Learn More
The rapid progress in human-genome sequencing is leading to a high availability of genomic data. This data is notoriously very sensitive and stable in time. It is also highly correlated among relatives. A growing number of genomes are becoming accessible online (e.g., because of leakage, or after their posting on genome-sharing websites). What are then the(More)
People increasingly have their genomes se-quenced and some of them share their genomic data on-line. They do so for various purposes, including to find relatives and to help advance genomic research. An indi-vidual's genome carries very sensitive, private information such as its owner's susceptibility to diseases, which could be used for discrimination.(More)
Users of mobile networks can change their identifier in regions called mix zones in order to defeat the tracking of their location by third parties. Mix zones must be carefully deployed in the network to reduce the cost induced on mobile users and to provide high location privacy. Unlike most previous work that considers a global adversary, we consider a(More)
Direct-to-consumer genetic testing makes it possible for everyone to learn their genome sequences. In order to contribute to medical research, a growing number of people publish their genomic data on the Web, sometimes under their real identities. However, this is at odds not only with their own privacy but also with the privacy of their relatives. The(More)
Recent smartphones incorporate embedded GPS devices that enable users to obtain geographic information about their surroundings by providing a location-based service (LBS) with their current coordinates. However, LBS providers collect a significant amount of data from mobile users and could be tempted to misuse it, by compromising a cus-tomer's location(More)
—Scrip is a generic term for any substitute for real currency; it can be converted into goods or services sold by the issuer. In the classic scrip system model, one agent is helped by another in return for one unit of scrip. In this paper, we present an upgraded model, the one-ton scrip system, where users need to find n agents to accomplish a single task.(More)
In this paper, we introduce a navigation privacy attack, where an external adversary attempts to find a target user by exploiting publicly visible attributes of intermediate users. If such an attack is successful , it implies that a user cannot hide simply by excluding himself from a central directory or search function. The attack exploits the fact that(More)
Over the last few years, the vast progress in genome sequenc-ing has highly increased the availability of genomic data. Today, individuals can obtain their digital genomic sequences at reasonable prices from many online service providers. Individuals can store their data on personal devices, reveal it on public online databases, or share it with third(More)
In today's data-driven world, programmers routinely incorporate user data into complex algorithms, heuristics, and application pipelines. While often beneficial, this practice can have unintended and detrimental consequences, such as the discriminatory effects identified in Staples's online pricing algorithm and the racially offensive labels recently found(More)
—Co-location information about users is increasingly available online. For instance, mobile users more and more frequently report their co-locations with other users in the messages and in the pictures they post on social networking websites by tagging the names of the friends they are with. The users' IP addresses also constitute a source of co-location(More)