#deanonymization — Public Fediverse posts
Live and recent posts from across the Fediverse tagged #deanonymization, aggregated by home.social.
-
The Risks Of Anonymity In The Age Of Generative AI
-
Well, we don't decide what the customers decide to ship, or where it goes. We don't enforce policy like that; our job is just to provide a neutral platform for others to use to accomplish their goals. We don't even know what they ship - we just build the train cars. We don't even know where Bergen-Belsen is.
This is a post about #systemd.
#AgeVerification #AgeGate #AgeGating #identification #deanonymization #anonymous #fascism #fascist #compliance #ComplyInAdvance #DoNotComply #DoNotComplyInAdvance #resistance #freedom #FreeSoftware #OpenSource #coconspirator #accomplice #DeathCamp #ConcentrationCamp
-
Well, we don't decide what the customers decide to ship, or where it goes. We don't enforce policy like that; our job is just to provide a neutral platform for others to use to accomplish their goals. We don't even know what they ship - we just build the train cars. We don't even know where Bergen-Belsen is.
This is a post about #systemd.
#AgeVerification #AgeGate #AgeGating #identification #deanonymization #anonymous #fascism #fascist #compliance #ComplyInAdvance #DoNotComply #DoNotComplyInAdvance #resistance #freedom #FreeSoftware #OpenSource #coconspirator #accomplice #DeathCamp #ConcentrationCamp
-
Well, we don't decide what the customers decide to ship, or where it goes. We don't enforce policy like that; our job is just to provide a neutral platform for others to use to accomplish their goals. We don't even know what they ship - we just build the train cars. We don't even know where Bergen-Belsen is.
This is a post about #systemd.
#AgeVerification #AgeGate #AgeGating #identification #deanonymization #anonymous #fascism #fascist #compliance #ComplyInAdvance #DoNotComply #DoNotComplyInAdvance #resistance #freedom #FreeSoftware #OpenSource #coconspirator #accomplice #DeathCamp #ConcentrationCamp
-
Well, we don't decide what the customers decide to ship, or where it goes. We don't enforce policy like that; our job is just to provide a neutral platform for others to use to accomplish their goals. We don't even know what they ship - we just build the train cars. We don't even know where Bergen-Belsen is.
This is a post about #systemd.
#AgeVerification #AgeGate #AgeGating #identification #deanonymization #anonymous #fascism #fascist #compliance #ComplyInAdvance #DoNotComply #DoNotComplyInAdvance #resistance #freedom #FreeSoftware #OpenSource #coconspirator #accomplice #DeathCamp #ConcentrationCamp
-
[en] Paper: LLMs can be used to perform at-scale #deanonymization
"With full Internet access, our #agent can re-identify Hacker News users and Anthropic Interviewer participants at high precision, given #pseudonymous online profiles and conversations alone, matching what would take hours for a dedicated human investigator."
"Our results show that the practical #obscurity protecting pseudonymous users online no longer holds and that #threat models for online #privacy need to be reconsidered."
"We demonstrate that LLMs fundamentally change the picture, enabling fully automated deanonymization attacks that operate on #unstructured text at scale."
Note: also check paragraphs "Potential harms" and "Potential benefits".
-
Large-scale online deanonymization with LLMs
From Cornel University Computer ScienceWe show that large language models can be used to perform at-scale deanonymization. With full Internet access, our agent can re-identify Hacker News users and Anthropic Interviewer participants at high precision, given pseudonymous online profiles and conversations alone, matching what would take hours for a dedicated human investigator. We then design attacks for the closed-world setting. Given two databases of pseudonymous individuals, each containing unstructured text written by or about that individual, we implement a scalable attack pipeline that uses LLMs to: (1) extract identity-relevant features, (2) search for candidate matches via semantic embeddings, and (3) reason over top candidates to verify matches and reduce false positives. Compared to classical deanonymization work (e.g., on the Netflix prize) that required structured data, our approach works directly on raw user content across arbitrary platforms. We construct three datasets with known ground-truth data to evaluate our attacks. The first links Hacker News to LinkedIn profiles, using cross-platform references that appear in the profiles. Our second dataset matches users across Reddit movie discussion communities; and the third splits a single user's Reddit history in time to create two pseudonymous profiles to be matched. In each setting, LLM-based methods substantially outperform classical baselines, achieving up to 68% recall at 90% precision compared to near 0% for the best non-LLM method. Our results show that the practical obscurity protecting pseudonymous users online no longer holds and that threat models for online privacy need to be reconsidered.
