{"id":"https://openalex.org/W4220861560","doi":"https://doi.org/10.2478/popets-2022-0035","title":"CoverDrop: Blowing the Whistle Through A News App","display_name":"CoverDrop: Blowing the Whistle Through A News App","publication_year":2022,"publication_date":"2022-03-03","ids":{"openalex":"https://openalex.org/W4220861560","doi":"https://doi.org/10.2478/popets-2022-0035"},"language":"en","primary_location":{"id":"doi:10.2478/popets-2022-0035","is_oa":true,"landing_page_url":"https://doi.org/10.2478/popets-2022-0035","pdf_url":"https://petsymposium.org/popets/2022/popets-2022-0035.pdf","source":{"id":"https://openalex.org/S4210183172","display_name":"Proceedings on Privacy Enhancing Technologies","issn_l":"2299-0984","issn":["2299-0984"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320322","host_organization_name":"De Gruyter Open","host_organization_lineage":["https://openalex.org/P4310320322","https://openalex.org/P4310313990"],"host_organization_lineage_names":["De Gruyter Open","De Gruyter"],"type":"journal"},"license":"cc-by-nc-nd","license_id":"https://openalex.org/licenses/cc-by-nc-nd","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings on Privacy Enhancing Technologies","raw_type":"journal-article"},"type":"article","indexed_in":["crossref","datacite"],"open_access":{"is_oa":true,"oa_status":"hybrid","oa_url":"https://petsymposium.org/popets/2022/popets-2022-0035.pdf","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5065998385","display_name":"Mansoor Ahmed-Rengers","orcid":"https://orcid.org/0000-0003-1078-6185"},"institutions":[],"countries":[],"is_corresponding":true,"raw_author_name":"Mansoor Ahmed-Rengers","raw_affiliation_strings":["OpenOrigins Limited and University of Cambridge"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"OpenOrigins Limited and University of Cambridge","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5026640323","display_name":"Diana A. Vasile","orcid":"https://orcid.org/0000-0002-3476-3060"},"institutions":[{"id":"https://openalex.org/I241749","display_name":"University of Cambridge","ror":"https://ror.org/013meh722","country_code":"GB","type":"education","lineage":["https://openalex.org/I241749"]}],"countries":["GB"],"is_corresponding":false,"raw_author_name":"Diana A. Vasile","raw_affiliation_strings":["Department of Computer Science and Technology , University of Cambridge"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"Department of Computer Science and Technology , University of Cambridge","institution_ids":["https://openalex.org/I241749"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5051634362","display_name":"Daniel Hugenroth","orcid":"https://orcid.org/0000-0003-3413-1722"},"institutions":[{"id":"https://openalex.org/I241749","display_name":"University of Cambridge","ror":"https://ror.org/013meh722","country_code":"GB","type":"education","lineage":["https://openalex.org/I241749"]}],"countries":["GB"],"is_corresponding":false,"raw_author_name":"Daniel Hugenroth","raw_affiliation_strings":["Department of Computer Science and Technology , University of Cambridge"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"Department of Computer Science and Technology , University of Cambridge","institution_ids":["https://openalex.org/I241749"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5025243398","display_name":"Alastair R. Beresford","orcid":"https://orcid.org/0000-0003-0818-6535"},"institutions":[{"id":"https://openalex.org/I241749","display_name":"University of Cambridge","ror":"https://ror.org/013meh722","country_code":"GB","type":"education","lineage":["https://openalex.org/I241749"]}],"countries":["GB"],"is_corresponding":false,"raw_author_name":"Alastair R. Beresford","raw_affiliation_strings":["Department of Computer Science and Technology , University of Cambridge"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"Department