Skip to main content
Security Education Companion
A free resource for digital security educators

Security News

Security News is an archive of curated EFF Deeplinks posts for trainers, technologists, and educators who teach digital security.

Issues that we track here include: country-specific policy updates on security and privacy, updates on malware and vulnerabilities, discussions on encryption and privacy-protecting tools, updates on surveillance (corporate surveillance, street-level surveillance, and mass surveillance), device searches by law and border enforcement, tracking via devices, and general digital security tips.

VICTORY: Zoom Will Offer End-to-End Encryption to All Its Users

Crossed keys icon with pink & grey starburst pattern in background

We are glad to see Zoom’s announcement today that it plans to offer end-to-end encryption to all its users, not just those with paid subscriptions. Zoom initially stated it would develop end-to-end encryption as a premium feature. Now, after 20,000 people signed on to EFF and Mozilla’s open letter to Zoom, Zoom has done the right thing, changed course, and taken a big step forward for privacy and security.

Other enterprise companies like Slack, Microsoft, and Zoom’s direct...

Read More

A Quick and Dirty Guide to Cell Phone Surveillance at Protests

IMSI-Catchers Exploit Cell Networks

As uprisings over police brutality and institutionalized racism have swept over the country, many people are facing the full might of law enforcement weaponry and surveillance for the first time. Whenever protesters, cell phones, and police are in the same place, protesters should worry about cell phone surveillance. Often, security practitioners or other protesters respond to that worry with advice about the use of cell-site simulators (also known as a CSS, IMSI catcher, Stingray,...

Read More

Will Zoom Bring Encryption to the People Who Need It Most?

encrypted laptop

This morning, EFF and Mozilla called on Zoom to make their upcoming end-to-end encryption feature available to all 300 million of its users. We published an open letter urging Zoom’s CEO Eric Yuan not to exclude Zoom’s free customers from using their upcoming end-to-end encryption feature. 

We applaud Zoom for building strong end-to-end encryption into their service. But by limiting this security enhancement to paid accounts, Zoom is denying privacy protections to the participants...

Read More

Amazon Ring Must End Its Dangerous Partnerships With Police

The shadow of a police officer looms in front of a Ring device on a closed door.

Across the United States, people are taking to the street to protest racist police violence, including the tragic police killings of George Floyd and Breonna Taylor. This is a historic moment of reckoning for law enforcement. Technology companies, too, must rethink how the tools they design and sell to police departments minimize accountability and exacerbate injustice. Even worse, some companies profit directly from exploiting irrational fears of crime that all too often feed the flames...

Read More

Digital Security Advice for Journalists Covering the Protests Against Police Violence

This guide is an overview of digital security considerations specific to journalists covering protests. For EFF’s comprehensive guide to digital security, including advice for activists and protesters, visit Legal advice in this post is specific to the United States.

As the international protests against police killings enter their third week, the public has been exposed to shocking videos of law enforcement wielding violence against not only demonstrators,...

Read More

You Have a First Amendment Right to Record the Police

Police car being recorded by phone video

Like the rest of the world, we are horrified by the videos of George Floyd’s murder. Once again, police brutality was documented by brave bystanders exercising their First Amendment rights. Their videos forcefully tell a painful truth that has further fueled a movement to demand an end to racism and abuse of power by police officers.

Recordings of police officers, whether by witnesses to an incident with officers, individuals who are themselves interacting with officers, or by...

Read More

Protecting Your Privacy if Your Phone is Taken Away

Your phone is your life. It’s where you communicate, get your news, take pictures and videos of your loved ones, relax and play games, and find a significant other. It can track your health, give you directions, remind you of events, and much more. It’s an incredibly helpful tool, but it can also be used against you by malicious actors. It’s important to know what your phone contains and how it can also make you vulnerable to attacks.

Your threat model is unique and personal. And...

Read More

EFF Offering Assistance with Attorney Referrals for Protesters

scales of justice icon + starburst

In light of the current protests across the country against racism and police brutality, we want to call attention to EFF’s attorney referral services. We are opening up our Cooperating Attorneys list to people facing legal troubles as a result of their participation in the ongoing demonstrations, especially those involving surveillance or devices such as phones. We urge anyone in such a position to contact us for help in finding representation.

