30Th USENIX Security Symposium August 11–13, 2021 • Virtual Event Sponsored by USENIX, the Advanced Computing Systems Association

Total Page:16

File Type:pdf, Size:1020Kb

30Th USENIX Security Symposium August 11–13, 2021 • Virtual Event Sponsored by USENIX, the Advanced Computing Systems Association Announcement and Call for Papers www.usenix.org/sec21/cfp 30th USENIX Security Symposium August 11–13, 2021 • Virtual Event Sponsored by USENIX, the Advanced Computing Systems Association Symposium Overview Symposium Organizers The USENIX Security Symposium brings together researchers, practitio- Program Co-Chairs ners, system administrators, system programmers, and others interested Michael Bailey, University of Illinois at Urbana–Champaign in the latest advances in the security and privacy of computer systems Rachel Greenstadt, New York University and networks. The 30th USENIX Security Symposium will be held as a Program Committee virtual event on August 11–13, 2021. Yousra Aafer, University of Waterloo Important: The USENIX Security Symposium moved to multiple submission Ruba Abu-Salma, University College London and Inria deadlines in 2019 and included changes to the review process and submission Gunes Acar, Katholieke Universiteit Leuven policies. Detailed information is available on the USENIX Security Publication David Adrian, Censys Model Changes web page at www.usenix.org/conference/usenixsecurity21/ Sadia Afroz, International Computer Science Institute (ICSI), University of publication-model-change. California, Berkeley, and Avast Devdatta Akhawe, Figma All researchers are encouraged to submit papers covering novel and sci- Benjamin Andow, IBM T. J. Watson Research Center entifically significant practical works in computer security. The Symposium Sebastian Angel, University of Pennsylvania will span three days with a technical program including refereed papers, Pauline Anthonysamy, Google invited talks, posters, panel discussions, and Birds-of-a-Feather sessions. Manos Antonakakis, Georgia Institute of Technology Jethro G. Beekman, Fortanix Important Dates Matthew Bernhard, University of Michigan Summer Deadline Battista Biggio, University of Cagliari, Italy • Refereed paper submissions due: Thursday, June 11, 2020, 11:59 pm AoE Thursday, June 18, 2020, 11:59 pm AoE (Extended) Leyla Bilge, NortonLifeLock Research Group Vincent Bindschaedler, University of Florida • Early reject notification: July 24, 2020 Tamara Bonaci, Northeastern University Rebuttal Period: August 31– September 2, 2020 • Joseph C Bonneau, New York University • Notification to authors: September 11, 2020 Sven Bugiel, CISPA Helmholtz Center for Information Security • Final papers due: October 13, 2020 Kevin Butler, University of Florida Fall Deadline Joseph Calandrino, Federal Trade Commission • Refereed paper submissions due: Thursday, October 15, 2020, Aylin Caliskan, George Washington University 11:59 pm AoE Stefano Calzavara, Università Ca’ Foscari Venezia • Early reject notification: November 20, 2020 Yinzhi Cao, Johns Hopkins University • Rebuttal Period: January 11–13, 2021 Alvaro A. Cardenas, University of California, Santa Cruz • Notification to authors: January 21, 2021 Nicholas Carlini, Google • Final papers due: February 22, 2021 Lorenzo Cavallaro, King’s College London Rahul Chatterjee, University of Wisconsin—Madison Winter Deadline Qi Alfred Chen, University of California, Irvine • Refereed paper submissions due: Thursday, February 4, 2021, 11:59 pm AoE Marshini Chetty, University of Chicago Sherman S. M. Chow, The Chinese University of Hong Kong • Early reject notification: March 12, 2021 Omar Haider Chowdhury, The University of Iowa Rebuttal Period: April 19–21, 2021 • Mihai Christodorescu, Visa Research • Notification to authors: April 30, 2021 Erinn Clark, Google • Final papers due: June 2, 2021 Shaanan Cohney, Princeton University and University of Melbourne • Invited talk and panel proposals due: Thursday, February 4, 2021 Scott Coull, FireEye Cas Cremers, CISPA Helmholtz Center for Information Security Michel Cukier, University of Maryland George Danezis, University College London and Facebook Calibra Anupam Das, North Carolina State University Sanchari Das, Indiana University Bloomington Rev. 1/27/21 Sauvik Das, Georgia Institute of Technology Wenke Lee, Georgia Institute of Technology Nathan Dautenhahn, Rice University Corrado Leita, Lastline Lucas Davi, University of Duisburg-Essen Anja Lejman, Hasso-Plattner-Institute, University of Potsdam Roger Dingledine, The Tor Project Tancrède Lepoint, Google Brendan Dolan-Gavitt, New York University Dave Levin, University of Maryland Adam Doupé, Arizona State University Frank Li, Georgia Institute of Technology Zakir Durumeric, Stanford University Mingyan Liu, University of Michigan Manuel Egele, Boston University Wouter Lueks, École Polytechnique Fédérale de Lausanne (EPFL) Serge Egelman, International Computer Science Institute (ICSI), University of Mateo Maffei, Technische Universität Wien California, Berkeley, and AppCensus, Inc. Stefan Mangard, Graz University of Technology Pardis Emami-Naeini, University of Washington Ivan Martinovic, University of Oxford William Enck, North Carolina State University Michelle Mazurek, University of Maryland Roya Ensafi, University of Michigan Stephen McCamant, University of Minnesota Sascha Fahl, Leibniz University Hannover Jon McCune, Google Giulia Fanti, Carnegie Mellon University Patrick McDaniel, The Pennsylvania State University Kassem Fawaz, University of Wisconsin—Madison Susan E. McGregor, Columbia University Ariel J. Feldman, Google Andrew Miller, University of Illinois at Urbana–Champaign Wu-chang Feng, Portland State University Esfandiar Mohammadi, University of Lübeck Earlence Fernandes, University of Wisconsin—Madison Fabian Monrose, The University of North Carolina at Chapel Hill David Fifield, Unaffiliated Veelasha Moonsamy, Radboud University Simone Fischer-Hubner, Karlstad University Tyler Moore, The University of Tulsa Christopher Wardlaw Fletcher, University of Illinois at Urbana–Champaign Takao Murakami, AIST Michael Franz, University of California, Irvine Adwait Nadkarni, College of William & Mary Matt Fredrikson, Carnegie Mellon University Nick Nikiforakis, Stony Brook University David Freeman, Facebook Inc. Rishab Nithyanand, The University of Iowa Patrick Gage Kelley, Google Guevara Noubir, Northeastern University Siddarth Garg, New York University Cristina Onete, University of Limoges/XLIM/CNRS 7252 Christina Garman, Purdue University Yossi Oren, Ben-Gurion University of the Negev Carrie Gates, Bank of America Rebekah Overdorf, École Polytechnique Fédérale de Lausanne (EPFL) Daniel Genkin, University of Michigan Chris Palmer, Google Irene Giacomelli, Protocol Labs Nicholas Papernot, University of Toronto and Vector Institute Ian Goldberg, University of Waterloo Aleatha Parker-Wood, Unaffiliated Neil Gong, Duke University Mathias Payer, École Polytechnique Fédérale de Lausanne (EPFL) Daniel Gruss, Graz University of Technology Paul Pearce, Georgia Institute of Technology and International Computer Guofei Gu, Texas A&M University Science Institute (ICSI) J. Alex Halderman, University of Michigan Giancarlo Pellegrino, CISPA Helmholtz Center for Information Security Mike Hamburg, Rambus Roberto Perdisci, University of Georgia Hamza Harkous, Google Radia Perlman, Dell Technologies Wajih Ul Hassan, University of Illinois at Urbana–Champaign Zachary Peterson, California Polytechnic State University Xiali (Sharon) Hei, University of Louisiana at Lafayette Jason Polakis, University of Illinois at Chicago Nadia Heninger, University of California, San Diego Christina Pöpper, New York University Abu Dhabi Ryan Henry, University of Calgary Sara Rampazzi, University of Michigan and University of Florida Alejandro Hevia, University of Chile Aanjhan Ranghanathan, Northeastern University Matthew Hicks, Virginia Tech Bradley Reaves, North Carolina State University Thorsten Holz, Ruhr-Universität Bochum Elissa M. Redmiles, Microsoft Research Nicholas Hopper, University of Minnesota Konrad Rieck, Technische Universität Braunschweig Amir Houmansadr, University of Massachusetts Amherst Thomas Ristenpart, Cornell Tech Danny Yuxing Huang, New York University William Robertson, Northeastern University Sotiris Ioannidis, Technical University of Crete Stefanie Roos, Delft University of Technology Cynthia Irvine, Naval Postgraduate School Ahmad-Reza Sadeghi, Technische Universität Darmstadt Suman Jana, Columbia University Merve Sahin, SAP Security Research Rob Jansen, U.S. Naval Research Laboratory Brendan Saltaformaggio, Georgia Institute of Technology Somesh Jha, University of Wisconsin—Madison Nolen Scaife, University of Colorado Boulder Anthony D Joseph, University of California, Berkeley Bruce Schneier, Harvard Kennedy School Chris Kanich, University of Illinois at Chicago Kent