Search for: "Mayank Varia" Results 1 - 8 of 8
Sorted by Relevance | Sort by Date
RSS Subscribe: 20 results | 100 results
13 Aug 2021, 2:01 am by Jen Patja Howell
To help make sense of all of this, Alan Rozenshtein sat down with Mayank Varia, a cryptographer at Boston University, and Riana Pfefferkorn, a research scholar at the Stanford Internet Observatory. [read post]
6 Dec 2018, 1:32 pm by Anushka Limaye
Mayank Varia analyzed the development of Exceptional Access research in the fourth essay from the Crypto 2018 Workshop on Encryption and Surveillance series. [read post]
16 Aug 2021, 7:39 am by Ajay Sarma
  Howell shared an episode of the Lawfare Podcast in which Rozenshtein sat down with Mayank Varia, a cryptographer at Boston University, and Riana Pfefferkorn, a research scholar at the Stanford Internet Observatory to discuss Apple’s announcement that future iPhone operating systems would scan photos for child exploitation material:  Mark Montgomery and Natalie Thompson discussed the positive aspects of the Senate-passed United States Competition and Innovation… [read post]
9 Jun 2018, 5:24 am by Victoria Clark
Rozenshtein, Mayank Varia, and Charles Wright outlined how Congress can help bridge the gap between law enforcement and the tech community. [read post]
21 Aug 2018, 5:53 pm by Riana Pfefferkorn
The presenters included Matt Tait of UT-Austin; Stefan Savage of UC-San Diego; Mayank Varia of Boston University; and Ernie Brickell of Brickell Cryptology, LLC. [read post]
6 Jun 2018, 12:11 pm by Victoria Clark
Alan Rozenshtein, Mayank Varia, and Charles Wright analyzed how law-enforcement can better gain access to encrypted data. [read post]
8 Dec 2018, 8:00 am by Mikhaila Fogel
Meanwhile, Lawfare’s Crypto essay series continued with Mayank Varia providing a roadmap for Exception Access research and policy. [read post]
26 Dec 2018, 7:00 am by Susan Landau
Mayank Varia contends that the issue is politicized and more technical research might provide a solution, though I would argue that he fails to address the underlying issue of security risks posed by exceptional access. [read post]