Hacker News new | past | comments | ask | show | jobs | submit | from login
Secure Human-Centered Wireless Sensing: inference attacks and defenses (petsymposium.org)
1 point by transpute 5 months ago | past
VPN shadow port attack [pdf] (petsymposium.org)
4 points by hodgepodge 6 months ago | past
Attacking Connection Tracking Frameworks as used by VPNs [pdf] (petsymposium.org)
1 point by skilled 6 months ago | past | 1 comment
Attacking Connection Tracking Frameworks as Used by Virtual Private Networks (petsymposium.org)
1 point by vitplister 6 months ago | past
Bleeding Wall: A Hematologic Examination on the Great Firewall (petsymposium.org)
1 point by gslin 9 months ago | past
Bleeding Wall: A Hematologic Examination on the Great Firewall [pdf] (petsymposium.org)
5 points by partyboy 10 months ago | past | 2 comments
Understanding Person Identification Through Gait [pdf] (petsymposium.org)
2 points by jruohonen on Nov 1, 2023 | past | 1 comment
Dolphin: A Cellular Voice Based Internet Shutdown Resistance System (petsymposium.org)
2 points by simonpure on July 31, 2023 | past | 1 comment
No Privacy Among Spies (petsymposium.org)
1 point by favourable on March 20, 2023 | past
Eliminating Stop-Points in the Installation and Use of Anonymity Systems [pdf] (petsymposium.org)
1 point by greggarious on Dec 9, 2022 | past
Are iPhones Better for Privacy? Comparative Study of iOS and Android Apps [pdf] (petsymposium.org)
2 points by feross on March 20, 2022 | past | 1 comment
A Study of Mac Address Randomization in Mobile Devices and When It Succeeds [pdf] (petsymposium.org)
2 points by nceqs3 on Dec 11, 2021 | past
Harm Reduction for Cryptographic Backdoors [pdf] (petsymposium.org)
3 points by ComodoHacker on July 29, 2021 | past
Potentially Intrusive Practices in the Browser: A User-Centered Perspective [pdf] (petsymposium.org)
3 points by giuliomagnifico on July 21, 2021 | past
The Cname of the Game: Large-Scale Analysis of DNS-Based Tracking Evasion [pdf] (petsymposium.org)
2 points by uptown on July 6, 2021 | past
Privacy implications of the QUIC protocol [pdf] (petsymposium.org)
66 points by ivanblagdan on Jan 3, 2020 | past | 20 comments
Tracking Anonymized Bluetooth Devices [pdf] (petsymposium.org)
3 points by vuln on July 19, 2019 | past
Reducing Metadata Leakage from Encrypted Files and Communication with PURBs [pdf] (petsymposium.org)
2 points by octosphere on July 11, 2019 | past
4 Years of EU Cookie Law: Results and Lessons Learned [pdf] (petsymposium.org)
1 point by lainon on May 3, 2019 | past
Examining Children’s Online Privacy Protection Act compliance [pdf] (petsymposium.org)
25 points by optimusrex on April 16, 2018 | past | 7 comments
“Won’t Somebody Think of the Children?” Examining COPPA Compliance at Scale [pdf] (petsymposium.org)
3 points by eaguyhn on April 13, 2018 | past
Privacy Enhancing Technologies (petsymposium.org)
3 points by DyslexicAtheist on April 10, 2018 | past
Wiretapping End-To-End Encrypted VoIP Calls: Real-World Attacks on ZRTP [pdf] (petsymposium.org)
4 points by tony101 on Feb 28, 2018 | past | 1 comment
Crowdsourcing Mobile Apps’ Privacy Permission Settings [pdf] (petsymposium.org)
2 points by lainon on Oct 28, 2017 | past
Fingerprinting Keywords in Search Queries Over Tor [pdf] (petsymposium.org)
2 points by lainon on Sept 20, 2017 | past
A Usability Evaluation of Tor Launcher [pdf] (petsymposium.org)
1 point by lainon on Aug 27, 2017 | past
Using BGP to acquire bogus TLS certificates [pdf] (petsymposium.org)
4 points by fanf2 on July 26, 2017 | past
Using BGP to Acquire Bogus TLS Certificates [pdf] (petsymposium.org)
3 points by bracewel on July 21, 2017 | past
Tor-Powered Decentralized DNS for Tor Onion Services [pdf] (petsymposium.org)
2 points by lainon on April 22, 2017 | past
Nominations Open for Caspar Bowden Award for Outstanding Research in PETs (petsymposium.org)
1 point by rendx on Jan 16, 2017 | past

Consider applying for YC's Spring batch! Applications are open till Feb 11.

Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: