26 research outputs found

    Spatialités et temporalités du handicap I : des corps discrets dans un monde discret

    Get PDF
    International audienceThis article explores the relationships that disabled people have with the space surrounding them. Extending Jacques Lévy’s work on various non-Euclidean spatialities, we study the discontinuous and discrete nature of space as inhabited by disabled people, with a focus on people with physical impairments. We start at a local scale, with perceptions of one’s body, of one’s environment, and the algorithmic nature of conscious movement. Lack of autonomy, often a consequence of society’s (lack of) accessibility, creates an experience of disjointed spaces, connected not by continuous paths which the subject can explore at will, but by fixed A to B routes. This happens at multiple levels, from the occupation of space within a dwelling or office to national travel patterns, and contributes to crips’ lack of visibility in social spaces. We follow with a study of discontinuities and discreteness in the perception of time, with an analysis of spoon theory, and discuss potential extensions to discontinuous perceptions of the self.Cet article explore les rapports qu’entretiennent les personnes handicapées avec les espaces qui les entourent. Partant du travail de Jacques Lévy sur les spatialités non-euclidiennes, nous étudions les aspects discrets et discontinus de l’espace comme lieu vécu par des personnes handicapées, en se concentrant sur les handicaps physiques. Nous commençons avec la perception du corps et de son environnement, ainsi que la nature algorithmique du mouvement conscient. La dépendance, conséquence de contraintes sociétales, mène à un vécu d’espaces disjoints, reliés non pas par des chemins explorables mais par des routes fixées. Cela se manifeste de multiples manières, de l’occupation du lieu de vie aux phénomènes de transports massifs, et contribue à l’absence de visibilité du handicap dans la société. Nous terminons par une réflexion sur la perception discrète et discontinue du temps, avec une analyse de la théorie de la cuillère et des perceptions discontinues de la conscience

    Usable everlasting encryption using the pornography infrastructure

    Get PDF
    Nine years before Snapchat and its ephemeral messages, Aumann, Ding, and Rabin introduced the idea of everlasting security: an encryption that could not be decrypted after a certain date, no matter the adversary's computing power. Their method is efficient but not adapted to real-life constraints and cannot effectively be used today. This paper looks at what potential entropy sources are available today and proposes a new solution that makes use of the already existing communications from pornography distribution networks. The method proposed has multiple advantages stemming from the fact that pornography is shameful in most societies, giving the agents plausible deniability. It is also usable off-the-shelf by individuals with limited technical skills, although it still requires some effort

    A note on the inflating enclosing ball problem

    Get PDF
    International audienc

    Counting authorised paths in constrained control-flow graphs

    Get PDF
    International audienceOur goal in this extended abstract is to investigate a model of computation inspired by control-flow graphs, automata and arithmetic circuits. The objective is to extend the definition of the first to include computing on nodes and edges

    La Covid au prisme des minorités vulnérables

    Get PDF
    International audienceThe Covid-19 pandemic as a collective experience has brought certain minority experiences closer to the majority’s. The most obvious example have been the 2020 lockdowns, which has suddendly given able-bodied individuals the experience of the homeboundedness known to crips. Some other parallels constitute an unexpected positive impact of the pandemic, which has generally increased the level of solidarity in a common ordeal. Nevertheless, most pre-pandemic social vulnerabilities have perpetuated and even worsened. From proven correlations between one’s level of precarity and vulnerability to Covid-19 to documented cases of treatment refusal to crip patients as a ressource-saving policy, most marginalities have been exacerbated by the pandemic and its handling. Although in many cases this exacerbation results from correlation and unpredictable/unsolvable practical issues, it seems very important to assert that such disparities in individuals’ vulnerabilities to the pandemic also result from deliberate political choices or death-bearing ideologies.La pandémie de CoViD-19, vue comme expérience collective, a eu un effet de convergence des vécus minoritaires avec ceux de la « norme sociale ». L’exemple le plus évident est le confinement, qui a soudainement placé les personnes valides dans la même situation d’assignation à domicile que les personnes handicapées, mais de nombreux autres parallèles se dessinent. Cette convergence s’inscrit dans les effets positifs inattendus de la pandémie, avec le surcroît de solidarités occasionnées par l’épreuve commune. Cependant, les groupes sociaux les plus vulnérables avant la pandémie le sont restés, et ont subi celle-ci avec plus de violence. Des corrélations entre la précarité et l’exposition au CoViD-19 aux cas de refus de soins aux patients handicapés au nom du triage par manque de ressources, les différentes formes de marginalités ont été exacerbées par la pandémie. S’il s’agit dans certains cas de corrélations et d’effets imprévus ou impossibles à corriger instantanément, il nous paraît très important d’avoir conscience que cette plus grande vulnérabilité à la pandémie résulte aussi souvent de choix politiques délibérés, voire d’idéologies mortifères

    Boardroom Voting: Verifiable Voting with Ballot Privacy Using Low-Tech Cryptography in a Single Room

