Four short links: 1 February 2018

Tor + Bitcoin = De-anonymization, Classic Papers, 3D Holograms, and Big Data Privacy

By Nat Torkington
February 1, 2018
  1. Deanonymizing Tor Hidden Service Users Through Bitcoin Transactions AnalysisThis, for example, allows an adversary to link a user with @alice Twitter address to a Tor hidden service with private.onion address by finding at least one past transaction in the blockchain that involves their publicly declared Bitcoin addresses.
  2. Great Moments in Computing — the reading list for this Princeton course is fascinating! (via Paper a Day)
  3. Learn faster. Dig deeper. See farther.

    Join the O'Reilly online learning platform. Get a free trial today and find answers on the fly, or master something new and useful.

    Learn more
  4. Volumetric 3D Images that Float in the Air (Kurzweil AI) — the video is impressive! Trap a particle with a laser, move it around really fast while illuminating it with red, green, and blue lights. Result, thanks to persistence of vision: illusion of 3D object. Brilliant!
  5. A Precautionary Approach to Big Data PrivacyIn Section 3, we discuss the levers that policymakers can use to influence data releases: research funding choices that incentivize collaboration between privacy theorists and practitioners, mandated transparency of re-identification risks, and innovation procurement. Meanwhile, practitioners and policymakers have numerous pragmatic options for narrower releases of data. In Section 4, we present advice for six of the most common use cases for sharing data. Our thesis is that the problem of “what to do about re-identification” unravels once we stop looking for a one-size-fits-all solution, and in each of the six cases we propose a solution that is tailored, yet principled.
Post topics: Four Short Links
Share: