Gone, But Not Forgotten: The Current State of Private Computing

Provided by: Stony Brook University
Topic: Security
Format: PDF
Private data comes in many forms: web browser histories, chat logs, sensitive word processor documents, network proxy logs, and many more. Some applications - primarily web browsers - now support private modes that aim to prevent sensitive information leaks. There are two problems with this application-level approach. First, there are many software engineering challenges in implementing correct and complete private modes. More fundamentally, applications cannot always tell which data is private - this is up to the user.

Find By Topic