/span&gt;&lt;/a&gt;&lt;span&gt;. It’s also bundled with a policy that would allow felony charges to be brought against researchers and journalists for sharing design files restricted by the state.  The worst of these impacts won’t be known until &lt;/span&gt;&lt;i&gt;&lt;span&gt;after&lt;/span&gt;&lt;/i&gt;&lt;span&gt; it is negotiated behind closed doors, with no safeguards for creative expression or privacy.&lt;/span&gt;&lt;/p&gt;
&lt;h3&gt;&lt;strong&gt;Researchers and Journalists Could Face Felony Charges&lt;/strong&gt;&lt;/h3&gt;
&lt;p&gt;&lt;span&gt;Part C Subpart A of the budget includes two particularly concerning provisions: §2.10 and 2.11. These threaten Class E felony charges for distributing or possessing 3D-printer files that would produce firearm parts with a 3D printer or CNC machine. &lt;/span&gt;&lt;/p&gt;
&lt;p class=&quot;pull-quote&quot;&gt;&lt;span&gt;Under these provisions merely sharing a print file with any of them could result in criminal charges&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span&gt;The first provision, 2.10, makes it a felony to sell or distribute files that can produce major firearm components to someone who is not a federally and NY-licensed gunsmith. Under 2.11, it’s also a felony to possess these files if you intend to illegally print a firearm or share them with someone you believe is not permitted to own or smith a firearm.&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span&gt;A &lt;/span&gt;&lt;a href=&quot;https://www.wired.com/story/luigi-mangione-ghost-gun-built-tested/&quot;&gt;&lt;span&gt;journalist reporting&lt;/span&gt;&lt;/a&gt;&lt;span&gt; on 3D-printed guns. A &lt;/span&gt;&lt;a href=&quot;https://www.sciencedirect.com/science/article/abs/pii/S2468170917300140&quot;&gt;&lt;span&gt;researcher studying&lt;/span&gt;&lt;/a&gt;&lt;span&gt; printable firearms. An artist incorporating parts into a new work commenting on gun culture. Under these provisions merely sharing a print file with any of them could result in criminal charges, even if no one involved intends to assemble a firearm.&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span&gt;Criminalizing information doesn’t work. Someone intent on illegally printing a firearm is already subject to charges for that act. Adding felony liability for simply possessing a file or design piles on additional charges while doing nothing to stop printing. New charges for someone distributing these files won’t make them inaccessible to lawbreakers, but they will have a chilling effect on legitimate and entirely legal work. &lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span&gt;Unsurprisingly, a similar law was proposed and subsequently &lt;/span&gt;&lt;a href=&quot;https://hoodline.com/2026/03/polis-veto-scare-ends-with-scaled-back-3d-gun-ban-at-colorado-capitol/&quot;&gt;&lt;span&gt;scrapped in Colorado&lt;/span&gt;&lt;/a&gt;&lt;span&gt; due to First Amendment concerns. We recommend New York do the same.&lt;/span&gt;&lt;/p&gt;
&lt;p class=&quot;take-action&quot;&gt;&lt;a href=&quot;https://act.eff.org/action/stop-new-york-s-surveillance-and-censorship-mandate-before-it-s-too-late&quot;&gt;Take action&lt;/a&gt;&lt;/p&gt;
&lt;p class=&quot;take-explainer&quot;&gt;&lt;span&gt;Tell Your Representative to Stand with Creators&lt;/span&gt;&lt;/p&gt;
&lt;h3&gt;&lt;b&gt;Mandated Surveillance, Less Access&lt;/b&gt;&lt;/h3&gt;
&lt;p&gt;&lt;span&gt;Part C Subpart B would require every 3D printer and CNC machine sold in New York to include algorithms that scan your design files and block prints the system identifies as producing firearm components. Furthermore, all sales and deliveries of these machines must be made face-to-face. &lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span&gt;Unlike other bills we have seen, there are no exceptions to this mandate. These restrictions apply to sales to researchers, commercial manufacturers, and—oddly enough—federally and state-licensed gunsmiths.&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span&gt;Applying these restrictions to CNC machine sellers is particularly absurd. These cousins of 3D printers, which make 3D objects by &lt;/span&gt;&lt;i&gt;&lt;span&gt;removing&lt;/span&gt;&lt;/i&gt;&lt;span&gt; materials, are often tens of thousands of dollars and used by commercial manufacturers. Automotive, &lt;/span&gt;&lt;a href=&quot;https://www.stratasys.com/en/resources/videos/lockheed-martin-3d-prints-spaceready-parts/&quot;&gt;&lt;span&gt;aerospace&lt;/span&gt;&lt;/a&gt;&lt;span&gt;, medical manufacturers, and many others industries will be subject to the in-person sales, surveillance risk, and all the &lt;/span&gt;&lt;a href=&quot;https://www.eff.org/deeplinks/2026/04/print-blocking-anti-consumer-permission-print-part-1&quot;&gt;&lt;span&gt;other problems with these print-blocking algorithms&lt;/span&gt;&lt;/a&gt;&lt;span&gt; introduce.&lt;/span&gt;&lt;/p&gt;
&lt;p class=&quot;pull-quote&quot;&gt;&lt;span&gt;Industries will be subject to the in-person sales, surveillance risk, and all the other problems &lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span&gt;Even limiting the focus to individual buyers—hobbyists and artists who use these machines at home—this restriction to face-to-face sales comes with its own issues. Beyond unnecessarily complicating the use of printers in the state, this barrier to access will hit rural New Yorkers the hardest. People in rural or remote locations can stand to benefit from the saved time and costs of printing useful parts at home. With this restriction, they will need to drive to one of the few retailers who actually sell this equipment and settle for the models they stock. &lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span&gt;That is, if sellers continue to stock these printers despite the risk. Subpart B §§ 2.3 and 2.5 open sellers up to liability, including anyone on the second-hand market, for selling out-of-date printers. Meanwhile, buyers hoping to illegally print firearms can simply &lt;/span&gt;&lt;a href=&quot;https://all3dp.com/2/how-to-build-a-3d-printer-from-a-kit-or-from-scratch/&quot;&gt;&lt;span&gt;build their own printer&lt;/span&gt;&lt;/a&gt;&lt;span&gt; with widely available equipment.&lt;/span&gt;&lt;/p&gt;
&lt;h3&gt;&lt;b&gt;The Law Won’t Work as Advertised &lt;/b&gt;&lt;/h3&gt;
&lt;p&gt;&lt;span&gt;Here’s what makes Subpart B of the New York budget particularly reckless: the technology it mandates is not capable of doing what it is supposed to. &lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span&gt;There is very little detail provided about requirements for the mandated algorithms. What the bill does outline boils down to this: the algorithms must evaluate print files to determine whether they would produce a firearm or illegal firearm parts, and if so, block the print. In an attempt to enable this, New York state would also create and maintain a library of forbidden files with tightly restricted access. &lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span&gt;We’ve already gone over why &lt;/span&gt;&lt;a href=&quot;https://www.eff.org/deeplinks/2026/04/print-blocking-wont-work-permission-print-part-2&quot;&gt;&lt;span&gt;this idea simply won’t work&lt;/span&gt;&lt;/a&gt;&lt;span&gt;. Design files are trivially easy to modify, split into segments, or otherwise alter to evade pattern detection. Even if printers fully rendered and analyzed the print with cloud-based AI, any number of design or post-print tricks can be used to dodge detection. Meanwhile, such fuzzy AI interpretation will rapidly increase the percentage of lawful prints censored. &lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span&gt;Firearms aren’t a highly specific design like paper currency; these proposed algorithms are futilely attempting to block an infinite number of designs capable of—or that can be made capable of—the few simple mechanical functions that make up a firearm. &lt;/span&gt;&lt;/p&gt;
&lt;p class=&quot;pull-quote&quot;&gt;&lt;span&gt;This group has no peer review requirements, so it could easily be loaded with profiteers or incumbent manufacturers&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span&gt;As we’ve said before: the internet always routes around censorship. Anyone determined to print a prohibited object has straightforward workarounds. The people who get surveilled and blocked are the people trying to follow the law.&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span&gt;The bill aims to enforce this impossible mandate by creating a working group to define the actual technical requirements of enforcement—but only after the law passes. This group has no peer review requirements, so it could easily be loaded with profiteers or incumbent manufacturers who are &lt;/span&gt;&lt;a href=&quot;https://www.theverge.com/tech/905922/new-york-3d-printed-ghost-gun-ban-luigi-mangione-united-healthcare-shooting&quot;&gt;&lt;span&gt;already lining up to participate&lt;/span&gt;&lt;/a&gt;&lt;span&gt;. These incumbents stand to profit from shutting out new competitors and locking in users to their devices, and sellers into their platform, subjecting both to the type of &lt;/span&gt;&lt;i&gt;&lt;span&gt;enshittification&lt;/span&gt;&lt;/i&gt;&lt;span&gt; seen with Digital Rights Management (DRM) software. There are also no safeguards in the law to prevent the most surveillance-heavy approaches to print scanning, or to stop this censorship infrastructure from being further weaponized against &lt;/span&gt;&lt;a href=&quot;https://makerworld.com/en/models/1986369-ice-out-whistle-keychain-open-license-support-free&quot;&gt;&lt;span&gt;lawful speech&lt;/span&gt;&lt;/a&gt;&lt;span&gt;.&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span&gt;On the other hand, unbiased experts in open-source manufacturing in the working group can at best pause the clock by showing such algorithms are unfeasible. That is, until a new snake oil company comes along to restart it. &lt;/span&gt;&lt;/p&gt;
