Blog

Most recent of my blog posts.
Blog about web technologies and games with a focus on performance and security
blurry image for loading
blurry image for loading
cryptography
Hacker's guide to deep-learning side-channel attacks: the theory
Hacker's guide to deep-learning side-channel attacks: the theory
May 2021
Learn the concepts behind deep-learning side-channels attack, a powerful cryptanalysis technique, by using it to recover AES cryptographic keys from a hardware device.
blurry image for loading
blurry image for loading
web
Insights about the first five years of Right to Be Forgotten requests at Google
Insights about the first five years of Right to Be Forgotten requests at Google
Dec 2019
This blog post distills the key findings of our longitudinal analysis of how Europe’s right to be forgotten (RTBF) is being applied in practice.
blurry image for loading
blurry image for loading
user experience
Understanding the online safety and privacy challenges faced by South Asian women
Understanding the online safety and privacy challenges faced by South Asian women
Jun 2019
For South Asian women, a major hurdle to their meaningful participation online is their ability to ensure their safety. This post illustrates this challenge by recounting the safety and privacy challenges faced by women across India, Pakistan, and Bangladesh, who talked to us about their online experiences.
blurry image for loading
blurry image for loading
security
Password checkup: from 0 to 650, 000 users in 20 days
Password checkup: from 0 to 650, 000 users in 20 days
Mar 2019
Password checkup allows users to check, in a privacy-preserving manner, whether their username and password matches one of the more than 4B+ credentials exposed by third-party data breaches of which Google is aware.
blurry image for loading
blurry image for loading
security
Account security - a divided user perception
Account security - a divided user perception
Feb 2019
This post considers the perception clash that exists between what users perceive to be their most valuable accounts (email and social networks) and those they think they should protect the most (online banking).
blurry image for loading
blurry image for loading
security
The bleak picture of two-factor authentication adoption in the wild
The bleak picture of two-factor authentication adoption in the wild
Dec 2018
This post looks at two-factor authentication adoption in the wild, highlights the disparity of support between the various categories of websites, and illuminates how fragmented the two factor ecosystem is in terms of standard adoption.
blurry image for loading
blurry image for loading
web
Quantifying the impact of the Twitter fake accounts purge - a technical analysis
Quantifying the impact of the Twitter fake accounts purge - a technical analysis
Aug 2018
This post provides an overview of the impact of the Twitter 2018 accounts purge through the lens of its impact on 16k of Twitter’s most popular accounts.
Show more
--

Get cutting edge research directly in your inbox.