Amira Ghenai, PhD candidate
David R. Cheriton School of Computer Science
Yuhao Dong, PhD candidate
David R. Cheriton School of Computer Science
Crispin Cowan, Leviathan Security Group
Privacy, especially anonymity, is tricky, because you don’t want to trust anyone, lest your identity leak, but you must trust someone, or else you cannot communicate. Threat modeling is rarely used in privacy, instead most used for prioritizing security hardening efforts.
Joan Bartlett, School of Information Studies
McGill University