Explores censorship resistance strategies, including mimicry, tunneling, and covert channels, to ensure internet accessibility in the face of censorship.
Covers privacy mechanisms, their pros and cons, and their application in various scenarios, emphasizing privacy as a security property and its significance in society.
Explores the challenges of protecting location privacy and various techniques to mitigate location-related inferences, highlighting the importance of trust assumptions and practical issues.