no code implementations • 3 Nov 2023 • Jake Chanenson, Madison Pickering, Noah Apthorpe
We apply our best-performing model to privacy policies from 164 popular online services, demonstrating the effectiveness of scaling GKC-CI annotation for data exploration.
no code implementations • 5 Feb 2021 • Tu Le, Danny Yuxing Huang, Noah Apthorpe, Yuan Tian
Finally, we identify a novel risk in the VPA ecosystem: confounding utterances, or voice commands shared by multiple apps that may cause a user to interact with a different app than intended.
1 code implementation • 22 Aug 2018 • Trisha Datta, Noah Apthorpe, Nick Feamster
The number and variety of Internet-connected devices have grown enormously in the past few years, presenting new challenges to security and privacy.
Cryptography and Security
no code implementations • 7 May 2018 • Daniel Hahn, Noah Apthorpe, Nick Feamster
Data encryption is the primary method of protecting the privacy of consumer device Internet communications from network observers.
no code implementations • 11 Apr 2018 • Rohan Doshi, Noah Apthorpe, Nick Feamster
An increasing number of Internet of Things (IoT) devices are connecting to the Internet, yet many of these devices are fundamentally insecure, exposing the Internet to a variety of attacks.
no code implementations • 16 Aug 2017 • Noah Apthorpe, Dillon Reisman, Srikanth Sundaresan, Arvind Narayanan, Nick Feamster
The growing market for smart home IoT devices promises new conveniences for consumers while presenting new challenges for preserving privacy within the home.
Cryptography and Security
no code implementations • 18 May 2017 • Noah Apthorpe, Dillon Reisman, Nick Feamster
The growing market for smart home IoT devices promises new conveniences for consumers while presenting novel challenges for preserving privacy within the home.
Cryptography and Security