J. Alex Halderman

@jhalderm

Professor of Computer Science and Engineering at . Security and privacy, election security, and Internet freedom. Cofounded and .

Vrijeme pridruživanja: prosinac 2009.

Tweetovi

Blokirali ste korisnika/cu @jhalderm

Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @jhalderm

  1. Prikvačeni tweet
    5. tra 2018.

    I teamed up with to demonstrate how U.S. voting machines can be remotely hacked to steal votes. Yes, this is a real machine still used in almost 20 states! States and Congress need to act on before it's too late. via .

    Prikaži ovu nit
    Poništi
  2. proslijedio/la je Tweet

    Remember when hacked DC's mock election & how his team managed to change every vote before installing the fight song into the glitchy pilot voting app? No? Neither did , who were saved by paper Story w/

    Poništi
  3. proslijedio/la je Tweet

    "This is a reminder of why phone and app based voting are not ready for prime time" election cyber expert DM'd me tonight

    Prikaži ovu nit
    Poništi
  4. 4. velj

    ...what could go wrong?

    Poništi
  5. proslijedio/la je Tweet
    30. sij
    Poništi
  6. proslijedio/la je Tweet
    30. sij

    Tomorrow at Pierpont Commons: is part of a pre-show panel discussion at the performance of "Is This A Room":

    Poništi
  7. 10. sij

    ., thanks, but our findings are more subtle: - Verbal instructions helped, but signage (what GA law requires) didn't. - Verbal instructions alone achieved only up to 16% detection. Higher rates were among voters who also used a written slate, like a sample ballot.

    Poništi
  8. proslijedio/la je Tweet
    8. sij

    It’s time to restore confidence in our elections by replacing America’s insecure voting machines with hand-marked and risk-limiting audits.

    Prikaži ovu nit
    Poništi
  9. proslijedio/la je Tweet
    8. sij

    I know things are wild right now but this is important: New research by and others at the University of Michigan sheds new light on the security of voting systems used around the country:

    Poništi
  10. 8. sij

    Can voters detect malicious manipulation of ballot marking devices? To find out, and our team had 241 people vote on BMDs we secretly hacked to change every printout. Voters missed >93% of errors! Full study published today at :

    Poništi
  11. proslijedio/la je Tweet

    The time for PhD applications is drawing near—Sunday, Dec. 15 is the deadline for . wants you: join a team of exceptional systems researchers tackling problems that make real-world technology safer, more efficient, and smarter:

    Poništi
  12. 15. stu 2019.

    . had 8 papers at this year, from 7 different research groups. I'm proud to have such an amazing bunch of colleagues! Want to join us? We have job opportunities for multiple security/crypto/privacy faculty. Apply here:

    Poništi
  13. 15. stu 2019.

    In a new paper at , we explain how we built and how it has impacted the Web: When we started in 2012, the idea sounded crazy. Now, 7 years later, we're the world's largest provider of HTTPS certificates and help secure 180M sites!

    Poništi
  14. proslijedio/la je Tweet

    Thanks to for your collaboration in building Let's Encrypt!

    Poništi
  15. proslijedio/la je Tweet

    The Systems Lab had a big week—2 teams demonstrated the impact we have on security and privacy all around the globe. We want to see more great researchers here making an impact! If you see your work here: Apply to join us here:

    Poništi
  16. proslijedio/la je Tweet
    6. stu 2019.
    Poništi
  17. 6. stu 2019.

    My U-M colleague and team just posted the first detailed technical study of Internet censorship in Russia. Summary and full paper at

    Poništi
  18. proslijedio/la je Tweet

    Technology pioneered by Michigan researchers including can circumvent many effective internet censorship tools. Their latest work, Conjure, makes it easier than ever for ISPs to work around website blocking.

    Poništi
  19. proslijedio/la je Tweet
    31. lis 2019.

    We are excited to announce the commercial availability of the Censys SaaS Platform, using our rich data to provide real-time monitoring, infrastructure change auditing, vulnerability enrichment, security risk assessment, and software inventory. Learn more:

    Poništi
  20. 19. lis 2019.

    Michigan CS is hiring, and we're looking for multiple new security/crypto/privacy faculty members. Apply at .

    Poništi
  21. proslijedio/la je Tweet
    Poništi

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.

    Možda bi vam se svidjelo i ovo:

    ·