
Victor Le Pochat
@victorlepochat
Web security & privacy researcher / Creator of tranco-list.eu
ID: 851801259128614912
https://lepoch.at/ 11-04-2017 14:17:00
83 Tweet
295 Followers
232 Following


Does Twitter/X comply with their advertising policies? We conduct a first large-scale measurement of problematic advertising on Twitter during the regime change in our research (Zubair Shafiq,Savvas Zannettou) by analyzing 34K ads from ~6M tweets - observing widespread non-compliance



For the current cycle of USENIX Security Artifacts Evaluation, we have only received registrations from 8 accepted papers so far. We request all authors to consider registering their for the AE process in order to promote open science in our community: sec24summerae.usenix.hotcrp.com

USENIX Security artifact evaluation registration deadline is tomorrow on 17th. Please register now and submit your full artifact a week later. All details: usenix.org/conference/useβ¦

The call for papers of the #SecWeb workshop (co-located with IEEE Security and Privacy) is now online! The deadline is in 1 month. Please consider submitting your web security and privacy research here! secweb.work/2024.html cc Marco Squarcina

Anjo Vahldiek-Oberwagner Victor Le Pochat and I encourage all USENIX Security '24 paper authors from the fall and summer cycles to get your artifacts ready for the AE process. Registration deadline: March 8th. More details in the CfA: usenix.org/conference/useβ¦ Help promote open science! π€π§βπ¬

If security meta-research interests you, I warmly recommend following CSET, the Cyber Security Experimentation and Test Workshop, co-located with USENIX Security. CSET welcomes meta-research work across a broad set of topics, with submissions due May 17: cset24.isi.edu/cfp.html

Thank you to Bhupendra Acharya and Thorsten Holz for hosting me at @CISPA! I really enjoyed your warm welcome, and it was nice to meet so many people. Es war ein VergnΓΌgen! DistriNet Computer Science | KU Leuven

And we awarded two amazing papers! "Community Contribution Award" goes to "Evaluating the Impact of Design Decisions on Passive DNS-Based Domain Rankings" Congrats to Victor Le Pochat and team!



Dating apps encourage users to share info (incl. sensitive info!) for matching quality. Unfortunately, apps may also leak information which users are not aware they are sharing. Some apps even leak exact locations of users. [Swipe Left for identity theft, Victor Le Pochat]
![Antoon Purnal (@purnaltoon) on Twitter photo Dating apps encourage users to share info (incl. sensitive info!) for matching quality.
Unfortunately, apps may also leak information which users are not aware they are sharing.
Some apps even leak exact locations of users.
[Swipe Left for identity theft, <a href="/VictorLePochat/">Victor Le Pochat</a>] Dating apps encourage users to share info (incl. sensitive info!) for matching quality.
Unfortunately, apps may also leak information which users are not aware they are sharing.
Some apps even leak exact locations of users.
[Swipe Left for identity theft, <a href="/VictorLePochat/">Victor Le Pochat</a>]](https://pbs.twimg.com/media/GVG39JcWYAEpYss.jpg)

Aurore Fass and I are pleased to invite (self-)nominations for USENIX Security '25 Artifact Evaluation Committee . This year's "Open Science" policy requires heavy support from our community. Please fill this form by October 11 to express interest: docs.google.com/forms/d/e/1FAI⦠1/2