Privacy   205774

« earlier    

When Coding Style Survives Compilation: De-anonymizing Programmers from Executable Binaries
The ability to identify authors of computer programs based on their coding style is a direct threat to the privacy and anonymity of programmers. While recent work found that source code can be attributed to authors with high accuracy, attribution of executable binaries appears to be much more difficult. Many distinguishing features present in source code, e.g. variable names, are removed in the compilation process, and compiler optimization may alter the structure of a program, further obscuring features that are known to be useful in determining authorship. We examine programmer de-anonymization from the standpoint of machine learning, using a novel set of features that include ones obtained by decompiling the executable binary to source code. We adapt a powerful set of techniques from the domain of source code authorship attribution along with stylistic representations embedded in assembly, resulting in successful de-anonymization of a large set of programmers.
We evaluate our approach on data from the Google Code Jam, obtaining attribution accuracy of up to 96% with 100 and 83% with 600 candidate programmers. We present an executable binary authorship attribution approach, for the first time, that is robust to basic obfuscations, a range of compiler optimization settings, and binaries that have been stripped of their symbol tables. We perform programmer de-anonymization using both obfuscated binaries, and real-world code found "in the wild" in single-author GitHub repositories and the recently leaked Nulled.IO hacker forum. We show that programmers who would like to remain anonymous need to take extreme countermeasures to protect their privacy.
programming  privacy  obfuscation 
yesterday by nmh
AP Exclusive: Google tracks your movements, like it or not
Google wants to know where you go so badly that it records your movements even when you explicitly tell it not to.
newswire  privacy  google 
yesterday by kejadlen
Multi-writer Dat could power the next Web – Aral Balkan
We’re witnessing the birth of the foundations of the next Web; the peer Web. ... I cannot stress enough how groundbreaking Dat is or how important it is to creating a free and open, decentralised, and interoperable world. It’s rare to encounter a technology that you feel could have this potential and rarer still when the people behind it are doing it for entirely the right reasons. I say rare, but what I really mean is unprecedented.

-- Aral Balkan
ar.al | 4 aug 2018
4web-warriors  internet-control  internet-freedom  internet-security  privacy  software-datproject  web-broken  web-browser  web-browser-beaker  format-article  type-information  type-opinion 
yesterday by tometaxu
Beaker Browser
A browser for the next-generation Web
Beaker is an experimental browser for exploring and building the peer-to-peer Web.
4web-warriors4web-warriors  internet-control  internet-freedom  internet-security  privacy  software  web-broken  web-browser  web-browser-beaker  format-website  type-information 
yesterday by tometaxu
BeakerBrowser ~ on Twitter
@BeakerBrowser
An experimental browser with a p2p protocol (@dat_project). Decentralize the Web!

Twitter | twitter.com | retr 15 aug 2018
4web-warriors  internet-control  internet-freedom  internet-security  privacy  software  web-broken  web-browser  web-browser-beaker  format-twitter-account  type-information 
yesterday by tometaxu

« earlier    

related tags

2018  4web-warriors  4web-warriors4web-warriors  aadmm  acceptableusepolicy  access  activity  adnetworks  ads  advertising  advocacy  ala  algorithms  alphabet  alternative  amazon  analysis  android  anonymity  ap  apple  article  articles  authority  behavioraltracking  berkman  big  biometric  biometrics  bitcoin  blogging  boston  brave  brother  browser  bsd  businessmodels  ca  caesarspalace  california  camera  certificate  certificates  chat  china  chrome  computers  computervision  configuration  consentmanagement  crystal  css  cybersecurity  data  data_leak  datagovernance  dataportability  dataprotection  deeproot  defcon  delete  design  differential  digitaltwin  ehealth  email  encryption  ethics  facebook  facedetection  fitness  format-article  format-twitter-account  format-website  freedom  freeexpression  fungibility  funny  gdpr  geolocation  gesture  global  gmail  golang  google  gps  habit  health  heatmap  history  hosting  hotel  hotjar  howto  https  ibm  indie  information  interface  internet-control  internet-freedom  internet-security  internet  internetgovernance  ios  iot  iphone  journalism  k-anonymity  k-map  kids  l-diversity  law  legal  localhost  location  locationdata  longreads  macos  mail  maps  marketing  mic  microsoft  mobile  network  newswire  obfuscation  online  onlinebanking  opensource  otf  ownership  paint  personality  phones  policy  politics  pricing  privacy  privacy_shield  profiling  programmatic  programming  proposal  publishing  registration  relationships  research  safety  score  search  searchengine  secure  security  service  socialmedia  software-datproject  software  solid  ssl  studentdata  surveillance  surveillance_capitalism  surveillanceoverride  targeting  technology  thailand  tls  to_do  toolkits  tools  totwitter  tracking  tree  trump  tutorial  type-information  type-opinion  visualization  vpn  web-broken  web-browser-beaker  web-browser  web  wellness  δ-presence 

Copy this bookmark:



description:


tags: