elie-logo
publications
blog
talks
press
about
search
H O M E
P U B L I C A T I O N S
B L O G
T A L K S
P R E S S
A B O U T
H O M E
P U B L I C A T I O N S
B L O G
T A L K S
P R E S S
A B O U T
search
Filter by
Type
Show All
Results
000
B L O G
Blog posts
066
Blog about web technologies and games with a focus on performance and security
Latest
Blog posts
web
Insights about the first five years of Right to Be Forgotten requests at Google
user experience
Understanding the online safety and privacy challenges faced by South Asian women
security
Password checkup: from 0 to 650, 000 users in 20 days
security
Account security - a divided user perception
security
The bleak picture of two-factor authentication adoption in the wild
web
Quantifying the impact of the Twitter fake accounts purge - a technical analysis
ai
Attacks against machine learning — an overview
ai
How to handle mistakes while using AI to block attacks
Categories
Recent blog posts for popular categories
Anti-abuse
In-depth analysis of the lessons we learned while protecting gmail users
Apr 2016
How phishing works
Aug 2015
When a porn site masquerades as the apple app store
May 2013
Hacking
Bad beat: practical attacks against poker cheating devices
Mar 2017
Royal flush: an in-depth look at poker cheating devices accessories
Nov 2016
Full(er) House: Exposing high-end poker cheating devices
Oct 2016
Network security
Taking down Gooligan part 3 — monetization and clean-up
Mar 2018
Taking down Gooligan: part 2 — inner workings
Mar 2018
Taking down Gooligan: part 1 — overview
Mar 2018
Web security
Understanding the prevalence of web traffic interception
Jun 2017
How google helps 600,000 webmasters re-secure their hacked sites every year
Jun 2016
19.5% of https sites trigger browser warning as they use sha-1 signed certificates
Jan 2015
Security
Password checkup: from 0 to 650, 000 users in 20 days
Mar 2019
Account security - a divided user perception
Feb 2019
The bleak picture of two-factor authentication adoption in the wild
Dec 2018
Video game
Predicting Hearthstone game outcome with machine learning
Oct 2016
Hearthstone 3d card viewer in pure javascript/css3
Apr 2015
I am a legend: Hacking Hearthstone with machine-learning Defcon talk wrap-up
Sep 2014
Web
Insights about the first five years of Right to Be Forgotten requests at Google
Dec 2019
Quantifying the impact of the Twitter fake accounts purge - a technical analysis
Aug 2018
How an improved responsive design and faster site increased visitor engagement by 104%
Mar 2016
How-to
Ten simple steps for keeping your laptop secure
Apr 2017
5 useful tips to bulletproof your credit cards against identity theft
Jul 2016
How to improve your online security and privacy in 10 easy steps
Jan 2016
Cryptography
Privacy
Understanding how people use private browsing
Jul 2017
Using big data to understand users' privacy concerns
May 2014
Using the microsoft geolocalization api to retrace where a windows laptop has been
Jul 2011
Ai
Attacks against machine learning — an overview
May 2018
How to handle mistakes while using AI to block attacks
Apr 2018
Challenges faced while training an AI to combat abuse
Apr 2018
User experience
Understanding the online safety and privacy challenges faced by South Asian women
Jun 2019
Meaning matters: why google switched to numeric captchas
Apr 2014
Phone screen size: bigger isn't always better
Jan 2014
show more