Home // About

science

Category
  • A QR code on food? (February 11, 2025)
  • Do fair design patterns exist? (February 7, 2024)
  • Analysing the proposal to regulate the digital euro (December 4, 2023)
  • Clearghost: Using the laws of nature to limit digital surveillance by law enforcement. (October 24, 2023)
  • A simulator for dynamic electricity contracts (with some surprising results) (June 15, 2023)
  • A proposal for a privacy friendly digital euro, using the existing payment infrastructure (March 3, 2023)
  • Analysing the Architecture of the European Digital Identity Framework. (February 14, 2023)
  • Summary of the 3rd Privacy Engineering Network (PEN-NL) workshop (February 6, 2023)
  • Mutual Contact Discovery (September 27, 2022)
  • Using revocable privacy to mitigate the risk of false accusations (July 7, 2021)
  • Contact discovery and notification. Some new privacy concerns (January 14, 2021)
  • Universities need to Act, Digitally (We don’t need a Digital University Act). (January 10, 2021)
  • A Corona Credential? (April 1, 2020)
  • Hansel and Gretel and the Virus: Privacy Conscious Contact Tracing (March 25, 2020)
  • Two faces of blind signatures (January 24, 2020)
  • Privacy friendly public transport ticketing (August 29, 2019)
  • Do they really need to know who you are? (June 26, 2019)
  • Review of 'Stand out of our light' by James Williams (March 26, 2019)
  • Open access should be free for both authors and readers (January 30, 2019)
  • Defining Distributed Ledgers (November 22, 2018)
  • Transparency is the perfect cover-up (if the sun does *not* shine) (June 4, 2018)
  • Privacy design strategies: the little blue book released. (May 25, 2018)
  • Privacyontwerpstrategieën: publicatie van het blauwe boekje. (May 25, 2018)
  • How the military thinks about cyberspace (November 3, 2017)
  • Blockcerts: Using blokchain for identity management is (mostly) ridiculous (September 6, 2017)
  • The challenges of privacy engineering (August 2, 2017)
  • Interdisciplinary Summerschool on Privacy (ISP 2017), day #4 (June 23, 2017)
  • Interdisciplinary Summerschool on Privacy (ISP 2017), day #2 (June 22, 2017)
  • Interdisciplinary Summerschool on Privacy (ISP 2017), day #1 (June 20, 2017)
  • Fix TLS. Let’s get rid of certificates. (A clarification and some improvements.) (February 28, 2017)
  • Fix TLS. Let's get rid of certificates. (February 26, 2017)
  • Using icons to summarise privacy policies: an analysis and a proposal. (September 21, 2016)
  • Summary of Day #5 of the Interdisciplinary Summerschool on Privacy (July 15, 2016)
  • Summary of Day #4 of the Interdisciplinary Summerschool on Privacy (July 14, 2016)
  • Summary of Day #1 of the Interdisciplinary Summerschool on Privacy (July 12, 2016)
  • Summary of Day #2 of the Interdisciplinary Summerschool on Privacy (July 12, 2016)
  • A very good example of why privacy is important (February 1, 2016)
  • The value of verifying public keys revisited. Or: how to limit the options for dragnet surveillance. (September 4, 2015)
  • WiFi in de trein is volstrekt onveilig. Nou en? (August 7, 2015)
  • Highlights of the 15th Privacy Enhancing Technologies Symposium 2015, day #2. (July 1, 2015)
  • Highlights of the 15th Privacy Enhancing Technologies Symposium 2015, day #1. (June 30, 2015)
  • Privately (and unlinkably) exchanging messages using a public bulletin board (June 22, 2015)
  • Burnrchat. A design sprint for an anonymous messaging app. (June 12, 2015)
  • In federated identity management, the issuer signing key poses a risk. (May 22, 2015)
  • Hoe houden we de digitale wereld menselijk? (April 28, 2015)
  • Location-restricted access to data. (April 20, 2015)
  • The ABC of ABC - An Analysis of Attribute-Based Credentials in the Light of Data Protection, Privacy and Identity (March 27, 2015)
  • Using attribute based credentials for auditable access control (February 18, 2015)
  • Highlights of the Real World Cryptography 2015 workshop, day #3 (January 10, 2015)
  • Highlights of the Real World Cryptography 2015 workshop, day #2 (January 9, 2015)
  • Highlights of the Real World Cryptography 2015 workshop, day #1 (January 8, 2015)
  • Why Peerby Works - And what we can learn from this to develop successful privacy friendly apps and services. (January 1, 2015)
  • Limiting the risk of federation in identity management (somewhat). (December 5, 2014)
  • Wat je niet hebt kun je ook niet afgeven - Kentekenparkeren zonder dat de Belastingdienst mee kan kijken. (November 13, 2014)
  • Het eID-stelsel: kort verslag van een discussie. (October 13, 2014)
  • Improving (i)Cloud security. (September 6, 2014)
  • PETs (Privacy Enhancing Technologies) post Snowden (July 18, 2014)
  • The future of IRMA: ideas to improve Attribute Based Credentials. (July 3, 2014)
  • Google gaat PGP voor Gmail ondersteunen. Wat betekent dit precies? (June 6, 2014)
  • Active authentication: continuously making sure that the owner of a smart phone is actually using it. (June 2, 2014)
  • Two types of location privacy (May 28, 2014)
  • Securely using a single master password on all sites you visit. (April 21, 2014)
  • How to more securely sign in to an account using a password that is shared across several services? (March 7, 2014)
  • What is the value of verifying public keys? (March 7, 2014)
  • Something's wrong with how Threema exchanges contact details using QR codes (or: What's in a name? Nothing really...) (February 23, 2014)
