conspicuouschatter.wordpress.com
How to track mobile IP addresses of specific users (PETS14 in real time) | Conspicuous Chatter
https://conspicuouschatter.wordpress.com/2014/07/16/how-to-track-mobile-ip-addresses-of-specific-users-pets14-in-real-time
Traffic analysis, anonymous and covert communications, and other magic. How to track mobile IP addresses of specific users (PETS14 in real time). The first session of PETS2014 deal with privacy for mobile devices. ). The paper “ Exploiting Delay Patterns for User IPs Identification in Cellular Networks. If the adversary can observe a large fraction of the network this may be easy. The paper shows that even a small entity — like a single user — may track a specific user’s IP. Posted by George Danezis.
conspicuouschatter.wordpress.com
Should Group Key Agreement be Symmetric and Contributory? | Conspicuous Chatter
https://conspicuouschatter.wordpress.com/2014/06/28/should-group-key-agreement-be-symmetric-and-contributory
Traffic analysis, anonymous and covert communications, and other magic. Should Group Key Agreement be Symmetric and Contributory? I have a rather enlightening chat with Yvo Desmedt. After the Cambridge Security Protocol. Yvo’s classic Eurocrypt paper [ BD94. Is the basis of GOTR [ LVH13. Which he thinks is superior to [ BD94. Now, the idea that schemes must be “contributory” (ie. no participant is special in determining the key — no one can force the key to be some specific value) e...8220; Then, they ju...
conspicuouschatter.wordpress.com
A brief commentary on the “Data Retention and Investigatory Powers Bill” (2014) | Conspicuous Chatter
https://conspicuouschatter.wordpress.com/2014/07/15/a-brief-commentary-on-the-data-retention-and-investigatory-powers-bill-2014
Traffic analysis, anonymous and covert communications, and other magic. A brief commentary on the Data Retention and Investigatory Powers Bill (2014). After it was deemed illiberal at a European level). It is meant to complete its journey through parliament this week, making an analysis all the more pressing. For a blast from the past, a quick reminder of how communications data is defined in RIPA. 8212; which this bill piggy-backs on:. 4) In this Chapter communications data means any of the following.
conspicuouschatter.wordpress.com
Technical Requirements for Processing PII: A First Draft | Conspicuous Chatter
https://conspicuouschatter.wordpress.com/2014/09/26/technical-requirements-for-processing-pii-a-first-draft
Traffic analysis, anonymous and covert communications, and other magic. Technical Requirements for Processing PII: A First Draft. I am today attending the first Internet Privacy Engineering Network (IPEN). Where the issue of translating Data Protection principles into requirements has been raised a number of times. While this exercise needs to be repeated for each given service or application, it reminded me that I had drafted a number of generic Technical Requirements for Processing PII. Email check fai...
conspicuouschatter.wordpress.com
Geo-indistinguishability for location traces (PETS2014 in real time) | Conspicuous Chatter
https://conspicuouschatter.wordpress.com/2014/07/16/geo-indistinguishability-for-location-traces-pets2014-in-real-time
Traffic analysis, anonymous and covert communications, and other magic. Geo-indistinguishability for location traces (PETS2014 in real time). The paper “ A Predictive Differentially-Private Mechanism for Mobility Traces. 8221; looks at sanitizing mobility traces within the paradigm of differential privacy. The strawman mechanism can be strengthened by doing a private test for the accuracy of the prediction, which in itself consumes some amount of the privacy budget. This results in information not le...
conspicuouschatter.wordpress.com
Introducing the expanded UCL Information Security Group | Conspicuous Chatter
https://conspicuouschatter.wordpress.com/2014/11/28/introducing-the-expanded-ucl-information-security-group
Traffic analysis, anonymous and covert communications, and other magic. Introducing the expanded UCL Information Security Group. It takes quite a bit of institutional commitment and vision to build a strong computer security group. For this reason I am delighted to share here that UCL computer science has in 2014 hired three amazing new faculty members into the Information Security group, bringing the total to nine. Here is the line-up of the UCL Information Security group. Prof M. Angela Sasse. Is a sym...
conspicuouschatter.wordpress.com
Security Engineering: What Works? | Conspicuous Chatter
https://conspicuouschatter.wordpress.com/2014/12/18/security-engineering-what-works
Traffic analysis, anonymous and covert communications, and other magic. Security Engineering: What Works? Last week I had the opportunity to attend a joint US National Academy of Sciences and UK Royal Society event on cyber-security in Washington DC. One of the speakers, a true expert that I respect very much, described how they envision building (more) secure systems, and others in the audience provided their opinion ( Chatham House Rule. How do they compare with each other? Wagner, S., Jürjens, J&#...
conspicuouschatter.wordpress.com
Piercing through encryption with traffic analysis (PETS2014 in real time) | Conspicuous Chatter
https://conspicuouschatter.wordpress.com/2014/07/16/piercing-through-encryption-with-traffic-analysis-pets2014-in-real-time
Traffic analysis, anonymous and covert communications, and other magic. Piercing through encryption with traffic analysis (PETS2014 in real time). The paper “ I Know Why You Went to the Clinic: Risks and Realization of HTTPS Traffic Analysis. 8221; is revisiting the vulnerability of HTTPS encryption to traffic analysis. Posted by George Danezis. Filed in Other magic. Leave a Reply Cancel reply. Enter your comment here. Fill in your details below or click an icon to log in:. Address never made public).