" It's the Equivalent of Feeling Like You're in {Jail”}: Lessons from Firsthand and Secondhand Accounts of {IoT-Enabled} Intimate Partner Abuse

S Stephenson, M Almansoori, P Emami-Naeini… - 32nd USENIX Security …, 2023 - usenix.org
Victim-survivors of intimate partner violence (IPV) are facing a new technological threat:
Abusers are leveraging IoT devices such as smart thermostats, hidden cameras, and GPS …

Contextualizing Interpersonal Data Sharing in Smart Homes

W He, N Reitinger, A Almogbil, YS Chiang… - Proceedings on …, 2024 - petsymposium.org
A key feature of smart home devices is monitoring the environment and recording data.
These devices provide security via motion-detection video alerts, cost-savings via thermostat …

Please Unstalk Me: Understanding Stalking with Bluetooth Trackers and Democratizing Anti-Stalking Protection

A Heinrich, L Würsching, M Hollick - Proceedings on Privacy …, 2024 - petsymposium.org
While designed to locate lost items, Bluetooth trackers are increasingly exploited for malign
purposes, such as unwanted location tracking. This study probes deeper into this issue …

GPSBuster: Busting out Hidden GPS Trackers via MSoC Electromagnetic Radiations

Y Li, Z Yan, W Jin, Z Ning, D Liu, Z Qin, Y Liu… - Proceedings of the …, 2024 - dl.acm.org
The escalating threat of hidden GPS tracking devices poses significant risks to personal
privacy and security. Featured by their miniaturization and misleading appearances, GPS …

DeTagTive: Linking MACs to protect against malicious BLE trackers

T Despres, N Davis, P Dutta, D Wagner - Proceedings of the Second …, 2023 - dl.acm.org
Bluetooth Low Energy (BLE) location trackers are popular and useful for finding misplaced
keys, devices, and other items. However, they can also be used to track people and enable …

No Place to Hide: Privacy Exposure in Anti-stalkerware Apps and Support Websites

P Mangeard, X Yu, M Mannan, A Youssef - Nordic Conference on Secure …, 2023 - Springer
Stalkerware is malicious software found in mobile devices that monitors and tracks a victim's
online and offline activity. This harmful technology has become a growing concern …

Your Mic Leaks Too Much: A Double-Edged Sword for Security

S Ramesh - Proceedings of the 22nd Annual International …, 2024 - dl.acm.org
Microphones are an integral part of a wide range of devices owing to their utility in
communication and voice-controlled assistance. However, the downside to microphones' …

Check for updates No Place to Hide: Privacy Exposure in Anti-stalkerware Apps and Support Websites

P Mangeard, X Yu, M Mannan… - Secure IT Systems: 28th …, 2023 - books.google.com
Stalkerware is malicious software found in mobile devices that monitors and tracks a victim's
online and offline activity. This harmful technology has become a growing concern …

Privacy Analysis of Technological Solutions Designed for Victims of Intimate Partner Abuse

X Yu - 2023 - spectrum.library.concordia.ca
Stalkerware is malicious software that monitors and tracks a victim's online and offline
activity. This harmful technology has become a growing concern, jeopardizing the security …

[PDF][PDF] Hoofdstuk 9

Het lijdt geen twijfel dat digitale technologie en het internet veel mogelijkheden bieden om
romantische relaties op te bouwen en te onderhouden. De komst van online dating apps en …