Editors' Introduction

Total Page:16

File Type:pdf, Size:1020Kb

Editors' Introduction Proceedings on Privacy Enhancing Technologies ; 2021 (3):1–4 Aaron Johnson and Florian Kerschbaum Editors’ Introduction DOI 10.2478/popets-2021-0034 second round for a total of four reviews (in a few cases, submissions received fewer or more reviews). Many articles had an external review drawn from a It is our great pleasure to introduce Issue 3 of Vol- pool of junior experts nominated by the community1. ume 2021 of the Proceedings on Privacy Enhancing Further external experts were invited to review certain Technologies (PoPETs). PoPETs is a journal that pub- articles. All reviews were sent to the authors of papers lishes articles accepted to the annual Privacy Enhanc- that proceeded to the second round of review, and those ing Technologies Symposium (PETS). To contribute to authors were invited to provide a written rebuttal to the the free availability of scientific publications, PoPETs reviews. After the rebuttal period there was a discussion is published under the open-access Creative Commons among the reviewers, other members of the Editorial Attribution-NonCommercial-NoDerivs license. Board, and the Editors-in-Chief to reach a consensus PoPETS/PETS uses a hybrid conference-journal decision for each paper. One of the reviewers was then model, one that has since been adopted by many other selected to write a meta-review that summarized the conferences in the field. In this model, articles are pub- discussion and the justification for the decision. lished throughout the year at regular intervals, and the Articles submitted to this issue were reviewed by papers for the year are then presented at an annual con- the 94 members of the Editorial Board and 76 exter- ference. Reviewers can request revisions of submitted nal reviewers. The submitted articles, reviews, and dis- articles, which may then be revised and resubmitted in cussion were available to all members of the Editorial the same year. PoPETs publishes four issues per year. Board that did not have a conflict of interest with the By enabling resubmission across these issues, PoPETS authors of the article. To identify conflicts of interest, provides a high-quality peer-review process that enables the membership of the Editorial Board was published authors and reviewers to work together to produce and before submissions were opened, and authors were asked recognize significant scholarly contributions. to indicate members with whom any of the authors had The PoPETS double-blind peer-review process is a conflict. In addition, Editorial Board members were similar to other top-tier computer security publications. asked to list the authors and institutions with which The process includes initial review by the Editors-in- they have conflicts of interest. Finally, the Editors-in- Chief for rules compliance and in-scope content, writ- Chief also checked for missed conflicts. Editorial Board ten reviews by multiple independent reviewers, author members were welcome to submit articles, while the rebuttal, discussion among reviewers, and consensus de- Editors-in-Chief were precluded from doing so. cisions with disagreements resolved by the Editors-in- There were 124 submissions to this issue of PoPETs. Chief. The output of the review process is a set of re- 13 of the 124 submissions had been invited during a pre- views, a meta-review summarizing the reviewers’ opin- vious issue to resubmit after major revision, and these ions after discussion, and one of the following decisions: were reassigned to the Editorial Board members that Accept, Accept with Minor Revisions, Major Revisions, had reviewed the previous version. Additionally, 17 ar- Reject and Resubmit, and Reject. ticles that had been rejected from a previous issue were Reviewing by the Editorial Board is performed in resubmitted to the journal, and they were reassigned two rounds. In the first round, the Editors-in-Chief as- to some of the same reviewers. For all these resubmis- sign two reviewers to all papers, and at the end of the sions, the authors provided a summary of changes made round early decisions are made to reject papers that to the prior version that explained how review concerns have two reject scores (Reject or Reject and Resubmit). had been addressed. The remaining papers receive additional reviews in the Of the 124 submissions, 11 papers were accepted, and 10 were conditionally accepted subject to minor revisions. For the latter, a reviewer was assigned as a Aaron Johnson: U.S. Naval Research Laboratory, E-mail: shepherd to ensure that the important points from the [email protected] Florian Kerschbaum: University of Waterloo, E-mail: flo- [email protected] 1 Nomination form: https://forms.gle/MFWa5yDgKZHz44F69 Editors’ Introduction 2 meta-review were addressed. 