The Center for Advanced Security Research Darmstadt (CASED) at the Technische Universität Darmstadt has >20 openings for its PhD scholarship program in several areas of IT Security.
Application deadline is August 15th, 2011.
One of the areas is PRIVACY AND TRUST, which comprises informational self-determination, privacy, data protection, privacy-enhancing and transparency-enhancing technologies, trust and trust management, reputation and recommendation systems, from a technical and legal perspective. And more, if you can think of more ...
For more information please check https://scholarship.cased.de.
Roger Clarke of Xamax Consultancy Pty Ltd, the distinguished expert on data surveillance and privacy, is asking "constructively negative comments" on his draft paper (available at http://www.rogerclarke.com/II/BrowserID‑1107.html) in which he summarizes his reactions to Mozilla's BrowserID Proposal. The BrowserID initiative has been greeted with enthusiasm by some commentators, however, according to Roger Clarke's analysis, the design of BrowserID is seriously threatening to individual freedoms, and the scheme should be avoided by consumers and by service-providers interested in serving consumers' needs.
Social networks and other Web 2.0 sites are becoming more and more a part of our culture; however, we are inclined to forget about – or at least ignore – their dangers. Many of us have heard or read stories where somebody was fired because he/she friended his/her boss on Facebook, and the latter found a malignant post about the company they worked for. However, it is good to know that we are in danger even if we do not make so obvious blunders. This article describes the threats we face, and the means of defence against them. One particular defence mechanism, BlogCrypt, is described in details: a simple Firefox plugin that allows encrypting and decrypting web content as easy as it sounds.
We will publish this article on the International PET Portal & Blog the following Friday.
Voluntary disclosure of personal information is becoming more and more widespread with the advent of Web 2.0 services. Publishing such information constitutes new kinds of threats, such as further reinforcing already existing profiling techniques through correlation of perceived user activities to those publicly disclosed, but the most obvious of all is the intrinsic threat that malicious third parties collect and combine information we publish about ourselves. In this paper, we evaluate currently existing solutions that are destined for addressing this issue, then propose a model of our own for providing access control for a user over information she published and analyse our implementation thereof.
The French National Assembly has just voted for a proposition which can have a huge impact on the personal rights of French citizens. The bill, which mandates the inclusion of a chip for storing – among other things – the photo and the fingerprint of the possessor, in identity cards, was passed with 7 yeses to 4 noes. The newly born law also states that an optional secondary chip could also be included in the identity card for the purpose of facilitating business transactions. But the biggest impact on the life of French citizens is the creation of a centralised database – referred to as the ‘database of honest people’ by the proposing delegate – that will contain the name, gender, date and place of birth, address, size and colour of the eyes, fingerprint and photograph of 45 million people.