- Our Work
Governments are finding themselves at a crossroads in their policies on how to find, buy, store, use and share vulnerabilities. When is it the right decision for governments to exploit a flaw in a commercial technology
Why do people post salacious photos or incendiary comments on social media, when the damage to their relationships, reputation and careers could be permanent? Why do we prefer to hire people who ...
Artificially intelligent fake accounts attack politicians and public figures on social media. Conspiracy theorists publish junk news sites to promote their outlandish beliefs. Campaigners create fake dating profiles to attract ...
It is well known that digital ads violate privacy, yet we know little about their content. Digital ads are of increasingly low-quality, and often contain manipulative and deceptive components to lure users into ...
Works in Progress Talk: Mona Wang - Leveraging Strategic Connection Migration-Powered Traffic Splitting for Privacy