21 articles were ultimately – Arkady Yerukhimovich, George Washington Uni- accepted for publication in this issue. These 21 and 1 ar- versity ticle revised after being conditionally accepted for issue – Atefeh Mashatan, Ryerson University 2 form the articles published in this issue. These articles – Athina Markopoulou, University of California, will be presented at PETS 2021. Irvine The authors of 83 other articles were invited to re- – Attila Yavuz, University of South Florida submit to a future issue of PoPETs. For 23 of them, spe- – Balazs Pejo, Budapest University of Technology and cific major revisions were requested, to be reviewed by Economics the same reviewers when submitted to one of the follow- – Bogdan Carbunar, Florida International University ing two PoPETs submission deadlines. The remaining 60 – Chaya Ganesh, Indian Institute of Science articles received a decision of Reject and Resubmit (15 – Chris Clifton, Purdue University of them during the first round of review), as reviewers – Christo Wilson, Northeastern University identified needed revisions that were unlikely to be suc- – Dali Kaafar, Macquarie University cessfully addressed in a short time. 16 papers received – Damien Desfontaines, ETH Zurich / Google a decision of Reject (5 of them during the first round), – Daniel Roche, U.S. Naval Academy either due to serious deficiencies or to being on topics – Daniel Takabi, Georgia State University out of scope for PoPETs. Finally, 2 submissions were – David Evans, University of Virginia rejected by the Editors-in-Chief without review by the – Elissa Redmiles, Microsoft Research Editorial Board for being out of scope, over the page – Erman Ayday, Case Western Reserve University / limit, or non-anonymous and 2 submissions were with- Bilkent University drawn by the authors during the reviewing process. – Esfandiar Mohammadi, University of Luebeck For the 2021 volume, we continue an artifact-review – Fabian Prasser, Charite - Universitätsmedizin procedure to collect, evaluate, and distribute any ar- Berlin / Berlin Institute of Health tifacts related to accepted papers (e.g. source code, – Fabio Massacci, University of Trento datasets, machine-generated proofs, formal specifica- – Fan Zhang, Duke University tions, and build environments)2. Authors of accepted – Florentin Rochet, Universite catholique de Louvain papers are encouraged (but not obliged) to submit their – Florian Hahn, University of Twente artifacts for review by an artifact-review committee. – Florian Schaub, University of Michigan The committee performs some checks on artifact quality – Florian Tramer, Stanford University (e.g. documentation, licensing, and compilation); once – Frederik Armknecht, University of Mannheim approved, artifacts accompany the corresponding pa- – Gennie Gebhart, Electronic Frontier Foundation pers on the PETS website. – Gergely Acs, Budapest University of Technology We thank the following people for making the third and Economics issue of PoPETs Volume 2021 possible: – Ghassan Karame, NEC Laboratories – Giovanni Cherubin, Turing Institute General Chair for PETS 2021: – Igor Bilogrevic, Google – Matthew Wright, Rochester Institute of Technology – Jaap-Henk Hoepman, Radboud University, Univer- sity of Groningen – Jamie Hayes, UCL Program Committee / Editorial Board: – Jessica Staddon, Google – Abbas Razaghpanah, International Computer Sci- – Joel Reardon, University of Calgary ence Institute – Josep Domingo-Ferrer, Universitat Rovira i Virgili – Abigail Marsh, Macalester College – Julien Freudiger, Apple – Adam Groce, Reed College – Kartik Nayak, Duke University – Alan Mislove, Northeastern University – Kassem Fawaz, University of Wisconsin - Madison – Alisa Frik, International Computer Science Insti- – Luca Melis, Amazon tute, UC Berkeley – Lucas Davi, University of Duisburg Essen – Mahmood Sharif, Tel Aviv University and VMware – Marcel Keller, CSIRO’s