A Tight Context-aware Privacy Bound for Histogram Publication
Sara Saeidian (KTH Royal Institute of Technology, Inria Saclay), Ata Yavuzy{\i}lmaz (KTH Royal Institute of Technology), Leonhard Grosse (KTH Royal Institute of Technology), Georg Schuppe (SEBx), Tobias J. Oechtering (KTH Royal Institute of Technology)
https://arxiv.org/abs/2508…
9 months ago I had no plans to even try out Bluesky, because it was extremely centralized. Now, with Blacksky and others, I'm not so sure. https://privacy.thenexus.today/can-we-please-stop-arguing-about-whether-bluesky-is-decentralized/
Sixty-five countries sign a UN cybercrime treaty to share data and extradite suspects, despite privacy and security concerns from tech companies and activists (Lien Hoang/Nikkei Asia)
https://asia.nikkei.com/spotlight/cybe
Can we make NeRF-based visual localization privacy-preserving?
Maxime Pietrantoni, Martin Humenberger, Torsten Sattler, Gabriela Csurka
https://arxiv.org/abs/2508.18971 https://…
Tell me, when you need a photo for a document, aren't you worried that the photographer is using commercial software that will upload it somewhere, and that it will be used to train models?
I suspect the office issuing the documents isn't any better.
#privacy
Enhancing Model Privacy in Federated Learning with Random Masking and Quantization
Zhibo Xu, Jianhao Zhu, Jingwen Xu, Changze Lv, Zisu Huang, Xiaohua Wang, Muling Wu, Qi Qian, Xiaoqing Zheng, Xuanjing Huang
https://arxiv.org/abs/2508.18911
The Double-edged Sword of LLM-based Data Reconstruction: Understanding and Mitigating Contextual Vulnerability in Word-level Differential Privacy Text Sanitization
Stephen Meisenbacher, Alexandra Klymenko, Andreea-Elena Bodea, Florian Matthes
https://arxiv.org/abs/2508.18976
Efficient and Privacy-Protecting Background Removal for 2D Video Streaming using iPhone 15 Pro Max LiDAR
Jessica Kinnevan, Naifa Alqahtani, Toral Chauhan
https://arxiv.org/abs/2508.20250
"Nobody should control the end user": Exploring Privacy Perspectives of Indian Internet Users in Light of DPDPA
Sana Athar, Devashish Gosain, Anja Feldmann, Mannat Kaur, Ha Dao
https://arxiv.org/abs/2508.17962
CON-QA: Privacy-Preserving QA using cloud LLMs in Contract Domain
Ajeet Kumar Singh, Rajsabi Surya, Anurag Tripathi, Santanu Choudhury, Sudhir Bisane
https://arxiv.org/abs/2509.19925
Ohhhh, hab ich gerade ein informative Website zum Thema "sicheres anonymes Surfen uvm." im Internet gefunden
https://privacy-handbuch.de/index.htm
Privacy-Preserving Performance Profiling of In-The-Wild GPUs
Ian McDougall, Michael Davies, Rahul Chatterjee, Somesh Jha, Karthikeyan Sankaralingam
https://arxiv.org/abs/2509.21762
Apparently I missed that as of last year, Proton now has Docs (https://proton.me/drive/docs) as an alternative to real-time editing via Google Docs (or Word docs). As of now, it appears Proton only has Docs for word processing and not one like Google Sheets for spreadsheets (yet? I'll need that functionality …
A Scenario-Oriented Survey of Federated Recommender Systems: Techniques, Challenges, and Future Directions
Yunqi Mi, Jiakui Shen, Guoshuai Zhao, Jialie Shen, Xueming Qian
https://arxiv.org/abs/2508.19620
Cory @… Doctorow in a must-read on Apple, the EU, privacy and the absolute need to get rid of facist-adjacent (or fully fascist) tech infrastructure.
https://…
Tor browser's great - but for more complete privacy protection, you need to add this
When you use the @… Browser, the only network traffic that's being masked is via the web browser. If you want more traffic anonymized and encrypted, you need to take a different approach.
🧅
AI – I am here to help; would you like to chat?
Artificial Intelligence (AI) of one type of another is now a part of most of the applications and services we use on the Internet. In spite of AI’s helpful features, there are hidden dangers in most of the common AI applications and services. Most people are not aware that AI is not just being helpful – it is recording, storing and sharing information about our activities. This information can be helpful to autocrats in their…
Ktoś powinien zrobić diagram.