Simon Lermen, Daniel Paleka, Joshua Swanson, Michael Aerni, Nicholas Carlini, Florian Tramè
#computerscience #cornelluniversity #AiResearch #privacy #anonymity #llm #HackNews #athropic #pseudonymity
#deanonymization -
#Republican plan would make #deanonymization of #census data trivial
But now, a little-known #algorithmic process called “differential privacy,” created to keep census data from being used to identify individual respondents, has become the right’s latest focus. WIRED spoke to six experts about the #GOP ’s ongoing effort to falsely allege that a system created to protect people’s #privacy has made the data from the 2020 census inaccurate.
-
I really like this kind of content that breaks down research papers for the rest of us. I had no idea that BGP hijacking was such a threat.
I wonder if any security folks out there have more up-to-date information on the resilience of OVH, Hetzner, DigitalOcean and other major provider networks. Are Counter-RAPTOR guards, counter-fingerprinting measures, BGP monitoring and RPKI being deployed in the wild?
#Security #BGP #Networking #Tor #AttackVector #Deanonymization
-
I really like this kind of content that breaks down research papers for the rest of us. I had no idea that BGP hijacking was such a threat.
I wonder if any security folks out there have more up-to-date information on the resilience of OVH, Hetzner, DigitalOcean and other major provider networks. Are Counter-RAPTOR guards, counter-fingerprinting measures, BGP monitoring and RPKI being deployed in the wild?
#Security #BGP #Networking #Tor #AttackVector #Deanonymization
-
I really like this kind of content that breaks down research papers for the rest of us. I had no idea that BGP hijacking was such a threat.
I wonder if any security folks out there have more up-to-date information on the resilience of OVH, Hetzner, DigitalOcean and other major provider networks. Are Counter-RAPTOR guards, counter-fingerprinting measures, BGP monitoring and RPKI being deployed in the wild?
#Security #BGP #Networking #Tor #AttackVector #Deanonymization
-
I really like this kind of content that breaks down research papers for the rest of us. I had no idea that BGP hijacking was such a threat.
I wonder if any security folks out there have more up-to-date information on the resilience of OVH, Hetzner, DigitalOcean and other major provider networks. Are Counter-RAPTOR guards, counter-fingerprinting measures, BGP monitoring and RPKI being deployed in the wild?
#Security #BGP #Networking #Tor #AttackVector #Deanonymization
-
I really like this kind of content that breaks down research papers for the rest of us. I had no idea that BGP hijacking was such a threat.
I wonder if any security folks out there have more up-to-date information on the resilience of OVH, Hetzner, DigitalOcean and other major provider networks. Are Counter-RAPTOR guards, counter-fingerprinting measures, BGP monitoring and RPKI being deployed in the wild?
#Security #BGP #Networking #Tor #AttackVector #Deanonymization
-
Администраторов Telegram каналов теперь можно деанонимизировать по кастомным стикерам и эмоджи.
Уязвимость заключается в том, что UID стикер-пака позволяет извлечь ID его создателя, что помогает раскрыть профиль пользователя.
Авторы Telegram-каналов заказывают у дизайнеров фирменные наклейки и «регистрируют» их в мессенджере с помощью бота Stickers, не подозревая о том, что это раскрывает их аккаунт всем.
Для популярной OSINT-утилиты Maltego даже уже разработали модуль позволяющий автоматизировать данную задачу.
src: https://github.com/vognik/maltego-telegram
#blacktriangle #anonymity #deanonymization #maltego #telegram #opensource #osint