This is a draft version and you will get a chance to revise it after feedback and hand in a final report at the end of the period. The closer you make this to what could be considered a final report already here, the better it will serve as the basis for review and thus the more useful the feedback you get will be. Though this is a mandatory assignment, the quality of your submission does not influence your grade.
Format: pdf, ACM style (link), double column.
Length of final report 6-8 pages, including abstract. No length requirement now.
Structure: title, abstract, introduction, <main sections according to you>, conclusion, bibliography
Content: Introduction to your topic in more depth than the presentation. Include a bibliography with references to all sources used; most of them should be scientific publications. Audience: computer scientists somewhat familiar with privacy-enhancing technologies.
Investigate your topic in both general terms and one specific instantiation. Address the following questions, wherever applicable, either by including the relevant information in the text such that the reader can answer them themselves or by stating and answering the questions explicitly.
- What is the problem the technology tries to solve?
- Why is it a problem, i.e., what was missing from previous solutions or what made it difficult?
- Why is this important, i.e., what can be done now that the technology exists that couldn't be done before, why does this matter?
- What is the approach, i.e., how does it work?
- Does it work? Based on what?
What are the assumptions about
- the system
- the users, their goals and capabilities
- the potential adversaries, their goals and capabilities
What are the choices made with respect to
- method (e.g., crypto, adding noise)
- implementation (e.g., open source, proprietary, none/conceptual)
- architecture (e.g., cloud and browser)
- data at rest (how and where is it stored)
- data in transit (what is sent and how)
- trade-offs (e.g., privacy vs. utility, cost vs. security)
Within the context of the course, evaluate the technology and discuss your findings from the previous sections. Do you see anything problematic, anything well done, what could or should be done differently according to you?