Follow Slashdot stories on Twitter

 



Forgot your password?
typodupeerror

Comment Re:Covertly transferring images from your phone (Score 3, Insightful) 71

You have to differentiate between experimentation and use; when you test the idea you need to make sure that your users knowledge of what you are doing is not affecting your results and weakening your conclusion. Of course, if ever deployed, you have to tell people what are they doing.
The Internet

Submission + - Using Virtual Worlds to 'Soft Control' People's Movements in the Real One (northwestern.edu)

pinguin-geek writes: Computer science researchers at Northwestern University have developed a way to exert limited control one how people move, pushing them out of their regular travel patterns. The key: tapping into some of their cell phone applications. The findings could elicit a broader range of user-collected data by driving foot traffic to under-utilized areas.
Privacy

Submission + - Privacy in BitTorrent by Hiding in the Crowd

pinguin-geek writes: Researchers at the McCormick School of Engineering and Applied Science at Northwestern University have identified a new "guilt-by-association" threat to privacy in peer-to-peer (P2P) systems that would enable an eavesdropper to accurately classify groups of users with similar download behavior. While many have pointed out that the data exchanged over these connections can reveal personal information about users, the researchers shows that only the patterns of connections — not the data itself — is sufficient to create a powerful threat to user privacy. To thwart this threat, they have released SwarmScreen, a publicly available, open source software that restores privacy by masking a user's real download activity in such a manner as to disrupt classification. For the full story ....

Slashdot Top Deals

Kiss your keyboard goodbye!

Working...