On 13 March 2025, we filed a complaint against the UK government challenging their use of dangerous, disproportionate and ...
We fight for a world where technology will empower and enable us, not exploit our data for profit and power. This means providing people with ways to take concrete action to protect themselves or ...
Just want to get started? Scroll down to view the list of guides! Imagine an ordinary day online: in the morning you check your e-mail and scroll through your favourite sites to learn about the latest ...
Our data reveals a lot of information about us. From our data, intelligence is gleaned about us - our habits, our health and finances, our desires and hopes - some of ...
The UK government has used its surveillance to issue a Technical Capability notice to Apple to hand over encrypted iCloud data, threatening the privacy and security of users all over the world. We are ...
A growing number of governments around the world are embracing hacking to facilitate their surveillance activities. But many deploy this capability in secret and without a clear basis in law.In the ...
This guide was designed for our partners across the world who want to see strong data protection laws in their countries. We identify some key points that they can use in their advocacy. This version ...
Mahdis Keshavarz is a leading media and communications specialist, and an accomplished advocate of groundbreaking issues. She is an empowering and dynamic voice for the Middle Eastern community. She ...
On February 21st, Apple disabled their ‘advanced data protection’ service for UK customers. That means no-one in Great Britain can now enable a powerful security safeguard that people who use Apple ...
Ioannis oversees PI's legal coordination and leads our work against system exploitation, government hacking and corporate social media intelligence. He is also responsible for some of our litigation ...
Companies change harmful business models that rely on our personal data ...
The use of a technology or system to deliver public functions can only ever be legitimate if it is “legal”, in the sense of falling under an appropriate legal framework that authorises such technology ...
一些您可能无法访问的结果已被隐去。
显示无法访问的结果