All Stories

  1. Who Tracks the Trackers?
  2. Handoff All Your Privacy – A Review of Apple’s Bluetooth Low Energy Continuity Protocol
  3. Exploiting TLS Client Authentication for Widespread User Tracking
  4. Deterministic, Stash-Free Write-Only ORAM
  5. A Study of MAC Address Randomization in Mobile Devices and When it Fails