    Get PDF
    A boardroom election is an election that takes place in a single room-the boardroom-in which all voters can see and hear each other. We present an initial exploration of boardroom elections with ballot privacy and voter verifiability that use only "low-tech cryptography" without using computers to mark or collect ballots. Specifically, we define the problem, introduce several building blocks, and propose a new protocol that combines these blocks in novel ways. Our new building blocks include "foldable ballots" that can be rotated to hide the alignment of ballot choices with voting marks, and "visual secrets" that are easy to remember and use but hard to describe. Although closely seated participants in a boardroom election have limited privacy, the protocol ensures that no one can determine how others voted. Moreover, each voter can verify that their ballot was correctly cast, collected, and counted, without being able to prove how they voted, providing assurance against undue influence. Low-tech cryptography is useful in situations where constituents do not trust computer technology, and it avoids the complex auditing requirements of end-to-end cryptographic voting systems such as PrĂŞt-Ă -Voter. This paper's building blocks and protocol are meant to be a proof of concept that might be tested for usability and improved

    Phrase-Verified Voting: Verifiable Low-Tech Remote Boardroom Voting: (How We Voted on Tenure & Promotion Cases during the Pandemic)

    Get PDF
    We present Phrase-Verified Voting, a voter-verifiable remote voting system assembled from commercial off-the-shelf software for small private elections. The system is transparent and enables each voter to verify that the tally includes their ballot selection without requiring any understanding of cryptography. This paper describes the system and its use in fall 2020, to vote remotely in promotion committees in a university. Each voter fills out a form in the cloud with their vote V (YES, NO, ABSTAIN) and a passphrase P-two words entered by the voter. The system generates a verification prompt of the (P,V) pairs and a tally of the votes, organized to help visualize how the votes add up. After the polls close, each voter verifies that this table lists their (P,V) pair and that the tally is computed correctly. The system is especially appropriate for any small group making sensitive decisions. Because the system would not prevent a coercer from demanding that their victim use a specified passphrase, it is not designed for applications where such malfeasance would be likely or go undetected. Results from 43 voters show that the system was well-accepted, performed effectively for its intended purpose, and introduced users to the concept of voter-verified elections. Compared to the commonly-used alternatives of paper ballots or voting by email, voters found the system easier to use, and that it provided greater privacy and outcome integrity

    Spatialités et temporalités du handicap II : une typologie systématique des taxes temporelles

    No full text
    International audienceLiving with a disability involves handling many costs that the general population is not aware of, which have recently been denounced in the online #CripTax campaign. Those costs can be split into many categories, the principal ones being financial costs (from buying specialised equipment to higher insurance premiums), psychological costs (with increased stress and mental loads), and finally temporal costs. Those temporal costs can be organised into a hierarchy, starting with the simplest costs arising from decreased efficiency when performing basic physical tasks. Well-meaning individuals and institutions, by trying to address the issues of this first layer, often create new types of temporal costs. This applies semi-recursively as new sets of measures and behaviours try to compensate those new costs. This article proposes a decomposition of those temporal costs into such a hierarchical structure, along with an analysis of how they are perceived by the public, which is a central component of the upper layers.Vivre avec un handicap est la source de nombreux coûts souvent ignorés par le reste de la population, qui ont récemment été la cible de la campagne #CripTax (taxe handicapée). Ces coûts peuvent être répartis en plusieurs catégories : des coûts financiers (que ce soit pour l'achat d'équipement médical ou pour des frais d'assurances plus élevés), des coûts psychologiques (liés au stress et à la charge mentale supérieure) et enfin des coûts temporels. Ces coûts temporels peuvent être structurés dans une hiérarchie dont le premier étage correspond aux coûts conséquences de la perte d'efficacité dans la réalisation de tâches physiques élémentaires. Les institutions et les individus cherchant à compenser ces coûts créent souvent de nouveaux coûts de manière indirecte, créant ainsi un étage supplémentaire. Ce processus est semi-récursif, chaque mesure prise compensant certains coûts mais créant une nouvelle catégorie plus complexe. Cet article propose une catégorisation de ces coûts temporels selon une structure hiérarchique, ainsi qu'une analyse de la perception publique de ces coûts, vu que celle-ci joue un rôle majeur dans les niveaux supérieurs de la hiérarchie

    Making more extensive and efficient typo-tolerant password checkers

    No full text
    © 2020 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for all other uses, in any current or future media, including reprinting/republishing this material for advertising or promotional purposes, creating new collective works, for resale or redistribution to servers or lists, or reuse of any copyrighted component of this work in other works.As passwords remain the main online authentication method, focus has shifted from naive entropy to how usability improvements can increase security. Chatterjee et al. recently introduced the first two typo-tolerant password checkers, their second being usable in practice while being able to correct up to 32% of typos, with no real security cost. We propose an alternative framework which corrects up to 57% of typos without affecting user experience, at no computational cost to the server
    corecore