There is no new content.

» Go to the full list

Recent comments

» 2018.02.03. 18:24:02, Note for Firefox @ Preventing misuses and misapprehensions of FireGloves

» 2017.03.12. 20:02:46, Namrata Nayak @ Predicting anonymity with machine learning in social networks

» 2017.01.13. 20:51:19, anonymous @ Preventing misuses and misapprehensions of FireGloves

» 2016.06.12. 13:52:44, Dany_HackerVille @ Preventing misuses and misapprehensions of FireGloves

» 2014.08.29. 17:16:15, [anonymous] @ Preventing misuses and misapprehensions of FireGloves


4 results.

Re-identification explanation and an intuitive in-browser demo for social networks

| | 2017.01.10. 11:49:21  Gulyás Gábor  

By clicking on the image below, you can open an in-browser de-anonymization simulator for social networks.

Tags: social networks, de-anonymization, demo


0 comment(s).

New doctoral dissertation on anonymity

| | 2015.05.13. 20:48:57  Székely Iván  

Gábor György Gulyás, founding Editor-in-Chief of the International PET Portal and Blog successfully defended his PhD thesis titled "Protecting Privacy Against Structural De-Anonymization Attacks in Social Networks" earlier today. The peculiarity of the public defense held at the Faculty of Electrical Engineering and Informatics, Budapest University of Technology and Economics, was that not only the dissertation had been written in English but the defense procedure has also been conducted in English, and one of the two opponents, Julien Freudiger participated in the event from the US through Skype connection. The doctoral committee accepted the thesis and the oral presentation with the highest grade and awarded the PhD degree to the doctoral candidate.

A study publishing the results of the doctoral research can be accessed here.

UPDATE (2015-05-15): the dissertation is available online here.

Tags: social networks, anonymity, identity separation


0 comment(s).

Report on privacy issues in online social networks

| | 2011.10.21. 10:40:37  Székely Iván  

The SPION Project has finalized and made publicly available a deliverable that provides an overview of the state of the art in research on privacy in social networks from different perspectives (technical, legal, sociological, etc), and points to challenges and research gaps.


The objective of this deliverable is to (1) provide an overview of existing literature and case descriptions of social and community uses of online Social Network Services (SNS); (2) summary of available educational solutions and empirical evidence of the efficiency and efficacy and the satisfaction they generate; analysis of legal frameworks applicable to SNS; (3) a review of confidentiality, access control and information flow, as well as feedback and awareness solutions. The Deliverable also includes an analysis of how the gaps and challenges in the different disciplines represented in the project are interrelated, mapping out research gaps and potentials for future interdisciplinary research on privacy and security in online Social Network Services.

The document can be downloaded from here.

Tags: social networks, SPION project


2 comment(s).

Upcoming article: BlogCrypt: Private Content Publishing on the Web

| | 2011.07.18. 05:59:00  Földes Ádám Máté  

Social networks and other Web 2.0 sites are becoming more and more a part of our culture; however, we are inclined to forget about – or at least ignore – their dangers. Many of us have heard or read stories where somebody was fired because he/she friended his/her boss on Facebook, and the latter found a malignant post about the company they worked for. However, it is good to know that we are in danger even if we do not make so obvious blunders. This article describes the threats we face, and the means of defence against them. One particular defence mechanism, BlogCrypt, is described in details: a simple Firefox plugin that allows encrypting and decrypting web content as easy as it sounds.

We will publish this article on the International PET Portal & Blog the following Friday.


Voluntary disclosure of personal information is becoming more and more widespread with the advent of Web 2.0 services. Publishing such information constitutes new kinds of threats, such as further reinforcing already existing profiling techniques through correlation of perceived user activities to those publicly disclosed, but the most obvious of all is the intrinsic threat that malicious third parties collect and combine information we publish about ourselves. In this paper, we evaluate currently existing solutions that are destined for addressing this issue, then propose a model of our own for providing access control for a user over information she published and analyse our implementation thereof.

Tags: social networks, articles, profiling, web2.0, upcoming article


Source: BlogCrypt: Private Content Publishing on the Web

0 comment(s).

© International PET Portal, 2010 | Imprint | Terms of Use | Privacy Policy