Some thoughts on why research on creating synthetic user behavior is tractable even without large data sets.
Read more
Posts
A General Theory of Sidechannel Leakage
Jul 16, 2020
Some thoughts about modeling sidechannels as a 3-step attack and how that framing might help think about realistic defenses.
Read more
Speculative Vignette: Social Occupation
Jul 15, 2020
A little near-future sci-fi vignette centering around military influence operations.
Read more
The GDPR and Sensitive Data Inference
Feb 21, 2018
The GDPR outright bans the processing of several types of sensitive personal data except under special circumstances. What happens if a company reveals data that can be used to _infer_ these sensitive pieces of data? Is that also prohibited?
Read more
Political ADINT
Nov 05, 2017
A Washington Post opinion piece about the Russian political ads made me think about how false-flag social media advertising can complement politically-motivated ADINT operations to provide an easy path to surveillance.
Read more
Domain-Censor Collusion in Decoy Routing
Feb 10, 2017
I was just catching up on some academic reading by looking over CCS 2016 and found this paper, Game of Decoys: Optimal Decoy Routing Through Game Theory. It sparked an idea, that others have probably had, about what seems like an unaddressed possibility in the hypothetical world where Decoy Routing systems actually get implemented: does the censor have leverage to get domains to move to non-decoy routing Autonomous Systems (ASs)?
Read more
Casablanca: The Web of Trusted Updates
Mar 01, 2016
My encrypted messaging app, Signal, has made an update to its Android app and pushed it out. How do I know my phone is receiving the same update as everyone else, or that everyone else is even receiving an update? I could be getting a targeted malicious update that compromises my secure messaging, with Signal having been hacked or forced to sign the update by a governing authority! But it'll be okay, because I have Casablanca.
Read more