of Computer Science and Technology , University of Cambridge","institution_ids":["https://openalex.org/I241749"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5111970827","display_name":"Ross Anderson","orcid":null},"institutions":[{"id":"https://openalex.org/I241749","display_name":"University of Cambridge","ror":"https://ror.org/013meh722","country_code":"GB","type":"education","lineage":["https://openalex.org/I241749"]}],"countries":["GB"],"is_corresponding":false,"raw_author_name":"Ross Anderson","raw_affiliation_strings":["Department of Computer Science and Technology , University of Cambridge"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"Department of Computer Science and Technology , University of Cambridge","institution_ids":["https://openalex.org/I241749"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5065998385"],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":0.2976,"has_fulltext":true,"cited_by_count":2,"citation_normalized_percentile":{"value":0.47877929,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":90,"max":94},"biblio":{"volume":"2022","issue":"2","first_page":"47","last_page":"67"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":0.9997000098228455,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9993000030517578,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/usable","display_name":"USable","score":0.7715245485305786},{"id":"https://openalex.org/keywords/adversary","display_name":"Adversary","score":0.6954398155212402},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.6107722520828247},{"id":"https://openalex.org/keywords/cover","display_name":"Cover (algebra)","score":0.5752012133598328},{"id":"https://openalex.org/keywords/newspaper","display_name":"Newspaper","score":0.5176734924316406},{"id":"https://openalex.org/keywords/internet-privacy","display_name":"Internet privacy","score":0.5028850436210632},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.4461023211479187},{"id":"https://openalex.org/keywords/business","display_name":"Business","score":0.30445170402526855},{"id":"https://openalex.org/keywords/world-wide-web","display_name":"World Wide Web","score":0.24449566006660461},{"id":"https://openalex.org/keywords/advertising","display_name":"Advertising","score":0.19205129146575928},{"id":"https://openalex.org/keywords/engineering","display_name":"Engineering","score":0.15570062398910522}],"concepts":[{"id":"https://openalex.org/C2780615836","wikidata":"https://www.wikidata.org/wiki/Q2471869","display_name":"USable","level":2,"score":0.7715245485305786},{"id":"https://openalex.org/C41065033","wikidata":"https://www.wikidata.org/wiki/Q2825412","display_name":"Adversary","level":2,"score":0.6954398155212402},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.6107722520828247},{"id":"https://openalex.org/C2780428219","wikidata":"https://www.wikidata.org/wiki/Q16952335","display_name":"Cover (algebra)","level":2,"score":0.5752012133598328},{"id":"https://openalex.org/C201280247","wikidata":"https://www.wikidata.org/wiki/Q11032","display_name":"Newspaper","level":2,"score":0.5176734924316406},{"id":"https://openalex.org/C108827166","wikidata":"https://www.wikidata.org/wiki/Q175975","display_name":"Internet privacy","level":1,"score":0.5028850436210632},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.4461023211479187},{"id":"https://openalex.org/C144133560","wikidata":"https://www.wikidata.org/wiki/Q4830453","display_name":"Business","level":0,"score":0.30445170402526855},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.24449566006660461},{"id":"https://openalex.org/C112698675","wikidata":"https://www.wikidata.org/wiki/Q37038","display_name":"Advertising","level":1,"score":0.19205129146575928},{"id":"https://openalex.org/C127413603","wikidata":"https://www.wikidata.org/wiki/Q11023","display_name":"Engineering","level":0,"score":0.15570062398910522},{"id":"https://openalex.org/C78519656","wikidata":"https://www.wikidata.org/wiki/Q101333","display_name":"Mechanical engineering","level":1,"score":0.0}],"mesh":[],"locations_count":5,"locations":[{"id":"doi:10.2478/popets-2022-0035","is_oa":true,"landing_page_url":"https://doi.org/10.2478/popets-2022-0035","pdf_url":"https://petsymposium.org/popets/2022/popets-2022-0035.pdf","source":{"id":"https://openalex.org/S4210183172","display_name":"Proceedings on Privacy Enhancing Technologies","issn_l":"2299-0984","issn":["2299-0984"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320322","host_organization_name":"De Gruyter Open","host_organization_lineage":["https://openalex.org/P4310320322","https://openalex.org/P4310313990"],"host_organization_lineage_names":["De Gruyter Open","De Gruyter"],"type":"journal"},"license":"cc-by-nc-nd","license_id":"https://openalex.org/licenses/cc-by-nc-nd","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings on Privacy Enhancing Technologies","raw_type":"journal-article"},{"id":"pmh:oai:pure.ed.ac.uk:openaire/33f1c073-1930-4d8e-8998-3e4a76f7a8e5","is_oa":true,"landing_page_url":"https://www.research.ed.ac.uk/en/publications/33f1c073-1930-4d8e-8998-3e4a76f7a8e5","pdf_url":null,"source":{"id":"https://openalex.org/S4406922455","display_name":"Edinburgh Research Explorer","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"repository"},"license":"other-oa","license_id":"https://openalex.org/licenses/other-oa","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Ahmed-Rengers, M, Vasile, D A, Hugenroth, D, Beresford, A R & Anderson, R 2022, 'CoverDrop: Blowing the Whistle Through A News App', Proceedings on Privacy Enhancing Technologies, vol. 2022, no. 2, pp. 47-67. https://doi.org/10.2478/popets-2022-0035","raw_type":"info:eu-repo/semantics/publishedVersion"},{"id":"pmh:oai:pure.ed.ac.uk:publications/33f1c073-1930-4d8e-8998-3e4a76f7a8e5","is_oa":true,"landing_page_url":"http://hdl.handle.net/20.500.11820/33f1c073-1930-4d8e-8998-3e4a76f7a8e5","pdf_url":null,"source":{"id":"https://openalex.org/S4406922455","display_name":"Edinburgh Research Explorer","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by-nc-nd","license_id":"https://openalex.org/licenses/cc-by-nc-nd","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"","raw_type":""},{"id":"pmh:oai:www.repository.cam.ac.uk:1810/339328","is_oa":true,"landing_page_url":"https://www.repository.cam.ac.uk/handle/1810/339328","pdf_url":null,"source":{"id":"https://openalex.org/S4306401777","display_name":"Apollo (University of Cambridge)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I241749","host_organization_name":"University of Cambridge","host_organization_lineage":["https://openalex.org/I241749"],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by-nc-nd","license_id":"https://openalex.org/licenses/cc-by-nc-nd","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"Conference Object"},{"id":"doi:10.17863/cam.86739","is_oa":true,"landing_page_url":"https://doi.org/10.17863/cam.86739","pdf_url":null,"source":{"id":"https://openalex.org/S7407050737","display_name":"Apollo","issn_l":null,"issn":[],"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":null,"raw_source_name":null,"raw_type":"article"}],"best_oa_location":{"id":"doi:10.2478/popets-2022-0035","is_oa":true,"landing_page_url":"https://doi.org/10.2478/popets-2022-0035","pdf_url":"https://petsymposium.org/popets/2022/popets-2022-0035.pdf","source":{"id":"https://openalex.org/S4210183172","display_name":"Proceedings on Privacy Enhancing Technologies","issn_l":"2299-0984","issn":["2299-0984"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320322","host_organization_name":"De Gruyter Open","host_organization_lineage":["https://openalex.org/P4310320322","https://openalex.org/P4310313990"],"host_organization_lineage_names":["De