&lt;h3&gt;&lt;strong&gt;New York Won&#039;t Be the Last Stop &lt;/strong&gt;&lt;/h3&gt;
&lt;p&gt;&lt;span&gt;New York is one of the largest consumer markets in the country. When it mandates a feature in hardware, manufacturers hardly ever build a New York-only version. They build the New York version and sell it globally. A print-blocking mandate adopted in New York will become the national standard in practice.&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span&gt;New Yorkers deserve more than this rush job buried in a budget bill. This is an unfeasible tech solution, built without the consumer protections that would be required of any serious policy proposal, and creates new costs and inconveniences amidst a protracted annual budget process. It also threatens First Amendment protections. This policy will take shape without consumer guardrails, behind closed doors, and risks the worst outcomes for grassroots innovation and creativity enabled by these machines. Worse still, these practices can become the norm across other states and among 3D-printer manufacturers worldwide. &lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span&gt;Your representatives could vote on this ill-conceived measure in the next week.  If you&#039;re a New Yorker, email your legislators now, and tell them to strip this measure from the budget today. &lt;/span&gt;&lt;/p&gt;
&lt;p class=&quot;take-action&quot;&gt;&lt;a href=&quot;https://act.eff.org/action/stop-new-york-s-surveillance-and-censorship-mandate-before-it-s-too-late&quot;&gt;Take action&lt;/a&gt;&lt;/p&gt;
&lt;p class=&quot;take-explainer&quot;&gt;&lt;span&gt;Tell Your Representative to Stand with Creators&lt;/span&gt;&lt;/p&gt;


&lt;/div&gt;&lt;/div&gt;&lt;/div&gt;</description>
     <pubDate>Thu, 16 Apr 2026 20:31:22 +0000</pubDate>
 <guid isPermaLink="false">111970 at https://www.eff.org</guid>
 <category domain="https://www.eff.org/issues/innovation">Creativity &amp; Innovation</category>
 <category domain="https://www.eff.org/issues/competition">Competition</category>
 <category domain="https://www.eff.org/issues/privacy">Privacy</category>
 <dc:creator>Rory Mir</dc:creator>
 <dc:creator>Nathan Sheard</dc:creator>
 <enclosure url="https://www.eff.org/files/banner_library/3d-ny-3-banner.jpg" alt="3D printer makes a map of NY" type="image/jpeg" length="283416" />
  </item>
  <item>
    <title>How Push Notifications Can Betray Your Privacy (and What to Do About It)</title>
    <link>https://www.eff.org/deeplinks/2026/04/how-push-notifications-can-betray-your-privacy-and-what-do-about-it</link>
    <description>&lt;div class=&quot;field field--name-body field--type-text-with-summary field--label-hidden&quot;&gt;&lt;div class=&quot;field__items&quot;&gt;&lt;div class=&quot;field__item even&quot;&gt;&lt;p&gt;&lt;em&gt;Update April 22, 2026. Apple has &lt;a href=&quot;https://techcrunch.com/2026/04/22/apple-fixes-bug-that-cops-used-to-extract-deleted-chat-messages-from-iphones/&quot; rel=&quot;noopener noreferrer&quot; target=&quot;_blank&quot;&gt;reportedly addressed&lt;/a&gt; part of the issue with the notification database in &lt;a href=&quot;https://support.apple.com/en-us/127002&quot; rel=&quot;noopener noreferrer&quot; target=&quot;_blank&quot;&gt;iOS 26.4.2&lt;/a&gt; and &lt;a href=&quot;https://support.apple.com/en-us/127003&quot; rel=&quot;noopener noreferrer&quot; target=&quot;_blank&quot;&gt;18.7.8&lt;/a&gt;, released today. With this update, notifications marked for deletion should no longer be stored in the notification database.&lt;/em&gt;&lt;/p&gt;
&lt;p&gt;&lt;span&gt;A phone’s push notifications can contain a significant amount of information about you, your communications, and what you do throughout the day. They’re important enough to government investigations that &lt;/span&gt;&lt;a href=&quot;https://apnews.com/article/apple-push-notification-data-court-order-4dc52e631220a987022a528c08d2c457&quot;&gt;&lt;span&gt;Apple and Google now both require a judge’s order&lt;/span&gt;&lt;/a&gt;&lt;span&gt; to hand details about push notifications over to law enforcement, and even with that requirement Apple &lt;/span&gt;&lt;a href=&quot;https://www.apple.com/legal/transparency/push-token.html&quot;&gt;&lt;span&gt;shares data on hundreds&lt;/span&gt;&lt;/a&gt;&lt;span&gt; of users. More recently, we also learned from a 404 Media report that law enforcement forensic extraction tools &lt;/span&gt;&lt;a href=&quot;https://www.404media.co/fbi-extracts-suspects-deleted-signal-messages-saved-in-iphone-notification-database-2/&quot;&gt;&lt;span&gt;can unearth&lt;/span&gt;&lt;/a&gt;&lt;span&gt; the text from deleted notifications, including those from secure messaging tools, like Signal. The good news is that you can mitigate some of this risk. &lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span&gt;There are two points where notifications may betray your privacy: when they’re transmitted over cloud servers and once they land on the device. Let’s start with the cloud. It might seem like push notifications come directly from an app, but they are typically routed through either Apple or Google’s servers first (depending on if you use iOS or Android). &lt;/span&gt;&lt;a href=&quot;https://www.wyden.senate.gov/imo/media/doc/wyden_smartphone_push_notification_surveillance_letter.pdf&quot;&gt;&lt;span&gt;According to a letter&lt;/span&gt;&lt;/a&gt;&lt;span&gt; sent to the Department of Justice by Senator Wyden, the content of those notifications may be visible to Apple and Google, and at the very least the companies collect some metadata about what apps send a notification and when. App providers have to make the decision to hide the content from Apple and Google and implement that functionality; Signal is one app that does this. &lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span&gt;Then, once the notifications land on your phone, depending on your settings, the notification content may be visible on your lock screen without needing to unlock the device. This can be dangerous if you lose your device, someone steals it, or it’s confiscated by law enforcement. &lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span&gt;You may clear notifications after looking at them. But it turns out the content notifications get recorded in your device’s internal storage, which then makes them susceptible to recovery with certain types of forensic tools. Notification content may even persist after the app is deleted, if the OS doesn’t fully purge the app’s notification data. &lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span&gt;We still have a lot of unanswered questions about how the notification databases work on devices. We do not know how long notifications are stored, or whether they’re backed up to the cloud, in which case the cloud provider could get backdoor access to the content of messages if the backups are enabled and not end-to-end encrypted. This may also make backups vulnerable to law enforcement demands for data. &lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span&gt;Which is all to say that there are myriad ways that law enforcement can access the content or metadata of push notifications. Let’s fix that.&lt;/span&gt;&lt;/p&gt;
&lt;h2&gt;&lt;span&gt;Consider the Strongest Notification Protections for Your Secure Messaging Apps&lt;/span&gt;&lt;/h2&gt;
&lt;p&gt;&lt;span&gt;Secure chat tools are designed to keep the content of the messages safe inside the app. So, for secure chat apps like WhatsApp and Signal, that means the company that makes those apps cannot see the content of your messages, and they’re only accessible on your and your recipients’ devices. Once messages land on a device, it’s still important to consider some privacy precautions, particularly with notifications. &lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt;Signal&lt;br /&gt;&lt;/b&gt;&lt;span&gt;Signal offers three levels of information to include in notifications, all which are pretty self explanatory:&lt;/span&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;i&gt;&lt;span&gt;&lt;strong&gt;Name, Content, and Actions&lt;/strong&gt;&lt;/span&gt;&lt;/i&gt;&lt;span&gt; (&lt;/span&gt;&lt;i&gt;&lt;span&gt;&lt;strong&gt;Name and message&lt;/strong&gt;&lt;/span&gt;&lt;/i&gt;&lt;span&gt; on Android) shows the entirety of a message as well as who sent it (on iPhone you can also slide to reply, mark as read, or call back). &lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;i&gt;&lt;span&gt;&lt;strong&gt;Name only&lt;/strong&gt;&lt;/span&gt;&lt;/i&gt;&lt;span&gt; only shows the name of the sender. &lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;i&gt;&lt;span&gt;&lt;strong&gt;No Name or Content&lt;/strong&gt;&lt;/span&gt;&lt;/i&gt;&lt;span&gt; (&lt;/span&gt;&lt;i&gt;&lt;span&gt;&lt;strong&gt;No name or message&lt;/strong&gt;&lt;/span&gt;&lt;/i&gt;&lt;span&gt; on Android) will only show that you have a message from Signal, not who sent it or what it’s about. &lt;/span&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;span&gt;To change your settings:&lt;/span&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;b&gt;On iPhone&lt;/b&gt;&lt;span&gt;: Tap your profile picture, then &lt;/span&gt;&lt;b&gt;&lt;i&gt;Settings&lt;/i&gt;&lt;/b&gt;&lt;span&gt; &amp;gt; &lt;/span&gt;&lt;b&gt;&lt;i&gt;Notifications&lt;/i&gt;&lt;/b&gt;&lt;span&gt; &amp;gt; &lt;/span&gt;&lt;b&gt;&lt;i&gt;Show&lt;/i&gt;&lt;/b&gt;&lt;span&gt;.&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;b&gt;On Android&lt;/b&gt;&lt;span&gt;: Tap your profile picture, then &lt;/span&gt;&lt;b&gt;&lt;i&gt;Notifications&lt;/i&gt;&lt;/b&gt;&lt;span&gt; &amp;gt; &lt;/span&gt;&lt;b&gt;&lt;i&gt;Show&lt;/i&gt;&lt;/b&gt;&lt;span&gt;. &lt;/span&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;b&gt;WhatsApp&lt;br /&gt;&lt;/b&gt;&lt;span&gt;WhatsApp only has one option for this, and it’s currently limited to iPhone, but you can at least tell the app not to include the content of a message in the notification:&lt;/span&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;span&gt;Open WhatsApp for iPhone, tap the “You” bar, then &lt;/span&gt;&lt;b&gt;&lt;i&gt;Notifications&lt;/i&gt;&lt;/b&gt;&lt;span&gt;, and disable the &lt;/span&gt;&lt;b&gt;&lt;i&gt;Show preview &lt;/i&gt;&lt;/b&gt;&lt;span&gt;option.&lt;/span&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;span&gt;Check your other apps to see if they offer similar settings.&lt;/span&gt;&lt;/p&gt;
