Splinter is a new encryption system that disguises users' database queries so they reveal no private information.
MIT News From ACM TechNews | March 29, 2017
New technology for protecting anonymity online provides stronger security guarantees but uses bandwidth much more efficiently than previous anonymity networks. MIT News From ACM TechNews | July 14, 2016
Anonymity networks protect people living under repressive regimes from surveillance of their Internet use. But the recent discovery of vulnerabilities in the most...MIT News Office From ACM News | July 12, 2016
Researchers have demonstrated that snoopers armed with little sophisticated technology can expose the home and workplace addresses of Twitter users. MIT News From ACM TechNews | May 18, 2016
Planning algorithms for teams of robots fall into two categories: centralized algorithms, in which a single computer makes decisions for the whole team, and decentralized...MIT News Office From ACM News | April 21, 2016
Researchers at the Massachusetts Institute of Technology and Texas Instruments have developed a virtually hack-proof radio-frequency identification chip.MIT News From ACM TechNews | February 5, 2016
Massachusetts Institute of Technology researchers have unveiled an untraceable text-messaging system designed to foil even the most powerful adversaries.MIT News From ACM TechNews | December 7, 2015
Anonymity networks, which sit on top of the public Internet, are designed to conceal people’s Web-browsing habits from prying eyes.MIT News Office From ACM News | December 7, 2015
Researchers have found the user experience is largely unaffected by much of the data transferred between the top 500 free Google Android cellphone applications. ...MIT News From ACM TechNews | November 20, 2015
The inability to practically apply indistinguishability obfuscation to deliver secure cryptography may be mitigated with an efficient method for functional encryption...MIT News From ACM TechNews | October 28, 2015
Massachusetts Institute of Technology researchers have developed what they call the first computer file system that ensures no loss of data when the system crashes...MIT News From ACM TechNews | August 24, 2015
At the Association for Computing Machinery's Programming Language Design and Implementation conference this month, MIT researchers presented a new system that repairs...MIT News Office From ACM News | June 29, 2015
Researchers have developed a quantum error correction code that requires the measurement of only a few quantum bits at a time. MIT News From ACM TechNews | May 29, 2015
Researchers are using microscopic variations to "fingerprint" silicon chips used in consumer-product tags to combat product counterfeiting. MIT News From ACM TechNews | May 4, 2015
Researchers are working to implement a way to thwart criminals from inferring computer data based on the pattern in which the machine accesses its memory.MIT News From ACM TechNews | April 24, 2015
A new wireless transmitter design reduces off-state leakage 100-fold while providing adequate power for Bluetooth or 802.15.4 transmissions.MIT News From ACM TechNews | February 23, 2015
The HTTP with Accountability protocol is designed to track the transmission of private data and enable the data owner to see how it is used online. MIT News From ACM TechNews | June 16, 2014