Seamons, Brigham Young University Apu Kapadia, Indiana University Bloomington Vyas Sekar, Carnegie Mellon University Vasileios Kemerlis, Brown University Wendy Seltzer, W3C and Massachusetts Institute of Technology Yongdae Kim, Korea Advanced Institute of Science and Technology (KAIST) Fatemeh Shirazi, Web3 Foundation Sam King, University of California, Davis Haya Shulman, Fraunhofer SIT Engin Kirda, Northeastern University Angelos Stavrou, Virginia Tech Tadayoshi Kohno, University of Washington Deian Stefan, University of California, San Diego Katharina Krombholz, CISPA Helmholtz Center for Information Security Ben Stock, CISPA Helmholtz Center for Information Security Christopher Kruegel, University of California, Santa Barbara Gianluca Stringhini, Boston University Negar Kyavash, École Polytechnique Fédérale de Lausanne (EPFL) Cynthia Sturton, The University of North Carolina at Chapel Hill Andrea Lanzi, University of Milan Nick Sullivan, Cloudflare Mathias
Recommended publications
  • September 2, 2015 Dear Kilton Library Community, As Guardians Of
    September 2, 2015 Dear Kilton Library community, As guardians of knowledge and the freedom to read, librarians have long led the fight for free expression. In the Information Age —which has produced unprecedented access to information and mass surveillance— librarians are eager as ever to help their communities better understand and protect their privacy and intellectual freedom. Across the nation and around the globe, librarians are working with the Library Freedom Project (LFP) to make real the promise of intellectual freedom in the digital age. LFP, along with our partners the ACLU and the Tor Project, provides privacy trainings for library communities, teaching people their rights under the law, and how to find and use free and open source, privacy protective technologies. Thanks to generous funding from the Knight Foundation, LFP has over the past year run dozens of privacy workshops for libraries of all sizes across the United States. In a pilot project in the summer of 2015, the Kilton Library in Lebanon, New Hampshire, worked with LFP and the Tor Project to setup a Tor relay.1 Tor is a free, open network that helps people defend against mass surveillance by providing them anonymity online. While the Tor Project is responsible for maintaining the source code for Tor, the technology depends on thousands of volunteers who run "relays", or computer servers that support the Tor network. Libraries are ideal locations to host Tor relays because they are staunch supporters of intellectual freedom and privacy, and because they provide access to other essential internet services. The Kilton Library, with LFP's help, sought to become one among many such nodes in Tor's worldwide internet freedom system.
    [Show full text]
  • Faulty Math: the Economics of Legalizing the Grey Album
    File: BambauerMerged2 Created on: 1/31/2008 4:34 PM Last Printed: 2/13/2008 3:38 PM FAULTY MATH: THE ECONOMICS OF LEGALIZING THE GREY ALBUM Derek E. Bambauer* ABSTRACT ................................................................................................. 346 I. INTRODUCTION ....................................................................................... 346 II. MISSED OPPORTUNITIES ..................................................................... 348 III. COPYRIGHT’S UNUSUAL ECONOMICS................................................. 354 IV. ECONOMIC THEORIES SUPPORTING THE DERIVATIVE WORKS RIGHT 357 A. Reducing Transaction Costs........................................................... 358 1. Theory: Copyright as Clearinghouse ....................................... 358 2. Analysis: Second-Best at Cutting Costs.................................... 359 B. Enabling Price Discrimination....................................................... 361 1. Theory: Broadening Access, Boosting Returns ........................ 361 2. Analysis: Movie Rentals and Other Weaknesses...................... 364 a. Access................................................................................. 364 b. Production.......................................................................... 367 c. Shortcomings...................................................................... 368 C. Exploiting Markets Efficiently........................................................ 368 1. Theory: Digging Dry Wells .....................................................
