Events

Filter by:

Limit to events where the first date of the event:
Date range
Limit to events where the first date of the event:
Limit to events where the title matches:
Limit to events where the type is one or more of:
Limit to events tagged with one or more of:
Limit to events where the audience is one or more of:

Chelsea Komlo, HashiCorp

​Privacy Enhancing Technology communities rely on the research community for help designing and validating protocols, finding potential attack vectors, and applying new technological innovations to existing protocols. However, while the research community has made significant progress studying projects such as Tor, the number of research outcomes that have actually been incorporated into privacy enhancing technologies such as The Tor Project is lower than the number of feasible and useful research outcomes. 

Matthew Finkel, The Tor Project

There are hundreds of millions of new "smart" mobile device users every year, but the mobile ecosystem and infrastructure are designed and built for optimizing convenience, not protecting the privacy of the user. From a design flaw in the Internet Protocol to an abundence of physical sensors, a mobile device may tell a third-party more information than the user intended or wanted. 

Tuesday, July 31, 2018 11:00 am - 11:00 am EDT (GMT -04:00)

CrySP Speaker Series on Privacy - Finding Very Damaging Needles in Very Large Haystacks

Vern Paxson, University of California, Berkeley / Corelight, Inc. / International Computer Science Institute

Many of the most costly security compromises that enterprises suffer manifest as tiny trickles of behavior hidden within oceans of other site activity. This talk will examine the problem of developing robust detectors for particular forms of such activity. The process is in some ways a dual to that of adversaries who seek to design algorithms to identify users who employ particular approaches for keeping their network activity private.

Nolen Scaife, PhD candidate
Florida Institute for Cybersecurity, University of Florida

Credit, debit, and prepaid cards have dominated the payment landscape for decades, empowering the economy. Unfortunately, these legacy systems were not designed for today's adversarial environment, and deployment of new technologies is slow, expensive, and difficult to adopt. 

Monday, May 13, 2019 2:30 pm - 2:30 pm EDT (GMT -04:00)

CrySP Speaker Series on Privacy: Sarah Roberts, UCLA

Doing the Internet's Dirty Work: Commercial Content Moderators as Social Media's Gatekeepers

Faced with mounting pressures and repeated, very public crises, social media firms have taken a new tack since 2017: to respond to criticism of all kinds and from numerous quarters (regulators, civil society advocates, journalists, academics and others) by acknowledging their long-obfuscated human gatekeeping workforce of commercial content moderators.