Blog
Blog about web technologies and games with a focus on performance and security
cryptography
Hacker's guide to deep-learning side-channel attacks: code walkthrough
Jun 2021
Learn how to perform a deep-learning side-channels attack using TensorFlow to recover AES cryptographic keys from a hardware device power traces, step by step.
cryptography
Hacker's guide to deep-learning side-channel attacks: the theory
May 2021
Learn the concepts behind deep-learning side-channels attack, a powerful cryptanalysis technique, by using it to recover AES cryptographic keys from a hardware device.
web
Insights about the first five years of Right to Be Forgotten requests at Google
Dec 2019
This blog post distills the key findings of our longitudinal analysis of how Europe’s right to be forgotten (RTBF) is being applied in practice.
user experience
Understanding the online safety and privacy challenges faced by South Asian women
Jun 2019
For South Asian women, a major hurdle to their meaningful participation online is their ability to ensure their safety. This post illustrates this challenge by recounting the safety and privacy challenges faced by women across India, Pakistan, and Bangladesh, who talked to us about their online experiences.
security
Password checkup: from 0 to 650, 000 users in 20 days
Mar 2019
Password checkup allows users to check, in a privacy-preserving manner, whether their username and password matches one of the more than 4B+ credentials exposed by third-party data breaches of which Google is aware.
security
Account security - a divided user perception
Feb 2019
This post considers the perception clash that exists between what users perceive to be their most valuable accounts (email and social networks) and those they think they should protect the most (online banking).
security
The bleak picture of two-factor authentication adoption in the wild
Dec 2018
This post looks at two-factor authentication adoption in the wild, highlights the disparity of support between the various categories of websites, and illuminates how fragmented the two factor ecosystem is in terms of standard adoption.
Show more