Re-Imagining Cryptography and Privacy (ReCAP) Workshop
The Re-Imagining Cryptography and Privacy (ReCAP) Workshop expands the space of the
Community-Driven Cryptography Project,
which explores the ways in which cryptography and privacy
intersect with society toward designing, creating, and sustaining technologies that explicitly
benefit marginalized communities.
The focus of the ReCAP Workshop is Re-Imagination: identifying the aspects of cryptography and
privacy technology production that contribute to marginalization, and solidifying approaches, ideas,
and designs that
center marginalized voices, resist toxic aspects of technology production, and leverage
cryptography and privacy tools toward dismantling systems of marginalization.
Like the Community-Driven Cryptography Project, the ReCAP Workshop seeks to build and sustain an
interdisciplinary community of cryptographers, social scientists, humanities scholars, community
organizations, industry practitioners, and technologists, and contribute to the broadening of
access to the field.
ReCAP 2024
ReCAP 2024 is a hybrid workshop from May
2-3 that will take place physically at Tufts University in Medford,
Massachusetts (USA)
and virtually on Zoom. The workshop itself is free but we unfortunately we do not have travel stipends available for
physical attendance this year and hope to secure funding in the future.
Registration
The workshop is open to all who register. To register, please fill out this
form.
Schedule
All times are listed in EST (UTC-4).
Thursday (May 2, 2024)
Time |
Activity/Session Title |
Speaker(s) |
Session |
8:00-9:00AM |
Check-In & Breakfast (Provided) |
|
|
9:00-9:10AM |
Opening remarks |
ReCAP Organizers |
|
9:10-9:45AM |
Reflecting on Crypto for the People |
Seny Kamara |
Cryptography & Privacy for the People |
9:45-10:05AM |
Saying NO! to Workplace Surveillance: Lessons from Cybersecurity and Privacy Institute |
Lisa Oakley, xenia dragon, Eysa Lee |
Meta-Topic |
10:05-10:25AM |
On the Virtues of Information Security in the UK Climate Movement: An Ethnographic Case Study |
Mikaela Brough |
Cryptography & Privacy for the People |
10:25-10:35AM |
Spaces for dialogue and design: Imagining security futures with female social leaders and conflict victims in Cauca, Colombia |
Jessica McClearn |
Cryptography & Privacy for the People |
10:35-11:00AM |
Break |
|
|
11:00-11:20AM |
Not Yet Another Digital ID: Privacy-Preserving Humanitarian Aid Distribution |
Boya Wang |
Cryptography & Privacy for the People |
11:20-11:40AM |
The Good, The Bad, and The Ugly — Lessons from an MPC for Social Good Deployment |
Gabe Kaptchuk |
Cryptography & Privacy for the People |
11:40-12:00PM |
Engineering privacy for vulnerable populations |
Carmela Troncoso |
Cryptography & Privacy for the People |
12:00-12:10PM |
Secret Vector Search: Secure and Private Content Querying with Semantic Embeddings |
Madelyne Xiao |
Cryptography & Privacy for the People |
12:10-12:25PM |
“Get a PhD”: from idea to song, and how to use your art for communicating your ideas |
Daniel Escudero |
Creative Expression |
12:25-2:00PM |
Lunch (On Your Own) |
|
|
2:00-2:20PM |
Where Are the Vicious Vandals of Yesteryear? |
William M Fleischman |
Meta-Topic |
2:20-2:50PM |
Holder, Issuer, Verifier: A Radical Analysis of the 3-party Digital Identity Model |
Daniel Kahn Gillmor |
Cryptography and Privacy in Context |
2:50-3:00PM |
Towards Building Cryptographic Tools to Protect Device Bystanders |
Tess Depres |
Cryptography and Privacy in Context |
3:00-3:20PM |
The Purification of Cryptography: Reactionary Mathematics & Random Oracles |
Zoë Ruha Bell |
Cryptography and Privacy in Context |
3:20-3:40PM |
Break |
|
|
3:40-4:00PM |
Criptolatino: the community of Latin-American cryptographers |
Daniel Escudero |
Cryptography and Privacy in the Margins |
4:00-4:20PM |
Human rights in the technology we chose to standardize |
Sofía Celi and Mallory Knodel |
Surveillance and Systems of Marginalization |
4:20-4:40PM |
My phone's lying out on Thanksgiving and Grandma picks it up.'' User Threat Models for Using Vault Applications |
Chris Geeng |
Cryptography & Privacy for the People |
4:40-5:00PM |
