Research that changes platforms, policies, and protections for billions of users.

0
IoT vendors patched
0
Browser/OS mitigations
0
Countries with lawsuits
0
Media outlets

Localhost Tracking

Silent web-to-app tracking on mobile via localhost — exposing how Meta and Yandex covertly tracked Android users' browsing across apps.

USENIX Security 2026 Bridges to Self: Silent Web-to-App Tracking on Mobile via Localhost

Regulatory & Policy

  • The Spanish Prime Minister cited the research to announce a parliamentary investigation into Meta. Our team testified before the Spanish Congress commission.
  • Members of the U.S. House of Representatives cited the research in a formal inquiry to Meta leadership.
  • Class actions filed in the U.S. (Rose v. Meta, Carroll, Zaveeri), Canada, and Germany.
  • Disclosures to CNIL, EDPS, AEPD, EDPB, UK CMA, and the European Commission.
  • Civil society response from EFF and Privacy International.

Platform & Technical

Industry Response

  • Meta and Yandex terminated the abuse on the day of public disclosure.
  • VPN vulnerability and cross-profile tracking vectors disclosed to Google.
Press Coverage & Commentary 15+ outlets
Commentary

Smart Home / IoT

Exposing how local network protocols in smart homes violate platform access control assumptions — apps bypass Android's permission model to harvest device metadata.

IMC 2023 In the Room Where It Happens: Characterizing Local Communication and Threats in Smart Homes

Platform & Technical

  • Google introduced a dedicated local network permission in Android 16.
  • Dozens of privacy-invasive apps and SDKs removed from the Google Play Store.
  • 20+ IoT vendors (Philips, Google, TP-Link, Apple) redesigned identifier schemes.

Regulatory & Policy

  • Presented at CNIL Privacy Research Day 2024, RIPE 89 Plenary (Prague), and RediMadrid Conference.
  • Findings shared with EDPS, AEPD, and CNIL.

Industry Response

  • Google publicly recognized the real-world impact of our findings, awarded a $2,000 bug bounty (donated to Médecins Sans Frontières), and engaged with us to explore mitigations via Android OS, app review processes, and IoT standardization efforts.
Press Coverage 5+ outlets

Wireless SDKs

Empirical privacy analysis of wireless-scanning SDKs in Android — revealing how apps exploit Wi-Fi, Bluetooth, and other wireless signals for covert location tracking.

PoPETs 2025 Your Signal, Their Data: An Empirical Privacy Analysis of Wireless-Scanning SDKs in Android

Regulatory & Policy

  • Findings shared with CNIL, EDPS, and AEPD to inform enforcement discussions.
Press Coverage 2 outlets