Skip to main content
Back to content
Default Profile Picture

Bennett Cyphers

A new law could change the U.S. approach to cross-border access to data — for better and worse

5 Jan 2018

The U.S. could help improve cross-border access to data, but not without ensuring there are sufficient protections for human rights.

Post
A new law could change the U.S. approach to cross-border access to data — for better and worse
5 Jan 2018
A new law could change the U.S. approach to cross-border access to data — for better and worse

Differential privacy, part 3: Extraordinary claims require extraordinary scrutiny

30 Nov 2017

Companies that use differential privacy have greater responsibility to be transparent about what they can (or cannot) do to protect our data.

Post
Differential privacy, part 3: Extraordinary claims require extraordinary scrutiny
30 Nov 2017
Differential privacy, part 3: Extraordinary claims require extraordinary scrutiny
||

Differential privacy, part 2: It’s complicated

15 Nov 2017

For at-risk users, privacy is vital for safety and the exercise of human rights. In part two of our series on differential privacy, we take a close look at the complexities of implementing the approach.

Post
Differential privacy, part 2: It’s complicated
15 Nov 2017
Differential privacy, part 2: It’s complicated
|

Understanding differential privacy and why it matters for digital rights

25 Oct 2017

For at-risk users, privacy is vital for safety and the exercise of human rights. Our analysis examines a promising approach to protecting privacy, and how it can be used responsibly.

Post
Understanding differential privacy and why it matters for digital rights
25 Oct 2017
Understanding differential privacy and why it matters for digital rights
||

“Five Eyes” governments respond to coalition demands to stop undermining encryption

18 Oct 2017

Here’s a status update on the Five Eyes governments’ positions on encryption.

Post
“Five Eyes” governments respond to coalition demands to stop undermining encryption
18 Oct 2017
“Five Eyes” governments respond to coalition demands to stop undermining encryption

Our fall cheat sheet for the U.S. Congress

10 Oct 2017

Here’s how the U.S. should proceed on “cyber” to keep the internet secure.

Post
Our fall cheat sheet for the U.S. Congress
10 Oct 2017
Our fall cheat sheet for the U.S. Congress