[PET] PET Digest, Vol 54, Issue 2

L Jean Camp ljcamp at indiana.edu
Fri Nov 2 20:09:40 GMT 2012

We could ask one of the Silent Circle founders to speak at PETS. We
could at least get a SC engineer. Certainly by PETS the code should be
out, and if not then SC might want a kind of open community code
review. They have addressed some interesting threats. For example,
their PSP was selected not for lowest rate but commitment to transmit
and store less information.

On Thu, Nov 1, 2012 at 8:00 AM,  <pet-request at lists.links.org> wrote:

> Today's Topics:
>    1. Silent Circle (Wright, Matthew)
>    2. Privacy Researcher Opportunities at NICTA, Sydney (Roksana Boreli)
>    3. AnTe, Special Issue on Privacy-aware electronic society -
>       Deadline  Extended: November 8th, 2012 (sara.foresti at unimi.it)
>    4. Re: UK proof of age PET pilot (Tom Ritter)
> ----------------------------------------------------------------------
> Message: 1
> Date: Thu, 18 Oct 2012 05:55:11 -0500
> From: "Wright, Matthew" <mwright at uta.edu>
> To: Discussion of privacy enhancing technologies <pet at lists.links.org>
> Subject: [PET] Silent Circle
> Message-ID: <2691111D-4701-417E-8863-BE806722848E at cse.uta.edu>
> Content-Type: text/plain; charset="us-ascii"
> I gather that this isn't (yet?) open source. It's supposed to be easy-to-use encryption (smart phone app), sent through a single proxy that I guess? is effectively a one-hop anonymizer.
> https://silentcircle.com/web/how-it-works/
> Phil Zimmerman is among the creators.
> https://silentcircle.com/web/about/
> cheers-
> Matt
> -------------- next part --------------
> An HTML attachment was scrubbed...
> URL: <http://lists.links.org/pipermail/pet/attachments/20121018/855af3f7/attachment-0001.html>
> ------------------------------
> Message: 2
> Date: Wed, 24 Oct 2012 14:18:58 +1100
> From: Roksana Boreli <Roksana.Boreli at nicta.com.au>
> To: "pet at lists.links.org" <pet at lists.links.org>
> Subject: [PET] Privacy Researcher Opportunities at NICTA, Sydney
> Message-ID: <CCADA670.16C9A%roksana.boreli at nicta.com.au>
> Content-Type: text/plain; charset="Windows-1252"
> Please feel free to forward the below ad to colleagues who may be interested.
> Kind regards, Roksana
> Dr Roksana Boreli
> Research Leader
> ____________________________________________
> Privacy Researcher Opportunities at NICTA, Sydney
> NICTA's Network Research Group is looking for researchers and post-docs with experience in privacy enhancing technologies, in line with our current work in this area http://www.nicta.com.au/research/projects/trusted_networking/ . Successful candidates will contribute to the research activity at NICTA.
> About NICTA
> NICTA (National ICT Australia Ltd) is Australia's Information and Communications Technology Research Centre of Excellence. Our primary goal is to build and deliver excellence in ICT research and commercial outcomes for Australia. Since NICTA was founded in 2002, it has created five startups, developed a substantial technology and intellectual property portfolio, and continues to supply new talents to the ICT industry through a NICTA-supported PhD program. With 5 laboratories around Australia and over 700 staff, NICTA is the largest organisation in Australia dedicated to ICT research.
> Accountability and Associated Responsibilities:
> ?Achieve the highest international standards of research.
> ?Publish results of research in top tier venues targeted at security and privacy e.g. S&P, CCS, USENIX Security, NDSS, PETS etc.
> ?Participate in supervision and review of PhD students.
> Essential Requirements:
> ?PhD qualification in a relevant area of CS, Engineering, or related fields.
> ?Proven research experience in privacy enhancing technologies.
> ?High quality publications in top tier journals and conferences relevant to privacy enhancing technologies.
> Salary and conditions are commensurate with experience. The positions are based at the ATP Laboratory in Sydney, Australia. Applications will be considered as they arrive and the start date is negotiable.
> For further information please contact Roksana Boreli roksana.boreli(at)nicta.com.au or Arik Friedman, arik.friedman(at)nicta.com.au .
> ________________________________
> The information in this e-mail may be confidential and subject to legal professional privilege and/or copyright. National ICT Australia Limited accepts no liability for any damage caused by this email or its attachments.
> ------------------------------
> Message: 3
> Date: Tue, 30 Oct 2012 10:51:15 +0200
> From: sara.foresti at unimi.it
> To: pet at lists.links.org
> Subject: [PET] AnTe, Special Issue on Privacy-aware electronic society
>         -       Deadline        Extended: November 8th, 2012
> Message-ID: <0MCP005UTA1FEA20 at mta02.msg.unimi.it>
> Content-Type: text/plain; charset=us-ascii
> [Apologies if you receive multiple copies of this message]
> ** deadline extended: November 8th, 2012 **
> **********************************************************************
> Annals of Telecommunications:
> Special Issue on: Privacy-aware electronic society
> http://www.annales-des-telecommunications.com/en_accueil.html
> **********************************************************************
> Our electronic society is making fast progress for offering users greater
> comfort in their daily activities. Users can benefit from fast access to
> services, better reactivity of their physical, computing and
> networking environments to their own needs and habits, and preselection of
> information flows and relationships they have interest in. Our digital society
> is eager to collect information for serving users as best as possible, but
> also to make profits by potentially selling the collected information.
> Profiling users is one usual marketing activity, but new lucrative
> applications based on the huge amount of available information are emerging,
> with total disregard to the privacy of the users.
> There are a number of sources for collecting information like social networks,
> cloud computing, electronic transactions, RFID/NFC systems, biometrical
> applications... For users to keep confidence in computing systems and
> communication networks, and for making their basic privacy rights observed,
> there is a strong need to identify a framework covering the legal, economical,
> ethical, social and technical disciplines. Regulation is essential for
> authorities to approve that framework and give support for worldwide
> observability. Economy is also a key issue for users and providers negotiating
> the delivery of personal information vs the provision of a service at an
> acceptable price. Ethical and social aspects are also important, at least to
> identify how confidence can be best provided back to users. Finally, methods
> are fundamental for enforcing this framework through privacy-by-design, and
> in-depth knowledge of privacy threats.
> Given the recent events reported by the media, the growing requirements of
> users for privacy, and the lack of privacy-aware framework, Annals of
> Telecommunications is organizing a Special Issue on these topics. The
> objectives of this Special Issue are twofold: first, research and
> implementation experiences, and experiments; second, novel research
> contributions addressing privacy issues under the technical viewpoint and one
> among the legal, economical, ethical or social viewpoint.
> The topics of interest include, but are not limited to:
> - Economics of privacy;
> - Human factors in privacy;
> - Legal and ethical issues;
> - Privacy by design;
> - Privacy enhancing technologies;
> - Privacy in networks, and services;
> - Privacy in smart grids, and cloud computing;
> - Privacy in social applications and networks;
> - Privacy models;
> - Privacy threats.
> Guest Editors:
> - Maryline Laurent, Telecom SudParis, France
>   (Maryline . Laurent at telecom-sudparis . eu)
> - Sara Foresti, Università degli Studi di Milano, Italy
> - Heng Xu, Pennsylvania State University, USA
> Submissions:
> The manuscript must be in English and comprise between 5,000 and 8,500 words
> (30,000 to 50,000 characters including spaces). They must describe original
> research not published or currently under review by other journals or
> conferences. Submissions should be sent according to the editorial procedure
> described in the instructions available at:
> http://www.annals-of-telecommunications.com/p_en_publish_6.html
> Schedule:
> - Manuscript submission: November 8th, 2012 [Extended!!]
> - Expected publication: September-December 2013
> CFP available at:
> http://www.annals-of-telecommunications.com/archive/102/CfP_privacy_aware_electronic_soc.pdf
> http://www-public.it-sudparis.eu/~lauren_m/Special-Issue/CfP_privacy_aware_electronic_society-2012.pdf
> ------------------------------
> Message: 4
> Date: Thu, 18 Oct 2012 12:32:42 -0400
> From: Tom Ritter <tom at ritter.vg>
> To: Discussion of privacy enhancing technologies <pet at lists.links.org>
> Subject: Re: [PET] UK proof of age PET pilot
> Message-ID:
>         <CA+cU71k_53vqyNxgvJFpT5uzbJzNvsviTT4ZzNL0dMhYONa3WA at mail.gmail.com>
> Content-Type: text/plain; charset=ISO-8859-1
> Based on the description, it seems the system would be vulnerable to
> forgery if someone reverse engineers the details of the encryption on
> the card.  They'd be able to create their own stickers that said
> anything.  Even if they used a secret as part of the encryption key,
> that secret would need to be on the checking systems also, which would
> be vulnerable to theft/bribery.
> ... Unless, the birthdate was first encrypted with the user's
> fingerprint hash, and then signed by a private key of the government,
> with the corresponding public key on the verification systems...
> -tom
> ------------------------------
> _______________________________________________
> PET mailing list
> PET at lists.links.org
> http://lists.links.org/mailman/listinfo/pet
> End of PET Digest, Vol 54, Issue 2
> **********************************

Prof. L. Jean Camp
Net Trust
Economics of Security
Congressional Fellow

More information about the PET mailing list