Events

Filter by:

Limit to events where the first date of the event:
Date range
Limit to events where the first date of the event:
Limit to events where the title matches:
Limit to events where the type is one or more of:
Limit to events tagged with one or more of:
Limit to events where the audience is one or more of:
Wednesday, June 8, 2022 6:30 pm - 8:00 pm EDT (GMT -04:00)

CPI Talk- Digital Disinformation and Democracy

In our next CPI Talk, our hosts Bessma Momani and Shelly Ghai Bajaj discuss how disinformation flows and spreads on direct messaging and private chat applications, why they are important digital spaces to study, and the broader political and social implications of disinformation.

Chelsea Komlo, HashiCorp

​Privacy Enhancing Technology communities rely on the research community for help designing and validating protocols, finding potential attack vectors, and applying new technological innovations to existing protocols. However, while the research community has made significant progress studying projects such as Tor, the number of research outcomes that have actually been incorporated into privacy enhancing technologies such as The Tor Project is lower than the number of feasible and useful research outcomes. 

Matthew Finkel, The Tor Project

There are hundreds of millions of new "smart" mobile device users every year, but the mobile ecosystem and infrastructure are designed and built for optimizing convenience, not protecting the privacy of the user. From a design flaw in the Internet Protocol to an abundence of physical sensors, a mobile device may tell a third-party more information than the user intended or wanted. 

Tuesday, July 31, 2018 11:00 am - 11:00 am EDT (GMT -04:00)

CrySP Speaker Series on Privacy - Finding Very Damaging Needles in Very Large Haystacks

Vern Paxson, University of California, Berkeley / Corelight, Inc. / International Computer Science Institute

Many of the most costly security compromises that enterprises suffer manifest as tiny trickles of behavior hidden within oceans of other site activity. This talk will examine the problem of developing robust detectors for particular forms of such activity. The process is in some ways a dual to that of adversaries who seek to design algorithms to identify users who employ particular approaches for keeping their network activity private.

Aiman Erbad, Qatar University

With the rapid increase of threats on the Internet, people are continuously seeking privacy and anonymity. Services such as Bitcoin and Tor were introduced to provide anonymity for online transactions and Web browsing. Due to its pseudonymity model, Bitcoin lacks retroactive operational security, which means historical pieces of information could be used to identify a certain user.

Tuesday, September 25, 2018 3:00 pm - 3:00 pm EDT (GMT -04:00)

Evaluating the Australian Government’s Legislative Response to the Encryption Debate

Adam Molnar, Deakin University

Abstract

The Australian Government released a proposed draft of legislation that would expand national security and law enforcement agencies’ access to encrypted communications on August 15, 2018. The draft, entitled the ‘Telecommunications and Other Legislation Amendment (Assistance and Access) Bill 2018’ follows after several months of consultations.

Monday, October 22, 2018 2:00 pm - 2:00 pm EDT (GMT -04:00)

Anonymization with Differential Privacy / Secure Data Structures with Intel SGX

Text Anonymization with Differential Privacy

Ben Weggenmann, SAP Security Research 

Huge amounts of textual data are processed every day using text mining and information retrieval techniques to assist us with analyzing, organizing and retrieving text documents. In many cases, it is desirable that the authors of such documents remain anonymous: They can reveal sensitive information about its authors, and critical news articles or customer feedback could cause retaliation or worsening business relations.
Friday, November 2, 2018 2:30 pm - 2:30 pm EDT (GMT -04:00)

CrySP Speaker Series on Privacy - Fantastically Bad Laws and Where to Find Them

Nate Cardozo, Electronic Frontier Foundation

Encryption is legal in the Five Eyes countries, thanks to our victory in what’s come to be known as the Crypto Wars of the 1990s. Computer security research is increasingly viewed as a boon rather than a scourge. But time is a circle and once again, law enforcement and policy makers around the world are calling for all that to change. In this presentation, I will discuss in brief the history of the first Crypto Wars, and the state of the law in 2018.