Our referral list is comprised of...

Read More

Surveillance Self-Defense: Attending Protests in the Age of COVID-19

In the wake of nationwide protests against the police killings of George Floyd and Breonna Taylor, we urge protestors to stay safe, both physically and digitally. Our Surveillance Self Defense (SSD) Guide on attending a protest offers practical tips on how to maintain your privacy and minimize your digital footprint while taking to the streets.

These demonstrations have taken place against the backdrop of the COVID-19 pandemic, so for many, public health concerns have added an...

Read More

Sex Worker Rights Advocates Raise the Alarms about EARN IT

Cat Astronaut Soars Through Cyberspace, Leaving a Glowing Rainbow Trail

June 2nd is recognized around the world as the chosen date of countless direct actions and protests in support of the sex workers' rights movement. Since its inception nearly 45 years ago, International Whores Day reclaims a sometimes derogatory word to set the tone for a day of unrest and political action. June also marks International LGBTQ+ Pride month, and this is the first in a series of blog posts that aims to highlight different facets within the broader LGBTQ+ community.

... Read More

Tech Learning Collective: A Grassroots Technology School Case Study

Crossed keys icon with pink & grey starburst pattern in background

Grassroots education is important for making sure advanced technical knowledge is accessible to communities who may otherwise be blocked or pushed out of the field. By sharing this invaluable knowledge and skills, local groups can address and dissolve these barriers to organizers hoping to step up their cybersecurity.

The Electronic Frontier Alliance (EFA) is a network of community-based groups across the U.S.  dedicated to advocacy and community education...

Read More

Don’t Mix Policing with COVID-19 Contact Tracing

Over the weekend, Minnesota’s Public Safety Commissioner analogized COVID-19 contact tracing with police investigation of arrested protesters. This analogy is misleading and dangerous. It also underlines the need for public health officials to practice strict data minimization—including a ban on sharing with police any personal information collected through contact tracing.

On May 30, at a press conference about the ongoing protests in Minneapolis against racism and police...

Read More

From Tunis to Minneapolis—and Beyond—Social Media Keeps Us Connected

In January 2011, after hearing about the unrest unfolding in Sidi Bouzid, Tunisian blogger Lina Ben Mhenni (who passed away in January of this year from a chronic illness) began traveling around the country to document the nascent protests and the government’s response to them.

“There are no journalists doing this,” she told Newsweek at the time. “And moreover, the official media started to tell lies about what was happening.”

Despite widespread censorship and...

Read More

Black Lives Matter, Online and in the Streets: Statement from EFF in the Wake of the Police Killings of Breonna Taylor and George Floyd

Protesters and police. Photo by Rose Pineda

Black lives matter on the streets. Black lives matter on the Internet. 

EFF stands with the communities mourning the victims of police homicide. We stand with the protesters who are plowed down by patrol cars. We stand with the journalists placed in handcuffs or fired upon while reporting these atrocities. And we stand with all those using their cameras, phones and digital tools to make sure we cannot turn away from the truth.

There is no doubt that we are in deeply troubled...

Read More

Black Lives Matter, Online and in the Streets: Statement from EFF in the Wake of the Police Killings of Breonna Taylor and George Floyd

Protesters and police. Photo by Rose Pineda

Black lives matter on the streets. Black lives matter on the Internet. 

EFF stands with the communities mourning the victims of police homicide. We stand with the protesters who are plowed down by patrol cars. We stand with the journalists placed in handcuffs or fired upon while reporting these atrocities. And we stand with all those using their cameras, phones and digital tools to make sure we cannot turn away from the truth.

There is no doubt that we are in deeply troubled...

Read More

Watch EFF Cybersecurity Director Eva Galperin's TED Talk About Stalkerware

Eva Galperin at TED

Stalkers and abusive partners want access to your device for the same reason governments and advertisers do: because “full access to a person's phone is the next best thing to full access to a person's mind,” as EFF Director of Cybersecurity Eva Galperin explains in her TED talk on “stalkerware” and her efforts to end the abuse this malicious software enables.

... Read More

COVID-19 Patients’ Right to Privacy Against Quarantine Surveillance

An array of laptops, each of which has a virus icon, except one which has a surveillance icon

Governments around the world are using surveillance technologies to monitor whether COVID-19 patients are complying with instructions to quarantine at home. These include GPS ankle shackles, phone apps that track location, and phone apps that require patients to periodically take quarantine selfies and send them to government monitors.

All of these surveillance technologies burden fundamental rights. And they can harm public health, by discouraging people from getting tested. No...

Read More

Cryptoparty Ann Arbor: A Case Study in Grassroots Activism


Grassroots activism, in its many forms, allows a community to mobilize around a shared set of ideals and creates an environment whereby participants can share information and resources to help facilitate the advancement of their common aims.

The Electronic Frontier Alliance (EFA) is a grassroots network of community and campus organizations, unified by a commitment to upholding the principles of the EFA: privacy, free expression, access to knowledge, creativity, and...

Read More

Keeping Each Other Safe When Virtually Organizing Mutual Aid

laptops in an array, each with a virus icon, except one, which has an free speech (bullhorn) icon

Communities across the country are stepping up to self-organize mutual aid groups, uniting virtually to offer and coordinate support to those who are in need. In solidarity with the need for physical distancing, many people are organizing online using Google spreadsheets, Google forms, public posts on Twitter and Facebook, and private messages on social media platforms. 

There is great beauty and power in this support, but it also puts security concerns in the spotlight: overlooked...

Read More

What You Should Know About Online Tools During the COVID-19 Crisis

crossed keys security icon banner

A greater portion of the world’s work, organizing, and care-giving is moving onto digital platforms and tools that facilitate connection and productivity: video conferencing, messaging apps, healthcare and educational platforms, and more. It’s important to be aware of the ways these tools may impact your digital privacy and security during the COVID-19 crisis.

Here are a few things you should know in order to make informed decisions about what works best for you and your...

Read More

Phishing in the Time of COVID-19: How to Recognize Malicious Coronavirus Phishing Scams


Update 3-26-20: A new prevalent example of Android Spyware that leverages COVID-19 as a way to deliver their malicious product has been reported by researchers at Lookout. This particular malware, called "corona live 1.1.", comes out of Libya and seems to mostly be targeting Libyan citizens. Like other examples listed below, it uses the same COVID-19 dashboard developed by Johns Hopkins University.

For malicious people, preying on collective fear and misinformation is...

Read More

Unchecked Smart Cities are Surveillance Cities. What We Need are Smart Enough Cities.

Locational Privacy
We can have beautiful cities without turning our cities into surveillance cities.

Cities across the U.S. are forcing operators of shared bikes and scooters to use dangerous and privacy invasive APIs developed by the Los Angeles Department of Transportation. These APIs—collectively called the “mobility data specification,” or MDS—require that operators share granular location data on every trip taken. The location data that cities are demanding is incredibly sensitive and...

Read More

Tattoo Recognition Score Card: How Institutions Handled Unethical Biometric Surveillance Dataset

In response to an EFF campaign started last year, roughly a third  of institutions that we believe requested problematic and exploitive data as part of a government automated tattoo recognition challenge deleted the data or reported that they had never received or used it.

EFF has long been concerned with the many problems associated with efforts to use automated tattoo recognition, a form of biometric surveillance similar to face recognition that can use your body art to reveal...

Read More

Victory: Android 11 Rolls out Improved Certificate Warnings


Now that HTTPS encrypts over 80% of web connections, powerful actors are targeting root certificate stores to compromise our security and surveil us. In the past year alone, that’s included a “market research” company secretly owned by Facebook and the government of Kazakhstan.

Forcing users to install a root certificate enables the certificate owner to decrypt almost all their Internet traffic. This capability is allowed primarily for enterprise network monitoring, and is...

Read More

Tech Lobbyists Are Pushing Bad Privacy Bills. Washington State Can, and Must, Do Better.

A data privacy bill in Washington State has gained momentum. The bill, 2SSB 6281 (also known as the Washington Privacy Act, or WPA), has received widespread support from big tech companies. It’s no wonder they like it because, as currently written, the WPA would be a weak, token effort at reining in corporations’ rampant misuse of personal data.

The WPA didn’t come from nowhere, and it didn’t come alone. A number of industry-friendly groups have...

Read More
Close tooltip