Home
|
Logbook
|
Projects
|
Tags
Pages Tagged: privacy-research
2024/09
Ricochet Refresh - UI Redressing / Shared File Names can contained HTML
log
sec-research
privacy-research
2023/12
Disclosing a Signal Desktop UI Redressing Issue
log
sec-research
privacy-research
2023/09
Quiet - Arbitrary File Write (leading to code execution)
log
sec-research
privacy-research
2022/12
Obsidian - Malicious Websites can access internal Obsidian URIs
log
sec-research
privacy-research
2022/08
Thunderbird Decryption Oracle
log
sec-research
crypto-research
privacy-research
2021/08
NeuralHash, Semantics, Collisions and You (or When is a Cat a Dog?)
log
privacy-research
2021/08
Revisiting First Impressions: Apple, Parameters and Fuzzy Threshold PSI
log
privacy-research
2021/08
A Closer Look at Fuzzy Threshold PSI (ftPSI-AD)
log
privacy-research
2021/08
Obfuscated Apples
log
privacy-research
2021/02
FuzzyTags
log
privacy-research
project
2020/05
How not to prove your election outcome
crypto-research
evoting
log
conference
privacy-research
paper
2020/03
Zecwallet Lite Critical MITM Vulnerability
log
sec-research
privacy-research
2020/03
Zecwallet Lite Nonce Reuse Issue
log
sec-research
privacy-research
2020/02
Zecwallet, Electron and Deanonymization
log
privacy-research
2019/07
Knights and knaves run elections: Internet voting and undetectable electoral fraud
crypto-research
evoting
log
privacy-research
paper
2019/03
Addendum to How not to prove your election outcome
crypto-research
evoting
log
privacy-research
paper
2019/03
How not to prove your election outcome
crypto-research
evoting
privacy-research
log
paper
2019/03
Ceci n’est pas une preuve
crypto-research
evoting
log
privacy-research
paper
2018/06
Cwtch - decentralized, privacy-preserving, multi-party messaging protocol/app
log
sec-research
privacy-research
project
2017/12
Flaws in Smart Toys Marketed to Children
sec-research
privacy-research
log
2017/05
Queer Privacy
privacy-research
log
2017/02
OnionScan Report: Freedom Hosting II, A New Map and a New Direction.
privacy-research
log
onionscan
2017/01
OnionScan Report: Reconstructing the Finances of Darknet Markets through Reputation Systems
privacy-research
log
onionscan
2016/10
OnionScan Report: This One Weird Trick Can Reveal Information from 25% of the Dark Web
privacy-research
log
onionscan
sec-research
2016/09
OnionScan Report: September 2016 - Uptime, Downtime and Freedom Hosting II
privacy-research
log
onionscan
2016/08
OnionScan Report: August 2016 - Revisiting CARONTE; Analytics, Bitcoins and Correlations
privacy-research
log
onionscan
2016/07
OnionScan Report: July 2016 - HTTPS Somewhere Sometimes
privacy-research
log
onionscan
2016/06
OnionScan Report June 2016 - Snapshots of the Dark Web
privacy-research
log
onionscan
2016/05
OnionScan Report: May 2016 - Technologies used by Onion Services
privacy-research
log
onionscan
2016/04
OnionScan Report: April 2016 - The Tor Network: Security and Crime
privacy-research
log
onionscan
2016/02
Onionscan / Dark Web Deanonymization Summary
sec-research
privacy-research
project