#PGP (Pretty Good Privacy) to oryginalne, własnościowe narzędzie. Z niego wyprowadzono otwarty standard #OpenPGP. Ten standard zaimplementowano w #GPG (GNU Privacy Guard), którego autorzy p…
Anthropic requires users to accept new terms by September 28, including choosing whether new chats and coding sessions can be used to train AI models (Anthropic)
https://www.anthropic.com/news/updates-to-our-consumer-terms
So “MAP activist” and self admitted groomer Katie Cruz is mass reporting and privacy striking anyone who covers her. Spread the word, but be careful. She’s already threatened one YouTuber’s life over it. #fediblock #psa
Bontebal #CDA wil encryptie en privacy offeren "laat politie meekijken in besloten telegram en signal appgroepen, etc." en Wilders #PVV gaat enigszins schrap staan voor privacy.
Wie is hier nou de grootste #fascist?…
The Privacy Paradox
Hadn’t realised that this short piece on privacy by Al Jazeera that I contributed to had aired. Apparently did mid August :)
https://www.aljazeera.com/video/aljazeerauntangles/2025/8/13/the-privacy-paradox
Been using Monero for 5 years now, and I can’t believe how fast the time has gone by, it feels like just yesterday I started. Over that time, I’ve even used it to pay for clothes, which might sound a bit unusual but it works, and I also use it to pay for privacy services like Mullvad and iVPN since they accept XMR.
Honestly, I’m probably one of the few people who still uses Monero on a weekly basis, not just holding it but actually spending it the way it was meant to be used, which is …
hey. hey do you know the `-----BEGIN PRIVATE KEY-----` thing you see in files with key material? the files whose name ends in .pem? do you know what .pem stands for?
i just learned it stands for "Privacy-Enhanced Mail" https://en.wikipedia.org/wiki/Privacy-Enhanced_Mail
SecureV2X: An Efficient and Privacy-Preserving System for Vehicle-to-Everything (V2X) Applications
Joshua Lee, Ali Arastehfard, Weiran Liu, Xuegang Ban, Yuan Hong
https://arxiv.org/abs/2508.19115
Mind the Third Eye! Benchmarking Privacy Awareness in MLLM-powered Smartphone Agents
Zhixin Lin, Jungang Li, Shidong Pan, Yibo Shi, Yue Yao, Dongliang Xu
https://arxiv.org/abs/2508.19493
Position: Human-Robot Interaction in Embodied Intelligence Demands a Shift From Static Privacy Controls to Dynamic Learning
Shuning Zhang, Hong Jia, Simin Li, Ting Dang, Yongquan `Owen' Hu, Xin Yi, Hewu Li
https://arxiv.org/abs/2509.19041
Generative Adversarial Networks Applied for Privacy Preservation in Biometric-Based Authentication and Identification
Lubos Mjachky, Ivan Homoliak
https://arxiv.org/abs/2509.20024
Apple says the UK CMA's proposed "EU-style" regulation is "bad for users and bad for developers", "undermines" privacy and security, and "hampers" innovation (Chris Vallance/BBC)
https://www.bbc.com/news/articles/ckgj9kjmvzzo
Crosslisted article(s) found for cs.AI. https://arxiv.org/list/cs.AI/new
[5/6]:
- Enhancing Model Privacy in Federated Learning with Random Masking and Quantization
Xu, Zhu, Xu, Lv, Huang, Wang, Wu, Qian, Zheng, Huang
Every Keystroke You Make: A Tech-Law Measurement and Analysis of Event Listeners for Wiretapping
Shaoor Munir, Nurullah Demir, Qian Li, Konrad Kollnig, Zubair Shafiq
https://arxiv.org/abs/2508.19825
Protect your privacy – browsers and search engines
Surveillance has always been a core part of fascist regimes. This is still true today, but is even more dangerous due to new data aggregation and AI technologies. The Internet sites you visit and the things you search for become a part of the larger surveillance database of your activities. You can take action now to reduce the risk to yourself, your friends and your loved ones while you browse the Internet. You should start now …
Swiss government looks to undercut privacy tech, stoking fears of mass surveillance
The Swiss government could soon require service providers with more than 5,000 users to collect government-issued identification, retain subscriber data for six months and, in many cases, disable encryption.
