publication

An analysis of the security and privacy issues of the Neovote online voting system

This article provides the first security and privacy analysis of the Neovote voting system, which was used for three of the five primaries in the French 2022 presidential election. We show that the demands of transparency, verifiability and …

Analyse du système de vote en ligne Neovote

Cet article analyse le système de vote en ligne Neovote, utilisé pour plusieurs scrutins des primaires présidentielles de 2022 (Primaire Populaire, EELV et LR). Nous montrons que les objectifs de transparence, de vérifiabilité et de sécurité exigés …

Disabled dimensionality

As humans, we are expected to interact as fully functional 3D manipulators who can observe, handle, and act in three spatial dimensions. This is how users are considered in the design of many products and spaces. Ableism often gives people the …

Visual Secrets: a human security primitive

This article presents and evaluates an idea for a non-transferable secret that can be used for security verifi cation. This new type of security primitive relies on the pre-semantic treatment of images in the human brain. By showing users an image …

Queer fragmentation and trans urban aesthetics: from cyberpunk to cottagecore

Queerness and transidentity have had a durable relationship with cyberpunk aesthetics, reflected in both cultural works and academic reflections. There is an evident attraction in worlds where technological prowess allows one to evolve beyond one’s …

Recherche et dogmatisme : de l'improductivité du productivisme

Le renforcement du discours de l’urgence dans nos sociétés accroît la mise sous tension de la recherche. Elle fait l’objet d’attentes croissantes, parmi lesquelles se distingue une demande croissante de productivité. Celle-ci postule d’une part la …

Theories of global collapse: closing down or opening up the futures?

In this essay, we fi rst ask what kind of rhetorical styles the theories of global collapse have when talking about futures. We claim that these theories manifest in one of three forms: prospecti ve, prophecy, and science-fi cti on. We then ask if …

Improving the usability and security of mail-in ballots

While more prevalent than ever, absentee ballots and protocols for them have barely improved over the last decades. This paper describes opportunities for improving the accuracy, security but and especially accessibility & usability of paper …

Cripping assistive tech design How the current disability framework limits our ability to create emancipatory technology

Recent advances in assistive technologies have blurred the lines between compensating for impairments — for disabled users — and augmenting capabilities — such as with cobotic systems. This article examines how assistive technologies generally seek …

Phrase-Verified Voting: Verifiable Low-Tech Remote Boardroom Voting

We present Phrase-Verified Voting, a voter-verifiable remote voting system easily assembled from commercial off-the-shelf software for small private elections. The system is transparent and enables each voter to verify that the tally includes their …