The joy of PETs: Guard dogs of the internet
Researcher helps people avoid leaving tracks in cyberspace with PETs — privacy enhancing technologies.
Researcher helps people avoid leaving tracks in cyberspace with PETs — privacy enhancing technologies.
By Christian Aagaard Communications and Public AffairsRecipes, travel directions, theories of the universe — the Internet has them in abundance.
Privacy, however, is in short supply.
That problem has held Ian Goldberg’s interest for years. As a graduate student at the University of California, Berkeley in 1995 — his Bachelor of Mathematics degree still fresh from the University of Waterloo — Goldberg and fellow student David Wagner poked a hole in the web’s leading web browser at the time.
They cracked Netscape Navigator’s secure sockets layer (SSL), which kept uninvited eyes off information that needed secure handling. Now an associate professor and University Research Chair at Waterloo’s David R. Cheriton School of Computer Science, Goldberg reminds people that they leave crumb trails on the Internet in the form of credit card numbers, shopping habits, communication patterns, and personal interests, and gives them tools to help them shield their online activities.
“A lot people just don’t know how much information about themselves is available online,” Goldberg says. “Data brokers collect all kinds of information on you, and more and more companies are buying profiles from them.
“Just as a lot of companies do credit checks, they can do this as well,” says Goldberg, an Early Researcher Award recipient. Goldberg also received the 2011 Outstanding Young Computer Science Researcher Award from the Canadian Association for Computer Science, and the Pioneer Award from the Electronic Frontier Foundation.
We have the technology
The tools that help people protect their personal information online are called privacy enhancing technologies, or PETs. Goldberg and his research group work on open-source PETs to increase privacy in the digital world, such as:
Score one for the good guys
Crooks already use malicious software — malware — to break into personal computers. They can steal information off these computers or use them to mask their own activities.
“The bad guys are already able to hide their actions by compromising other people's computers,” Goldberg says. “My goal is to give the good guys the tools to maintain their privacy when they go online.”
Open-sourcing means others can build on his work, and find parts that need improving. Goldberg isn’t bothered.
“That’s how science moves forward,” he says.
Waterloo welcomes emerging postdoctoral scholars to receive funding from Provost fellowship programs
From sustainable additive manufacturing and climate change to quantum molecular dynamics and human health, Waterloo researchers are leading future-focused researchers projects
The app is being deployed at Waterloo’s Campus Wellness and 30 clinics across Canada, making support more accessible and affordable
The University of Waterloo acknowledges that much of our work takes place on the traditional territory of the Neutral, Anishinaabeg, and Haudenosaunee peoples. Our main campus is situated on the Haldimand Tract, the land granted to the Six Nations that includes six miles on each side of the Grand River. Our active work toward reconciliation takes place across our campuses through research, learning, teaching, and community building, and is co-ordinated within the Office of Indigenous Relations.