“There's so much responsibility on users right now:” Expert Advice for Staying Safer From Hate and Harassment

M Wei, S Consolvo, PG Kelley, T Kohno… - Proceedings of the …, 2023‏ - dl.acm.org
Online hate and harassment poses a threat to the digital safety of people globally. In light of
this risk, there is a need to equip as many people as possible with advice to stay safer …

" All of them claim to be the best": Multi-perspective study of {VPN} users and {VPN} providers

R Ramesh, A Vyas, R Ensafi - 32nd USENIX Security Symposium …, 2023‏ - usenix.org
As more users adopt VPNs for a variety of reasons, it is important to develop empirical
knowledge of their needs and mental models of what a VPN offers. Moreover, studying VPN …

Bypassing tunnels: Leaking {VPN} client traffic by abusing routing tables

N Xue, Y Malla, Z **a, C Pöpper… - 32nd USENIX Security …, 2023‏ - usenix.org
Virtual Private Networks (VPNs) authenticate and encrypt network traffic to protect users'
security and privacy, and are used in professional and personal settings to defend against …

A Decade of {Privacy-Relevant} Android App Reviews: Large Scale Trends

O Akgul, ST Peddinti, N Taft, ML Mazurek… - 33rd USENIX Security …, 2024‏ - usenix.org
We present an analysis of 12 million instances of privacy-relevant reviews publicly visible on
the Google Play Store that span a 10 year period. By leveraging state of the art NLP …

Unfulfilled promises of child safety and privacy: portrayals and use of children in smart home marketing

K Sun, J Li, Y Zou, J Radesky, C Brooks… - Proceedings of the ACM …, 2024‏ - dl.acm.org
Smart home technologies are making their way into families. Parents' and children's shared
use of smart home technologies has received growing attention in CSCW and related …

Security and privacy software creators' perspectives on unintended consequences

HS Ramulu, H Schmitt, D Wermke, Y Acar - 33rd USENIX Security …, 2024‏ - usenix.org
Security & Privacy (S&P) software is created to have positive impacts on people: to protect
them from surveillance and attacks, enhance their privacy, and keep them safe. Despite …

Investigating security folklore: A case study on the tor over vpn phenomenon

M Fassl, A Ponticello, A Dabrowski… - Proceedings of the ACM …, 2023‏ - dl.acm.org
Users face security folklore in their daily lives in the form of security advice, myths, and word-
of-mouth stories. Using a VPN to access the Tor network, ie, Tor over VPN, is an interesting …

Negative effects of social triggers on user security and privacy behaviors

L Moore, T Mori, AA Hasegawa - Twentieth Symposium on Usable …, 2024‏ - usenix.org
People make decisions while being influenced by those around them. Previous studies have
shown that users often adopt security practices on the basis of advice from others and have …

Targeted and troublesome: Tracking and advertising on children's websites

Z Moti, A Senol, H Bostani, FZ Borgesius… - … IEEE Symposium on …, 2024‏ - ieeexplore.ieee.org
On the modern web, trackers and advertisers frequently construct and monetize users'
detailed behavioral profiles without consent. Despite various studies on web tracking …

Stranger VPNs: Investigating the Geo-Unblocking Capabilities of Commercial VPN Providers

E Khan, A Sperotto, J van der Ham… - … Conference on Passive …, 2023‏ - Springer
Abstract Commercial Virtual Private Network (VPN) providers have steadily increased their
presence in Internet culture. Their most advertised use cases are preserving the user's …