RSS.Social

Bryan Ford's Home Page

follow: @[email protected]

Posts

TRIP: Coercion-resistant Registration for E-Voting with Verifiability and Usability in Votegral

Robust and High-Performance Wide-Area Consensus Protocols

Beyond the ratchet: practical challenges in secure messaging

Coercion-Resistant E-voting and Proof of Personhood

Towards Real Democratic DAOs

Towards practical and efficient performance robustness: QuePaxa and beyond

E-Vote Your Conscience: Perceptions of Coercion and Vote Buying, and the Usability of Fake Credentials in Online Voting

Can decentralized systems be truly “democratizing” – and how?

ZeroAuction: Zero-Deposit Sealed-bid Auction via Delayed Execution

Towards General-Purpose Decentralized Computing with Permissionless Extensibility

What Distributed Infrastructure Could Save the Planet?

QuePaxa: Escaping the Tyranny of Timeouts in Consensus

Authenticated Private Information Retrieval

Building Strongly-Consistent Systems Resilient to Failures, Partitions, and Slowdowns

Privacy-Preserving Personhood-Based Credentials

Matchertext: an escape route from language-embedding hell?

Matchertext: Towards Verbatim Interlanguage Embedding

MinML: concise but general markup syntax

Toward Internet Performance Transparency

Flash Freezing Flash Boys: Countering Blockchain Front-Running

Who – Or What – Will Our Distributed Metaverse Serve?

Auditing the Swiss Post E-voting System: An Architectural Perspective

3PBCS: A Privacy-Preserving, Personhood-Based Credential System

Moby: A Blackout-Resistant Anonymity Network for Mobile Devices

Digital Personhood: Towards Technology that Securely Serves People

Integrity and Metadata Protection in Data Retrieval

Immunizing Systems from Distant Failures by Limiting Lamport Exposure

Decentralized Finance: for the few, the many, or everyone?

Consensus for Decentralized Ledgers

Digital Personhood: Towards Technology that Securely Serves People

Privacy-Preserving Federated Analytics using Multiparty Homomorphic Encryption

Analyzing and Protecting Communication Metadata

CALYPSO: Private Data Management for Decentralized Ledgers

Votegral: Coercion-Resistant E-voting Without Trusted Hardware

Proof of Personhood: Introduction and Challenges

Technologizing Democracy or Democratizing Technology? A Layered-Architecture Perspective on Potentials and Challenges

AI for Governance Belongs in Mechanism, Not Policy

Personhood Online: Privacy, Transparency, and Inclusion for Digital Democracy

Identity and Personhood in Digital Democracy: Evaluating Inclusion, Equality, Security, and Privacy in Pseudonym Parties and Other Proofs of Personhood

Distributed Randomness

Design choices for Central Bank Digital Currency

PriFi: Low-Latency Anonymity for Organizational Networks

Que Sera Consensus: Simple Asynchronous Agreement with Private Coins and Threshold Logical Clocks

Blockchain: Between Hype and Reality

Blockchain, Privacy, and Accountability

Digital Architecture for Trust in the 21st Century

Voting and Blockchain: Promise and Challenges

Secure, Confidential Blockchains Providing High Throughput and Low Latency

Rationality is Self-Defeating in Permissionless Systems

Are Only Type Parameters Generic Enough for Go 2 Generics?

Reducing Metadata Leakage from Encrypted Files and Communication with PURBs

Threshold Logical Clocks for Asynchronous Distributed Coordination and Consensus

On the Security of Two-Round Multi-Signatures

Rethinking General-Purpose Decentralized Computing

MorphIT: Morphing Packet Reports for Internet Transparency

MedChain: Accountable and Auditable Data Sharing in Distributed Medical Scenarios

The Remote Voting Minefield: from North Carolina to Switzerland

Rethinking Priorities: Should Identity Systems Divide or Unite People?

Are Biometrics a Good Test for Real Unique Personhood?

A Liquid Perspective on Democratic Choice

So They're Selling You a Blockchain

MedCo: Enabling Secure and Privacy-Conscious Exploration of Distributed Clinical and Genomic Data

International Scientific Conferences Must Leave the U.S.

Sightseeing Around Lausanne

Democratic Value and Money for Decentralized Digital Society

OmniLedger: A Secure, Scale-Out, Decentralized Ledger via Sharding

On Enforcing the Digital Immunity of a Large Humanitarian Organization

Secure, Scalable Proof-of-Stake Blockchains

Atom: Horizontally Scaling Strong Anonymity

CHAINIAC: Proactive Software-Update Transparency via Collectively Signed Skipchains and Verified Builds

How Do You Know It's On the Blockchain? With a SkipChain.

