Why Drexel's Rachel Greenstadt is a big deal in the privacy technology scene - Technical.ly Philly

Dev

Jul. 28, 2015 10:01 am

Why Drexel’s Rachel Greenstadt is a big deal in the privacy technology scene

Greenstadt is working on projects to anonymize developers, sniff out cyber-crime gangs and determine the sensitivity of tweets. She's also the reason an international privacy technology conference came to Philadelphia this year.

Rachel Greenstadt, a computer science professor at Drexel, runs the school's Privacy, Security and Automation Lab.

(Photo by Juliana Reyes)

To hell with origin stories.

Rachel Greenstadt could tell you how, when she was in eighth grade, she borrowed a library book with BASIC programs for encrypting and decrypting data and how she copied them into her Apple IIe to make secret messages. But that’s not the whole story. That’d just be cherry picking — editing her personal history into a narrative that makes it seems like she was going to become a privacy technology professor all along. That it was written in the stars.

And well, that’d be bullshit.

Greenstadt, 36, runs Drexel’s Privacy, Security and Automation Lab, where she works with graduate and undergraduate students to solve puzzles around privacy and technology (more on those in a second). She’s also a leader in the broader internet privacy scene, which has been growing locally — she was the reason the international Privacy Enhancing Technologies Symposium came to Philadelphia this year and she’ll be the co-editor-in-chief, choosing talks for the conference, for the next two years. But she didn’t always know she was going to work in technology.

She wanted to be an architect. (She actually went to MIT for architecture, mainly trying computer science so she could find a summer job to help pay for her college education.) She thought she might become a science fiction novelist. (She’s a big Neil Gaiman fan — her office’s walls are bare except for a Sandman poster — and she also likes Vernor Vinge and the late Iain M. Banks.)

Greenstadt dropped the prospect of being a novelist when she realized: “I don’t need to be a writer. I could be a protagonist. I could be a scientist.”

(She’s still fascinated by writing, though. Many of her projects focus on the written word, like the software programs she built with then-Ph.D. candidate Mike Brennan that aim to determine an author of a text, as well as make an author anonymous.)

Advertisement

privacy security automation lab drexel

Members of Drexel’s Privacy, Security and Automation Lab. (Photo by Juliana Reyes)

But back to origin stories.

Greenstadt, who grew up in Southern California and got her Ph.D. in computer science at Harvard, said that talking about origin stories isn’t just skewing a narrative, but that it can also be harmful not to show the whole picture.

Someone might read about a technologist and see that they started coding at 14 and think: “Oh, that’s not me. I don’t have that backstory. I can’t be like that.” She said she thinks that’s particularly true for underrepresented groups. (Greenstadt also advises Drexel’s Women in Computing Society.)

Greenstadt doesn’t believe that anyone has to have a particular backstory to become a technologist.

“I’m a big advocate for different routes into computer science,” she said.

She wants people to know that, despite “this bias for extreme youth,” it’s never too late to get into technology. You can pick this stuff up, she said.

At Drexel, she’s been working with students on projects like:

  • How to identify (and mask) who has written a certain piece of code — students are currently working on how to determine authors of code that has been written by a group of people.
  • If it’s possible to track where people are going when they use The Tor Project’s anonymous browser, based on data from Tor.
  • If it’s possible to analyze cyber-criminal data to see if there are cyber-criminal gangs.
  • How to analyze tweets for their “sensitivity.” Researchers built a program that could identify more personal tweets, like tweets one might later regret, and used that to analyze different Twitter accounts.

The end goal with many of these projects is to build tools that people can actually use, but it’s hard, she said, because the lab doesn’t have a UX team or a team of dedicated engineers. These are generally grad students.

“You can’t create software that’s super mature,” she said.

They do try to release as much of their code and data as possible, but it’s not the cleanest code: “It’s research code, not production code,” she said.

Greenstadt is also one-half of a privacy technology power couple: She’s married to Tor cofounder Roger Dingledine. (That’s why Dingledine is based in Philadelphia, because the couple moved to the city for Greenstadt’s job.)

She’ll be going on sabbatical this fall, spending time in Berkeley, where one of her former advisees, Sadia Afroz, is a postdoc, and Belgium.

You must appreciate accurate, relevant and productive community journalism.  Support this sort of work from professional reporters with seasoned editors.  Become a Technical.ly member for $12 per month -30-
LEAVE A COMMENT

Advertisement

Knight Foundation grants boost two Philly art-innovation projects

Temple University business dean ousted over years of ‘false’ data

A healthcare hackathon in South Jersey produced 3 ideas worth exploring

SPONSORED

Philly

UX, UArts and the importance of human-centered design

Chesterbrook, PA

Deacom

Deacom | Creative Marketing Writer

Apply Now
Chesterbrook, PA

Deacom

EDI Specialist

Apply Now
Philadelphia

Inspire

Associate Product Manager

Apply Now

K-12 makerspaces lack inclusive culture, Drexel study says

Temple University partners with Apple to put student IDs on iWatch, iPhone

Penn joins $50M blockchain research push launched by Ripple

SPONSORED

Philly

Pitch to win up to $360,000 in funding at WeWork’s Creator Awards

Philadelphia

Perpay

Product Designer

Apply Now
30 S 15th St #1400, Philadelphia, PA 19102

Inspire

Fall 2018 – Cleantech Connect Project Mentee

Apply Now
Philadelphia

Practice

Director of Sales

Apply Now

Sign-up for daily news updates from Technical.ly

Do NOT follow this link or you will be banned from the site!