Investigating ad transparency mechanisms in social media: a case study of Facebook’s explanations

Investigating ad transparency mechanisms in social media: a case study of Facebook’s explanations Andreou et al., NDSS’18 Let me start out by saying that I think it’s good Facebook are making an effort to provide more transparency to advertising. It’s good that Twitter announced they will do something similar too. It’s a shame though that … Continue reading Investigating ad transparency mechanisms in social media: a case study of Facebook’s explanations

Apps, trackers, privacy, and regulators: a global study of the mobile tracking ecosystem

Apps, trackers, privacy, and regulators: a global study of the mobile tracking ecosystem Razaghpanah et al., NDSS’18 Sadly you probably won’t be surprised to learn that this study reveals user tracking is widespread within the mobile app (Android) ecosystem. The focus is on third-party services included in apps, identified by the network domains they try … Continue reading Apps, trackers, privacy, and regulators: a global study of the mobile tracking ecosystem

DStress: Efficient differentially private computations on distributed data

DStress: Efficient differentially private computations on distributed data Papadimitriou et al., EuroSys'17 Regulators would like to assess and manage the systemic risk in the banking system - for example, the likelihood that a few initial bankruptcies could cause a failure cascade. In theory, it would be possible to quantify the risk of such a cascading … Continue reading DStress: Efficient differentially private computations on distributed data

Trajectory recovery from Ash: User privacy is NOT preserved in aggregated mobility data

Trajectory recovery from Ash: User privacy is NOT preserved in aggregated mobility data Xu et al., WWW'17 Borrowing a little from Simon Wardley's marvellous Enterprise IT Adoption Cycle, here's roughly how my understanding progressed as I read through this paper: Huh? What? How? Nooooo, Oh No, Oh s*@\#! Xu et al. show us that even … Continue reading Trajectory recovery from Ash: User privacy is NOT preserved in aggregated mobility data

Semi-supervised knowledge transfer for deep learning from private training data

Semi-supervised knowledge transfer for deep learning from private training data Papernot et al., ICLR'17 How can you build deep learning models that are trained on sensitive data (e.g., concerning individuals), and be confident to deploy those models in the wild knowing that they won't leak any information about the individuals in the training set? As … Continue reading Semi-supervised knowledge transfer for deep learning from private training data

If you can’t beat them, join them: a usability approach to interdependent privacy in cloud apps

If you can't beat them, join them: a usability approach to interdependent privacy in cloud apps Harkous & Aberer, CODASPY '17 I'm quite used to thinking carefully about permissions before installing a Chrome browser extensions (they all seem to want permission to see absolutely everything - no thank you!). A similar issue comes up with … Continue reading If you can’t beat them, join them: a usability approach to interdependent privacy in cloud apps

Zerocash: Decentralized anonymous payments from Bitcoin

Zerocash: Decentralized anonymous payments from Bitcoin Ben-Sasson et al., 2014 Yesterday we saw that de-anonymising techniques can learn a lot about the true identities of participants in Bitcoin transactions. Ben-Sasson et al. point out that given this, Bitcoin could be considered significantly less private than traditional schemes: While users may employ many identities (or pseudonyms) … Continue reading Zerocash: Decentralized anonymous payments from Bitcoin

A fistful of Bitcoins: Characterizing payments among men with no names

A fistful of bitcoins: characterizing payments among men with no names Meiklejohn et al., USENIX ;login: 2013 This week we're going to be looking at the five papers from the ACM Queue Research for Practice selections on 'Cryptocurrencies, Blockchains, and Smart Contracts.' These papers are chosen by Arvind Narayanan and Andrew Miller, co-authors of the … Continue reading A fistful of Bitcoins: Characterizing payments among men with no names