🇨🇭 https://
A Model-agnostic Strategy to Mitigate Embedding Degradation in Personalized Federated Recommendation
Jiakui Shen, Yunqi Mi, Guoshuai Zhao, Jialie Shen, Xueming Qian
https://arxiv.org/abs/2508.19591
While facial recognition tech remains unregulated at the US federal level, 23 states have passed or expanded laws to restrict mass scraping of biometric data (Bobby Allyn/NPR)
https://www.npr.org/2025/08/28/nx-s1-5519756/biometrics-facial-recognition-l…
SynPAIN: A Synthetic Dataset of Pain and Non-Pain Facial Expressions
Babak Taati, Muhammad Muzammil, Yasamin Zarghami, Abhishek Moturu, Airhossein Kazerouni, Hailey Reimer, Alex Mihailidis, Thomas Hadjistavropoulos
https://arxiv.org/abs/2507.19673
CON-QA: Privacy-Preserving QA using cloud LLMs in Contract Domain
Ajeet Kumar Singh, Rajsabi Surya, Anurag Tripathi, Santanu Choudhury, Sudhir Bisane
https://arxiv.org/abs/2509.19925
»The Privacy Theater of Hashed PII:
A 2020 MacBook Air can hash every North American phone number in four hours«
Good article that clearly shows that only hashing alone is not yet data safe. That's where HMAC belongs at the SHA-2 min. but also not to save passwords and the same.
🤷 https://
Closer to Reality: Practical Semi-Supervised Federated Learning for Foundation Model Adaptation
Guangyu Sun, Jingtao Li, Weiming Zhuang, Chen Chen, Chen Chen, Lingjuan Lyu
https://arxiv.org/abs/2508.16568
Cory Doctorow gets it – Time to download privacy apps now
The Dictator/Fascist/Authoritarian playbook is well understood. Surveillance is a key part of the effort to dominate and punish individuals who engage in legal dissent or opposition. The recent decision by Apple and Google to remove the ICEBlock application from their app stores is a good example of how this control plays out.
Our mobile phones are the main platform that we use to send and receive text and email messages.…
Towards the ideals of Self-Recovery and Metadata Privacy in Social Vault Recovery
Shailesh Mishra, Simone Colombo, Pasindu Tennage, Martin Burkhart, Bryan Ford
https://arxiv.org/abs/2507.19484
No Prior, No Leakage: Revisiting Reconstruction Attacks in Trained Neural Networks
Yehonatan Refael, Guy Smorodinsky, Ofir Lindenbaum, Itay Safran
https://arxiv.org/abs/2509.21296
Google is phasing out its Privacy Sandbox technologies; the initiative was launched in 2019 to develop privacy-protecting tech to replace third-party cookies (Kendra Barnett/Adweek)
https://www.adweek.com/media/googles-privacy-sandbox-is-officially-dead/
ZAPS: A Zero-Knowledge Proof Protocol for Secure UAV Authentication with Flight Path Privacy
Shayesta Naziri, Xu Wang, Guangsheng Yu, Christy Jie Liang, Wei Ni
https://arxiv.org/abs/2508.17043
FEST: A Unified Framework for Evaluating Synthetic Tabular Data
Weijie Niu, Alberto Huertas Celdran, Karoline Siarsky, Burkhard Stiller
https://arxiv.org/abs/2508.16254 https://…
FedProtoKD: Dual Knowledge Distillation with Adaptive Class-wise Prototype Margin for Heterogeneous Federated Learning
Md Anwar Hossen, Fatema Siddika, Wensheng Zhang, Anuj Sharma, Ali Jannesari
https://arxiv.org/abs/2508.19009
Privacy-Preserving Federated Learning Framework for Risk-Based Adaptive Authentication
Yaser Baseri, Abdelhakim Senhaji Hafid, Dimitrios Makrakis, Hamidreza Fereidouni
https://arxiv.org/abs/2508.18453 …
Switzerland proposes regulations forcing service providers to collect user IDs and disable encryption, threatening its status as a haven for privacy tech firms (Suzanne Smalley/The Record)
https://therecord.media/switzerland-digital-privacy-law-proton-priv…