Cryptography for the People: Protecting marginalised groups from mass surveillance |
Anna Storli Tveit |
Cryptography and Privacy in the Margins |
Friday (May 3, 2024)
Time |
Activity/Session Title |
Speaker(s) |
Session |
8:00-9:00AM |
Check-In & Breakfast (Provided) |
|
|
9:00-9:10AM |
You Still See Me: How Data Protection Supports the Architecture of ML Surveillance |
Rui-Jie Yew |
Meta-Topic |
9:10-9:40AM |
How we resist the surveillance nightmare |
Evan Greer |
Surveillance and Systems of Marginalization |
9:40-10:10AM |
Navigating Criminal Defense in the Age of Surveillance: Challenges, Ethics, and Learning Together |
Mirna Haidar |
Surveillance and Systems of Marginalization |
10:10-10:30AM |
Cryptographic Metaphors |
Ying Tong Lai |
Creative Expression |
10:30-11:00AM |
Break |
|
|
11:00-11:30AM |
Digital Public Infrastructure and Surveillance—mobile drivers license, digital wallets, and centralized city databases—a new triad of carceral tech |
Cynthia Conti-Cook and Ed Vogel |
Surveillance and Systems of Marginalization |
11:30AM-12:00PM |
Academia to action: Doing something about *gestures broadly at everything* |
Julie Lee |
Meta-Topic |
12:00-12:20PM |
Quiet - A Slackier Signal for Communities and Organizations |
Holmes Wilson |
Surveillance and Systems of Marginalization |
12:20-12:30PM |
Private Resource Sharing in Distributed Embedded Systems |
Micah Murray |
Surveillance and Systems of Marginalization |
12:30-1:45PM |
Lunch (On Your Own) |
|
|
1:45-2:05PM |
Surveil, control, demonize: how “protect the children” laws are part of larger effort to restrict rights for vulnerable groups |
Erica Portnoy |
Surveillance and Systems of Marginalization |
2:05-2:25PM |
Building Secure Allegation Escrows |
Aniket Kate |
Cryptography & Privacy for the People |
2:25-2:40PM |
Callisto Vault: Privacy and Cryptography in Action |
Scott MacDonald |
Cryptography & Privacy for the People |
2:40-3:00PM |
Private Account Recovery for an Anonymous Web Service |
Ryan Little |
Cryptography & Privacy for the People |
3:00-3:30PM |
Break |
|
|
3:30-3:50PM |
Interfaces for Data Consent |
Riley Wong |
Cryptography and Privacy in the Margins |
3:50-4:10PM |
What you don't build can't teach you |
Nick Mathewson |
Meta-Topic |
4:10-4:30PM |
29°S, 71°W |
Jack Doerner |
Creative Expression |
4:30-5:00PM |
Closing Remarks + Reflection |
ReCAP Organizers |
|
Sessions
Please find the session topics and list of contributions below. For contributions from multiple individuals,
the speaker's name is underlined. When provided, we have added additional links for speakers.
- Cryptography and Privacy in Context: Cryptography and privacy
have deep and under-explored historical, social, political, environmental, psychological,
emotional, and spiritual dimensions. The art of hiding and communicating private information
in plain sight has persisted throughout the social, political, and spiritual histories of
people. This session creates space for the presentation and discussion of histories, stories,
artifacts, reflections, and ideas related to the many dimensions of cryptography and privacy.
Contribution Title |
Contributor(s) |
Holder, Issuer, Verifier: A Radical Analysis of the 3-party Digital Identity Model | Daniel Kahn Gillmor |
Towards Building Cryptographic Tools to Protect Device Bystanders | Tess Despres |
The Purification of Cryptography: Reactionary Mathematics & Random Oracles | Zoë Ruha Bell |
Surveil, control, demonize: how “protect the children” laws are part of a larger effort to restrict rights for vulnerable groups | Erica Portnoy |
- Surveillance and Systems of Marginalization:
This session centers forms of surveillance explicitly wielded
against marginalized people: the surveillance systems of police, local law enforcement, and
domestic federal agencies such as the United States' Federal Bureau of Investigation (FBI)
and Immigration and Customs Enforcement (ICE), intimate partner, family, and peer
surveillance, and the surveillance technologies deployed in school, healthcare,
and welfare systems. Work in this session might document, discuss, or develop new analysis at
the intersections of surveillance and systems of marginalization.