&lt;h2&gt;&lt;span&gt;Limit Your Notifications Device-Wide&lt;/span&gt;&lt;/h2&gt;
&lt;p&gt;&lt;span&gt;Since Apple and Google manage push notifications for their respective devices, they also have some visibility into certain data. Push notification data can include certain types of metadata, like which app sent a notification and when, as well as the account ID associated with the phone. In &lt;/span&gt;&lt;a href=&quot;https://www.reuters.com/technology/cybersecurity/governments-spying-apple-google-users-through-push-notifications-us-senator-2023-12-06/?ref=404media.co&quot;&gt;&lt;span&gt;some cases&lt;/span&gt;&lt;/a&gt;&lt;span&gt;, Apple and Google may have access to unencrypted content, including the content of the text in a notification or other information from the app itself. &lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span&gt;For most app notifications, there’s no simple way to easily figure out what metadata might be gleaned from a notification, or if the notification is unencrypted or not. But some app developers have described details along these lines. For example, Signal president Meredith Whittaker &lt;/span&gt;&lt;a href=&quot;https://mastodon.world/@Mer__edith/111563865413484025&quot;&gt;&lt;span&gt;explained on social media&lt;/span&gt;&lt;/a&gt;&lt;span&gt; how the Signal app handles notifications entirely on-device. Searching online for an app name along with “notification privacy,” “notification encryption” or “notification metadata” may help answer your questions, or you may need to dig around in support forums for the app.&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span&gt;&lt;img src=&quot;/files/2026/04/15/screenshot_2026-04-15_at_1.49.24_pm.png&quot; width=&quot;1188&quot; height=&quot;1098&quot; alt=&quot; push notifications for Signal NEVER contain sensitive unencrypted data &amp;amp; do not reveal the contents of any Signal messages or calls-not to Apple, not to Google, not to anyone but you &amp;amp; the people you&#039;re talking to. 1/ In Signal, push notifications simply act as a ping that tells the app to wake up. They don&#039;t reveal who sent the message or who is calling (not to Apple, Google, or anyone). Notifications are processed entirely on your device. This&quot; title=&quot; push notifications for Signal NEVER contain sensitive unencrypted data &amp;amp; do not reveal the contents of any Signal messages or calls-not to Apple, not to Google, not to anyone but you &amp;amp; the people you&#039;re talking to. 1/ In Signal, push notifications simply act as a ping that tells the app to wake up. They don&#039;t reveal who sent the message or who is calling (not to Apple, Google, or anyone). Notifications are processed entirely on your device. This&quot; /&gt;&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span&gt;It’s also good to reconsider whether any app should be sending you notifications to begin with. Aside from a potential decrease in the number of distractions you endure throughout the day, or the level of chaos on display on your lockscreen, limiting the apps that can send notifications and what content is visible in them can improve your privacy with respect to the sorts of metadata that may be gathered by the companies, as well as any content that may be viewable if someone has physically accessed your device.&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt;To check and change your settings on iPhone&lt;/b&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;span&gt;Open &lt;/span&gt;&lt;b&gt;&lt;i&gt;Settings&lt;/i&gt;&lt;/b&gt;&lt;span&gt; &amp;gt; &lt;/span&gt;&lt;b&gt;&lt;i&gt;Notifications.&lt;/i&gt;&lt;/b&gt;&lt;/li&gt;
&lt;li&gt;&lt;span&gt;On the &lt;/span&gt;&lt;b&gt;&lt;i&gt;Show Previews&lt;/i&gt;&lt;/b&gt;&lt;span&gt; option, you can choose whether to show the content of notifications on the lock screen, “Always,” which doesn’t require unlocking the device, “When Unlocked,” which does, and “Never,” which means notifications won’t have any details, just that you have a notification in an app. &lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span&gt;Alternatively, you can scroll down and change these settings per app. Just tap the app name, then the &lt;/span&gt;&lt;b&gt;&lt;i&gt;Show Previews&lt;/i&gt;&lt;/b&gt;&lt;span&gt; menu, and choose how you’d like them to appear. Or, if you’ve decided you don’t want notifications from that app at all, uncheck the &lt;/span&gt;&lt;b&gt;&lt;i&gt;Allow Notifications&lt;/i&gt;&lt;/b&gt;&lt;span&gt; option.&lt;/span&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;b&gt;To check and change your settings on Android&lt;br /&gt;&lt;/b&gt;&lt;span&gt;The core version of Android relies on app developers to develop specific settings more than controlling them on a platform-wide level.&lt;/span&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;span&gt;Open &lt;/span&gt;&lt;b&gt;&lt;i&gt;Settings&lt;/i&gt;&lt;/b&gt;&lt;span&gt; &amp;gt; &lt;/span&gt;&lt;b&gt;&lt;i&gt;Notifications &amp;gt; App notifications &lt;/i&gt;&lt;/b&gt;&lt;span&gt;to disable notifications from any app completely. Some apps may also offer internal notification options for specific types of notices, like new messages, that you can control in the app itself. Tap an app name, then tap the &lt;/span&gt;&lt;b&gt;&lt;i&gt;Addition settings in the app&lt;/i&gt;&lt;/b&gt;&lt;span&gt; option to potentially customize it more.&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span&gt;You can also experiment with the sensitive content setting. This is up to the developer to set properly, but when done so, most notifications will require at least unlocking the device to see them. Open &lt;/span&gt;&lt;b&gt;&lt;i&gt;Settings&lt;/i&gt;&lt;/b&gt;&lt;span&gt; &amp;gt; &lt;/span&gt;&lt;b&gt;&lt;i&gt;Notifications &amp;gt; Notifications on lock screen&lt;/i&gt;&lt;/b&gt;&lt;span&gt; and disable “Show sensitive content.”&lt;/span&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;h2&gt;&lt;span&gt;Control What Notifications AI Tools Can Access&lt;/span&gt;&lt;/h2&gt;
&lt;p&gt;&lt;span&gt;In an attempt to make notifications easier to skim, both Android and iOS offer optional ways to get notification summaries using their AI tools that summarize the content of notifications. On an individual app level, WhatsApp offers this as well. Some of these summarization tools, like Apple’s, &lt;/span&gt;&lt;a href=&quot;https://www.apple.com/legal/privacy/data/en/intelligence-engine/&quot;&gt;&lt;span&gt;run on the device&lt;/span&gt;&lt;/a&gt;&lt;span&gt;, while others, &lt;/span&gt;&lt;a href=&quot;https://blog.whatsapp.com/catch-up-on-conversations-with-private-message-summaries&quot;&gt;&lt;span&gt;like WhatsApp’s&lt;/span&gt;&lt;/a&gt;&lt;span&gt;, do not. This can all be a lot to keep track of, and sending data off device may create some level of risk for some messages.&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span&gt;Since this is a bit more complicated, &lt;/span&gt;&lt;a href=&quot;https://www.eff.org/deeplinks/2025/10/when-ai-and-secure-chat-meet-users-deserve-strong-controls-over-how-they-interact&quot;&gt;&lt;span&gt;we have another blog post&lt;/span&gt;&lt;/a&gt;&lt;span&gt; that walks through the steps to take to protect messaging from accidentally ending up in AI tools built into Apple and Google&#039;s devices. For WhatsApp specifically, &lt;/span&gt;&lt;a href=&quot;https://www.eff.org/deeplinks/2025/09/what-whatsapps-advanced-chat-privacy-really-does&quot;&gt;&lt;span&gt;we have a blog&lt;/span&gt;&lt;/a&gt;&lt;span&gt; detailing when you might want to turn on the app’s “Advanced Chat Privacy” feature, which can disable summaries for both yourself and others in the chat.&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span&gt;Balancing security, privacy, and usability with something like push notifications is a complicated task. At the very least, Apple and Google should better ensure that the content of these notifications isn’t transmitted over their servers in plain text. The companies need to also make sure that device operating systems don’t back up the notification database to the cloud, and when an app is deleted, that all notification data is purged.&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span&gt;We appreciate that apps like Signal allow you to control what’s visible with notifications on a per-app basis, and we’d like to see this level of granularity of choices in other secure messaging tools, like WhatsApp. Likewise, more apps should handle push notifications similarly to the way Signal does, where a ping is sent to wake up the app to check for messages, and the content of that message is never sent across servers.&lt;/span&gt;&lt;/p&gt;

