XRDS

Crossroads The ACM Magazine for Students

Sign In

Association for Computing Machinery

Magazine: Summer 2018 | Volume 24, No. 4

Paying it forward

Pseudonimity and anonymity as tools for regaining privacy

How to find relevant papers: thinking like a researcher

A history of data breaches

So you want to be an elite hacker? finding your career in cyber operations

On earthquakes, lakes, and sensors

DEPARTMENT: Blogs

On earthquakes, lakes, and sensors

The XRDS blog highlights a range of topics from conference coverage, to security and privacy, to CS theory. Selected blog posts, edited for print, are featured in every issue. Please visit xrds.acm.org/blog to read each post in its entirety. If you are interested in joining as a student blogger, please contact us.

By Gunnar Wolf

HTML | In the Digital Library
Tags: Earth and atmospheric sciences, Sensor networks, Wireless mesh networks

Demistifying the dark web

SECTION: Features

Demistifying the dark web

Anonymity network overlays have a dark shroud of mystery. The "dark web" is known to everybody and nobody. But what is it, really?

By Vasilis Ververis

HTML | In the Digital Library
Tags: Broadband access, Network privacy and anonymity, Pseudonymity, anonymity and untraceability, Surveillance, Technology and censorship

Autonomous infrastructure for a suckless internet

Autonomous infrastructure for a suckless internet

How can we promote an internet that respects human rights? Investing in autonomous infrastructure built and operated by politically motivated techies, who put their skills at the service of the public interest, may be the answer.

By Stefania Milan

HTML | In the Digital Library
Tags: Human and societal aspects of security and privacy, Public Internet, Self-organizing autonomic computing, Wireless access networks

The principle of least authority: how capabilities can improve internet-scale privacy

The principle of least authority: how capabilities can improve internet-scale privacy

The core protocols our computers use to communicate across the internet need to be improved in order to give users control over their privacy and protect metadata. Capabilities encode information about what can be done with data into the data itself, and may be a useful building block for the next generation of internet protocols.

By Jack Grigg

HTML | In the Digital Library
Tags: Access control, Database and storage security, Overlay and other logical network structures, Privacy-preserving protocols

Routes to rights: internet architecture and values in times of ossification and commercialization

Routes to rights: internet architecture and values in times of ossification and commercialization

This article discusses the consequences of the commercialization and evolution of the Internet infrastructure, and how it affects our ability to exercise human rights online.

By Niels ten Oever, Davide Beraldo

HTML | In the Digital Library
Tags: Centralization / decentralization, Human and societal aspects of security and privacy, Privacy policies, Privacy-preserving protocols

Stop looking over our shoulders!

Stop looking over our shoulders!

The global push for secure digital identities, privacy tools, and online rights.

By Kali Kaneko

HTML | In the Digital Library
Tags: Network access control, Pseudonymity, anonymity and untraceability, Software and application security, Surveillance

How to fix email: making communication encrypted and decentralized with autocrypt

How to fix email: making communication encrypted and decentralized with autocrypt

Email has been declared dead many times but refuses to die. There is a new effort underway to make encrypted end-to-end email communication as automatic as possible. It is part of a diverse set of efforts to reinvigorate the email ecosystem, which remains a crucial cornerstone of a functioning, open internet.

By Holger Krekel, Karissa McKelvey, Emil Lefherz

HTML | In the Digital Library
Tags: Cryptography, Email, Software and application security, Surveillance

Can we build a privacy-preserving web browser we all deserve?

Can we build a privacy-preserving web browser we all deserve?

The web is the biggest legacy application ever developed or supported by software engineers, but it's also blurring the line between the consumption of data and the leaking of personal details. Browser makers may be the only line of defense.

By Christoph Kerschbaumer, Luke Crouch, Tom Ritter, Tanvi Vyas

HTML | In the Digital Library
Tags: Browser security, Privacy protections, World Wide Web

The case for regulating social networks and the internet

The case for regulating social networks and the internet

We don't need to miss out on the joys of technology in order to regain what liberty and democracy are supposed to mean, but the regulatory transformation we need is of epic proportions.

By carlo von lynX

HTML | In the Digital Library
Tags: Internet telephony, Network protocols, Privacy policies, Pseudonymity, anonymity and untraceability, Web mining

Christopher Sheats<br /> Founder of the Emerald Onion

Encrypting a functionality<br />Crypto Lab, University of Texas at Austin

Anonymity: from Plato to Tor