Data61 – Mario Alvim, Universidade Federal de Minas Gerais 2 https://petsymposium.org/artifacts.php Editors’ Introduction 3 – Markulf Kohlweiss, University of Edinburgh / Publications Chairs: IOHK – Tobias Pulls, Karlstad University – Martin Degeling, Ruhr-University Bochum – Anselme Tueno, SAP SE – Mathias Humbert, armasuisse W+T – Matt Blaze, Georgetown University – Melek Önen, EURECOM Artifact Chair: – Michelle Mazurek, University of Maryland – Cecylia Bocovich, The Tor Project – Milad Nasr, UMass Amherst – Minhui Xue, The University of Adelaide – Moti Yung, Google Video Chair: – Narseo Vallina, IMDEA Networks Institute – Jeremy Clark, Concordia University – Nataliia Bielova, INRIA – Benjamin Zhao, University of New South Wales / – Neil Gong, Duke University CSIRO Data61 – Nitesh Saxena, University of Alabama at Birming- ham – Omar Chowdhury, University of Iowa Publicity/Web Chairs:
Recommended publications
  • September 2, 2015 Dear Kilton Library Community, As Guardians Of
    September 2, 2015 Dear Kilton Library community, As guardians of knowledge and the freedom to read, librarians have long led the fight for free expression. In the Information Age —which has produced unprecedented access to information and mass surveillance— librarians are eager as ever to help their communities better understand and protect their privacy and intellectual freedom. Across the nation and around the globe, librarians are working with the Library Freedom Project (LFP) to make real the promise of intellectual freedom in the digital age. LFP, along with our partners the ACLU and the Tor Project, provides privacy trainings for library communities, teaching people their rights under the law, and how to find and use free and open source, privacy protective technologies. Thanks to generous funding from the Knight Foundation, LFP has over the past year run dozens of privacy workshops for libraries of all sizes across the United States. In a pilot project in the summer of 2015, the Kilton Library in Lebanon, New Hampshire, worked with LFP and the Tor Project to setup a Tor relay.1 Tor is a free, open network that helps people defend against mass surveillance by providing them anonymity online. While the Tor Project is responsible for maintaining the source code for Tor, the technology depends on thousands of volunteers who run "relays", or computer servers that support the Tor network. Libraries are ideal locations to host Tor relays because they are staunch supporters of intellectual freedom and privacy, and because they provide access to other essential internet services. The Kilton Library, with LFP's help, sought to become one among many such nodes in Tor's worldwide internet freedom system.
    [Show full text]
  • Faulty Math: the Economics of Legalizing the Grey Album
    File: BambauerMerged2 Created on: 1/31/2008 4:34 PM Last Printed: 2/13/2008 3:38 PM FAULTY MATH: THE ECONOMICS OF LEGALIZING THE GREY ALBUM Derek E. Bambauer* ABSTRACT ................................................................................................. 346 I. INTRODUCTION ....................................................................................... 346 II. MISSED OPPORTUNITIES ..................................................................... 348 III. COPYRIGHT’S UNUSUAL ECONOMICS................................................. 354 IV. ECONOMIC THEORIES SUPPORTING THE DERIVATIVE WORKS RIGHT 357 A. Reducing Transaction Costs........................................................... 358 1. Theory: Copyright as Clearinghouse ....................................... 358 2. Analysis: Second-Best at Cutting Costs.................................... 359 B. Enabling Price Discrimination....................................................... 361 1. Theory: Broadening Access, Boosting Returns ........................ 361 2. Analysis: Movie Rentals and Other Weaknesses...................... 364 a. Access................................................................................. 364 b. Production.......................................................................... 367 c. Shortcomings...................................................................... 368 C. Exploiting Markets Efficiently........................................................ 368 1. Theory: Digging Dry Wells .....................................................