&lt;/div&gt;&lt;/div&gt;&lt;/div&gt;</description>
     <pubDate>Thu, 16 Apr 2026 16:41:57 +0000</pubDate>
 <guid isPermaLink="false">111967 at https://www.eff.org</guid>
 <category domain="https://www.eff.org/issues/security-education">Security Education</category>
 <category domain="https://www.eff.org/issues/end-end-encryption">End-to-End Encryption</category>
 <category domain="https://www.eff.org/mobile-devices">Mobile devices</category>
 <dc:creator>Thorin Klosowski</dc:creator>
 <enclosure url="https://www.eff.org/files/banner_library/mobile-privacy.png" alt="" type="image/png" length="23559" />
  </item>
  <item>
    <title>EFF Calls on Kuwait to Release Journalist Ahmed Shihab-Eldin</title>
    <link>https://www.eff.org/deeplinks/2026/04/eff-calls-kuwait-release-journalist-ahmed-shihab-eldin</link>
    <description>&lt;div class=&quot;field field--name-body field--type-text-with-summary field--label-hidden&quot;&gt;&lt;div class=&quot;field__items&quot;&gt;&lt;div class=&quot;field__item even&quot;&gt;&lt;p&gt;&lt;span&gt;EFF calls on the Kuwaiti government to immediately release journalist Ahmed Shihab-Eldin. An award-winning journalist and television host who worked for &lt;i&gt;&lt;span&gt;Al Jazeera&lt;/span&gt;&lt;/i&gt; for many years, Shihab-Eldin—a dual American-Kuwaiti citizen—was arrested in Kuwait on March 3 while visiting family. The Committee to Protect Journalists (CPJ) reported yesterday that it is believed he has been &lt;a href=&quot;https://cpj.org/2026/04/cpj-calls-on-kuwait-to-release-us-kuwaiti-journalist-ahmed-shihab-eldin/&quot;&gt;charged with spreading false information, harming national security, and misusing his mobile phone.&lt;/a&gt;&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span&gt;According to the &lt;/span&gt;&lt;a href=&quot;https://www.theguardian.com/world/2026/apr/14/detention-journalist-ahmed-shihab-eldin-kuwait-crackdown-freedom-speech-iran-war&quot;&gt;&lt;i&gt;&lt;span&gt;Guardian&lt;/span&gt;&lt;/i&gt;&lt;/a&gt;&lt;span&gt;, Shihab-Eldin published footage of a U.S. Air Force F-15 E Strike Eagle crash, and posted to his &lt;/span&gt;&lt;a href=&quot;https://substack.com/@ahmedeldin&quot;&gt;&lt;span&gt;Substack&lt;/span&gt;&lt;/a&gt;&lt;span&gt; about the incident, noting that video circulating online showed local residents assisting the crash survivors. &lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span&gt;Kuwait is &lt;/span&gt;&lt;a href=&quot;https://www.eff.org/deeplinks/2026/04/war-pretext-gulf-states-are-tightening-screws-speech-again&quot;&gt;&lt;span&gt;one of several countries&lt;/span&gt;&lt;/a&gt;&lt;span&gt; that has recently cracked down on reporting amidst the ongoing war. Kuwait’s Ministry of Interior &lt;/span&gt;&lt;a href=&quot;https://x.com/MOInformation/status/2028608058750865618?s=20&quot;&gt;&lt;span&gt;posted on X&lt;/span&gt;&lt;/a&gt;&lt;span&gt; on March 3—the same day Shihab-Eldin was arrested—warning people in the country “not to photograph or publish any clips or information related to missiles or relevant locations.” Earlier this month, the UN Office of the High Commissioner for Human Rights (OHCHR) &lt;/span&gt;&lt;a href=&quot;https://news.un.org/en/story/2026/04/1167234&quot;&gt;&lt;span&gt;highlighted a new decree&lt;/span&gt;&lt;/a&gt;&lt;span&gt; in Kuwait banning the circulation of reports that seek to “undermine the prestige of the military” or erode public trust in it. &lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;a href=&quot;https://kuwaittimes.com/article/41128/kuwait/other-news/10-years-jail-for-undermining-military-services/#:~:text=/,inflicting%20any%20damage%20on%20them&quot;&gt;&lt;span&gt;As reported by local media&lt;/span&gt;&lt;/a&gt;&lt;span&gt;, the decree states that “those who intentionally publish statements or news or circulate false reports and rumors about military authorities resulting in weakening the trust in them and their morale, in addition to undermining their prestige, are punishable by three to 10 years in jail and a fine between KD 5,000 and 10,000.” The decree also imposes a penalty ranging from seven years to life imprisonment for “authorized people who cause financial loss or damage to the military authorities while carrying out a transaction, operation, project or case or obtaining any profit from such deals.”&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span&gt;In contrast to neighboring Gulf states, Kuwait has historically allowed the press to operate with relative freedom, and even &lt;/span&gt;&lt;a href=&quot;https://www.cbk.gov.kw/en/about-cbk/Contact-Us/Right-of-Access-Request#:~:text=%22Law%20No.%2012%20of%202020%20Regarding%20the,of%20the%20matrices%20in%20international%20anti%2Dcorruption%20measures.&quot;&gt;&lt;span&gt;introduced a law&lt;/span&gt;&lt;/a&gt;&lt;span&gt; in 2020 protecting the right to access information. In practice, however, the government &lt;/span&gt;&lt;a href=&quot;https://rsf.org/en/country/kuwait&quot;&gt;&lt;span&gt;exercises considerable control&lt;/span&gt;&lt;/a&gt;&lt;span&gt; over the media. Furthermore, there are several laws, including &lt;/span&gt;&lt;a href=&quot;https://www.amnesty.org/en/latest/press-release/2016/01/kuwait-electronic-crimes-law-threatens-to-further-stifle-freedom-of-expression/#:~:text=Kuwait%20has%20a%20new%20cybercrimes%20law%20that,*%20Use%20of%20the%20internet%20for%20trafficking&quot;&gt;&lt;span&gt;cybercrime legislation&lt;/span&gt;&lt;/a&gt;&lt;span&gt; introduced in 2016, that restrict freedom of expression.&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span&gt;EFF is deeply concerned that Ahmed has not been seen nor heard from in nearly six weeks. We call on the government of Kuwait to immediately release Ahmed Shihab-Eldin. &lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;/p&gt;

&lt;/div&gt;&lt;/div&gt;&lt;/div&gt;</description>
     <pubDate>Wed, 15 Apr 2026 15:04:21 +0000</pubDate>
 <guid isPermaLink="false">111954 at https://www.eff.org</guid>
 <category domain="https://www.eff.org/issues/free-speech">Free Speech</category>
 <category domain="https://www.eff.org/offline">Offline: Imprisoned Bloggers and Technologists</category>
 <category domain="https://www.eff.org/issues/international">International</category>
 <category domain="https://www.eff.org/taxonomy/term/69">Call To Action</category>
 <dc:creator>Jillian C. York</dc:creator>
 <enclosure url="https://www.eff.org/files/banner_library/offline-general.png" alt="Offline General" type="image/png" length="18239" />
  </item>
  <item>
    <title>Digital Hopes, Real Power: The Rise of Network Shutdowns </title>
    <link>https://www.eff.org/deeplinks/2026/04/digital-hopes-real-power-rise-network-shutdowns</link>
    <description>&lt;div class=&quot;field field--name-body field--type-text-with-summary field--label-hidden&quot;&gt;&lt;div class=&quot;field__items&quot;&gt;&lt;div class=&quot;field__item even&quot;&gt;&lt;p&gt;&lt;i&gt;&lt;span&gt;This is the fourth installment of a blog series reflecting on the global digital legacy of the 2011 Arab uprisings. &lt;span&gt;You can &lt;em&gt;read the rest of the series &lt;a href=&quot;https://eff.org/tags/digitalhopesrealpower&quot;&gt;here&lt;/a&gt;.&lt;/em&gt;&lt;/span&gt;&lt;/span&gt;&lt;/i&gt;&lt;/p&gt;
&lt;p&gt;&lt;span&gt;Iran’s internet has been &lt;/span&gt;&lt;a href=&quot;https://www.hrw.org/news/2026/03/06/iran-internet-shutdown-violates-rights-escalates-risks-to-civilians&quot;&gt;&lt;span&gt;intermittently disrupted&lt;/span&gt;&lt;/a&gt;&lt;span&gt; for months. After years of bombardment, Gaza’s telecommunications infrastructure &lt;/span&gt;&lt;a href=&quot;https://7amleh.org/storage/Advocacy%20Reports/Telecommunications%20Report.pdf&quot;&gt;&lt;span&gt;remains fragile&lt;/span&gt;&lt;/a&gt;&lt;span&gt;. In India, &lt;/span&gt;&lt;a href=&quot;https://restofworld.org/2024/india-internet-shutdown-record/&quot;&gt;&lt;span&gt;recurring shutdowns&lt;/span&gt;&lt;/a&gt;&lt;span&gt; and throttling have become a routine response to protests and unrest, cutting millions off from news, work, and basic services. Across &lt;/span&gt;&lt;a href=&quot;https://www.accessnow.org/campaign/keepiton/#global-tracker&quot;&gt;&lt;span&gt;dozens of other countries&lt;/span&gt;&lt;/a&gt;&lt;span&gt;, governments increasingly treat connectivity itself as something that can be weaponized—cut, slowed, or selectively restored to shape what people can see, say, and share. In 2024 alone, authorities imposed &lt;/span&gt;&lt;a href=&quot;https://www.accessnow.org/keepiton-data-dashboard/&quot;&gt;&lt;span&gt;304 internet shutdowns across 54 countries&lt;/span&gt;&lt;/a&gt;&lt;span&gt;—the highest number ever recorded.&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span&gt;In 2011, when protesters in Tunisia, Egypt, and beyond used social media to broadcast their uprisings to the world, many observers heralded a new era of networked freedom. Governments, however, responded quickly by developing and refining systems of control that have only grown more sophisticated over time. Today’s landscape of regulation, blackouts, and degraded networks reflects that trajectory, as early experiments in censorship and disruption have hardened into a durable system of control—what began as an emergency measure has become a normalized infrastructure of control.&lt;/span&gt;&lt;/p&gt;
&lt;h3&gt;&lt;b&gt;A Brief History of Internet Shutdowns&lt;/b&gt;&lt;/h3&gt;