Privacy startup Duality says it has developed a private LLM inference framework that uses fully homomorphic encryption to let LLMs answer encrypted prompts (Rina Diane Caballar/IEEE Spectrum)
https://spectrum.ieee.org/homomorphic-encryption-llm
Privacy in Action: Towards Realistic Privacy Mitigation and Evaluation for LLM-Powered Agents
Shouju Wang, Fenglin Yu, Xirui Liu, Xiaoting Qin, Jue Zhang, Qingwei Lin, Dongmei Zhang, Saravan Rajmohan
https://arxiv.org/abs/2509.17488
Guarding Your Conversations: Privacy Gatekeepers for Secure Interactions with Cloud-Based AI Models
GodsGift Uzor, Hasan Al-Qudah, Ynes Ineza, Abdul Serwadda
https://arxiv.org/abs/2508.16765
B-Privacy: Defining and Enforcing Privacy in Weighted Voting
Samuel Breckenridge, Dani Vilardell, Andr\'es F\'abrega, Amy Zhao, Patrick McCorry, Rafael Solari, Ari Juels
https://arxiv.org/abs/2509.17871
Differential Privacy of Network Parameters from a System Identification Perspective
Andrew Campbell, Anna Scaglione, Hang Liu, Victor Elvira, Sean Peisert, Daniel Arnold
https://arxiv.org/abs/2509.20460
RAG Security and Privacy: Formalizing the Threat Model and Attack Surface
Atousa Arzanipour, Rouzbeh Behnia, Reza Ebrahimi, Kaushik Dutta
https://arxiv.org/abs/2509.20324 https:…
From Research to Reality: Feasibility of Gradient Inversion Attacks in Federated Learning
Viktor Valadi, Mattias {\AA}kesson, Johan \"Ostman, Salman Toor, Andreas Hellander
https://arxiv.org/abs/2508.19819
Breaking the Layer Barrier: Remodeling Private Transformer Inference with Hybrid CKKS and MPC
Tianshi Xu, Wen-jie Lu, Jiangrui Yu, Chen Yi, Chenqi Lin, Runsheng Wang, Meng Li
https://arxiv.org/abs/2508.19525
Crosslisted article(s) found for cs.CR. https://arxiv.org/list/cs.CR/new
[1/1]:
- ZTFed-MAS2S: A Zero-Trust Federated Learning Framework with Verifiable Privacy and Trust-Aware Ag...
Yang Li, Hanjie Wang, Yuanzheng Li, Jiazheng Li, Zhaoyang Dong
Towards Adapting Federated & Quantum Machine Learning for Network Intrusion Detection: A Survey
Devashish Chaudhary, Sutharshan Rajasegarar, Shiva Raj Pokhrel
https://arxiv.org/abs/2509.21389
Network-Level Prompt and Trait Leakage in Local Research Agents
Hyejun Jeong, Mohammadreze Teymoorianfard, Abhinav Kumar, Amir Houmansadr, Eugene Badasarian
https://arxiv.org/abs/2508.20282
Federated Learning for Large Models in Medical Imaging: A Comprehensive Review
Mengyu Sun, Ziyuan Yang, Yongqiang Huang, Hui Yu, Yingyu Chen, Shuren Qi, Andrew Beng Jin Teoh, Yi Zhang
https://arxiv.org/abs/2508.20414
The Hidden Cost of Correlation: Rethinking Privacy Leakage in Local Differential Privacy
Sandaru Jayawardana, Sennur Ulukus, Ming Ding, Kanchana Thilakarathna
https://arxiv.org/abs/2508.12539
Securing the Internet of Medical Things (IoMT): Real-World Attack Taxonomy and Practical Security Measures
Suman Deb, Emil Lupu, Emm Mic Drakakis, Anil Anthony Bharath, Zhen Kit Leung, Guang Rui Ma, Anupam Chattopadhyay
https://arxiv.org/abs/2507.19609
R-CONV : Uncovering Privacy Vulnerabilities through Analytical Gradient Inversion Attacks
Tamer Ahmed Eltaras, Qutaibah Malluhi, Alessandro Savino, Stefano Di Carlo, Adnan Qayyum
https://arxiv.org/abs/2509.18871
Private Hyperparameter Tuning with Ex-Post Guarantee
Badih Ghazi, Pritish Kamath, Alexander Knop, Ravi Kumar, Pasin Manurangsi, Chiyuan Zhang
https://arxiv.org/abs/2508.15183 ht…
How to Get Actual Privacy and Utility from Privacy Models: the k-Anonymity and Differential Privacy Families
Josep Domingo-Ferrer, David S\'anchez
https://arxiv.org/abs/2510.11299