Gruyter Open","De Gruyter"],"type":"journal"},"license":"cc-by-nc-nd","license_id":"https://openalex.org/licenses/cc-by-nc-nd","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings on Privacy Enhancing Technologies","raw_type":"journal-article"},"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/9","score":0.6600000262260437,"display_name":"Industry, innovation and infrastructure"}],"awards":[{"id":"https://openalex.org/G7481669020","display_name":"Interdisciplinary Centre for Finding, Understanding and Countering Crime in the Cloud","funder_award_id":"EP/M020320/1","funder_id":"https://openalex.org/F4320334627","funder_display_name":"Engineering and Physical Sciences Research Council"}],"funders":[{"id":"https://openalex.org/F4320334627","display_name":"Engineering and Physical Sciences Research Council","ror":"https://ror.org/0439y7842"}],"has_content":{"grobid_xml":true,"pdf":true},"content_urls":{"pdf":"https://content.openalex.org/works/W4220861560.pdf","grobid_xml":"https://content.openalex.org/works/W4220861560.grobid-xml"},"referenced_works_count":9,"referenced_works":["https://openalex.org/W1447429957","https://openalex.org/W1844767618","https://openalex.org/W2128735745","https://openalex.org/W2154137163","https://openalex.org/W2606774910","https://openalex.org/W2751696670","https://openalex.org/W2963901295","https://openalex.org/W2974196328","https://openalex.org/W3082830152"],"related_works":["https://openalex.org/W4362599004","https://openalex.org/W3156990385","https://openalex.org/W4368232262","https://openalex.org/W2079101048","https://openalex.org/W3190778120","https://openalex.org/W602396061","https://openalex.org/W4221142798","https://openalex.org/W4285163392","https://openalex.org/W4298144666","https://openalex.org/W2499292486"],"abstract_inverted_index":{"Abstract":[0],"Whistleblowing":[1],"is":[2,58,72,115],"hazardous":[3],"in":[4,105],"a":[5,59,73,85,101,106,119],"world":[6],"of":[7],"pervasive":[8],"surveillance,":[9],"yet":[10,132],"many":[11],"leading":[12],"newspapers":[13],"expect":[14],"sources":[15,68],"to":[16,31,77,117,126],"contact":[17,63],"them":[18],"with":[19,38,123],"methods":[20],"that":[21,54,89],"are":[22],"either":[23],"insecure":[24],"or":[25],"barely":[26],"usable.":[27],"In":[28],"an":[29],"attempt":[30],"do":[32,78],"better,":[33],"we":[34,98],"conducted":[35],"two":[36],"workshops":[37],"British":[39],"news":[40,86,112],"organisations":[41],"and":[42,46,64,69,151,155],"surveyed":[43],"whistleblowing":[44],"options":[45],"guidelines":[47],"at":[48],"major":[49],"media":[50],"outlets.":[51],"We":[52,80,141],"concluded":[53],"the":[55,111,124,143],"soft":[56],"spot":[57],"system":[60,76],"for":[61],"initial":[62],"trust":[65],"establishment":[66],"between":[67],"reporters.":[70],"CoverDrop":[71,114],"two-way,":[74],"secure":[75,82],"this.":[79],"support":[81],"messaging":[83],"within":[84,110],"app,":[87],"so":[88],"all":[90],"its":[91,153],"other":[92],"users":[93],"provide":[94],"cover":[95],"traffic,":[96],"which":[97],"channel":[99],"through":[100],"threshold":[102],"mix":[103],"instantiated":[104],"Trusted":[107],"Execution":[108],"Environment":[109],"organisation.":[113],"designed":[116],"resist":[118],"powerful":[120],"global":[121],"adversary":[122],"ability":[125],"issue":[127],"warrants":[128],"against":[129],"infrastructure":[130],"providers,":[131],"it":[133],"can":[134],"easily":[135],"be":[136],"integrated":[137],"into":[138],"existing":[139],"infrastructure.":[140],"present":[142],"results":[144],"from":[145],"our":[146],"workshops,":[147],"describe":[148],"CoverDrop\u2019s":[149],"design":[150],"demonstrate":[152],"security":[154],"performance.":[156]},"counts_by_year":[{"year":2024,"cited_by_count":1},{"year":2023,"cited_by_count":1}],"updated_date":"2026-04-28T14:05:53.105641","created_date":"2025-10-10T00:00:00"}