&lt;p&gt;&lt;span&gt;Egypt’s&lt;/span&gt;&lt;span&gt; &lt;/span&gt;&lt;a href=&quot;https://www.bbc.co.uk/news/technology-12306041&quot;&gt;&lt;span&gt;2011 internet shutdown&lt;/span&gt;&lt;/a&gt;&lt;span&gt; wasn’t the first. Although the government’s heavy-handed response after just two days of protests caught the world’s attention, &lt;/span&gt;&lt;a href=&quot;https://opennet.net/blog/2007/02/media-and-internet-blackout-guinea&quot;&gt;&lt;span&gt;Guinea&lt;/span&gt;&lt;/a&gt;&lt;span&gt;, &lt;/span&gt;&lt;a href=&quot;https://cpj.org/reports/2005/05/nepal-news/&quot;&gt;&lt;span&gt;Nepal&lt;/span&gt;&lt;/a&gt;&lt;span&gt;, &lt;/span&gt;&lt;a href=&quot;https://www.theguardian.com/world/2007/sep/28/burma.marktran&quot;&gt;&lt;span&gt;Myanmar&lt;/span&gt;&lt;/a&gt;&lt;span&gt;, and a handful of other countries had previously enacted shutdowns. But Egypt marked a turning point. In the years that followed, &lt;/span&gt;&lt;a href=&quot;https://www.accessnow.org/campaign/keepiton/#global-tracker&quot;&gt;&lt;span&gt;shutdowns increased sharply worldwide&lt;/span&gt;&lt;/a&gt;&lt;span&gt;, suggesting that governments had taken note—adopting network disruptions as a tactic for suppressing dissent and limiting the flow of information within and beyond their borders.&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span&gt;On January 28, 2011, at 12:34 a.m. local time, five of Egypt’s internet service providers (ISPs) &lt;/span&gt;&lt;a href=&quot;https://www.theguardian.com/technology/2011/jan/28/egypt-cuts-off-internet-access&quot;&gt;&lt;span&gt;shut down their networks&lt;/span&gt;&lt;/a&gt;&lt;span&gt;. At least one provider—Noor, which also hosted the Egyptian stock exchange—remained online, leaving only about 7% of the country connected. &lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span&gt;In the aftermath of President Hosni Mubarak’s resignation, rights groups sought to understand how such a sweeping shutdown had been possible—and how future incidents might be prevented. There was no centralized “kill switch.” Instead, authorities leveraged the country’s highly consolidated telecommunications sector, which all operate by government license. With only a handful of ISPs, a small number of directives was enough to bring most of the network offline.&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span&gt;In the years following Egypt’s 2011 shutdown, telecommunications companies—many of which had been directly implicated in enabling state-ordered disruptions—began to organize around a shared set of human rights challenges. Beginning that same year, a group of operators and vendors quietly convened to examine how the &lt;/span&gt;&lt;a href=&quot;https://www.business-humanrights.org/en/big-issues/governing-business-human-rights/un-guiding-principles/&quot;&gt;&lt;span&gt;UN Guiding Principles on Business and Human Rights&lt;/span&gt;&lt;/a&gt;&lt;span&gt; applied to their sector, particularly in contexts where government demands could translate into sweeping restrictions on access. By 2013, this effort had formalized into the &lt;/span&gt;&lt;a href=&quot;https://www.business-humanrights.org/en/latest-news/telecommunications-industry-dialogue/&quot;&gt;&lt;span&gt;Telecommunications Industry Dialogue&lt;/span&gt;&lt;/a&gt;&lt;span&gt;, bringing together major global firms to develop common principles on freedom of expression and privacy and, through a partnership with the &lt;/span&gt;&lt;a href=&quot;https://globalnetworkinitiative.org/&quot;&gt;&lt;span&gt;Global Network Initiative&lt;/span&gt;&lt;/a&gt;&lt;span&gt;, engage more directly with civil society. The initiative reflected a growing recognition that telecom companies—unlike platforms—&lt;/span&gt;&lt;a href=&quot;https://protectthestack.org/&quot;&gt;&lt;span&gt;operate at a critical chokepoint in the network&lt;/span&gt;&lt;/a&gt;&lt;span&gt;. But it also underscored the limits of voluntary approaches: while the Dialogue helped establish shared norms, it did little to constrain the legal and political pressures that continue to drive shutdowns—or to prevent companies from complying with them.&lt;/span&gt;&lt;/p&gt;
&lt;h3&gt;&lt;b&gt;From Emergency Measure to Legal Authority&lt;/b&gt;&lt;/h3&gt;
&lt;p&gt;&lt;span&gt;If the early aughts were defined by improvised shutdowns, the years since have seen governments formalize their power to control networks. What was once exceptional is now often embedded in law.&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span&gt;In India, the &lt;/span&gt;&lt;a href=&quot;https://sflc.in/new-rules-temporary-suspension-telecom-services-case-public-emergency-or-public-safety/&quot;&gt;&lt;span&gt;2017 Temporary Suspension of Telecom Services Rules&lt;/span&gt;&lt;/a&gt;&lt;span&gt;—issued under the Telegraph Act—provided a clear legal pathway for cutting connectivity. The Telecommunications Act, 2023, &lt;/span&gt;&lt;a href=&quot;https://sflc.in/throttling-telecom/&quot;&gt;&lt;span&gt;further entrenched the government’s ability to enact shutdowns&lt;/span&gt;&lt;/a&gt;&lt;span&gt;, granting the central and state governments, or “authorised officers” the power to suspend telecommunications services in the interest of public safety or sovereignty, or during emergencies. The government has used these measures repeatedly, particularly in Jammu and Kashmir. India’s Software Freedom Law Centre’s &lt;/span&gt;&lt;a href=&quot;https://internetshutdowns.in/&quot;&gt;&lt;span&gt;Shutdown Tracker&lt;/span&gt;&lt;/a&gt;&lt;span&gt; shows India as instigating more than 900 shutdowns, 447 of which were in Jammu and Kashmir.&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span&gt;In Kazakhstan, &lt;/span&gt;&lt;a href=&quot;https://www.accessnow.org/central-asia-internet-shutdowns-harm-rights/&quot;&gt;&lt;span&gt;shutdowns have also become common&lt;/span&gt;&lt;/a&gt;&lt;span&gt;. Over the years, the government has &lt;/span&gt;&lt;a href=&quot;https://www.cfr.org/articles/consequences-internet-shutdowns-kazakhstan&quot;&gt;&lt;span&gt;passed legislation&lt;/span&gt;&lt;/a&gt;&lt;span&gt; that allows state agencies to shut down the internet. The 2012 law on national security enabled the government to disrupt communications channels during anti-terrorist operations and to contain riots. In 2014 and 2016, laws were further amended to expand the number of actors able to shut down the internet without a court decision, and a government decree in 2018 enabled shutdowns in the event of a “social emergency.” &lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span&gt;Elsewhere, governments have built or expanded legal and technical frameworks that enable similar control over information flows. Ethiopia’s state-dominated telecom sector has facilitated sweeping shutdowns during periods of conflict, including the war in Tigray, where the internet was &lt;/span&gt;&lt;a href=&quot;https://www.accessnow.org/15-stories-from-tigrays-internet-siege/&quot;&gt;&lt;span&gt;disconnected for more than two years&lt;/span&gt;&lt;/a&gt;&lt;span&gt;. In Iran, authorities have developed regulatory and infrastructural capacity to isolate domestic networks from the global internet, allowing them to restrict external visibility while maintaining limited internal connectivity. This year alone, Iranians have spent &lt;/span&gt;&lt;a href=&quot;https://www.thenationalnews.com/future/technology/2026/03/10/is-iran-internet-still-down/&quot;&gt;&lt;span&gt;one third of the year&lt;/span&gt;&lt;/a&gt;&lt;span&gt; offline. And amidst the ongoing war, Iranian officials have made it clear that &lt;/span&gt;&lt;span&gt;the&lt;/span&gt;&lt;span&gt; &lt;/span&gt;&lt;a href=&quot;https://carnegieendowment.org/research/2026/03/iran-wields-wartime-internet-access-as-a-political-tool&quot;&gt;&lt;span&gt;internet is a privilege&lt;/span&gt;&lt;/a&gt;&lt;span&gt; for those who toe the government’s official line.&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span&gt;Even where laws do not explicitly authorize shutdowns, broadly worded provisions around national security or public order are routinely used to justify them. The result is a growing legal architecture that treats network disruptions not as extraordinary measures, but as standard tools for managing populations.&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span&gt;When that authority is exercised over a population beyond a state’s own citizens, the consequences can be even more severe. Israel’s Ministry of Communications &lt;/span&gt;&lt;a href=&quot;https://www.aljazeera.com/opinions/2011/11/9/hacking-palestine-a-digital-occupation/&quot;&gt;&lt;span&gt;controls the flow of communications&lt;/span&gt;&lt;/a&gt;&lt;span&gt; in and out of Palestine and has used that power to shut down internet access &lt;/span&gt;&lt;a href=&quot;https://www.eff.org/deeplinks/2024/03/access-internet-infrastructure-essential-wartime-and-peacetime&quot;&gt;&lt;span&gt;during periods of conflict&lt;/span&gt;&lt;/a&gt;&lt;span&gt;. Over the past two and a half years, Gaza has experienced &lt;/span&gt;&lt;a href=&quot;https://www.eff.org/deeplinks/2023/10/internet-access-shouldnt-be-bargaining-chip-geopolitical-battles&quot;&gt;&lt;span&gt;repeated outages&lt;/span&gt;&lt;/a&gt;&lt;span&gt;, and experts now estimate that roughly 75% of its telecommunications infrastructure has been &lt;/span&gt;&lt;a href=&quot;https://7amleh.org/storage/Advocacy%20Reports/Telecommunications%20Report.pdf&quot;&gt;&lt;span&gt;damaged&lt;/span&gt;&lt;/a&gt;&lt;span&gt;—leaving essential services severely disrupted.&lt;/span&gt;&lt;/p&gt;
&lt;h3&gt;&lt;b&gt;Elections and the Expansion of Control&lt;/b&gt;&lt;/h3&gt;
