Year: 2019
-
Every move you make, I’ll be watching you: Privacy implications of the Apple U1 chip and ultra-wideband
By Colleen Josephson and Yan Shvartzshnaider The concerning trend of tracking of user’s location through their mobile phones has very serious privacy implications. For many of us, phones have become an integral part of our daily routine. We don’t leave our homes without and take them everywhere we go. It has become alarmingly easy for services…
-
2020 Workshop on Technology and Consumer Protection
Christo Wilson and I are pleased to announce that the Workshop on Technology and Consumer Protection (ConPro ’20) is returning for a fourth year, co-located with the IEEE Symposium on Security and Privacy in May 2020. As in past years, ConPro seeks a diverse range of technical research with implications for consumer protection. Past talks…
-
CITP Call for Visitors 2020-21
The Center for Information Technology Policy is an interdisciplinary research center at Princeton University that sits at the crossroads of engineering, the social sciences, law, and policy. CITP seeks applicants for various visiting positions each year. Visitors are expected to live in or near Princeton and to be in residence at CITP on a daily basis. They…
-
Enhancing the Security of Data Breach Notifications and Settlement Notices
[This post was jointly written by Ryan Amos, Mihir Kshirsagar, Ed Felten, and Arvind Narayanan.] We couldn’t help noticing that the recent Yahoo and Equifax data breach settlement notifications look a lot like phishing emails. The notifications make it hard for users to distinguish real settlement notifications from scams. For example, they direct users to…
-
Content Moderation for End-to-End Encrypted Messaging
Thursday evening, the Attorney General, the Acting Homeland Security Secretary, and top law enforcement officials from the U.K. and Australia sent an open letter to Mark Zuckerberg. The letter emphasizes the scourge of child abuse content online, and the officials call on Facebook to press pause on end-to-end encryption for its messaging platforms. The letter…
-
Watching You Watch: The Tracking Ecosystem of Over-the-Top TV Streaming Devices
By Hooman Mohajeri Moghaddam, Gunes Acar, Ben Burgess, Arunesh Mathur, Danny Y. Huang, Nick Feamster, Ed Felten, Prateek Mittal, and Arvind Narayanan By 2020 one third of US households are estimated to “cut the cord”, i.e., discontinue their multichannel TV subscriptions and switch to internet-connected streaming services. Over-the-Top (“OTT”) streaming devices such as Roku and…
-
Deconstructing Google’s excuses on tracking protection
By Jonathan Mayer and Arvind Narayanan. Blocking cookies is bad for privacy. That’s the new disingenuous argument from Google, trying to justify why Chrome is so far behind Safari and Firefox in offering privacy protections. As researchers who have spent over a decade studying web tracking and online advertising, we want to set the record…
-
Should we regulate the makers or users of insecure IoTs?
By Matheus V. X. Ferreira, Danny Yuxing Huang, Tithi Chattopadhyay, Nick Feamster, and S. Matthew Weinberg Recent years have seen a proliferation of “smart-home” or IoT devices, many of which are known to contain security vulnerabilities that have been exploited to launch high-profile attacks and disrupt Internet-wide services such as Twitter and Reddit. The sellers…
-
Is This An Ad? Help Us Identify Misleading Content On YouTube
by Michael Swart, Arunesh Mathur, and Marshini Chetty Ever watched a video on YouTube and wondered if the YouTuber was paid for endorsing a product? You are not alone. In fact, Senator Blumenthal of Connecticut recently called for the Federal Trade Commission (FTC) to look into deceptive practices where YouTubers do not disclose that they…
-
Conference on Social Protection by Artificial Intelligence: Decoding Human Rights in a Digital Age
Christiaan van Veen[1] and Ben Zevenbergen [2] Governments around the world are increasingly using Artificial Intelligence and other digital technologies to streamline and transform their social protection and welfare systems. This move is usually presented as a means by which to provide an improved and enhanced system and to be better able to assist individuals…