  • IRMA en het risico van een online identificatieplicht (February 20, 2014)
  • How to track a user over several devices? (February 12, 2014)
  • Highlights of the Real World Cryptography 2014 workshop, day #3 (January 21, 2014)
  • Highlights of the Real World Cryptography 2014 workshop, day #1 (January 20, 2014)
  • Highlights of the Real World Cryptography 2014 workshop, day #2 (January 20, 2014)
  • Wat is Forward Secrecy? (December 17, 2013)
  • AppOps broken in Android 4.4.2 on rooted phones (December 16, 2013)
  • Some reservations about SpiderOak security. (December 8, 2013)
  • Keep your backup discs offline! (November 7, 2013)
  • Even secure clouds have a backdoor. (October 27, 2013)
  • When will users drop their passwords (and move to a more secure form of authentication)? (October 21, 2013)
  • Tracking across multiple websites using only first party cookies (October 4, 2013)
  • Hebben de Duitsers nu echt veilige email? (August 11, 2013)
  • Whose security is this anyway? (June 19, 2013)
  • Would you trust the janitor with all your keys? (June 17, 2013)
  • Password or passphrase: which is more secure? (May 16, 2013)
  • Google is sending the perfect phishing email. (April 15, 2013)
  • Attribute based credentials and digital signatures on a single eID (March 5, 2013)
  • How to make money with privacy friendly identity management. (February 21, 2013)
  • IRMA versus Frau Mustermann, take 2: the advantages of attribute based credentials over a more centralised approach. (February 12, 2013)
  • IRMA versus Frau Mustermann: the advantages of using attribute based credentials over attestation based approaches. (February 10, 2013)
  • An eID should not be linked exclusively to an identity card. (February 8, 2013)
  • Does a centralised eID service in the German eID system pose a privacy risk? (February 7, 2013)
  • ECRYPT II workshop on Crypto for 2020, day #2 (January 27, 2013)
  • ECRYPT II workshop on Crypto for 2020, day #1 (January 26, 2013)
  • Open Access! - But How? (January 15, 2013)
  • For Your Eyes Only: Day #2. Summary of presentations. (December 2, 2012)
  • For Your Eyes Only: Main findings. (December 2, 2012)
  • For Your Eyes Only: Day #1: Summary of presentations. (November 30, 2012)
  • Wanneer wordt precies de locatie van je mobiel opgeslagen? (November 28, 2012)
  • Proving your age with IRMA (without revealing you're a dog) (November 12, 2012)
  • IRMA: Using attribute based credentials to stop resale of tickets. (November 6, 2012)
  • Don't build your business on consent. (September 14, 2012)
  • The fuzzy mud puddle test: can your cloud storage provider access your encrypted data? (July 27, 2012)
  • Een app die je gedachten afluistert (July 5, 2012)
  • IFIP WG 11.2 Seminar: Summary of presentations. (July 4, 2012)
  • RFIDSec 2012: Day #1. Summary of presentations. (July 3, 2012)
  • RFIDSec 2012: Day #2. Summary of presentations. (July 3, 2012)
  • Attribute based Credentials and Selective Context Separation (May 28, 2012)
  • The new German eId card has security, privacy and usability limitations. (May 8, 2012)
  • Unlinkability equals untraceability (April 19, 2012)
  • Analysing ADEPT (Adobe Digital Experience Protection Technology) (April 12, 2012)
  • An unexpected privacy risk of anonymous credentials (February 14, 2012)
  • Participatory sensing / participatory surveillance (January 26, 2012)
  • On using identity cards to store anonymous credentials. (November 16, 2011)
  • The Future of Authenticating Websites (FAWN) - 2 (October 24, 2011)
  • On the moral basis for privacy protection. (October 16, 2011)
  • The Future of Authenticating Websites (FAWN) - 1 (October 6, 2011)
  • Het recht op inzage is een wassen neus. Wat nu? (August 25, 2011)
  • Traceable Anonymity and Revocable Privacy (June 24, 2011)
  • Identity cards should not be used to store anonymous credentials (June 9, 2011)
  • Vingerafdrukken: het effect van hashen op veiligheid en privacy (April 18, 2011)
  • Track-me-not: a comparison of recent browser-based solutions. (January 30, 2011)
  • GSM Broken. (December 28, 2010)
  • Calendar of Security, Privacy and Cryptography related events (December 27, 2010)
  • Why the Privacy Coach runs on NFC (November 11, 2010)
  • Blog spam through social engineering - Approve comments conservatively. (September 20, 2010)
  • The problem with OpenID. (August 31, 2010)
  • Seminar IFIP WG 11.2 on Pervasive Systems Security (June 8, 2010)
  • Push-to-talk button for RFID (June 8, 2010)
  • De chipkaart: een belangrijke privacy beschermer (June 2, 2010)
  • Using a mobile phone number as an authentic identifier (April 27, 2010)
  • The Identity Crisis (4) - Security (April 6, 2010)
  • Fast anonymous credentials on smart cards (March 31, 2010)
  • Xmarks Smart Search invading privacy (March 3, 2010)
  • The identity crisis (3) - Trust. (February 23, 2010)
  • GSM broken? Well... (December 29, 2009)
  • Improve the resilience of EMV against relay attacks (December 17, 2009)
  • The identity crisis (2) - What is identity? (December 3, 2009)
  • PwdHash (November 16, 2009)
  • The Identity Crisis (1) - Membership vs Ownership (November 4, 2009)
  • Revocable Privacy (November 21, 2008)
  • The weakest link fallacy (January 30, 2008)

Search /// Archives /// Categories /// Tags /// RSS Feed /// Subscribe
Made with SSST.