&lt;p&gt;&lt;span&gt;Historically, most blackouts have occurred during moments of &lt;/span&gt;&lt;a href=&quot;https://restofworld.org/2022/blackouts/&quot;&gt;&lt;span&gt;intense political tension&lt;/span&gt;&lt;/a&gt;&lt;span&gt;. But authorities are increasingly using them as a tool to preempt dissent.&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span&gt;In 2024, as more than half the world’s population headed to the polls, shutdowns followed. That year alone, authorities imposed &lt;/span&gt;&lt;a href=&quot;http://www.accessnow.org/internet-shutdowns-2024/&quot;&gt;&lt;span&gt;304 internet shutdowns across 54 countries&lt;/span&gt;&lt;/a&gt;&lt;span&gt;—the highest number ever recorded, surpassing the previous record set just a year earlier. The geographic spread also widened significantly, with shutdowns affecting more countries than ever before. The &lt;/span&gt;&lt;a href=&quot;https://www.accessnow.org/press-release/comoros-must-not-blackout-the-internet/&quot;&gt;&lt;span&gt;Comoros&lt;/span&gt;&lt;/a&gt;&lt;span&gt; imposed a shutdown for the first time, while other countries, such as &lt;/span&gt;&lt;a href=&quot;https://monitor.civicus.org/explore/mauritius-social-media-suspension-reversed-after-backlash/&quot;&gt;&lt;span&gt;Mauritius&lt;/span&gt;&lt;/a&gt;&lt;span&gt;, instituted broad bans on social media platforms during elections.&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span&gt;At least &lt;/span&gt;&lt;a href=&quot;https://www.accessnow.org/wp-content/uploads/2025/02/KeepItOn-2024-Internet-Shutdowns-Annual-Report.pdf&quot;&gt;&lt;span&gt;24 countries holding elections in 2024 had a prior history of shutdowns&lt;/span&gt;&lt;/a&gt;&lt;span&gt;, putting billions of people at risk of disruptions during critical democratic moments.&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span&gt;What stands out is not just the scale, but the normalization. Notably, the number of shutdowns in 2025 &lt;/span&gt;&lt;a href=&quot;https://www.accessnow.org/press-release/breaking-records-breaking-connections-internet-shutdowns-in-eeca-in-2025/&quot;&gt;&lt;span&gt;broke the record&lt;/span&gt;&lt;/a&gt;&lt;span&gt; set the year prior. Whereas network disruptions were once a rare occurrence, they are now a routine measure, increasingly treated by authorities as a standard response to periods of heightened political sensitivity. &lt;/span&gt;&lt;/p&gt;
&lt;h3&gt;&lt;b&gt;Civil Society Fights Back&lt;/b&gt;&lt;/h3&gt;
&lt;p&gt;&lt;span&gt;Governments use all sorts of &lt;/span&gt;&lt;a href=&quot;https://www.accessnow.org/five-excuses-governments-abuse-justify-internet-shutdowns/&quot;&gt;&lt;span&gt;justifications&lt;/span&gt;&lt;/a&gt;&lt;span&gt;—national security, curbing the spread of disinformation, and even &lt;/span&gt;&lt;a href=&quot;http://arstechnica.com/tech-policy/2015/06/iraqi-government-shut-down-internet-to-prevent-exam-cheating/&quot;&gt;&lt;span&gt;preventing&lt;/span&gt;&lt;/a&gt; &lt;a href=&quot;https://zeenews.india.com/news/india/mobile-internet-services-blocked-in-gujarat-know-why_1860264.html&quot;&gt;&lt;span&gt;students&lt;/span&gt;&lt;/a&gt;&lt;span&gt; from &lt;/span&gt;&lt;a href=&quot;https://fortune.com/2016/06/20/algeria-facebook-twitter-exams/&quot;&gt;&lt;span&gt;cheating&lt;/span&gt;&lt;/a&gt;&lt;span&gt; on &lt;/span&gt;&lt;a href=&quot;https://www.bbc.co.uk/news/world-africa-36763572&quot;&gt;&lt;span&gt;exams&lt;/span&gt;&lt;/a&gt;&lt;span&gt;—for internet shutdowns. But civil society is watching, and &lt;/span&gt;&lt;a href=&quot;https://www.accessnow.org/keepiton-data-dashboard/&quot;&gt;&lt;span&gt;documenting&lt;/span&gt;&lt;/a&gt;&lt;span&gt;, network disruptions and their impact on citizens.&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span&gt;In 2016, as shutdowns became an increasingly common tool of state control, &lt;/span&gt;&lt;a href=&quot;https://www.accessnow.org/&quot;&gt;&lt;span&gt;Access Now&lt;/span&gt;&lt;/a&gt;&lt;span&gt; launched the &lt;/span&gt;&lt;a href=&quot;https://www.accessnow.org/campaign/keepiton&quot;&gt;&lt;span&gt;#KeepItOn&lt;/span&gt;&lt;/a&gt;&lt;span&gt; campaign to coordinate global advocacy against network disruptions. The campaign includes a &lt;/span&gt;&lt;a href=&quot;https://www.accessnow.org/campaign/keepiton/#coalition&quot;&gt;&lt;span&gt;coalition&lt;/span&gt;&lt;/a&gt;&lt;span&gt; composed of 345 advocacy groups (including EFF), research centers, detection networks, and others who work together to report on, and fight back against, internet shutdowns. Anyone can &lt;/span&gt;&lt;a href=&quot;https://www.accessnow.org/campaign/keepiton/#resources&quot;&gt;&lt;span&gt;get involved&lt;/span&gt;&lt;/a&gt;&lt;span&gt; by signing on to campaign action alerts, sharing their story, or reporting a shutdown in their jurisdiction.&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span&gt;Ending this harmful practice remains the goal. In 2016, the UN &lt;/span&gt;&lt;a href=&quot;https://www.accessnow.org/press-release/un-passes-resolution-condemning-internet-shutdowns/&quot;&gt;&lt;span&gt;passed a landmark resolution&lt;/span&gt;&lt;/a&gt;&lt;span&gt; supporting human rights online and condemning internet shutdowns, and UN agencies have continued to &lt;/span&gt;&lt;a href=&quot;https://www.unesco.org/en/articles/unesco-statement-internet-shutdowns&quot;&gt;&lt;span&gt;warn against the practice&lt;/span&gt;&lt;/a&gt;&lt;span&gt;. But the fight to change government practices remains an uphill battle, leading civil society—and even companies—to get creative. &lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span&gt;During repeated shutdowns in Gaza, grassroots efforts mobilised to distribute eSIMs so Palestinians could stay connected. In 2024, &lt;/span&gt;&lt;a href=&quot;https://www.eff.org/press/releases/electronic-frontier-foundation-present-annual-eff-awards-carolina-botero-connecting&quot;&gt;&lt;span&gt;EFF recognized Connecting Humanity&lt;/span&gt;&lt;/a&gt;&lt;span&gt;, a Cairo-based non-profit providing eSIM access in Gaza, with its annual award for its vital work. Satellite internet such as Starlink has been supplied to people in &lt;/span&gt;&lt;a href=&quot;https://guardian.ng/technology/musk-activates-starlink-internet-service-in-ukraine/&quot;&gt;&lt;span&gt;Ukraine&lt;/span&gt;&lt;/a&gt;&lt;span&gt; and Iran, though it, too, is &lt;/span&gt;&lt;a href=&quot;https://www.techpolicy.press/what-irans-internet-shutdown-reveals-about-starlink/&quot;&gt;&lt;span&gt;not immune to state control&lt;/span&gt;&lt;/a&gt;&lt;span&gt;. Alongside these efforts, civil society continues to share &lt;/span&gt;&lt;a href=&quot;https://www.apc.org/en/news/learn-how-get-past-internet-shutdown&quot;&gt;&lt;span&gt;practical guidance&lt;/span&gt;&lt;/a&gt;&lt;span&gt; on circumventing shutdowns and maintaining access to information.&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span&gt;EFF’s mission is to ensure that technology supports freedom, justice, and innovation for all people of the world—and we’ll continue to fight back against internet shutdowns wherever they occur.&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;i&gt;&lt;span&gt;This is the fourth installment of a blog series reflecting on the global digital legacy of the 2011 Arab uprisings. Read the rest of the series &lt;/span&gt;&lt;/i&gt;&lt;a href=&quot;https://eff.org/tags/digitalhopesrealpower&quot;&gt;&lt;i&gt;&lt;span&gt;here&lt;/span&gt;&lt;/i&gt;&lt;/a&gt;&lt;i&gt;&lt;span&gt;.&lt;/span&gt;&lt;/i&gt;&lt;/p&gt;

&lt;/div&gt;&lt;/div&gt;&lt;/div&gt;</description>
     <pubDate>Wed, 15 Apr 2026 11:38:48 +0000</pubDate>
 <guid isPermaLink="false">111932 at https://www.eff.org</guid>
 <category domain="https://www.eff.org/issues/international">International</category>
 <category domain="https://www.eff.org/issues/free-speech">Free Speech</category>
 <dc:creator>Jillian C. York</dc:creator>
 <enclosure url="https://www.eff.org/files/banner_library/arabspring-banner2.png" alt="Hands holding up flowers under the word حرية, Arabic for &amp;quot;freedom&amp;quot;" type="image/png" length="1396283" />
  </item>
  <item>
    <title>Google Broke Its Promise to Me. Now ICE Has My Data.</title>
    <link>https://www.eff.org/deeplinks/2026/04/google-broke-its-promise-me-now-ice-has-my-data</link>
    <description>&lt;div class=&quot;field field--name-body field--type-text-with-summary field--label-hidden&quot;&gt;&lt;div class=&quot;field__items&quot;&gt;&lt;div class=&quot;field__item even&quot;&gt;&lt;p&gt;&lt;i&gt;&lt;span data-contrast=&quot;none&quot;&gt;In September 2024, Amandla Thomas-Johnson was a Ph.D. candidate studying in the U.S. on a student visa when he briefly attended a pro-Palestinian protest. In April 2025, Immigration and Customs Enforcement (ICE) sent Google an administrative subpoena requesting his data. The next month, Google gave Thomas-Johnson&#039;s information to ICE without giving him the chance to challenge the subpoena, breaking &lt;/span&gt;&lt;/i&gt;&lt;i&gt;&lt;span data-contrast=&quot;none&quot;&gt;a nearly decade-long promise&lt;/span&gt;&lt;/i&gt;&lt;i&gt;&lt;span data-contrast=&quot;none&quot;&gt; to notify users before handing their data to law enforcement.&lt;/span&gt;&lt;/i&gt;&lt;span data-ccp-props=&quot;{}&quot;&gt; &lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;i&gt;&lt;span data-contrast=&quot;none&quot;&gt;Google names a handful of exceptions to this promise (such as if Google receives a gag order from a court) that do not apply to Thomas-Johnson&#039;s case. While ICE “requested” that Google not notify Thomas-Johnson, the request was not enforceable or mandated by a court. Today, the Electronic Frontier Foundation &lt;a href=&quot;https://www.eff.org/press/releases/eff-state-ags-investigate-googles-broken-promise-users-targeted-government&quot;&gt;sent complaints&lt;/a&gt; to the California and New York Attorneys General asking them to investigate Google for deceptive trade practices for breaking that promise. You can read about the complaints &lt;a href=&quot;https://www.eff.org/press/releases/eff-state-ags-investigate-googles-broken-promise-users-targeted-government&quot;&gt;here&lt;/a&gt;. Below is Thomas-Johnson&#039;s account of his ordeal.&lt;/span&gt;&lt;/i&gt;&lt;span data-ccp-props=&quot;{}&quot;&gt; &lt;/span&gt;&lt;/p&gt;