    [Show full text]
  • Strategies for Unbridled Data Dissemination: an Emergency Operations Manual
    Strategies for Unbridled Data Dissemination: An Emergency Operations Manual Nikita Mazurov PhD Thesis Centre for Cultural Studies, Goldsmiths, University of London 1 Declaration To the extent that this may make sense to the reader, I declare that the work presented in this thesis is my own. Nikita Mazurov 2 Acknowledgements The notion that the work in a thesis is ‘one’s own’ doesn’t seem quite right. This work has benefited from countless insights, critiques, commentary, feedback and all potential other manner of what is after all, work, by those who were subjected to either parts or the entirety of it during encounters both formal and informal. To say nothing of the fact that every citation is an acknowledgement of prior contributory work in its own right. I may have, however, mangled some or all of the fine input that I have received, for which I bear sole responsibility. Certain images were copied from other publications for illustrative purposes. They have been referenced when such is the case. Certain other images were provided by sources who will rename anonymous for reasons of safety. Assistance with technical infrastructure in establishing a server for part of the project was provided by another anonymous source; anonymous for the same reason as above. 3 Abstract This project is a study of free data dissemination and impediments to it. Drawing upon post-structuralism, Actor Network Theory, Participatory Action Research, and theories of the political stakes of the posthuman by way of Stirnerian egoism and illegalism, the project uses a number of theoretical, technical and legal texts to develop a hacker methodology that emphasizes close analysis and disassembly of existent systems of content control.
    [Show full text]
  • The Private-Sector Ecosystem of User Data in the Digital
    on current controversies in communications Maya has a track record of helping technologists Liz Woolery policy, online intermediary liability, privacy, and successfully navigate complex regulations to Senior Policy Analyst, copyright. Olivier has been on the local NPR achieve their design and product goals. Most Center for Democracy and Technology station and an invited speaker at universities recently, she was on the healthcare team at Liz Woolery is a senior policy analyst at the and conferences around the world. He is part the United States Digital Service, which aims to Center for Democracy and Technology, where of a team of legal scholars, research engineers, improve the way government delivers services to her work focuses on the intersection of free and social entrepreneurs to whom The National the American people through better technology expression and the digital world. Prior to CDT, Science Foundation in fall 2017 awarded a three- and user-centered design. Maya worked directly she was with New America’s Open Technology year one-million-dollar grant to prototype an with engineers, data scientists, designers, and Institute (OTI) as a senior policy analyst on the “edge-cloud” network that is to be owned and product managers on the launch of the All of Us secure internet team, where her work addressed operated as a “commons resource” for Harlem Research Program at the National Institutes of free speech, privacy, and transparency online. residents. Health. She also worked with the Centers for Previously she was a Google Policy Fellow at OTI, Medicare and Medicaid Services to improve At Fordham, Olivier teaches Legislation & interned with the Berkman Center for Internet data sharing with physicians participating in Regulation, Administrative Law, Information and Society’s Chilling Effects Clearinghouse the Quality Payment Program, and transition Law, and information law related courses.
    [Show full text]
  • Annual Report 2012 Leadership and Core Tor Team
    Annual Report 2012 Leadership and Core Tor Team Andrew Lewman Roger Dingledine Nick Mathewson Dr. Paul Syverson Also Jacob Appelbaum Karen Reilly Melissa Gilroy Moritz Bartl Erinn Clark Arturo Filastò Nathan Freitas Aaron Gibson Dr. Ian Goldberg Sathyanarayanan Gunasekaran Sebastian Hahn Dr. Rob Jansen Damian Johnson George Kadianakis Dr. Karsten Loesing Steven Murdoch Shava Nerad Linus Nordberg Peter Palfrader Runa Sandvik Wendy Seltzer Andrea Shepard Philipp Winter And more than 3,200 Tor relay volunteers and supporters From the Executive Director In 2002, we released the first version of Tor. Over the past 10 years, we have grown and evolved with the demands of the technology landscape, the needs of the world, and a firm commitment to freedom of expression for everyone. Today, with over 2.4 billion people online, our commitment and passion continue. At Tor, we work tirelessly to increase the performance of the Tor network and to develop cutting- edge technology solutions. Every day we enlist a growing number of volunteers to join our relay network. We actively engage worldwide supporters and funders to help continue our mission. We fearlessly step up and speak out as the leading experts in privacy, censorship circumvention, anonymity and related research. Tor’s success is in large part thanks to our funding partners, including the Knight Foundation, The Broadcasting Board of Governors, SRI International, The United States Department of State, Swedish International Development Agency and many generous individual donors. In addition, thanks to our research partners at the University of Waterloo (Canada), the University of Cambridge (United Kingdom), Georgia Institute of Technology and many others around the globe we are able to leverage research and academic advancements to pioneer ground breaking circumvention and privacy solutions.
