Posts Tagged ‘privacy’

Summarizing 4 conferences last week: AACR ’15, ISEV ’15, BioIT ’15 & ICEBEM 2015

April 28, 2015

AACR 2015
http://www.aacr.org/Meetings/Pages/MeetingDetail.aspx?EventItemID=25#.VT8JXa1Viko https://linkstream2.gerstein.info/tag/i0pcawg15/

ISEV/ERCC Education Day – ISEV – International Society for
Extracellular Vesicles
http://www.isevmeeting.org/isevercc-education-day.html
https://linkstream2.gerstein.info/tag/i0isev/

2015 Bio-IT World Conference & Expo
http://www.bio-itworldexpo.com/
https://linkstream2.gerstein.info/tag/i0bioit15/
http://lectures.gersteinlab.org/summary/Progressive-summarization-large-scale-data-interpret-cancer–20150423-i0bioIT15/

8th International Conference on Ethics in Biology, Engineering & Medicine (ICEBEM 2015)
http://www.downstate.edu/orthopaedics/bioethics/
http://lectures.gersteinlab.org/summary/Soc-n-Tech-Soln-to-Privacy-in-Personal-Genomics–20150424-i0icebem15/

Tweets for all of them
https://storify.com/markgerstein/favorite-tweets-from-bioit-15-aacr-15-and-isev-15-16

truecrypt fork

March 24, 2015

https://veracrypt.codeplex.com/

Quantum internet could keep us safe from spying eyes – tech – 18 September 2014 – New Scientist

March 15, 2015

#Quantum internet could keep us safe from spying eyes http://www.newscientist.com/article/mg22329873.000-quantum-internet-could-keep-us-safe-from-spying-eyes.html#.VQOzLBDF87M Uses photon states for intercept-proof key distribution (#QKD)

QT:{{"
That something is called quantum key distribution (QKD). The technique
transmits photons in particular quantum states to generate a secure
cryptographic key, with which you can encrypt data sent over an
ordinary, non-quantum connection. QKD is far more secure than standard
cryptography, which relies on hard mathematical problems that can
theoretically be cracked, given enough computing power. Any attempt to
intercept a quantum key, however, will disturb the photon’s quantum
states, alerting users not to use the key (see "Unbeatable security")."}}

The Secret Life of Passwords – NYTimes.com

March 8, 2015

Secret life of passwords http://www.nytimes.com/2014/11/19/magazine/the-secret-life-of-passwords.html Our habit to use one secret to encode another & how this was helpful in the aftermath of 911

Private Link by bitly

March 4, 2015

http://blog.bitly.com/post/31527664770/public-and-private-whats-the-difference

Privacy in Pharmacogenetics: An End-to-End Case Study of Personalized Warfarin Dosing | USENIX

February 20, 2015

Privacy in Pharmacogenetics…Personalized Warfarin Dosing
https://www.usenix.org/conference/usenixsecurity14/technical-sessions/presentation/fredrikson_matthew Model-inversion attack; differential privacy doesn’t help

Authors:
Matthew Fredrikson, Eric Lantz, and Somesh Jha, University of Wisconsin—Madison; Simon Lin, Marshfield Clinic Research Foundation; David Page and Thomas Ristenpart, University of Wisconsin—Madison

Awarded Best Paper!

My Childhood Memories Are Locked in a Yahoo Account

February 1, 2015

My Childhood Memories Are Locked in a Yahoo Account http://www.theatlantic.com/technology/archive/2014/06/i-asked-the-internet-to-guess-the-answers-to-my-security-questions/373223 Nice example illustrating difficult tradeoffs in #datasecurity

The Slippery Slope of Silicon Valley – NYTimes.com

December 11, 2014

The Slippery Slope of Silicon Valley
http://www.nytimes.com/2014/11/27/style/uber-facebook-and-others-bedeviled-by-moral-issues.html #Tech world Yin-&-yang – eg for $GOOG, amazing free services v #privacy concerns

Five Eyes – Wikipedia, the free encyclopedia

December 8, 2014

http://en.wikipedia.org/wiki/Five_Eyes

Duffel Blog : NSA Intercepted Children’s Letters To Santa

November 30, 2014

#NSA Intercepted Children’s Letters To Santa http://www.duffelblog.com/2013/12/nsa-letters-to-santa N Pole address is non-US & OK for snooping HT @peterwsinger @DuffelBlog