Follow
Christopher Soghoian
Christopher Soghoian
Unknown affiliation
Verified email at soghoian.net - Homepage
Title
Cited by
Cited by
Year
Certified lies: Detecting and defeating government interception attacks against SSL
C Soghoian, S Stamm
Financial Cryptography and Data Security, 2011
309*2011
Caught in the cloud: Privacy, encryption, and government back doors in the web 2.0 era
C Soghoian
Journal on Telecommunications and High Technology Law, 2010
1702010
Anti-phishing system and method
C Soghoian, K Caine
US Patent 8,220,047, 2012
1272012
Can You See Me Now: Toward Reasonable Standards for Law Enforcement Access to Location Data that Congress Could Enact
S Pell, C Soghoian
Berkeley Technology Law Journal 27, 2012
1012012
Your secret stingray's no secret anymore: The vanishing government monopoly over cell phone surveillance and its impact on national security and consumer privacy
SK Pell, C Soghoian
Harv. JL & Tech. 28, 1, 2014
972014
A lot more than a pen register, and less than a wiretap: what the StingRay teaches us about how Congress should approach the reform of law enforcement surveillance authorities
SK Pell, C Soghoian
Yale JL & Tech. 16, 134, 2013
802013
Method and apparatus for performing delegated transactions
C Soghoian, I Aad
US Patent App. 12/220,744, 2009
392009
An end to privacy theater: Exposing and discouraging corporate disclosure of user data to the government
C Soghoian
Minnesota Journal of Law, Science & Technology, 2010
382010
Enforced community standards for research on users of the Tor anonymity network
C Soghoian
International Conference on Financial Cryptography and Data Security, 146-153, 2011
302011
The Problem of Anonymous Vanity Searches
C Soghoian
I/S: A Journal of Law and Policy for the Information Society 3 (2), 299, 2007
272007
Mantis: A lightweight, server-anonymity preserving, searchable P2P network
SC Bono, C Soghoian, F Monrose
Information Security Institute Johns Hopkins University, Tech. Rep. TR-2004 …, 2004
222004
How dropbox sacrifices user privacy for cost savings
C Soghoian
Post to Slight Paranoia blog, 2011
202011
Why private browsing modes do not deliver real privacy
C Soghoian
Center for Applied Cyber security Research, Bloomington, 2011
202011
Anti-phishing system and method
C Soghoian, K Caine
US Patent 8,713,677, 2014
192014
Legal risks for phishing researchers
C Soghoian
2008 eCrime Researchers Summit, 1-11, 2008
192008
The history of the do not track header
C Soghoian
Slight Paranoia, February, 2012
172012
Merx: Secure and privacy preserving delegated payments
C Soghoian, I Aad
International Conference on Trusted Computing, 217-239, 2009
172009
Caveat venditor: Technologically protected subsidized goods and the customers who hack them
C Soghoian
Nw. J. Tech. & Intell. Prop. 6, 46, 2007
162007
The spies we trust: Third party service providers and law enforcement surveillance
C Soghoian
Indiana University, 2012
132012
A deceit-augmented man in the middle attack against Bank of America’s SiteKey service
C Soghoian, M Jakobsson
Post to Slight Paranoia blog, 2007
132007
The system can't perform the operation now. Try again later.
Articles 1–20