Skip to content
An overview of links to livetweet threads and online articles covering the talks at the Usenix Enigma 2020
Branch: master
Clone or download
Fetching latest commit…
Cannot retrieve the latest commit at this time.
Permalink
Type Name Latest commit message Commit time
Failed to load latest commit information.
.gitignore
README.md

README.md

Livetweet threads and online articles about the talks at Usenix Enigma 2020

A huge thank you to @LeaKissner and @nhfruchter for the tremendous effort put into live tweeting the conference.

If I miss anything, then please let me know. You can reach me via DM at @ChrFolini or folini@netnea.com.

Panel: Encrypted Messaging

Moderator: Jon Callas, Senior Technology Fellow, ACLU

Panelists:

  • Riana Pfefferkorn, Associate Director of Surveillance and Cybersecurity, Stanford Center for Internet and Society;
  • Daniel J. Weitzner, Founding Director, MIT Internet Policy Research Initiative;
  • Matt Blaze, Georgetown University

https://twitter.com/LeaKissner/status/1221860574490849280

https://www.theregister.co.uk/2020/01/27/clipper_lessons_learned/

https://www.tomsguide.com/news/encryption-war-enigma-2020

https://www.law.com/briefings/whats-next/ (Newsletter, subscription needed)

https://duo.com/decipher/experts-worry-crypto-war-two-may-go-the-other-way

Filippo Valsorda, Google: Securing the Software Supply Chain

https://twitter.com/LeaKissner/status/1221874853902315520

Sarah Harvey, Square Inc (= payment company): Third-Party Integrations: Friend or Foe?

https://twitter.com/LeaKissner/status/1221875281763291136

Felix Fischer, Technical University of Munich: Stack Overflow: A Story of Two Security Tales

https://twitter.com/LeaKissner/status/1221881504357240832

Francis Guibernau, Deloitte: Catch Me If You Can!—Detecting Sandbox Evasion Techniques

No live tweets

Brandon Baker, Google: BeyondProd: The Origin of Cloud-Native Security at Google

https://twitter.com/nhfruchter/status/1221915734537715713

Kenn White, MongoDB: Bringing Usable Crypto to 7 Million Developers

https://twitter.com/nhfruchter/status/1221923274679975936

Yomna Nasser: Pre-Authentication Messages as a Common Root Cause of Cell Network Attacks

https://twitter.com/nhfruchter/status/1221931788412407808

https://www.heise.de/newsticker/meldung/IMSI-Catcher-Warum-Ueberwacher-es-so-einfach-haben-4646749.html (German)

Kavya Pearlman, XR Safety Initiative: Virtual Reality Brings Real Risks: Are We Ready?

https://twitter.com/leakissner/status/1221947111530348545

https://www.theregister.co.uk/2020/01/28/enigma_vr_security_risks/

Nicolas Papernot, University of Toronto and Vector Institute: What Does It Mean for Machine Learning to Be Trustworthy?

https://twitter.com/LeaKissner/status/1221954055464861696

https://www.heise.de/newsticker/meldung/Machine-Unlearning-Algorithmen-koennen-nichts-vergessen-4646747.html (German)

Sadia Afroz, ICSI, Avast: How to Build Realistic Machine Learning Systems for Security?

https://twitter.com/LeaKissner/status/1221961345332989952

Panel: Browser Privacy: Opportunities and Tradeoffs

Moderator: Dr. Lea Kissner, Humu Panelists:

  • Justin Schuh, Google;
  • Tanvi Vyas, Mozilla;
  • Yan Zhu, Brave;
  • Eric Lawrence, Microsoft

https://twitter.com/aalvatar/status/1222203431760228352

https://www.cnet.com/news/if-chrome-fixes-privacy-too-fast-it-could-break-the-web-google-exec-warns/

https://duo.com/decipher/better-privacy-through-collaboration

Annalisa Nash Fernandez, Intercultural Strategist: Data as a Social Science: Cultural Elements in Privacy and Security

https://twitter.com/nhfruchter/status/1222232990765289473

L. Jean Camp, Indiana University: All Security Is Good(s): Design Guidance for Economics

https://twitter.com/LeaKissner/status/1222237360974225408

https://www.heise.de/newsticker/meldung/Bongo-gegen-BGP-Hijacking-Wohin-lassen-Sie-Ihre-Daten-fliessen-4647808.html (German)