&lt;h3&gt;&lt;b&gt;&lt;span data-contrast=&quot;none&quot;&gt;Out of touch but not out of reach&lt;/span&gt;&lt;/b&gt;&lt;span data-ccp-props=&quot;{}&quot;&gt; &lt;/span&gt;&lt;/h3&gt;
&lt;p&gt;&lt;span data-contrast=&quot;none&quot;&gt;I thought my ordeal with U.S. immigration authorities was over a year ago, when I left the country, crossing into Canada at Niagara Falls. &lt;/span&gt;&lt;span data-ccp-props=&quot;{}&quot;&gt; &lt;/span&gt;&lt;/p&gt;
&lt;div class=&quot;media media-element-container media-default media-wysiwyg-align-right&quot;&gt;
&lt;div class=&quot;file file-image file-image-jpeg&quot;&gt;
&lt;div class=&quot;content&quot;&gt;&lt;img width=&quot;300&quot; class=&quot;media-element file-default&quot; src=&quot;https://eff.org/files/2026/04/09/d4d89898-c31f-4f0f-9383-ea14bc0b1005.png&quot; alt=&quot;A photo of Amandla Thomas-Johnson&quot; /&gt;&lt;/div&gt;
&lt;/div&gt;
&lt;/div&gt;
&lt;p&gt;&lt;span data-contrast=&quot;none&quot;&gt;By that point, the Trump administration had effectively turned federal power against international students like me. After I &lt;/span&gt;&lt;a href=&quot;https://www.theguardian.com/commentisfree/2025/oct/05/palestinian-foreigners-protests-campus-ai-ice-trump-us-migrant&quot;&gt;&lt;span data-contrast=&quot;none&quot;&gt;attended&lt;/span&gt;&lt;/a&gt;&lt;span data-contrast=&quot;none&quot;&gt; a pro-Palestine protest at Cornell University—for all of five minutes—the administration’s rhetoric about cracking down on students protesting what we saw as genocide forced me into hiding for three months. Federal agents came to my home looking for me. A friend was detained at an airport in Tampa and interrogated about my whereabouts.&lt;/span&gt;&lt;span data-ccp-props=&quot;{}&quot;&gt; &lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span data-contrast=&quot;none&quot;&gt;I’m currently a Ph.D. student. Before that, I was a reporter. I’m a dual British and Trinadad and Tobago citizen. I have not been accused of any crime.&lt;/span&gt;&lt;span data-ccp-props=&quot;{}&quot;&gt; &lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span data-contrast=&quot;none&quot;&gt;I believed that once I left U.S. territory, I had also left the reach of its authorities. I was wrong.&lt;/span&gt;&lt;span data-ccp-props=&quot;{}&quot;&gt; &lt;/span&gt;&lt;/p&gt;
&lt;h3&gt;&lt;b&gt;&lt;span data-contrast=&quot;none&quot;&gt;The email&lt;/span&gt;&lt;/b&gt;&lt;/h3&gt;
&lt;p&gt;&lt;span data-contrast=&quot;none&quot;&gt;Weeks later, in Geneva, Switzerland, I received what looked like a routine email from Google. It informed me that the company had already handed over my account data to the Department of Homeland Security.&lt;/span&gt;&lt;span data-ccp-props=&quot;{}&quot;&gt; &lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span data-contrast=&quot;none&quot;&gt;At first, I wasn’t alarmed. I had seen something similar before. An associate of mine, Momodou Taal, had received advance&lt;/span&gt;&lt;span data-contrast=&quot;none&quot;&gt; notice from Google and Facebook that his data had been requested. He was given advanced notice of the subpoenas, and law enforcement &lt;/span&gt;&lt;a href=&quot;https://theintercept.com/2025/09/16/google-facebook-subpoena-ice-students-gaza/&quot;&gt;&lt;span data-contrast=&quot;none&quot;&gt;eventually withdrew them&lt;/span&gt;&lt;/a&gt;&lt;span data-contrast=&quot;none&quot;&gt; before the companies turned over his data.&lt;/span&gt;&lt;span data-ccp-props=&quot;{}&quot;&gt; &lt;/span&gt;&lt;/p&gt;
&lt;p class=&quot;pull-quote&quot;&gt;&lt;span data-contrast=&quot;none&quot;&gt;Google had already disclosed my data without telling me.&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span data-contrast=&quot;none&quot;&gt;I assumed I would be given the same opportunity. But the language in my email was different. It was final: “Google has received and responded to legal process from a law enforcement authority compelling the release of information related to your Google Account.”&lt;/span&gt;&lt;span data-ccp-props=&quot;{}&quot;&gt; &lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span data-contrast=&quot;none&quot;&gt;Google had already disclosed my data without telling me. There was no opportunity to contest it.&lt;/span&gt;&lt;span data-ccp-props=&quot;{}&quot;&gt; &lt;/span&gt;&lt;/p&gt;
&lt;h3&gt;&lt;b&gt;&lt;span data-contrast=&quot;none&quot;&gt;Google’s broken promise&lt;/span&gt;&lt;/b&gt;&lt;/h3&gt;
&lt;p&gt;&lt;span data-contrast=&quot;none&quot;&gt;To be clear, this should not have happened this way. &lt;/span&gt;&lt;a href=&quot;https://policies.google.com/terms/information-requests?hl=en-US&quot;&gt;&lt;span data-contrast=&quot;none&quot;&gt;Google promises&lt;/span&gt;&lt;/a&gt;&lt;span data-contrast=&quot;none&quot;&gt; that it will notify users before their data is handed over in response to legal process&lt;/span&gt;&lt;span&gt;es&lt;/span&gt;&lt;span data-contrast=&quot;none&quot;&gt;, including administrative subpoenas. That notice is meant to provide a chance to challenge the request. In my case, that safeguard was bypassed. My data was handed over without warning—at the request of an administration targeting students engaged in protected political speech.&lt;/span&gt;&lt;span data-ccp-props=&quot;{}&quot;&gt; &lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span data-contrast=&quot;none&quot;&gt;Months later, my lawyer at the Electronic Frontier Foundation obtained the subpoena itself. On paper, the request focused largely on subscriber information: IP addresses, physical address, other identifiers, and session times and durations.&lt;/span&gt;&lt;span data-ccp-props=&quot;{}&quot;&gt; &lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span data-contrast=&quot;none&quot;&gt;But taken together, these fragments form something far more powerful—a detailed surveillance profile. IP logs can be used to approximate location. Physical addresses show where you sleep. Session times would show when you were communicating with friends or family. Even without message content, the picture that emerges is intimate and invasive. &lt;/span&gt;&lt;span data-ccp-props=&quot;{}&quot;&gt; &lt;/span&gt;&lt;/p&gt;
&lt;h3&gt;&lt;b&gt;&lt;span data-contrast=&quot;none&quot;&gt;State power meets private data&lt;/span&gt;&lt;/b&gt;&lt;/h3&gt;
&lt;p&gt;&lt;span data-contrast=&quot;none&quot;&gt;What this experience has made clear is that anyone can be targeted by law enforcement. And with their massive stores of data, technology companies can facilitate those arbitrary investigations. Together, they can combine state power, corporate data, and algorithmic inference in ways that are difficult to see—and even harder to challenge.&lt;/span&gt;&lt;span data-ccp-props=&quot;{}&quot;&gt; &lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span data-contrast=&quot;none&quot;&gt;The consequences of what happened to me are not abstract. I left the United States. But I do not feel that I have left its reach. Being investigated by the federal government is intimidating. Questions run through your head. Am I now a marked individual? Will I face heightened scrutiny if I continue my reporting? Can I travel safely to see family in the Caribbean?&lt;/span&gt;&lt;span data-ccp-props=&quot;{}&quot;&gt; &lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span data-contrast=&quot;none&quot;&gt;Who, exactly, can I hold accountable?&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;em&gt;&lt;span&gt;Update: This post has been updated to include more information about Google&#039;s exceptions to their notification policy, none of which applied to the subpoena targeting Thomas-Johnson.&lt;/span&gt;&lt;/em&gt;&lt;/p&gt;

&lt;/div&gt;&lt;/div&gt;&lt;/div&gt;</description>
     <pubDate>Tue, 14 Apr 2026 16:01:48 +0000</pubDate>
 <guid isPermaLink="false">111936 at https://www.eff.org</guid>
 <category domain="https://www.eff.org/issues/privacy">Privacy</category>
 <category domain="https://www.eff.org/issues/free-speech">Free Speech</category>
 <category domain="https://www.eff.org/issues/anonymity">Anonymity</category>
 <category domain="https://www.eff.org/taxonomy/term/68">Announcement</category>
 <dc:creator>Guest Author</dc:creator>
 <enclosure url="https://www.eff.org/files/banner_library/google-spy-eye.png" alt="Google Spying" type="image/png" length="10115" />
  </item>
  <item>
    <title>EFF to State AGs: Investigate Google&#039;s Broken Promise to Users Targeted by the Government</title>
    <link>https://www.eff.org/press/releases/eff-state-ags-investigate-googles-broken-promise-users-targeted-government</link>
