Error message

Deprecated function: implode(): Passing glue string after array is deprecated. Swap the parameters in Drupal\gmap\GmapDefaults->__construct() (line 107 of /mnt/w/cyberlaw/docs/prod/sites/all/modules/contrib/gmap/lib/Drupal/gmap/GmapDefaults.php).

Publications

Apple and Google Announced a Coronavirus Tracking System. How Worried Should We Be?

Author(s): 
Jennifer Granick
Publication Date: 
April 16, 2020
Publication Type: 
White Paper / Report

Apple and Google last week announced a joint contact tracing effort that would use Bluetooth technology to help alert people who have been in close proximity to someone who tested positive for COVID-19. Similar proposals have been put forward by an MIT-associated effort called PACT as well as by multiple European groups.
Read more about Apple and Google Announced a Coronavirus Tracking System. How Worried Should We Be?

The Limits of Location Tracking in an Epidemic

Author(s): 
Jennifer Granick
Publication Date: 
April 8, 2020
Publication Type: 
White Paper / Report

As Americans struggle to confront the COVID-19 outbreak, some have suggested that cell phone location tracking technology can help in the effort to contain the disease. The tech industry and the White House are reportedly having conversations over how information technology might be deployed, and there is increasing discussion about how foreign countries are using technology. The governor of Florida has even floated the idea of using an app to track visitors from COVID-19 hotspot New York. Read more about The Limits of Location Tracking in an Epidemic

Vulnerability reporting is dysfunctional

Author(s): 
Arvind Narayanan
Jonathan Mayer
Publication Date: 
March 25, 2020
Publication Type: 
Other Writing

In January, we released a study showing the ease of SIM swaps at five U.S. prepaid carriers.  These attacks—in which an adversary tricks telecoms into moving the victim’s phone number to a new SIM card under the attacker’s control—divert calls and SMS text messages away from the victim. This allows attackers to receive private information such as SMS-based authentication codes, which are often used in multi-factor login and password recovery procedures.  Read more about Vulnerability reporting is dysfunctional

Pages

Subscribe to Publications