Steven Buccini, Aspen Institute Tech Policy Hub: Platform Data Privacy & Security Strategies for Public Interest Research

https://twitter.com/LeaKissner/status/1222245364448653312

https://twitter.com/nhfruchter/status/1222248607308378113

Matt Bishop, Department of Computer Science, University of California, Davis: How Anonymous Is My Anonymized Data?

https://twitter.com/nhfruchter/status/1222271766216577024

Dr. Lea Kissner, Humu: Stop Failing. Start Building for Humanity.

https://twitter.com/benadida/status/1222281989228654595

https://twitter.com/nhfruchter/status/1222278393812570112

Dr. Engin Bozdag, Uber: Privacy at Speed: Privacy by Design for Agile Development at Uber

https://twitter.com/nhfruchter/status/1222286368987996161

Andrés Arrieta, Electronic Frontier Foundation: The Browser Privacy Arms Race: Which Browsers Actually Protect Your Privacy?

https://twitter.com/nhfruchter/status/1222292572430692352

Kathryn Kosmides, Founder, CEO of Garbo.io: Public Records in the Digital Age: Can They Save Lives?

https://twitter.com/LeaKissner/status/1222309611249647618

https://twitter.com/nhfruchter/status/1222309670552924160

Sanchari Das, Ph.D. Candidate and Information Security Engineer: Eyes in Your Child's Bedroom: Exploiting Child Data Risks with Smart Toys

https://twitter.com/LeaKissner/status/1222315832690147328

https://twitter.com/nhfruchter/status/1222315640062529536

Jennifer Helsby, Freedom of the Press Foundation: Next-Generation SecureDrop: Protecting Journalists from Malware

https://twitter.com/LeaKissner/status/1222322531958308864

https://twitter.com/nhfruchter/status/1222322390606045184

Panel: Disinformation

Moderator: Andrea Limbago, Virtru Panelists:

  • Renee DiResta, New Knowledge and Data for Democracy;
  • Melanie Ensign, Uber;
  • Camille Francois, Graphika

https://twitter.com/LeaKissner/status/1222564490450833409

https://twitter.com/nhfruchter/status/1222567104865427457

Joey Dodds, Galois and Free & Fair: Trustworthy Elections

https://twitter.com/LeaKissner/status/1222591914999865344

https://twitter.com/nhfruchter/status/1222592171569639425

Laurin B. Weissinger, Yale University: Internet Infrastructure Security: A Casualty of Laissez-Faire and Multistakeholderism?

https://twitter.com/LeaKissner/status/1222599484552515584

https://twitter.com/nhfruchter/status/1222599928955846656

Mieke Eoyang: Cybercrime: Getting beyond Analog Cops and Digital Robbers

https://twitter.com/LeaKissner/status/1222606242733912064

https://twitter.com/nhfruchter/status/1222606972656054272

Eva Galperin, Electronic Frontier Foundation: The State of the Stalkerware

https://twitter.com/LeaKissner/status/1222614313480814592

https://twitter.com/nhfruchter/status/1222614324859953152

https://twitter.com/IanColdwater/status/1222615224861130752

Birhanu Eshete, University of Michigan, Dearborn: Adventures with Cybercrime Toolkits: Insights for Pragmatic Defense

https://twitter.com/LeaKissner/status/1222641200919764992

https://twitter.com/nhfruchter/status/1222642910186762240

Swathi Joshi, Netflix: Reservist Model: Distributed Approach to Scaling Incident Response

https://twitter.com/nhfruchter/status/1222646867680301056

David Freeman, Facebook: The Abuse Uncertainty Principle, and Other Lessons Learned from Measuring Abuse on the Internet

https://twitter.com/LeaKissner/status/1222653317655846912

https://twitter.com/nhfruchter/status/1222653532584607745

This list is released via the Creative Commons "Attribution 4.0 International" license.

You can’t perform that action at this time.