    [Show full text]
  • Strategies for Unbridled Data Dissemination: an Emergency Operations Manual
    Strategies for Unbridled Data Dissemination: An Emergency Operations Manual Nikita Mazurov PhD Thesis Centre for Cultural Studies, Goldsmiths, University of London 1 Declaration To the extent that this may make sense to the reader, I declare that the work presented in this thesis is my own. Nikita Mazurov 2 Acknowledgements The notion that the work in a thesis is ‘one’s own’ doesn’t seem quite right. This work has benefited from countless insights, critiques, commentary, feedback and all potential other manner of what is after all, work, by those who were subjected to either parts or the entirety of it during encounters both formal and informal. To say nothing of the fact that every citation is an acknowledgement of prior contributory work in its own right. I may have, however, mangled some or all of the fine input that I have received, for which I bear sole responsibility. Certain images were copied from other publications for illustrative purposes. They have been referenced when such is the case. Certain other images were provided by sources who will rename anonymous for reasons of safety. Assistance with technical infrastructure in establishing a server for part of the project was provided by another anonymous source; anonymous for the same reason as above. 3 Abstract This project is a study of free data dissemination and impediments to it. Drawing upon post-structuralism, Actor Network Theory, Participatory Action Research, and theories of the political stakes of the posthuman by way of Stirnerian egoism and illegalism, the project uses a number of theoretical, technical and legal texts to develop a hacker methodology that emphasizes close analysis and disassembly of existent systems of content control.
    [Show full text]
  • The Private-Sector Ecosystem of User Data in the Digital
    on current controversies in communications Maya has a track record of helping technologists Liz Woolery policy, online intermediary liability, privacy, and successfully navigate complex regulations to Senior Policy Analyst, copyright. Olivier has been on the local NPR achieve their design and product goals. Most Center for Democracy and Technology station and an invited speaker at universities recently, she was on the healthcare team at Liz Woolery is a senior policy analyst at the and conferences around the world. He is part the United States Digital Service, which aims to Center for Democracy and Technology, where of a team of legal scholars, research engineers, improve the way government delivers services to her work focuses on the intersection of free and social entrepreneurs to whom The National the American people through better technology expression and the digital world. Prior to CDT, Science Foundation in fall 2017 awarded a three- and user-centered design. Maya worked directly she was with New America’s Open Technology year one-million-dollar grant to prototype an with engineers, data scientists, designers, and Institute (OTI) as a senior policy analyst on the “edge-cloud” network that is to be owned and product managers on the launch of the All of Us secure internet team, where her work addressed operated as a “commons resource” for Harlem Research Program at the National Institutes of free speech, privacy, and transparency online. residents. Health. She also worked with the Centers for Previously she was a Google Policy Fellow at OTI, Medicare and Medicaid Services to improve At Fordham, Olivier teaches Legislation & interned with the Berkman Center for Internet data sharing with physicians participating in Regulation, Administrative Law, Information and Society’s Chilling Effects Clearinghouse the Quality Payment Program, and transition Law, and information law related courses.
