“There's so much responsibility on users right now:” Expert Advice for Staying Safer From Hate and Harassment

M Wei, S Consolvo, PG Kelley, T Kohno… - Proceedings of the …, 2023 - dl.acm.org
Online hate and harassment poses a threat to the digital safety of people globally. In light of
this risk, there is a need to equip as many people as possible with advice to stay safer …

" All of them claim to be the best": Multi-perspective study of {VPN} users and {VPN} providers

R Ramesh, A Vyas, R Ensafi - 32nd USENIX Security Symposium …, 2023 - usenix.org
As more users adopt VPNs for a variety of reasons, it is important to develop empirical
knowledge of their needs and mental models of what a VPN offers. Moreover, studying VPN …

Bypassing tunnels: leaking {VPN} client traffic by abusing routing tables

N Xue, Y Malla, Z Xia, C Pöpper… - 32nd USENIX Security …, 2023 - usenix.org
Virtual Private Networks (VPNs) authenticate and encrypt network traffic to protect users'
security and privacy, and are used in professional and personal settings to defend against …

Unfulfilled Promises of Child Safety and Privacy: Portrayals and Use of Children in Smart Home Marketing

K Sun, J Li, Y Zou, J Radesky, C Brooks… - Proceedings of the ACM …, 2024 - dl.acm.org
Smart home technologies are making their way into families. Parents' and children's shared
use of smart home technologies has received growing attention in CSCW and related …

Investigating Security Folklore: A Case Study on the Tor over VPN Phenomenon

M Fassl, A Ponticello, A Dabrowski… - Proceedings of the ACM …, 2023 - dl.acm.org
Users face security folklore in their daily lives in the form of security advice, myths, and word-
of-mouth stories. Using a VPN to access the Tor network, ie, Tor over VPN, is an interesting …

Targeted and troublesome: Tracking and advertising on children's websites

Z Moti, A Senol, H Bostani, FZ Borgesius… - … IEEE Symposium on …, 2024 - ieeexplore.ieee.org
On the modern web, trackers and advertisers frequently construct and monetize users'
detailed behavioral profiles without consent. Despite various studies on web tracking …

The role of professional product reviewers in evaluating security and privacy

W Guo, J Walter, ML Mazurek - 32nd USENIX Security Symposium …, 2023 - usenix.org
Consumers who use Internet-connected products are often exposed to security and privacy
vulnerabilities that they lack time or expertise to evaluate themselves. Can professional …

Security and Privacy Software Creators' Perspectives on Unintended Consequences

HS Ramulu, H Schmitt, D Wermke, Y Acar - 33rd USENIX Security …, 2024 - usenix.org
Security & Privacy (S&P) software is created to have positive impacts on people: to protect
them from surveillance and attacks, enhance their privacy, and keep them safe. Despite …

We Are the Experts, and We Are the Problem: The Security Advice Fiasco

M Mazurek - Proceedings of the 2022 ACM SIGSAC Conference on …, 2022 - dl.acm.org
In an ideal world, automated tools and systems could manage security and privacy
seamlessly and transparently with minimal human input. In the real world, we are nowhere …

Negative Effects of Social Triggers on User Security and Privacy Behaviors

L Moore, T Mori, AA Hasegawa - Twentieth Symposium on Usable …, 2024 - usenix.org
People make decisions while being influenced by those around them. Previous studies have
shown that users often adopt security practices on the basis of advice from others and have …