Alexandra Klymenko (Technical University of Munich), Stephen Meisenbacher (Technical University of Munich), Luca Favaro (Technical University of Munich), and Florian Matthes (Technical University of Munich)

Privacy-Enhancing Technologies (PETs) have gained considerable attention in the past decades, particularly in academia but also in practical settings. The proliferation of promising technologies from research presents only one perspective, and the true success of PETs should also be measured in their adoption in the industry. Yet, a potential issue arises with the very terminology of Privacy-Enhancing Technology: what exactly is a PET, and what is not? To tackle this question, we begin with the academic side, investigating various definitions of PETs proposed in the literature over the past 30 years. Next, we compare our findings with the awareness and understanding of PETs in practice by conducting 20 semi-structured interviews with privacy professionals. Additionally, we conduct two surveys with 67 total participants, quantifying which of the technologies from the literature practitioners consider to be PETs, while also evaluating new definitions that we propose. Our results show that there is little agreement in academia and practice on how the term Privacy-Enhancing Technologies is understood. We conclude that there is much work to be done towards facilitating a common understanding of PETs and their transition from research to practice.

View More Papers

MTZK: Testing and Exploring Bugs in Zero-Knowledge (ZK) Compilers

Dongwei Xiao (The Hong Kong University of Science and Technology), Zhibo Liu (The Hong Kong University of Science and Technology), Yiteng Peng (The Hong Kong University of Science and Technology), Shuai Wang (The Hong Kong University of Science and Technology)

Read More

“I didn't click”: What users say when reporting phishing

Nikolas Pilavakis, Adam Jenkins, Nadin Kokciyan, Kami Vaniea (University of Edinburgh)

Read More

MingledPie: A Cluster Mingling Approach for Mitigating Preference Profiling...

Cheng Zhang (Hunan University), Yang Xu (Hunan University), Jianghao Tan (Hunan University), Jiajie An (Hunan University), Wenqiang Jin (Hunan University)

Read More

Welcome to Jurassic Park: A Comprehensive Study of Security...

Abdullah AlHamdan (CISPA Helmholtz Center for Information Security), Cristian-Alexandru Staicu (CISPA Helmholtz Center for Information Security)

Read More