Syndicated Blog

Elie on Internet Security and Performance
Blog about security and privacy.
Insights about the first five years of Right to Be Forgotten requests at Google

Insights about the first five years of Right to Be Forgotten requests at Google

|
The “Right to be Forgotten” (RTBF) is a landmark European ruling that governs the delisting of personal information from search results. This ruling establishes a right to privacy, whereby individuals can request ...
Understanding the online safety and privacy challenges faced by South Asian women

Understanding the online safety and privacy challenges faced by South Asian women

|
For South Asian women, a major hurdle to their meaningful participation online is their ability to ensure their safety. This post illustrates this challenge by recounting the safety and privacy challenges faced ...
Password checkup: from 0 to 650, 000 users in 20 days

Password checkup: from 0 to 650, 000 users in 20 days

|
On February 5th, for Safer Internet Day, our team launched its first public-facing system, called Password Checkup . Password checkup allows users to check, in a privacy-preserving manner, whether their username and ...
Account security - a divided user perception

Account security – a divided user perception

|
This post considers the perception clash that exists between what users perceive to be their most valuable accounts (email and social networks) and those they think they should protect the most (online ...
Rethinking the detection of child sexual abuse imagery on the internet

Rethinking the detection of child sexual abuse imagery on the internet

|
A critical part of child sexual abuse criminal world is the creation and distribution of child sexual abuse imagery (CSAI) on the Internet. To combat this crime efficiently and illuminate current defense ...
The bleak picture of two-factor authentication adoption in the wild

The bleak picture of two-factor authentication adoption in the wild

|
This post looks at two-factor authentication adoption in the wild, highlights the disparity of support between the various categories of websites, and illuminates how fragmented the two factor ecosystem is in terms ...
Quantifying the impact of the Twitter fake accounts purge - a technical analysis

Quantifying the impact of the Twitter fake accounts purge – a technical analysis

|
This post provides an overview of the impact of the Twitter 2018 accounts purge through the lens of its impact on 16k of Twitter’s most popular accounts. Overall, we found that on ...
How to Successfully Harness AI to Combat Fraud and Abuse - RSA 2018

Attacks against machine learning — an overview

|
This blog post survey the attacks techniques that target AI (artificial intelligence) systems and how to protect against them. At a high level, attacks against classifiers can be broken down into three ...
How to Successfully Harness AI to Combat Fraud and Abuse - RSA 2018

How to handle mistakes while using AI to block attacks

|
This post looks at the main difficulties faced while using a classifier to block attacks: handling mistakes and uncertainty such that the overall system remains secure and usable. At a high level, ...
How to Successfully Harness AI to Combat Fraud and Abuse - RSA 2018

Challenges faced while training an AI to combat abuse

|
This post looks at the main challenges that arise when training a classifier to combat fraud and abuse. At a high level, what makes training a classifier to detect fraud and abuse ...