    [Show full text]
  • Annual Report 2012 Leadership and Core Tor Team
    Annual Report 2012 Leadership and Core Tor Team Andrew Lewman Roger Dingledine Nick Mathewson Dr. Paul Syverson Also Jacob Appelbaum Karen Reilly Melissa Gilroy Moritz Bartl Erinn Clark Arturo Filastò Nathan Freitas Aaron Gibson Dr. Ian Goldberg Sathyanarayanan Gunasekaran Sebastian Hahn Dr. Rob Jansen Damian Johnson George Kadianakis Dr. Karsten Loesing Steven Murdoch Shava Nerad Linus Nordberg Peter Palfrader Runa Sandvik Wendy Seltzer Andrea Shepard Philipp Winter And more than 3,200 Tor relay volunteers and supporters From the Executive Director In 2002, we released the first version of Tor. Over the past 10 years, we have grown and evolved with the demands of the technology landscape, the needs of the world, and a firm commitment to freedom of expression for everyone. Today, with over 2.4 billion people online, our commitment and passion continue. At Tor, we work tirelessly to increase the performance of the Tor network and to develop cutting- edge technology solutions. Every day we enlist a growing number of volunteers to join our relay network. We actively engage worldwide supporters and funders to help continue our mission. We fearlessly step up and speak out as the leading experts in privacy, censorship circumvention, anonymity and related research. Tor’s success is in large part thanks to our funding partners, including the Knight Foundation, The Broadcasting Board of Governors, SRI International, The United States Department of State, Swedish International Development Agency and many generous individual donors. In addition, thanks to our research partners at the University of Waterloo (Canada), the University of Cambridge (United Kingdom), Georgia Institute of Technology and many others around the globe we are able to leverage research and academic advancements to pioneer ground breaking circumvention and privacy solutions.
    [Show full text]
  • ¿Qué Es TOR? ¿Qué Es TOR? Introducción
    Proyecto TOR ¿Qué es TOR? ¿Qué es TOR? Introducción TOR (The Onion Routing): Una red de anonimato ¿Qué es TOR? No es una red P2P: aunque es una red entre particulares Es software: procede de investigación, pero no es una red dedicada Algo de historia: de proyecto militar a organización sin ánimo de lucro. 2013-12-04 • El Enrutamiento de cebolla es una red de túneles virtuales de comunicación superpuesta a Internet que garantiza el anonimato de sus usuarios y de los enrutadores que median en la comunicación y proporciona integridad y confidencialidad de los datos que se intercambian. • Usuarios y encaminadores tienen distintos roles y existen servidores de directorio. Los enrutadores son individuales o empresas que prestan su ancho de banda. También hay servicios (web, mensajería) llamados hidden services que se prestan anónimamente (no se TOR (The Onion Routing): Una red de anonimato conoce su ubicación, ni quién los gestiona, desde donde, etc.) • Anteriormente un complemento de Firefox (Tor Button) ahora es un navegador seguro (Tor Browser Bundle y Vidalia) en múltiples No es una red P2P: aunque es una red entre particulares idiomas y varios proyectos de software más relacionados. Otros programas: Tails (SO seguro), Orbot (Tor para Android), Stem Es software: procede de investigación, pero no es una red dedicada (biblioteca python para controlar Tor, muy fácil para jugar con Tor), TorBirdy (Tor para Thunderbird), etc. • Tor se inició como un proyecto de investigación de la Marina de EE.UU. llamado Onion Routing, alla por 1996, para la construcción de Algo de historia: de proyecto militar a organización sin ánimo de lucro.
    [Show full text]
  • Roger Dingledine Moria Research Labs 1558 Massachusetts Ave #24 Cambridge, MA 02138 August 3, 2006 Broadcasting Board of Governo
    Roger Dingledine Moria Research Labs 1558 Massachusetts Ave #24 Cambridge, MA 02138 August 3, 2006 Broadcasting Board of Governors International Broadcasting Bureau Office of Engineering Cohen Building, Room 4300 330 Independence Avenue, SW Washington, DC 20237 Attn: Demetria Anderson P Dear Demetria Anderson, Below is my first invoice for contract BBGCON1806S6149. There are no travel costs. Please do not hesitate to mail me at | or call me at I if there are any questions or problems. Period Hours Rate Cost May 24 - July 24 2 months SlOOOO/mo $20000 Cumulative 2 months SlOOOO/mo $20000 Sincerely yours, Roger Dingledine Owner, Moria Research Labs Roger Dingledine Moria Research Labs 1558 