29 research outputs found

    An Assessment of the Commission’s Proposal on Privacy and Electronic Communications:Study for the LIBE Committee

    Get PDF

    Tackling the Algorithmic Control Crisis -the Technical, Legal, and Ethical Challenges of Research into Algorithmic Agents

    Get PDF
    Algorithmic agents permeate every instant of our online existence. Based on our digital profiles built from the massive surveillance of our digital existence, algorithmic agents rank search results, filter our emails, hide and show news items on social networks feeds, try to guess what products we might buy next for ourselves and for others, what movies we want to watch, and when we might be pregnant. Algorithmic agents select, filter, and recommend products, information, and people; they increasingly customize our physical environments, including the temperature and the mood

    Leaky Forms: A Study of Email and Password Exfiltration Before Form Submission (USENIX Security'22)

    No full text
    The released dataset contains data from ten crawls performed between May 2021 and June 2021 using an extended version of DuckDuckGo’s Tracker Radar Collector.A list of the included crawls is given in the README.md file. Details of the data collection methods can be found in the published paper: Leaky Forms: A Study of Email and Password Exfiltration Before Form Submission (USENIX Security'22). Asuman Senol and Gunes Acar and Mathias Humbert and Frederik Zuiderveen Borgesius. In Proceedings of the 31st USENIX Security Symposium, Boston, USA, August 10–12, 2022.- Project website: https://homes.esat.kuleuven.be/~asenol/leaky-forms/- Paper: https://homes.esat.kuleuven.be/~asenol/leaky-forms/leaky-forms-usenix-sec22.pdf- Crawler source code: https://github.com/leaky-forms/leaky-forms-crawle

    Leaky Forms: A Study of Email and Password Exfiltration Before Form Submission

    No full text
    The released dataset contains data from ten crawls performed between May 2021 and June 2021 using an extended version of DuckDuckGo’s Tracker Radar Collector.A list of the included crawls is given in the README.md file. Details of the data collection methods can be found in the published paper: Leaky Forms: A Study of Email and Password Exfiltration Before Form Submission (USENIX Security'22). Asuman Senol and Gunes Acar and Mathias Humbert and Frederik Zuiderveen Borgesius. In Proceedings of the 31st USENIX Security Symposium, Boston, USA, August 10–12, 2022.- Project website: https://homes.esat.kuleuven.be/~asenol/leaky-forms/- Paper: https://homes.esat.kuleuven.be/~asenol/leaky-forms/leaky-forms-usenix-sec22.pdf- Crawler source code: https://github.com/leaky-forms/leaky-forms-crawle
    corecore