Skip to main content
Back to content
Default Profile Picture

Bennett Cyphers

Access Now theme

A new law could change the U.S. approach to cross-border access to data — for better and worse

5 Jan 2018

The U.S. could help improve cross-border access to data, but not without ensuring there are sufficient protections for human rights.

Post
A new law could change the U.S. approach to cross-border access to data — for better and worse
5 Jan 2018
A new law could change the U.S. approach to cross-border access to data — for better and worse
Access Now theme

Differential privacy, part 3: Extraordinary claims require extraordinary scrutiny

30 Nov 2017

Companies that use differential privacy have greater responsibility to be transparent about what they can (or cannot) do to protect our data.

Post
Differential privacy, part 3: Extraordinary claims require extraordinary scrutiny
30 Nov 2017
Differential privacy, part 3: Extraordinary claims require extraordinary scrutiny
Access Now theme

Differential privacy, part 2: It’s complicated

15 Nov 2017

For at-risk users, privacy is vital for safety and the exercise of human rights. In part two of our series on differential privacy, we take a close look at the complexities of implementing the approach.

Post
Differential privacy, part 2: It’s complicated
15 Nov 2017
Differential privacy, part 2: It’s complicated
Access Now theme

Understanding differential privacy and why it matters for digital rights

25 Oct 2017

For at-risk users, privacy is vital for safety and the exercise of human rights. Our analysis examines a promising approach to protecting privacy, and how it can be used responsibly.

Post
Understanding differential privacy and why it matters for digital rights
25 Oct 2017
Understanding differential privacy and why it matters for digital rights
Access Now theme

“Five Eyes” governments respond to coalition demands to stop undermining encryption

18 Oct 2017

Here’s a status update on the Five Eyes governments’ positions on encryption.

Post
“Five Eyes” governments respond to coalition demands to stop undermining encryption
18 Oct 2017
“Five Eyes” governments respond to coalition demands to stop undermining encryption
Access Now theme

Our fall cheat sheet for the U.S. Congress

10 Oct 2017

Here’s how the U.S. should proceed on “cyber” to keep the internet secure.

Post
Our fall cheat sheet for the U.S. Congress
10 Oct 2017
Our fall cheat sheet for the U.S. Congress
Privacy Overview

This website uses strictly necessary cookies for functionality, and asks if you’d like to opt-in to anonymous analytics collection. The anonymous analytic cookies are stored in your browser and perform functions such as recognising you when you return to our website and helping our team to understand which sections of the website you utilise the most. We use this information to improve our website layout, content, and donations practices.

Strictly Necessary

Strictly necessary cookies should be enabled at all times. These cookies are used only for fraud prevention, session integrity, and to save your cookie preferences.

Analytics

Access Now uses Matomo, an open-source, self-hosted analytics platform, to collect anonymous information such as the number of visitors to the site, what people's journey across our website looks like, and the most popular pages. The data collected is stored on our own, secure servers and never shared with third parties.