UnLynx: A Decentralized System for Privacy-Conscious Data Sharing

Technology Governs Us. Will it Govern Us Well?

Scalable Bias-Resistant Distributed Randomness

Proof-of-Personhood: Redemocratizing Permissionless Cryptocurrencies

Multiple Objectives of Lawful-Surveillance Protocols

Selfish Mining in Bitcoin and ByzCoin

Untangling Mining Incentives in Bitcoin and ByzCoin

Privacy-Preserving Lawful Contact Chaining

Enhancing Bitcoin Security and Performance with Strong Consistency via Collective Signing

Riffle: An Efficient Communication System With Strong Anonymity

Open, privacy-preserving protocols for lawful surveillance

Keeping Authorities “Honest or Bust” with Decentralized Witness Cosigning

AnonRep: Towards Tracking-Resistant Anonymous Reputation

Building Privacy-Preserving Cryptographic Credentials from Federated Online Identities

Apple, FBI, and Software Transparency

An advanced crypto library for Go

Backdoors, Trusted Servers, and Deanonymization

How to prove DNSSEC isn't a key escrow scheme

Metadata Protection Considerations for TLS Present and Future

Collectively Witnessing Log Servers in CT

Let's verify real people, not real names.

Deterministically Deterring Timing Attacks in Deterland

Seeking Anonymity in an Internet Panopticon

A Flexible Architecture for Structural Reliability Auditing to the Clouds

Identity Management through Privacy-Preserving Authentication

Warding off Timing Channels in Deterland

Private Eyes: Secure Remote Biometric Authentication

Certificate Cothority: Towards Trustworthy Collective CAs

Building Privacy-Preserving Cryptographic Credentials from Federated Online Identities

About

GPUfs: The Case for Operating System Services on GPUs

Delegative Democracy Revisited

Faculty size and growth in the top 20 Computer Science departments

Open Surveillance

Heading Off Correlated Failures through Independence-as-a-Service

Catching Bandits and Only Bandits: Privacy-Preserving Intersection Warrants for Lawful Surveillance

Managing NymBoxes for Identity and Tracking Protection

Security Analysis of Accountable Anonymity in Dissent

A TorPath to TorCoin: Proof-of-Bandwidth Altcoins for Compensating Relays

From Onions to Shallots: Rewarding Tor Relays with TEARS

TAQ: Enhancing Fairness and Performance Predictability in Small Packet Regimes

A Wire-Compatible TCP Implementation for Low-Latency Applications

Crypto-Book: An Architecture for Privacy Preserving Online Identities

Structural Cloud Audits that Protect Private Information

Conscript Your Friends into Larger Anonymity Sets with JavaScript

Ensuring High-Quality Randomness in Cryptographic Key Generation

Hang With Your Buddies to Resist Intersection Attacks

An Untold Story of Redundant Clouds: Making Your Service Deployment Truly Reliable

Proactively Accountable Anonymous Messaging in Verdict

Maple: Simplifying SDN Programming Using Algorithmic Policies

Reducing Latency in Tor Circuits with Unordered Delivery

Lazy Tree Mapping: Generalizing and Scaling Deterministic Parallelism

Welcome to the World of Human Rights: Please Make Yourself Uncomfortable

GPUfs: Integrating a File System with GPUs

Enhancing the OS against Security Threats in System Administration

Dissent in Numbers: Making Strong Anonymity Scale

Deterministic OpenMP

Scavenging for Anonymity with BlogDrop

Scaling Software-Defined Network Controllers on Multicore Servers

Non-Linear Compression: Gzip Me Not!

Plugging Side-Channel Leaks with Timing Information Flow Control

Icebergs in the Clouds: the Other Risks of Cloud Computing

Strong Theft-Proof Privacy-Preserving Biometric Authentication

Fitting Square Pegs Through Round Pipes: Unordered Delivery Wire-Compatible with TCP and TLS

Faceless: Decentralized Anonymous Group Messaging for Online Social Networks

Scalable Anonymous Group Communication in the Anytrust Model

A Virtual Memory Foundation for Scalable Deterministic Parallelism

CertiKOS: A Certified Kernel for Secure Cloud Computing

Eyo: Device-Transparent Personal Storage

Deterministic OpenMP for Race-Free Parallelism

Workspace Consistency: A Programming Model for Shared Memory Parallelism

A Dynamic Recursive Unified Internet Design (DRUID)

Minion: an all-terrain packet packhorse to jump-start stalled internet transports

