GULYÁS, Gábor György, Ph.D.

Blog

Search results

Back to the blog

Behavioral fingerprinting in iOS 9 and tracking the Tor Browser users (part 2 of 2)

2016-06-13 | Gabor

Tags: anonymity, tracking, uniqueness, pet symposium, paper, fingerprinting

 

Behavioral fingerprinting in iOS 9 and tracking the Tor Browser users (part 1 of 2)

2016-06-06 | Gabor

Tags: anonymity, tracking, uniqueness, pet symposium, paper, fingerprinting

 

Use kmap to visualize anonymity/uniqueness in your data

2016-05-26 | Gabor

Tags: anonymity, visualization, plot, kmap, anonymity set, uniqueness

 

Re-addressing fundamental issues of practical privacy technology

2016-01-12 | Gabor

Tags: anonymity, privacy, surveillance, encryption, privacy-enhancing technology

 

LocationGuard and the anonymity paradox

2015-12-18 | Gabor

Tags: web tracking, tracking, anonymity paradox, location guard, location privacy

 

Update your TOR Browser settings - otherwise it is less anonymous than you would think

2015-11-30 | Gabor

Tags: anonymity, tor, tbb, bug

 

Predicting anonymity with neural networks

2015-10-09 | Gabor

Tags: anonymity, privacy, machine learning, anonymity measure, neural networks

 

Predicting anonymity with machine learning in social networks

2015-08-11 | Gabor

Tags: anonymity, machine learning, anonymity measure

 

Need of anonimity II. - Rock privacy in 8 easy steps!

2014-03-11 | Gabor

Tags: profiling, anonymity, tracking, nsa, prism, data retention, ebook, tresorit blog

 

Need of anonimity I. - How to rock privacy

2014-02-12 | Gabor

Tags: profiling, anonymity, tracking, privacy-enhancing technologies, false-beliefs, nsa, tresorit blog

 

Using privacy enhancing technologies properly

2013-10-16 | Gabor

Tags: anonymity paradox, privacy-enhancing technologies, rationality, disposable email

 

Preventing misuses and misapprehensions of FireGloves

2013-08-26 | Gabor

Tags: firefox, fingerprint, firegloves, tracking, web bug, anonymity paradox

 

Blog tagcloud

CSP (1), Content-Security-Policy (1), ad industry (1), adblock (1), ads (1), advertising wars (1), amazon (1), announcement (1), anonymity (9), anonymity measure (2), anonymity paradox (3), anonymity set (1), boundary (1), bug (2), code (1), control (1), crawling (1), data privacy (1), data retention (1), data surveillance (1), de-anonymization (2), definition (1), demo (1), device fingerprint (2), device identifier (1), disposable email (1), ebook (1), el capitan (1), email privacy (1), encryption (1), end (1), extensions (1), fairness (1), false-beliefs (1), fingerprint (3), fingerprint blocking (1), fingerprinting (3), firefox (1), firegloves (1), font (1), future of privacy (2), google (1), google glass (1), home (1), hungarian keyboard layout (1), inkscape (1), interesting paper (1), internet measurement (1), keys (1), kmap (1), latex (1), location guard (1), location privacy (1), logins (1), mac (1), machine learning (3), neural networks (1), nsa (2), osx (2), paper (2), pet symposium (2), plot (1), price of privacy (1), prism (1), privacy (8), privacy enhancing technology (1), privacy-enhancing technologies (2), privacy-enhancing technology (1), profiling (2), projects (1), raising awareness (1), rationality (1), re-identification (1), simulation (1), social network (2), surveillance (2), tbb (1), thesis contest (1), tor (1), tracemail (1), tracking (12), tracking cookie (1), transparency (1), tresorit blog (4), uniqueness (3), visualization (1), web bug (3), web privacy (3), web security (1), web tracking (3), win (1), you are the product (1)

Gábor György Gulyás, PhD – © 2025 all rights reserved