Borders in Cyberspace
As part of the Cybersecurity and International Affairs Workshops by the Cybersecurity and Privacy Institute and the Balsillie School of International Affairs
As part of the Cybersecurity and International Affairs Workshops by the Cybersecurity and Privacy Institute and the Balsillie School of International Affairs
N. Asokan, Department of Computer Science
Aalto University, Finland
Nolen Scaife, PhD candidate
Florida Institute for Cybersecurity, University of Florida
Credit, debit, and prepaid cards have dominated the payment landscape for decades, empowering the economy. Unfortunately, these legacy systems were not designed for today's adversarial environment, and deployment of new technologies is slow, expensive, and difficult to adopt.
Vitalik Buterin
Creator of Ethereum, Cofounder of Bitcoin Magazine
Faced with mounting pressures and repeated, very public crises, social media firms have taken a new tack since 2017: to respond to criticism of all kinds and from numerous quarters (regulators, civil society advocates, journalists, academics and others) by acknowledging their long-obfuscated human gatekeeping workforce of commercial content moderators.
Media, government, and industry commonly frame Security and Privacy as diametrically opposed: protecting one requires sacrificing the other.
The first CrySP Speaker Series on Privacy talk for the term will
be Tue Oct 6, 1:30 pm Eastern, at an online link TBA.
Taking on Big Tech: New Paradigms for New Possibilities
The UXperience | Think Privacy Design Jam will bring together Jammers to create a Privacy-Conscious Design Solution that brings people together. Think Privacy will deliver five days of pre-recorded and live content with four days of team action. Think Privacy will harness the power of experts to guide Jammers in developing a privacy-conscious design toolset. Participants can register as Jammers in teams of five to participate in the design challenge or join individually as Guests to partake in the talks and speakers’ Q & A sessions.
Abstract: Threshold signing