Contribution Title |
Contributor(s) |
Navigating Criminal Defense in the Age of Surveillance: Challenges, Ethics, and Learning Together | Mirna Haidar |
Quiet - A Slackier Signal for Communities and Organizations | Holmes Wilson |
How we resist the surveillance nightmare | Evan Greer |
Academia to action: Doing something about *gestures broadly at everything* | Julie Lee |
Human rights in the technology we chose to standardize | Sofía Celi, Mallory Knodel |
Digital Public Infrastructure and Surveillance—mobile drivers license, digital wallets, and centralized city databases—a new triad of carceral tech | Cynthia Conti-Cook, Ed Vogel |
Private Resource Sharing in Distributed Embedded Systems | Micah Murray |
- Cryptography and Privacy for the People: How do we think about,
talk about, design, build, and sustain cryptography and privacy tools that meet the needs of
individuals and groups of people who are the most vulnerable to surveillance and
marginalization? How might existing practices of threat modeling and protocol design in
cryptography and privacy flatten, miss, or undermine their needs? This session will consider the
lived privacy needs and practices of marginalized people, as well as mechanisms for
co-creating cryptography and privacy tools that reflect these needs and practices.
Contribution Title |
Contributor(s) |
Reflecting on Crypto for the People | Seny Kamara |
On the Virtues of Information Security in the UK Climate Movement: An Ethnographic Case Study | Mikaela Brough |
The Good, The Bad, and The Ugly — Lessons from an MPC for Social Good Deployment | Gabe Kaptchuk, Jen Benoit-Bryan, Kinan Dak Albab, Mia Locks, and Mayank Varia |
Callisto Vault: Privacy and Cryptography in Action | Scott MacDonald |
Private Account Recovery for an Anonymous Web Service | Ryan Little, Lucy Qin, Mayank Varia |
Building Secure Allegation Escrows | Aniket Kate |
"My phone's lying out on Thanksgiving and Grandma picks it up." User Threat Models for Using Vault
Applications | Chris Geeng, Natalie Chen, Kieron Ivy Turk, Jevan Hutson, Damon McCoy |
Engineering privacy for vulnerable populations | Carmela Troncoso |
Not Yet Another Digital ID: Privacy-Preserving Humanitarian Aid Distribution | Boya Wang |
Spaces for dialogue and design: Imagining security futures with female social leaders and conflict victims in Cauca, Colombia | Jessica McClearn |
Secret Vector Search: Secure and Private Content Querying with Semantic Embeddings | Madelyne Xiao, Sarah Scheffler, Micha Gorelick |
- Cryptography and Privacy in the Margins: This session will create
space for acknowledging and confronting the difficulties that people with certain
intersections of identity
experience in the field of
cryptography and privacy, and conversely, acknowledging and confronting the power that people with
opposing intersections of identity hold over decision-making in the field. It will center
conversations surrounding challenges, new perspectives, and action steps toward not only equity
of access and
representation, but also toward direct input, influence, and impact of marginalized
voices at the highest levels of decision-making in the field.
Contribution Title |
Contributor(s) |
Criptolatino: the community of Latin-American cryptographers | Arantxa Zapico, Daniel Escudero, Octavio Perez Kempner, Abdelraham Aly, Sofia Celi |
Interfaces for Data Consent | Riley Wong, Val Elefante |
Building Systems and Communities for Trans Citizen Science | Ada Lerner, Michael Ann DeVito, Leah Namisa Rosenbloom |
Cryptography for the People: Protecting marginalised groups from mass surveillance | Anna Storli Tveit, Katrien De Moor |
- Cryptography, Privacy, and Creative Expression:
This session will be dedicated to all forms of creative expression (multi-media art, music, song, dance,
poetry and creative writing, performance, etc.) produced and enjoyed by people in the
cryptography and privacy community.
Contribution Title |
Contributor(s) |
“Get a PhD”: from idea to song, and how to use your art for communicating your ideas | Daniel Escudero |
crypto_doodles: cryptography through comics and jokes | Eysa Lee |
29°S, 71°W | Jack Doerner, Sandy Williams IV |
Cryptographic metaphors | Ying Tong Lai |
- (Meta Topic) Dreaming and Design: This meta session will set aside time
to discuss the theory and practice of community-driven work, as well as to develop explicit
processes around co-ideation and co-design in cryptography and privacy. What does "for the
people" and "community" mean in our context? What does it mean and look like for the theory
and practice of cryptography and privacy to be "community-driven"? What does the ideation and
design process of "cryptography for the people" look like? Session participants might
highlight, unpack, and analyze particular positive examples of co-design, or take a
"big-picture" approach to imagining what this process could look like in an ideal world.
Contribution Title |
Contributor(s) |
Saying NO! to Workplace Surveillance: Lessons from Cybersecurity and Privacy Institute | Lisa Oakley, xenia dragon, Eysa Lee |
You Still See Me: How Data Protection Supports the Architecture of ML Surveillance | Rui-Jie Yew, Lucy Qin, Suresh Venkatasubramanian |
Where Are the Vicious Vandals of Yesteryear? | William M. Fleischman |
What you don't build can't teach you | Nick Mathewson |
Flyer
Feel free to share the ReCAP flyer with others!