Determinating Timing Channels in Compute Clouds

Efficient System-Enforced Deterministic Parallelism

Dissent: Accountable Anonymous Group Messaging

Advanced Development of Certified OS Kernels

Unintended Consequences of NAT Deployments with Overlapping Address Space

Efficient Cross-Layer Negotiation

Device Transparency: a New Model for Mobile Storage

NAT Behavioral Requirements for ICMP

Breaking Up the Transport Logjam

NAT Behavioral Requirements for TCP

UIA: A Global Connectivity Architecture for Mobile Personal Devices

UIA: A Global Connectivity Architecture for Mobile Personal Devices

Vx32: Lightweight User-level Sandboxing on the x86

An Offline Foundation for Online Accountable Pseudonyms

State of Peer-to-Peer (P2P) Communication across Network Address Translators (NATs)

Directions in Internet Transport Evolution

Alpaca: Extensible Authorization for Distributed Services

Structured Streams: a New Transport Abstraction

Persistent Personal Names for Globally Connected Mobile Devices

Sybil Parties: An Offline Foundation for Online Accountability

User-Relative Names for Globally Connected Personal Devices

VXA: A Virtual Architecture for Durable Compressed Archives

Peer-to-Peer Communication Across Network Address Translators

Application Design Guidelines for Traversal through Network Address Translators

Operating Principles and General Behavioral Requirements for Network Address Translators (BEH-GEN)

Individual Representation

Wiki Democracy

Cache Directory Tagging Specification

Parsing Expression Grammars: A Recognition-Based Syntactic Foundation

Unmanaged Internet Protocol: Taming the Edge Network Management Crisis

Scalable Internet Routing on Topology-Independent Node Identities

Fx86: Functional Management of Imperative Virtual Machines

Service Duality - Vitalizing the Commons

Delegative Voting

Packrat Parsing: Simple, Powerful, Lazy, Linear Time

Packrat Parsing: a Practical Linear-Time Algorithm with Backtracking

Packrat Parsing: a Practical Linear-Time Algorithm with Backtracking

Delegative Democracy

Interface and Execution Models in the Fluke Kernel

The Flux OSKit: A Substrate for Kernel and Language Research

Flick: A Flexible, Optimizing IDL Compiler

The Flux OS Toolkit: Reusable Components for OS Implementation

CPU Inheritance Scheduling

Microkernels Meet Recursive Virtual Machines

User-level Checkpointing Through Exportable Kernel State

The Persistent Relevance of the Local Operating System to Global Applications

Using Annotated Interface Definitions to Optimize RPC

Separating Presentation from Interface in RPC and IDLs

Evolving Mach 3.0 to A Migrating Thread Model

Microkernels Should Support Passive Objects

FLEX: A Tool for Building Efficient and Flexible Systems

In-Kernel Servers on Mach 3.0: Implementation and Performance

Notes on Thread Models in Mach 3.0

Die Datenpresse

Object-Oriented Display Refreshing

Introduction: Promise, Failures, and Future of Self-Organizing Technologies

A Layered Architecture Perspective on Self-Organizing Technologies

Identity, Personhood, and Citizenship in the Digital Age

Economic Empowerment and Inclusion: Money and Wealth in Digital Democracy

Speech and Association: Privacy, Accountability, and Freedoms in Digital Communications

Filtering, Curating, and Rewarding Value and Expertise in the Digital Information Deluge

A Liquid Perspective on Social Choice for Digital Democracy

Aachen

Antelope Island

Avignon

Bar Harbor, Maine

Barcelona

Berlin

Binary Encoded Schematic Objects (BESO)

Bonn

Bryan's Family

Bryan's Home in Cambridge

Cologne

Composable Markup (CMark)

Composable Math Markup (CMath)

Composable Text Markup Language (CTML)

Composable Text Syntax

Decentralized Update Governance (DUG)

Delimited Text and Binary Syntax

Distributed randomness, drand, and the League of Entropy

Dresden

Efficient Stream Embedding with Composable Binary Encoding (CBE)

Escaping Escaping Hell with Matchertext Resource Identifiers

eXtensible Syntax Object Notation (XSON)

Flowers in Lausanne

Geneva

JSON Binary Schema

Lagoon

Lake Louise

Magnitudes: When an Integer is Too Precise

Marseille

MaxML: Matchertext-friendly XML Syntax

Midsummer's Eve at Zebediah's

My Cats

Opus '99

Paris

Peterhof

Piano

Rethinking Social Media to Escape the Echo Chamber

Rome

Rwanda

Saint Petersburg

Secure, Scalable Proof-of-Stake Blockchains

South Korea

Spring 2002

Stata Center

Tornado

Travels

Trip to Hawaii, October 1999

Utah Travels

Venice

Vermont

Vienna

Villars, Switzerland

VIPcode: Encoding and Decoding Structured Data with Verifiable Interface Presentations (VIPs)

XTAX: an Extensible Sytntax Metalanguage