It’s very exciting to have a public face to the thoughts around how to enable effective private access to data. Research Announcement The basic hypothesis here is that there’s a high-leverage opportunity to attract thought around scaling the range of anonymous database or data transfer techniques to reach something with better properties that the systems… Continue reading Private Retrieval
What's Left for private Messaging
I had the privilege to address the annual Chaos Communication Congress (36C3) in Leipzig last week about the state and remaining issues in private communications. The recording of the video has been made available by the CCC, and I have also posted the slides. The TL;DR for me is that many of the trade-offs are… Continue reading What's Left for private Messaging
NextGen Korea Scholars
I had the incredible opportunity to spend the end of last week in Washington DC with the CSIS NextGen Scholars program meeting the US policy makers who define the US policy towards the DPRK. It was fascinating to see the process has been put in place for weighing the different factors that go into these… Continue reading NextGen Korea Scholars
Ethics of Censorship Measurement
I gave a talk this past summer at DEFCON on the ethical quandary that continues to play a role in the academic discussion of network censorship measurement. Over the course of my phd studies, there was a significant arc of time where the community yielded to caution as the issues around ethics were better understood.… Continue reading Ethics of Censorship Measurement
One of the most interesting lines of inquiry within the Censored Planet project at the University of Michigan is trying to pull apart the different actors involved in Internet censorship. One of the interesting quirks is that a significant factor in why content might not be available to users is that the web publisher themselves… Continue reading Corporate Censorship
Excited to be included in the 2018 class of CSIS NextGen Scholars.
Quite exciting to see another step in remote measurement systems at USENIX Security in August. This particular piece is on how to recover DPI policies at scale.
Open Letter to the Cuba Internet Task Force
The following is a response to an invitation to participate in the recently formed Cuba Internet Task Force. Task Force Representatives: I will not be joining the Cuba Internet Task Force, or Subcommittees, because I believe the harm done by the existence of these committees outweighs any potential benefit of the recommendations that can come… Continue reading Open Letter to the Cuba Internet Task Force
Messaging Threat models
I talked yesterday at Bornhack about the current state of secure messaging and the different primitives and threats that groups are working to address. The talk is on youtube. The slides are on this site, as are the directions for dogfooding the talek system.
Initial Measurements of the Cuban Street Network
Internet access in Cuba is severely constrained, due to limited availability, slow speeds, and high cost. Within this isolated environment, technology enthusiasts have constructed a disconnected but vibrant IP network that has grown organically to reach tens of thousands of households across Havana. We present the first detailed characterization of this deployment, which is known… Continue reading Initial Measurements of the Cuban Street Network