see also privacy on blockchain
Edward Snowden: How your cell phone spies on you, 24min:15 yt
Fat, Dumb, Happy & Under Surveillance: Bart Jacobs at TEDxRadboudU 2013 yt
Pavel Durov, Why Whatsapp will never be secure
Jason Castiglione, Dusko Pavlovic, Peter-Michael Seidel, Privacy protocols, arxiv/1904.05540
Security protocols enable secure communication over insecure channels. Privacy protocols enable private interactions over secure channels. Security protocols set up secure channels using cryptographic primitives. Privacy protocols set up private channels using secure channels. But just like some security protocols can be broken without breaking the underlying cryptography, some privacy protocols can be broken without breaking the underlying security. Such privacy attacks have been used to leverage e-commerce against targeted advertising from the outset; but their depth and scope became apparent only with the overwhelming advent of influence campaigns in politics. The blurred boundaries between privacy protocols and privacy attacks present a new challenge for protocol analysis. Covert channels turn out to be concealed not only below overt channels, but also above: subversions, and the level-below attacks are supplemented by sublimations and the level-above attacks.
Last revised on March 13, 2021 at 12:04:47. See the history of this page for a list of all contributions to it.