First-party Google Analytics
Third party analytics services are suffering from the growing prevalence of ad blocking, tracking protection, and the trend of minimizing connections and requests. However, from a site owner...
View ArticleAnother Strike against Domain Fronting
In 2014, Domain Fronting became the newest obfuscation technique for covert, difficult to censor communication. Even today, the Meek Pluggable transport serves ~400GB of Tor traffic each day, at a cost...
View ArticleIETF 98
Last week I talked briefly about the state of open internet measurement for network anomalies at IETF 98. This was my first time attending an IETF in-person meeting, and it was very useful in getting a...
View ArticleInitial Measurements of the Cuban Street Network
Internet access in Cuba is severely constrained, due to limited availability, slow speeds, and high cost. Within this isolated environment, technology enthusiasts have constructed a disconnected but...
View ArticleMessaging Threat models
I talked yesterday at Bornhack about the current state of secure messaging and the different primitives and threats that groups are working to address. The talk is on youtube. The slides are on this...
View ArticleHRPC Research
It’s great to see that Research into Human Rights Protocol Considerations has been published as an RFC. An interesting document exploring how the technical protocols of the Internet interact with our...
View ArticleOpen Letter to the Cuba Internet Task Force
The following is a response to an invitation to participate in the recently formed Cuba Internet Task Force. Task Force Representatives: I will not be joining the Cuba Internet Task Force, or...
View ArticleEthics of Censorship Measurement
I gave a talk this past summer at DEFCON on the ethical quandary that continues to play a role in the academic discussion of network censorship measurement. Over the course of my phd studies, there...
View ArticlePrivate Retrieval
It’s very exciting to have a public face to the thoughts around how to enable effective private access to data. Research Announcement EthCC Announcement The basic hypothesis here is that there’s a...
View Article