EFF

Latest

  • Who Killed TiVoToGo?

    by 
    Ben Drawbaugh
    Ben Drawbaugh
    01.14.2007

    It is nearly impossible to be a HDTV fan and to boycott DRM, because DRM is embedded in almost every type of HD programming. As with all DRM it is very complicated and almost impossible to keep track of all the limitations and restrictions. Every time we turn around we learn of another form and the only HDTV without restrictions is OTA HD, which was almost locked down via the Broadcast Flag. The latest feature to fall victim to DRM is TiVoToGo on the Series3 and right around the corner are some of our favorite Vista Media Center features, like rolling your own HD DVR. While none of this is a surprise to most of us you may not know the whole story and the Electric Frontier Foundation has done a great job of laying it all out and even providing everyone with a list of things that you can do to make a difference.[Via TiVoCommunity.com]

  • Asteroid a Hoax?

    by 
    Dan Lurie
    Dan Lurie
    06.10.2006

    Anne Onymus (get it? hehe!) over at LowEndMac is hypothesizing that the entire Asteroid fiasco was all part of an evil Apple plan to quash rumor sites. The assumption is based on the fact that two years after the Asteroid leak, Apple still hasn't released a GarageBand breakout box. If Apple had actually put work into Asteroid, surely Jobs wouldn't be so petty as to shut down the entire project because of a leak? (Jobs is rumored to have pulled some product announcements at the last minute during MWSF2006 as a way of punishing the development teams for the leak.) Despite the fact that Apple's competitors then knew what was brewing in Cupertino, the company still had a good head start, and could surely have pushed the product to market well before anyone else. Anne postulates that Apple never had the slightest intention to release Asteroid, and created the product for the precise purpose of the leak. After the leak, Apple expected it would be a piece of cake to squash the rumor mill with a flood of law suits requesting the names of the mole. Instead, the EFF took over the case of the rumor sites, and a federal district court recently ruled that online journalists have all the rights and protections as the traditional media, effectively destroying Apple's claims.While an interesting idea, I think LowEndMac might have the paranoia meter set a bit high this week. Apple may be secretive, but until I see evidence to the contrary, I'm sticking with Occam's razor.

  • How to get HDTV on your Linux PC

    by 
    Richard Lawler
    Richard Lawler
    12.27.2005

    Because Windows Media Center owners shouldn't have all the fun. The instructions are a little complicated but dude, if you're running Linux that should be par for the course.  The EFF recommends you build your own HD PVR while you still can, since for the moment at least the "Broadcast flag" legislation is DOA.Any HDBeat readers  currently getting HDTV on their non-Windows/Mac box?[Via digg]

  • EFF says buy a DTV tuner card NOW!

    by 
    Kevin C. Tofel
    Kevin C. Tofel
    12.27.2005

    Fred von Lohmann from the Electronic Frontier Foundation suggests a proactive approach to counteract the digital lockdown of devices in the future: buy a DTV tuner card now. Fred wants you to spend your money now, just in case the dreaded HDTV broadcast flag is raised up on the ugly flagpole again.We're all for snapping up a DTV tuner card; heck, we just did that last month for our WMCE machine. Is a proactive purchase really going to help us if the copyright standards are reviewed and implemented? Fred, we're not sure if you're a grandfather or not, but we don't think an early purchase will grandfather us under a broadcast flag ruling. If you're in the market for a DTV tuner, go for it, but trying to purchase technology to circumvent the future usually don't work. That's why we recently passed on a flux-capacitor purchase; it doesn't matter, we didn't have the DeLorean to go with it.

  • Privacy Watch: Tor

    by 
    Jay Savage
    Jay Savage
    06.22.2005

    With the nonsense on Capitol Hill this week, and discussion of DMCA revision and funding ramping up, I thought it would be a good time to talk about Tor, the award-winning privacy protocol and software from the EFF. Unlike other anonymizers that work by encrypting or proxying particular services and protocols, Tor's TLS-over-onion routing scheme works by re-routing all TCP traffic through a complex network of Tor nodes. Packets, including routing information, are encrypted between each node and each node has access to only very limited information about the next hop. Furthermore, packets pass through a random number of nodes (the more the merrier) and not all packets from a single session need follow the same route. This makes it very, very difficult (it's tempting to say impossible, but that's probably not quite true) to trace the ultimate origin or destination of any packet on the network unless the contents of the packet divulge revealing information.There are drawbacks, of course. Although the onion routing algorithms are good, onion routing certainly has the potential for higher latency that traditional RIP and OSPF routing. Tor is also not an end-to-end solution. If the ultimate destination of a packet is a machine that doesn't support Tor, the packet is in the open from the time it leaves the Tor exit point and using traditional end-to-end encrytption on top of Tor is advisable.The gains are significant, though, and as the protocol becomes more widely adopted the advantages will become even more pronounced. Aside from privacy protection, Tor's "next hop" TLS encryption virtually eliminates the potential for traditional "man in the middle" attacks within the network because such attacks rely on knowing the origin and destination of packets, and capturing a usable data stream. Tor, particularly if combined with end-to-end encryption, also makes encrypted data less susceptible to brute force attacks; it is much more difficult to capture a complete data stream, and data is encrypted multiple times with short-lived session keys.Even though Tor is still in beta, it's well worth a download (The Windows version already won a PCWorld "Best Products of 2005, Security" Award). Take a look, and if you have a public IP, think about setting up a server.