Apple, Google, Meta, Bluesky, Ring, Telegram—all these companies could offer stronger protections for our chats and our data.
From license-plate readers to drones and cell-site simulators, ICE relies on a growing web of surveillance. Here’s how hackers are shining a light on it—and why that matters.
Our age verification resource hub will answer all your questions about the dangerous new age-gating mandates sweeping the US and the world.
This isn’t just “owning the libs” — this is the highest office in the nation using technology to lie to the entire world.
With Encrypt It Already, we’re pushing on tech companies to deliver stronger privacy protections to their users by enabling and expanding the use of end-to-end encryption across their products or services.
Are there limitations to recording ICE? What's the deal with ICE and facial recognition tech? How do you protect your privacy while protesting? If you or loved ones are exercising your rights to demand justice, join our ICE and CBP town hall livestream on Thursday at 10 am PT.
Courts should treat biometric locks as equivalent to password protection, EFF’s Andrew Crocker told @npub18gnu...g0a2. “Your constitutional right against self-incrimination should not be dependent on technical convenience or lack thereof.”
Locking down your phone, being mindful of what you're wearing, and coming up with plans to communicate with others are all key steps to take before attending a protest.
EFF is closed today as part of the national shutdown in opposition to ICE and CBP and the brutality and terror they and other federal agencies continue to inflict on immigrant communities and any who stand with them.
To find out what kind of surveillance tech you may be facing at a protest, check out EFF’s Atlas of Surveillance: .