    [Show full text]
  • ¿Qué Es TOR? ¿Qué Es TOR? Introducción
    Proyecto TOR ¿Qué es TOR? ¿Qué es TOR? Introducción TOR (The Onion Routing): Una red de anonimato ¿Qué es TOR? No es una red P2P: aunque es una red entre particulares Es software: procede de investigación, pero no es una red dedicada Algo de historia: de proyecto militar a organización sin ánimo de lucro. 2013-12-04 • El Enrutamiento de cebolla es una red de túneles virtuales de comunicación superpuesta a Internet que garantiza el anonimato de sus usuarios y de los enrutadores que median en la comunicación y proporciona integridad y confidencialidad de los datos que se intercambian. • Usuarios y encaminadores tienen distintos roles y existen servidores de directorio. Los enrutadores son individuales o empresas que prestan su ancho de banda. También hay servicios (web, mensajería) llamados hidden services que se prestan anónimamente (no se TOR (The Onion Routing): Una red de anonimato conoce su ubicación, ni quién los gestiona, desde donde, etc.) • Anteriormente un complemento de Firefox (Tor Button) ahora es un navegador seguro (Tor Browser Bundle y Vidalia) en múltiples No es una red P2P: aunque es una red entre particulares idiomas y varios proyectos de software más relacionados. Otros programas: Tails (SO seguro), Orbot (Tor para Android), Stem Es software: procede de investigación, pero no es una red dedicada (biblioteca python para controlar Tor, muy fácil para jugar con Tor), TorBirdy (Tor para Thunderbird), etc. • Tor se inició como un proyecto de investigación de la Marina de EE.UU. llamado Onion Routing, alla por 1996, para la construcción de Algo de historia: de proyecto militar a organización sin ánimo de lucro.
    [Show full text]
  • Roger Dingledine Moria Research Labs 1558 Massachusetts Ave #24 Cambridge, MA 02138 August 3, 2006 Broadcasting Board of Governo
    Roger Dingledine Moria Research Labs 1558 Massachusetts Ave #24 Cambridge, MA 02138 August 3, 2006 Broadcasting Board of Governors International Broadcasting Bureau Office of Engineering Cohen Building, Room 4300 330 Independence Avenue, SW Washington, DC 20237 Attn: Demetria Anderson P Dear Demetria Anderson, Below is my first invoice for contract BBGCON1806S6149. There are no travel costs. Please do not hesitate to mail me at | or call me at I if there are any questions or problems. Period Hours Rate Cost May 24 - July 24 2 months SlOOOO/mo $20000 Cumulative 2 months SlOOOO/mo $20000 Sincerely yours, Roger Dingledine Owner, Moria Research Labs Roger Dingledine Moria Research Labs 1558 Massachusetts Ave #24 Cambridge, MA 02138 (b) (6) September 25, 2006 Broadcasting Board of Governors International Broadcasting Bureau Office of Engineering Cohen Building, Room 4300 330 Independence Avenue, SW Washington, DC 20237 Attn: Demetria Anderson T Dear Demetria Anderson, Below is my second invoice for contract BBGCON1806S6149, Fiscal Data 9568- 06-0206-E009601067-454000-4335-2544. There are no travel costs. Services rendered include a new stable update for Tor; a new development snap­ shot for Tor; continued work on designing incentive schemes and anti-blocking schemes; meetings with various developers and activists in the U.S. and Ger­ many; and new development work including improved resource management in Tor servers and improved auto-detection of server addresses. Please do not hesitate to mail me at | or call me at I if there are any questions
    [Show full text]
  • ISP Copyright Liability
    PART THREE Creativity Chapter twelve “Modernizing” ISP Copyright Liability Gregory R. Hagen* A. INTRODUCTION In the intense battle for the spoils generated by the online information ecosystem, it has been a contentious question as to whether Internet inter- mediaries — especially those who carry, host and index others’ informa- tion — should be liable for copyright infringement in relation to content provided by third parties. Internet intermediaries include Internet access providers, web hosting providers, Internet payment systems, search en- gines, portals, e-commerce intermediaries, blogs, video sites, and social networking platforms.1 Currently, under the Copyright Act,2 those who provide the means necessary for others to communicate works and other subject matter on the Internet (Internet Service Providers or ISPs) will not be liable for copyright infringement if they merely provide such means.3 Under the Copyright Act, there are no mandatory notice and takedown (NTD) provisions requiring ISPs to prevent infringement by taking down * I gratefully acknowledge the financial support of Borden Ladner Gervais, the re- search assistance of Kimberly Howe, and the helpful comments from an anonymous reviewer, Michael Geist, Sam Witherspoon and Maria Lavelle. 1 More generally, Internet intermediaries bring together or facilitate transactions between third parties on the Internet. See Organization for Economic Co-Operation and Development, “The Economic and Social Role of Internet Intermediaries” (April 2010), www.oecd.org/dataoecd/49/4/44949023.pdf. 2 Copyright Act, R.S.C. 1985, c. C-42, http://laws.justice.gc.ca/en/C-42 [Copyright Act]. 3 Ibid., ss. 2.4(1)(b). 361 362 Gregory R. Hagen allegedly infringing subject matter when an allegation is received from a copyright owner.
    [Show full text]
  • 30Th USENIX Security Symposium August 11–13, 2021 • Virtual Event Sponsored by USENIX, the Advanced Computing Systems Association
    Announcement and Call for Papers www.usenix.org/sec21/cfp 30th USENIX Security Symposium August 11–13, 2021 • Virtual Event Sponsored by USENIX, the Advanced Computing Systems Association Symposium Overview Symposium Organizers The USENIX Security Symposium brings together researchers, practitio- Program Co-Chairs ners, system administrators, system programmers, and others interested Michael Bailey, University of Illinois at Urbana–Champaign in the latest advances in the security and privacy of computer systems Rachel Greenstadt, New York University and networks. The 30th USENIX Security Symposium will be held as a Program Committee virtual event on August 11–13, 2021. Yousra Aafer, University of Waterloo Important: The USENIX Security Symposium moved to multiple submission Ruba Abu-Salma, University College London and Inria deadlines in 2019 and included changes to the review process and submission Gunes Acar, Katholieke Universiteit Leuven policies. Detailed information is available on the USENIX Security Publication David Adrian, Censys Model Changes web page at www.usenix.org/conference/usenixsecurity21/ Sadia Afroz, International Computer Science Institute (ICSI), University of publication-model-change. California, Berkeley, and Avast Devdatta Akhawe, Figma All researchers are encouraged to submit papers covering novel and sci- Benjamin Andow, IBM T. J. Watson Research Center entifically significant practical works in computer security. The Symposium Sebastian Angel, University of Pennsylvania will span three days with a technical
    [Show full text]
  • The Rise and Fall of Invasive Isp Surveillance
    OHM.DOCX 9/11/2009 2:19 PM THE RISE AND FALL OF INVASIVE ISP SURVEILLANCE Paul Ohm* Nothing in society poses as grave a threat to privacy as the Inter- net Service Provider (ISP). ISPs carry their users’ conversations, se- crets, relationships, acts, and omissions. Until the very recent past, they had left most of these alone because they had lacked the tools to spy invasively, but with recent advances in eavesdropping technology, they can now spy on people in unprecedented ways. Meanwhile, ad- vertisers and copyright owners have been tempting ISPs to put their users’ secrets up for sale, and judging from a recent flurry of reports, ISPs are giving in and experimenting with new forms of spying. This is only the leading edge of a coming storm of unprecedented and in- vasive ISP surveillance. This Article seeks to help policymakers strike the proper balance between user privacy and ISP need. Policymakers cannot simply ban aggressive monitoring, because ISPs have legitimate reasons for scru- tinizing communications on an Internet teeming with threats, so in- stead policymakers must learn to distinguish between an ISP’s legiti- mate needs and mere desires. In addition, this Article injects privacy into the network neutrali- ty debate—a debate about who gets to control innovation on the In- ternet. Despite the thousands of pages that have already been written about the topic, nobody has recognized that we already enjoy manda- tory network neutrality in the form of expansive wiretapping laws. The recognition of this idea will flip the status quo and reinvigorate a stagnant debate by introducing privacy and personal autonomy into a discussion that has only ever been about economics and innovation.
    [Show full text]
  • Internet Corporation for Assigned Names and Numbers July 7, 2015 12025 Waterfront Drive, Suite 300 Los Angeles, CA 90094­2536
    Internet Corporation for Assigned Names and Numbers July 7, 2015 12025 Waterfront Drive, Suite 300 Los Angeles, CA 90094­2536 To the Internet Corporation for Assigned Names and Numbers: We are an alliance of digital rights groups, anti­harassment initiatives, media advocacy groups, women’s rights organizations, and private individuals. We are writing to you about the Initial Report on the Privacy & Proxy Services published ​ ​ on May 5th, which proposes requiring “commercial website” owners to display their address under their WHOIS data. Broadly defined, this prevents millions of site owners from safeguarding their private information. We strongly oppose the Working Group’s proposal, which will physically endanger many domain owners and disproportionately impact those who come from marginalized communities. People perceived to be women, nonwhite, or LGBTQ are often targeted for harassment, and such harassment inflicts significant harm.1 The endemic nature of inequity online is a matter of deep concern for all of us, as we are working to make the Internet a safe and accessible place for all voices. The proposal in front of ICANN would radically undermine progress in that direction, in part by making it far easier to dox domain owners. "Doxing" is the malicious practice of obtaining someone's personal information (e.g. home address, phone number, etc) and making that information more readily and widely available. Doxing makes possible a wide range of crowdsourced harassment and intimidation, which includes everything from unwanted pizza deliveries to unrelenting barrages of rape­ and death threats. Doxing also enables "swatting," or calling in false tips that send a fully armed SWAT team crashing through a targeted person's door.
    [Show full text]
  • The Commonwealth of Massachusetts
    Office Use Only: Fiscal Year The Commonwealth of Massachusetts OFFICE OF THE ATTORNEY GENERAL NON-PROFIT ORGANIZATIONS/PUBLIC CHARITIES DIVISION ONE ASHBURTON PLACE BOSTON, MASSACHUSETTS 02108 (617) 727-2200, ext. 2101 www.mass.gov/ago/charities Form PC Check all items attached Report for the Fiscal Period: 01/01/14 to 12/31/14 (if applicable) X Schedule A-1 Attorney General's Account #: 046444 X Schedule A-2 Schedule RO Federal ID #: 20-8096820 Probate Account X Copy of IRS Return When did the organization first engage in X Audited Financial charitable work in Massachusetts? 01/01/2007 Statements/Review X Filing Fee Has the organization applied for or been granted Amended Articles/ IRS tax exempt status? X Yes No By-Laws If yes, date of application OR date of determination letter: 02/26/2007 IRS Exemption under 501(c): 3 If exempt under 501(c), are contributions to the organization tax deductible as charitable contributions? X Yes No Organization Data Name: THE TOR PROJECT, INC. Mailing Address: 7 TEMPLE STREET, SUITE A City: CAMBRIDGE State: MA ZIP: 02139 Phone Number: (781) 769-7555 Fax Number: Email: Website: WWW.TORPROJECT.ORG In the table below, please enter the appropriate codes from the corresponding tables found in the instructions. Enter up to 2 codes from Table 3 for your organization's main purpose(s) Category Code Category Code County (Table 1) 11 Organization Purpose Code 1 55 Type of Organization (Table 2) 21 Organization Purpose Code 2 Please check box if final return prior to dissolution: Office Use Only: Payment Received Form PC Page 1 of 14 478001 05-01-14 1 THE TOR PROJECT, INC.
    [Show full text]