Massachusetts Ave #24 Cambridge, MA 02138 (b) (6) September 25, 2006 Broadcasting Board of Governors International Broadcasting Bureau Office of Engineering Cohen Building, Room 4300 330 Independence Avenue, SW Washington, DC 20237 Attn: Demetria Anderson T Dear Demetria Anderson, Below is my second invoice for contract BBGCON1806S6149, Fiscal Data 9568- 06-0206-E009601067-454000-4335-2544. There are no travel costs. Services rendered include a new stable update for Tor; a new development snap­ shot for Tor; continued work on designing incentive schemes and anti-blocking schemes; meetings with various developers and activists in the U.S. and Ger­ many; and new development work including improved resource management in Tor servers and improved auto-detection of server addresses. Please do not hesitate to mail me at | or call me at I if there are any questions
    [Show full text]
  • ISP Copyright Liability
    PART THREE Creativity Chapter twelve “Modernizing” ISP Copyright Liability Gregory R. Hagen* A. INTRODUCTION In the intense battle for the spoils generated by the online information ecosystem, it has been a contentious question as to whether Internet inter- mediaries — especially those who carry, host and index others’ informa- tion — should be liable for copyright infringement in relation to content provided by third parties. Internet intermediaries include Internet access providers, web hosting providers, Internet payment systems, search en- gines, portals, e-commerce intermediaries, blogs, video sites, and social networking platforms.1 Currently, under the Copyright Act,2 those who provide the means necessary for others to communicate works and other subject matter on the Internet (Internet Service Providers or ISPs) will not be liable for copyright infringement if they merely provide such means.3 Under the Copyright Act, there are no mandatory notice and takedown (NTD) provisions requiring ISPs to prevent infringement by taking down * I gratefully acknowledge the financial support of Borden Ladner Gervais, the re- search assistance of Kimberly Howe, and the helpful comments from an anonymous reviewer, Michael Geist, Sam Witherspoon and Maria Lavelle. 1 More generally, Internet intermediaries bring together or facilitate transactions between third parties on the Internet. See Organization for Economic Co-Operation and Development, “The Economic and Social Role of Internet Intermediaries” (April 2010), www.oecd.org/dataoecd/49/4/44949023.pdf. 2 Copyright Act, R.S.C. 1985, c. C-42, http://laws.justice.gc.ca/en/C-42 [Copyright Act]. 3 Ibid., ss. 2.4(1)(b). 361 362 Gregory R. Hagen allegedly infringing subject matter when an allegation is received from a copyright owner.
    [Show full text]
  • The Rise and Fall of Invasive Isp Surveillance
    OHM.DOCX 9/11/2009 2:19 PM THE RISE AND FALL OF INVASIVE ISP SURVEILLANCE Paul Ohm* Nothing in society poses as grave a threat to privacy as the Inter- net Service Provider (ISP). ISPs carry their users’ conversations, se- crets, relationships, acts, and omissions. Until the very recent past, they had left most of these alone because they had lacked the tools to spy invasively, but with recent advances in eavesdropping technology, they can now spy on people in unprecedented ways. Meanwhile, ad- vertisers and copyright owners have been tempting ISPs to put their users’ secrets up for sale, and judging from a recent flurry of reports, ISPs are giving in and experimenting with new forms of spying. This is only the leading edge of a coming storm of unprecedented and in- vasive ISP surveillance. This Article seeks to help policymakers strike the proper balance between user privacy and ISP need. Policymakers cannot simply ban aggressive monitoring, because ISPs have legitimate reasons for scru- tinizing communications on an Internet teeming with threats, so in- stead policymakers must learn to distinguish between an ISP’s legiti- mate needs and mere desires. In addition, this Article injects privacy into the network neutrali- ty debate—a debate about who gets to control innovation on the In- ternet. Despite the thousands of pages that have already been written about the topic, nobody has recognized that we already enjoy manda- tory network neutrality in the form of expansive wiretapping laws. The recognition of this idea will flip the status quo and reinvigorate a stagnant debate by introducing privacy and personal autonomy into a discussion that has only ever been about economics and innovation.
