User Experience with Mobile Security and Privacy Mechanisms ABSTRACT
Total Page:16
File Type:pdf, Size:1020Kb
Load more
Recommended publications
-
Digital Security in Context
Digital Security in Context: Learning how human rights defenders adopt digital security practices Becky Kazansky Digital Security in Context: Learning how human rights defenders adopt digital security practices Table of Contents Setting the Scene......................................................................................................................................................4 1 Background and Rationale..........................................................................................................................4 2 Situating Tactical Tech's Practitioner Research........................................................................................7 3 Configuring the User: Perspectives from Academic Research................................................................9 4 Prioritising Context and Practice in Practitioner Work..........................................................................12 5 Practice-based Research Foundations.....................................................................................................14 Research Approach and Methods......................................................................................................................17 1 Research Implementation......................................................................................................................... 17 2 Sample......................................................................................................................................................... 19 3 Operationalising -
New Trends in Social Media
ISBN 978-9934-8644-7-6 1 NEW TRENDS IN SOCIAL MEDIA PREPARED BY THE NATO STRATEGIC COMMUNICATIONS CENTRE OF EXCELLENCE 1 ISBN 978-9934-8644-7-6 NEW TRENDS IN SOCIAL MEDIA Project director: Beata Bialy, Sanda Svetoka Text Editor: Juris Beņķis Production & Copy Editor:Linda Curika The NATO StratCom Centre of Excellence, based in Latvia, is a multinational, cross-sector organization which provides comprehensive analyses, advice and practical support to the alliance and allied nations. This report is a product of the NATO Strategic Communications Centre of Excellence (NATO StratCom COE). It is produced for NATO, NATO member countries, NATO partners, related private and public institutions and related individuals. It does not represent the opinions or policies of NATO. © All rights reserved by the NATO StratCom COE. Reports may not be copied, reproduced, distributed or publicly displayed without reference to the NATO StratCom COE. Cover photo: Alex Ingram Flickr creative commons licence Riga, December 2016 NATO Strategic Communications Centre of Excellence Riga, Kalnciema iela 11b, Latvia LV1048 www.stratcomcoe.org Ph.: 0037167335463 [email protected] 2 OUR LATEST PUBLICATIONS 3 TABLE OF CONTENTS FOREWORD ………...................................................................................................................……………………..4 INTRODUCTION………………………………………..................................................................…..……6 SOCIAL MEDIA TRENDS……………………….........................................................................................…………7 -
A Worldwide Survey of Encryption Products
A Worldwide Survey of Encryption Products Bruce Schneier Kathleen Seidel Saranya Vijayakumar Berkman Center for Internet Independent Researcher Harvard College and Society [email protected] [email protected] Harvard University [email protected] February 11, 2016 Version 1.0 Introduction Data security is a worldwide problem, and there is a wide world of encryption solutions available to help solve this problem. Most of these products are developed and sold by for-profit entities, although some are created as free open-source projects. They are available, either for sale or free download, all over the world. In 1999, a group of researchers from George Washington University attempted to survey the worldwide market for encryption products [HB+99]. The impetus for their survey was the ongoing debate about US encryption export controls. By collecting information about 805 hardware and software encryption products from 35 countries outside the US, the researchers showed that restricting the export of encryption products did nothing to reduce their availability around the world, while at the same time putting US companies at a competitive disadvantage in the information security market. Seventeen years later, we have tried to replicate this survey. Findings We collected information on as many encryption products as we could find anywhere in the world. This is a summary of our findings: We have identified 865 hardware or software products incorporating encryption from 55 different countries. This includes 546 encryption products from outside the US, representing two-thirds of the total. Table 1 summarizes the number of products from each country. The most common non-US country for encryption products is Germany, with 112 products. -
End-To-End Encrypted Messaging Protocols: an Overview Kseniia Ermoshina, Francesca Musiani, Harry Halpin
End-to-End Encrypted Messaging Protocols: An Overview Kseniia Ermoshina, Francesca Musiani, Harry Halpin To cite this version: Kseniia Ermoshina, Francesca Musiani, Harry Halpin. End-to-End Encrypted Messaging Protocols: An Overview. Third International Conference, INSCI 2016 - Internet Science, Sep 2016, Florence, Italy. pp.244 - 254, 10.1007/978-3-319-45982-0_22. hal-01426845 HAL Id: hal-01426845 https://hal.inria.fr/hal-01426845 Submitted on 5 Jan 2017 HAL is a multi-disciplinary open access L’archive ouverte pluridisciplinaire HAL, est archive for the deposit and dissemination of sci- destinée au dépôt et à la diffusion de documents entific research documents, whether they are pub- scientifiques de niveau recherche, publiés ou non, lished or not. The documents may come from émanant des établissements d’enseignement et de teaching and research institutions in France or recherche français ou étrangers, des laboratoires abroad, or from public or private research centers. publics ou privés. End-to-end Encrypted Messaging Protocols: An Overview Ksenia Ermoshina1, Francesca Musiani2, and Harry Halpin3 1 i3-CSI, MINES ParisTech, France [email protected] 2 ISCC, CNRS/Paris-Sorbonne/UPMC, France [email protected] 3INRIA, France [email protected] Abstract.This paper aims at giving an overview of the different core proto- cols used for decentralized chat and email-oriented services. This work is part of a survey of 30 projects focused on decentralized and/or end-to-end encrypted internet messaging, currently conducted in the early stages of the H2020 CAPS project NEXTLEAP. Keywords: Decentralization; end-to-end encryption; messaging; protocols; NEXTLEAP Exploratory/Survey Paper 1. -
Considerations for Mandating Open Interfaces Acknowledgements
December 2020 White Paper: Considerations for Mandating Open Interfaces Acknowledgements The report was developed by a small team led by Carl Gahnberg, following the strategic guidance of Robin Wilton, Olaf Kolkman and Steve Olshansky. Simon Phipps and Javier Ruiz, consultants for the Internet Society, served as lead authors of the report, providing invaluable expertise and vision. We would also like to thank the group of external experts that provided important comments and suggestions in reviews of earlier drafts, including: Amelia Andersdotter; John Bergmayer; Ian Brown; Cory Doctorow; Gurshabad Grover; Ali Lange; Mark Nottingham; Thomas Reibe; and Chris Riley. Special thanks to Andrew Sullivan, Joseph Lorenzo Hall, and Katie Watson Jordan for review and comments that helped improve the final version of the report. internetsociety.org | CC BY-NC-SA 4.0 Considerations for Mandating Open Interfaces | 2 Table of contents Introduction ...........................................................................................................................................................................................................4 Background .............................................................................................................................................................................................................6 Motivations for mandating open interfaces ................................................................................................................................................6 Enhancing