The Game

I want to design a game for people to play. The game should be challenging, but also winnable by a player with modest or no skill. It should be enjoyable, and it has to be a computer game.

Is there a particular experience I want this game to create? Something that I would want to share with others?

Who’s my audience? Men? Women? There are should be aspects of the game that are appealing to women.

Graphical exam.

The Hacker Quest – Chapter one:

Dark room, candle lights up and you see ancient writings on the wall. Here, you’ll find the secret to…

Cooperative Cellular Networks

I imagine the day where people no longer have to pay for their cellular service. What’s that gonna look like? Well, say you move into this new neighborhood, this isolated city where people operate their own cells. The cell is able to hook up automatically to neighboring cells, and any participant in this system is able to use any cell that is part of the system. Proof-of-work is gonna be however many bytes the user serves through their cell.

If the building or community is already wired, then that’s even better.

Where and how are we going to keep track of account balances? A distributed ledger provides a perfect answer.

Winter after winter, nothing changes, same snow, same people, same faces.

Last year I went to a conference in Colorado. I spent the three days in my room smoking weed.

Another rejection from a journal. What’s the point of writing this shit anymore. Rejection after rejection after rejection, from people you don’t know. I can’t bring myself to do it. Can’t even bring myself to talk about my PhD time.

I hate academia. I’m leaving.

How would I want to look for vulnerabilities in code?

Surreal surroundings….

What’s a game I’d want to play?

Codebreaking

Represent ciphers as physical structures for people to explore…. and play with. Would anyone be interested in a game like that?

What Does it Mean for a Medium Access Protocol to Maintain a User’s Privacy?

The hacker doesn’t want to be identified on the wireless medium. Her individual presence on the medium should not be inferrable (except with negligible probability of course).

I don’t want to be identified on the wireless medium. When I say ‘I’, I mean an I as an end-user of a WiFi-enabled device, e.g., my phone or my laptop. My individual presense on the medium should not be inferrable (except with negligible probability of course).

I perceive the location of my cell phone to be personal data that Google has no business obtaining, or maintaining.

What is the function of a media access protocol? According to Wikipedia,

What does an adversary “see” on the medium?

Here’s an idea: Prior to sending messages on the medium, I first listen to figure out the types of devices that are already there. In doing so, I’m trying to decide if I will be identified if I behave according to my nature. Will my IEs and timing information reveal me?

Whatever is sent on the wireless medium should not identify the mobile station.

The attacker has a target and is able to monitor the wireless signals in the vicinity of the target. The attacker has one Wi-Fi card and he can monitor only one channel at a single location. The attacker’s goal is to “distinguish” the signals of all devices in range from the crowd even though they use MAC address randomization, and to “track” individual devices among “extended periods of time”.

Research question: Things being the way they are, can a user do something on an arbitrary phone to prevent themselves from being “tracked” in the various senses that are envisioned/shown/conjectured by literature? There are different stakeholders some of them may not care for example apple may not actually care to stop sending out sequence numbers in their probe request frames but as a user can I counter this somehow?

No “location” identifying information is to be broadcast on the wireless medium: location identifying information could be for instance the signal strength at a location or the id of the AP I’m currently connected to as set by the ESS.

Maybe if you are to be able to access the wireless medium effectively then you’re going to have to be trackable, to some extent. The extent to which you are willing to be tracked corresponds to the level of quality of service that you hope to receive. In other words, if you hope to receive a higher quality of service then you must be willing to be tracked.

This property, due to the restrictions of the physical world, is naturally impossible to satisfy.

The location of some of our mobile devices thus become \emph{personal data}.

A solution that is currently explored by industry is identity randomization. In this solution, stations change their addresses on the fly. To remain in session,

picks a pseudonym on the fly, and advertises this identity in its basic service area. every time it sends a message to another station, and writes that pseduonym on the sendor’s field. To authenticate itself, The other party The access

For them to remain in session.
Another solution is to to use anonymity sets, that is,

We describe an address randomization protocol that preserves a user’s privacy and at the same time enables. The protocol gurantees the following.

How do we allow for use cases of a people counter without compromising the individual privacy? Is differential privacy relevant here?

Two questions: When exploring the security of an identity randmozation scheme,

A station attempts to disguise its presence in a service area by using a pseudonym, when communicating on the medium, instead of its actual identity.

Does the distribution system really have to track me? Maybe If I need to be authenticated I guess.

How do I know you’re authentic without knowing your identity

In the first work the distribution system is malicious.

It appears that the distribution system needs to track me, but it doesn’t need to identify me

Generalized Attack strategy:
The attacker builds a distribution profile.

If the majority of stations in the universe adopt the protocol faithfully, no indivdual station can be tracked.

Interestingly, this protocol requires that access points be more computationanally capable, which gives the access point operators a justification for asking for more money.

The attacker maintains a structure that represents the

Note that these challenges do not apply to physically protected media

Chip Obfuscation

So I plan on designing and constructing a program that takes as input a behavioral description of a chip, and outputs a gate-level netlist that reveals nothing on the intended function of the chip, yet functions correctly when a certain register in the netlist is programmed with a given secret. The length of this secret determines the level of security we get as a result of applying the program on the chip description.

Introduce Yourself (Example Post)

This is an example post, originally published as part of Blogging University. Enroll in one of our ten programs, and start your blog right.

You’re going to publish a post today. Don’t worry about how your blog looks. Don’t worry if you haven’t given it a name yet, or you’re feeling overwhelmed. Just click the “New Post” button, and tell us why you’re here.

Why do this?

  • Because it gives new readers context. What are you about? Why should they read your blog?
  • Because it will help you focus you own ideas about your blog and what you’d like to do with it.

The post can be short or long, a personal intro to your life or a bloggy mission statement, a manifesto for the future or a simple outline of your the types of things you hope to publish.

To help you get started, here are a few questions:

  • Why are you blogging publicly, rather than keeping a personal journal?
  • What topics do you think you’ll write about?
  • Who would you love to connect with via your blog?
  • If you blog successfully throughout the next year, what would you hope to have accomplished?

You’re not locked into any of this; one of the wonderful things about blogs is how they constantly evolve as we learn, grow, and interact with one another — but it’s good to know where and why you started, and articulating your goals may just give you a few other post ideas.

Can’t think how to get started? Just write the first thing that pops into your head. Anne Lamott, author of a book on writing we love, says that you need to give yourself permission to write a “crappy first draft”. Anne makes a great point — just start writing, and worry about editing it later.

When you’re ready to publish, give your post three to five tags that describe your blog’s focus — writing, photography, fiction, parenting, food, cars, movies, sports, whatever. These tags will help others who care about your topics find you in the Reader. Make sure one of the tags is “zerotohero,” so other new bloggers can find you, too.