    [Show full text]
  • Internet Corporation for Assigned Names and Numbers July 7, 2015 12025 Waterfront Drive, Suite 300 Los Angeles, CA 90094­2536
    Internet Corporation for Assigned Names and Numbers July 7, 2015 12025 Waterfront Drive, Suite 300 Los Angeles, CA 90094­2536 To the Internet Corporation for Assigned Names and Numbers: We are an alliance of digital rights groups, anti­harassment initiatives, media advocacy groups, women’s rights organizations, and private individuals. We are writing to you about the Initial Report on the Privacy & Proxy Services published ​ ​ on May 5th, which proposes requiring “commercial website” owners to display their address under their WHOIS data. Broadly defined, this prevents millions of site owners from safeguarding their private information. We strongly oppose the Working Group’s proposal, which will physically endanger many domain owners and disproportionately impact those who come from marginalized communities. People perceived to be women, nonwhite, or LGBTQ are often targeted for harassment, and such harassment inflicts significant harm.1 The endemic nature of inequity online is a matter of deep concern for all of us, as we are working to make the Internet a safe and accessible place for all voices. The proposal in front of ICANN would radically undermine progress in that direction, in part by making it far easier to dox domain owners. "Doxing" is the malicious practice of obtaining someone's personal information (e.g. home address, phone number, etc) and making that information more readily and widely available. Doxing makes possible a wide range of crowdsourced harassment and intimidation, which includes everything from unwanted pizza deliveries to unrelenting barrages of rape­ and death threats. Doxing also enables "swatting," or calling in false tips that send a fully armed SWAT team crashing through a targeted person's door.
    [Show full text]
  • Editors' Introduction
    Proceedings on Privacy Enhancing Technologies ; 2021 (3):1–4 Aaron Johnson and Florian Kerschbaum Editors’ Introduction DOI 10.2478/popets-2021-0034 second round for a total of four reviews (in a few cases, submissions received fewer or more reviews). Many articles had an external review drawn from a It is our great pleasure to introduce Issue 3 of Vol- pool of junior experts nominated by the community1. ume 2021 of the Proceedings on Privacy Enhancing Further external experts were invited to review certain Technologies (PoPETs). PoPETs is a journal that pub- articles. All reviews were sent to the authors of papers lishes articles accepted to the annual Privacy Enhanc- that proceeded to the second round of review, and those ing Technologies Symposium (PETS). To contribute to authors were invited to provide a written rebuttal to the the free availability of scientific publications, PoPETs reviews. After the rebuttal period there was a discussion is published under the open-access Creative Commons among the reviewers, other members of the Editorial Attribution-NonCommercial-NoDerivs license. Board, and the Editors-in-Chief to reach a consensus PoPETS/PETS uses a hybrid conference-journal decision for each paper. One of the reviewers was then model, one that has since been adopted by many other selected to write a meta-review that summarized the conferences in the field. In this model, articles are pub- discussion and the justification for the decision. lished throughout the year at regular intervals, and the Articles submitted to this issue were reviewed by papers for the year are then presented at an annual con- the 94 members of the Editorial Board and 76 exter- ference.
    [Show full text]
  • The Commonwealth of Massachusetts
    Office Use Only: Fiscal Year The Commonwealth of Massachusetts OFFICE OF THE ATTORNEY GENERAL NON-PROFIT ORGANIZATIONS/PUBLIC CHARITIES DIVISION ONE ASHBURTON PLACE BOSTON, MASSACHUSETTS 02108 (617) 727-2200, ext. 2101 www.mass.gov/ago/charities Form PC Check all items attached Report for the Fiscal Period: 01/01/14 to 12/31/14 (if applicable) X Schedule A-1 Attorney General's Account #: 046444 X Schedule A-2 Schedule RO Federal ID #: 20-8096820 Probate Account X Copy of IRS Return When did the organization first engage in X Audited Financial charitable work in Massachusetts? 01/01/2007 Statements/Review X Filing Fee Has the organization applied for or been granted Amended Articles/ IRS tax exempt status? X Yes No By-Laws If yes, date of application OR date of determination letter: 02/26/2007 IRS Exemption under 501(c): 3 If exempt under 501(c), are contributions to the organization tax deductible as charitable contributions? X Yes No Organization Data Name: THE TOR PROJECT, INC. Mailing Address: 7 TEMPLE STREET, SUITE A City: CAMBRIDGE State: MA ZIP: 02139 Phone Number: (781) 769-7555 Fax Number: Email: Website: WWW.TORPROJECT.ORG In the table below, please enter the appropriate codes from the corresponding tables found in the instructions. Enter up to 2 codes from Table 3 for your organization's main purpose(s) Category Code Category Code County (Table 1) 11 Organization Purpose Code 1 55 Type of Organization (Table 2) 21 Organization Purpose Code 2 Please check box if final return prior to dissolution: Office Use Only: Payment Received Form PC Page 1 of 14 478001 05-01-14 1 THE TOR PROJECT, INC.
    [Show full text]