    <description>&lt;div class=&quot;field field--name-field-pr-subhead field--type-text field--label-hidden&quot;&gt;&lt;div class=&quot;field__items&quot;&gt;&lt;div class=&quot;field__item even&quot;&gt;Google&amp;#039;s Failure to Warn Users About Law Enforcement Demands for Data Is Deceptive&lt;/div&gt;&lt;/div&gt;&lt;/div&gt;&lt;div class=&quot;field field--name-body field--type-text-with-summary field--label-hidden&quot;&gt;&lt;div class=&quot;field__items&quot;&gt;&lt;div class=&quot;field__item even&quot;&gt;&lt;p&gt;&lt;span data-contrast=&quot;auto&quot;&gt;SAN FRANCISCO – The Electronic Frontier Foundation sent complaints today to the attorneys general of California and New York urging them to investigate Google for deceptive trade practices, related to the company&#039;s broken promise to give users prior notice before disclosing their information to law enforcement. &lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span data-contrast=&quot;auto&quot;&gt;The letters were sent on behalf of Amandla Thomas-Johnson, &lt;a href=&quot;https://www.eff.org/deeplinks/2026/04/google-broke-its-promise-me-now-ice-has-my-data &quot;&gt;whose information was disclosed to U.S. Immigration and Customs Enforcement&lt;/a&gt; (ICE) without prior notice from Google.&lt;/span&gt;&lt;span data-ccp-props=&quot;{}&quot;&gt; &lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span data-contrast=&quot;auto&quot;&gt;For nearly a decade, Google &lt;/span&gt;&lt;a href=&quot;https://www.eff.org/who-has-your-back-2017&quot;&gt;&lt;span data-contrast=&quot;none&quot;&gt;has promised&lt;/span&gt;&lt;/a&gt;&lt;span data-contrast=&quot;auto&quot;&gt; billions of users that it will notify them before disclosing their personal data to law enforcement. Many times, the company has done just that. But through a hidden and systematic practice, Google has likely violated that promise numerous times over the years. This was the case for Thomas-Johnson, a Ph.D. candidate who was targeted by ICE after briefly attending a protest, effectively preventing him from contesting an invalid subpoena for his data.&lt;/span&gt;&lt;span data-ccp-props=&quot;{}&quot;&gt; &lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span data-contrast=&quot;auto&quot;&gt;&quot;Google should answer the question: How many other times has it broken its promise to users?” said EFF Senior Staff Attorney F. Mario Trujillo. &quot;Advance notice is especially important now, when agencies like ICE are unconstitutionally targeting users for First Amendment-protected activity. State attorneys general should investigate Google for this deception.&quot;&lt;/span&gt;&lt;span data-ccp-props=&quot;{}&quot;&gt; &lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span data-contrast=&quot;auto&quot;&gt;On Google’s Privacy &amp;amp; Terms page, &lt;/span&gt;&lt;a href=&quot;https://policies.google.com/terms/information-requests&quot;&gt;&lt;span data-contrast=&quot;none&quot;&gt;it promises&lt;/span&gt;&lt;/a&gt;&lt;span data-contrast=&quot;auto&quot;&gt; its users that “When we receive a request from a government agency, we send an email to the user account before disclosing information.” This promise ensures that users can protect their own privacy and decide to challenge overbroad or illegal demands on their own behalf. &lt;span&gt;The company lists a handful of exceptions to this policy (such as if Google receives a gag order from a court) that do not apply to Thomas-Johnson&#039;s case. While ICE “requested” that Google not notify Thomas-Johnson, the request was not enforceable or mandated by a court.&lt;/span&gt;&lt;/span&gt;&lt;span data-contrast=&quot;auto&quot;&gt; &lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span data-contrast=&quot;auto&quot;&gt;But on May 8, 2025, Google complied with an administrative subpoena from ICE seeking Thomas-Johnson’s subscriber information, including his name, address, IP address, and other personal identifiers. Later that same day, the company sent Thomas-Johnson a message telling him it had already complied with the subpoena, which he would have successfully challenged had he been given advance notice. Google received the subpoena in April and had more than a month to alert Thomas-Johnson.&lt;/span&gt;&lt;span data-ccp-props=&quot;279}&quot;&gt; &lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span data-contrast=&quot;auto&quot;&gt;Communication between EFF and Google later revealed that this is a systematic issue, not an isolated one. When Google does not fulfill a subpoena within a government-provided artificial deadline, the company&#039;s outside counsel explained, Google will sometimes comply with the request and provide notice to a user on the same day. The company calls this practice “simultaneous notice.”&lt;/span&gt;&lt;span data-ccp-props=&quot;{}&quot;&gt; &lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span data-contrast=&quot;auto&quot;&gt;&quot;What this experience has made clear is that anyone can be targeted by law enforcement,&quot; &lt;a href=&quot;https://www.eff.org/deeplinks/2026/04/google-broke-its-promise-me-now-ice-has-my-data &quot;&gt;said Thomas-Johnson&lt;/a&gt;. &quot;And with their massive stores of data, technology companies can facilitate those arbitrary investigations. Who, exactly, can I hold accountable?&quot;&lt;/span&gt;&lt;span data-ccp-props=&quot;{}&quot;&gt; &lt;/span&gt;&lt;/p&gt;
&lt;p&gt;Google must commit to ending this deception and pay for its past mistakes. The attorneys general of California and New York are empowered to stop deceptive business practices and seek financial restitution stemming from those practices. As EFF writes in its complaints, they should investigate, hold Google to its public promise to give users advanced notice of law enforcement demands, and take appropriate action if necessary.&lt;/p&gt;
&lt;p&gt;&lt;em&gt;&lt;span&gt;Update: This press release has been updated to include more information about Google&#039;s exceptions to their notification policy, none of which applied to the subpoena targeting Thomas-Johnson.&lt;/span&gt;&lt;/em&gt;&lt;span&gt;&lt;em&gt; &lt;/em&gt;&lt;br /&gt;&lt;/span&gt;&lt;span&gt; &lt;br /&gt;&lt;/span&gt;&lt;strong&gt;For the complaints:&lt;br /&gt;&lt;/strong&gt;&lt;a href=&quot;https://www.eff.org/document/eff-letter-re-google-notice-california&quot;&gt;https://www.eff.org/document/eff-letter-re-google-notice-california&lt;/a&gt; &lt;strong&gt;&lt;br /&gt;&lt;/strong&gt;&lt;a href=&quot;https://www.eff.org/document/eff-letter-re-google-notice-new-york&quot;&gt;https://www.eff.org/document/eff-letter-re-google-notice-new-york&lt;/a&gt; &lt;strong&gt;&lt;br /&gt;&lt;/strong&gt;&lt;span data-contrast=&quot;auto&quot;&gt;&lt;a href=&quot;https://www.eff.org/document/eff-letter-re-google-notice-exhibits&quot;&gt;https://www.eff.org/document/eff-letter-re-google-notice-exhibits&lt;/a&gt; &lt;/span&gt;&lt;span&gt;&lt;br /&gt;&lt;/span&gt;&lt;span&gt; &lt;br /&gt;&lt;/span&gt;&lt;strong&gt;For Thomas-Johnson&#039;s account of his ordeal:&lt;/strong&gt; &lt;a href=&quot;https://www.eff.org/deeplinks/2026/04/google-broke-its-promise-me-now-ice-has-my-data&quot;&gt;https://www.eff.org/deeplinks/2026/04/google-broke-its-promise-me-now-ice-has-my-data&lt;/a&gt;&lt;span&gt;&lt;a href=&quot;https://www.eff.org/deeplinks/2026/04/google-broke-its-promise-me-now-ice-has-my-data%20&quot;&gt; &lt;/a&gt;&lt;br /&gt;&lt;/span&gt;&lt;span&gt;&lt;br /&gt;&lt;/span&gt;&lt;strong&gt;For more information on lawless DHS subpoenas:&lt;/strong&gt;&lt;span data-contrast=&quot;auto&quot;&gt; &lt;/span&gt;&lt;a href=&quot;https://www.eff.org/deeplinks/2026/02/open-letter-tech-companies-protect-your-users-lawless-dhs-subpoenas&quot;&gt;&lt;span data-contrast=&quot;none&quot;&gt;https://www.eff.org/deeplinks/2026/02/open-letter-tech-companies-protect-your-users-lawless-dhs-subpoenas&lt;/span&gt;&lt;/a&gt;&lt;span data-ccp-props=&quot;{}&quot;&gt; &lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span data-ccp-props=&quot;{}&quot;&gt;&lt;strong&gt;&lt;span data-contrast=&quot;auto&quot; lang=&quot;EN-US&quot; class=&quot;TextRun MacChromeBold SCXW202980583 BCX0&quot; xml:lang=&quot;EN-US&quot;&gt;&lt;span class=&quot;NormalTextRun SCXW202980583 BCX0&quot;&gt;Contact:&lt;/span&gt;&lt;/span&gt;&lt;/strong&gt;&lt;span data-contrast=&quot;auto&quot; lang=&quot;EN-US&quot; class=&quot;TextRun SCXW202980583 BCX0&quot; xml:lang=&quot;EN-US&quot;&gt;&lt;span class=&quot;NormalTextRun SCXW202980583 BCX0&quot;&gt; &lt;a href=&quot;mailto:press@eff.org&quot;&gt;press@eff.org&lt;/a&gt;&lt;/span&gt;&lt;/span&gt;&lt;span class=&quot;EOP SCXW202980583 BCX0&quot; data-ccp-props=&quot;{}&quot;&gt; &lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;/div&gt;&lt;/div&gt;&lt;/div&gt;&lt;div class=&quot;field field--name-field-tags field--type-taxonomy-term-reference field--label-above&quot;&gt;&lt;div class=&quot;field__label&quot;&gt;Tags:&amp;nbsp;&lt;/div&gt;&lt;div class=&quot;field__items&quot;&gt;&lt;div class=&quot;field__item even&quot;&gt;&lt;a href=&quot;/tags/privacy&quot;&gt;privacy&lt;/a&gt;&lt;/div&gt;&lt;div class=&quot;field__item odd&quot;&gt;&lt;a href=&quot;/tags/free-speech&quot;&gt;free speech&lt;/a&gt;&lt;/div&gt;&lt;div class=&quot;field__item even&quot;&gt;&lt;a href=&quot;/tags/anonymity&quot;&gt;anonymity&lt;/a&gt;&lt;/div&gt;&lt;div class=&quot;field__item odd&quot;&gt;&lt;a href=&quot;/tags/dhs&quot;&gt;DHS&lt;/a&gt;&lt;/div&gt;&lt;div class=&quot;field__item even&quot;&gt;&lt;a href=&quot;/tags/subpoena&quot;&gt;subpoena&lt;/a&gt;&lt;/div&gt;&lt;div class=&quot;field__item odd&quot;&gt;&lt;a href=&quot;/tags/federal-law-enforcement&quot;&gt;federal law enforcement&lt;/a&gt;&lt;/div&gt;&lt;div class=&quot;field__item even&quot;&gt;&lt;a href=&quot;/tags/google&quot;&gt;Google&lt;/a&gt;&lt;/div&gt;&lt;/div&gt;&lt;/div&gt;</description>
     <pubDate>Tue, 14 Apr 2026 16:00:26 +0000</pubDate>
 <guid isPermaLink="false">111947 at https://www.eff.org</guid>
 <dc:creator>Hudson Hongo</dc:creator>
 <enclosure url="https://www.eff.org/files/banner_library/google-spy-eye.png" alt="Google Spying" type="image/png" length="10115" />
  </item>
  </channel>
</rss>
