An interesting story of uncovering an anonymous Internet social media account. Powered by WPeMatico
Category: anonymity
Auto Added by WPeMatico
Over the past few months, I have been watching my blog comments decline in civility. I blame it in part on the contentious US election and its aftermath. It’s also a consequence of not requiring visitors to register in order to post comments, and of our tolerance for impassioned conversation. Whatever the causes, I’m tired … Read More “Commenting Policy for This Blog” »
Interesting research: “De-anonymizing Web Browsing Data with Social Networks“: Abstract: Can online trackers and network adversaries de-anonymize web browsing data readily available to them? We show — theoretically, via simulation, and through experiments on real user data — that de-identified web browsing histories can be linked to social media profiles using only publicly available data. … Read More “De-Anonymizing Browser History Using Social-Network Data” »
Good article debunking the myth that requiring people to use their real names on the Internet makes them behave better. Powered by WPeMatico
Google’s new ways to violate your privacy and — more importantly — how to opt out. Powered by WPeMatico
In this article, detailing the Australian and then worldwide investigation of a particularly heinous child-abuse ring, there are a lot of details of the pedophile security practices and the police investigative techniques. The abusers had a detailed manual on how to scrub metadata and avoid detection, but not everyone was perfect. The police used information … Read More “Interesting Internet-Based Investigative Techniques” »
It’s a common fraud on sites like eBay: buyers falsely claim that they never received a purchased item in the mail. Here’s a paper on defending against this fraud through basic psychological security measures. It’s preliminary research, but probably worth experimental research. We have tested a collection of possible user-interface enhancements aimed at reducing liar … Read More “Defending Against Liar Buyer Fraud” »
Those of you unfamiliar with hacker culture might need an explanation of “doxing.” The word refers to the practice of publishing personal information about people without their consent. Usually it’s things like an address and phone number, but it can also be credit card details, medical information, private e-mails — pretty much anything an assailant … Read More “Doxing as an Attack” »