default search action
Proceedings on Privacy Enhancing Technologies, Volume 2022
Volume 2022, Number 1, January 2022
- Florian Kerschbaum, Michelle L. Mazurek:
Editors' Introduction. 1-5 - Jacob Leon Kröger, Leon Gellrich, Sebastian Pape, Saba Rebecca Brause, Stefan Ullrich:
Personal information inference from voice recordings: User awareness and privacy concerns. 6-27 - Jiafan Wang, Sherman S. M. Chow:
Forward and Backward-Secure Range-Searchable Symmetric Encryption. 28-48 - Mingyu Liang, Ioanna Karantaidou, Foteini Baldimtsi, S. Dov Gordon, Mayank Varia:
(∈, δ)-Indistinguishable Mixing for Cryptocurrencies. 49-74 - Hussein Darir, Hussein Sibai, Chin-Yu Cheng, Nikita Borisov, Geir E. Dullerud, Sayan Mitra:
MLEFlow: Learning from History to Improve Load Balancing in Tor. 75-104 - Maryam Mehrnezhad, Kovila P. L. Coopamootoo, Ehsan Toreini:
How Can and Would People Protect From Online Tracking? 105-125 - Michal Tereszkowski-Kaminski, Sergio Pastrana, Jorge Blasco, Guillermo Suarez-Tangil:
Towards Improving Code Stylometry Analysis in Underground Forums. 126-147 - Thomas Cilloni, Wei Wang, Charles Walter, Charles Fleming:
Ulixes: Facial Recognition Privacy with Adversarial Machine Learning. 148-165 - Mahsa Saeidi, McKenzie Calvert, Audrey Au, Anita Sarma, Rakesh B. Bobba:
If This Context Then That Concern: Exploring users' concerns with IFTTT applets. 166-186 - Elham Al Qahtani, Yousra Javed, Mohamed Shehab:
User Perceptions of Gmail's Confidential Mode. 187-206 - Ruben Recabarren, Bogdan Carbunar:
Toward Uncensorable, Anonymous and Private Access Over Satoshi Blockchains. 207-226 - Darion Cassel, Su-Chin Lin, Alessio Buraggina, William Wang, Andrew Zhang, Lujo Bauer, Hsu-Chun Hsiao, Limin Jia, Timothy Libert:
OmniCrawl: Comprehensive Measurement of Web Tracking With Real Desktop and Mobile Browsers. 227-252 - Josh Smith, Hassan Jameel Asghar, Gianpaolo Gioiosa, Sirine Mrabet, Serge Gaspers, Paul Tyler:
Making the Most of Parallel Composition in Differential Privacy. 253-273 - Dmitrii Usynin, Daniel Rueckert, Jonathan Passerat-Palmbach, Georgios Kaissis:
Zen and the art of model adaptation: Low-utility-cost attack mitigations in collaborative machine learning. 274-290 - Théo Ryffel, Pierre Tholoniat, David Pointcheval, Francis R. Bach:
AriaNN: Low-Interaction Privacy-Preserving Deep Learning via Function Secret Sharing. 291-316 - Marvin Kowalewski, Franziska Herbert, Theodor Schnitzler, Markus Dürmuth:
Proof-of-Vax: Studying User Preferences and Perception of Covid Vaccination Certificates. 317-338 - Damien Desfontaines, James Voss, Bryant Gipson, Chinmoy Mandayam:
Differentially private partition selection. 339-352 - Nishanth Chandran, Divya Gupta, Akash Shah:
Circuit-PSI With Linear Complexity via Relaxed Batch OPPRF. 353-372 - Badih Ghazi, Ben Kreuter, Ravi Kumar, Pasin Manurangsi, Jiayu Peng, Evgeny Skvortsov, Yao Wang, Craig Wright:
Multiparty Reach and Frequency Histogram: Private, Secure, and Practical. 373-395 - Donghang Lu, Albert Yu, Aniket Kate, Hemanta K. Maji:
Polymath: Low-Latency MPC via Secure Polynomial Evaluations and Its Applications. 396-416 - Sepideh Avizheh, Preston Haffey, Reihaneh Safavi-Naini:
Privacy-preserving FairSwap: Fairness and privacy interplay. 417-439 - Jochen Schäfer, Christian Müller, Frederik Armknecht:
If You Like Me, Please Don't "Like" Me: Inferring Vendor Bitcoin Addresses From Positive Reviews. 440-459 - Bogdan Kulynych, Mohammad Yaghini, Giovanni Cherubin, Michael Veale, Carmela Troncoso:
Disparate Vulnerability to Membership Inference Attacks. 460-480 - Xue Jiang, Xuebing Zhou, Jens Grossklags:
Privacy-Preserving High-dimensional Data Collection with Federated Generative Autoencoder. 481-500 - Konstantinos Athanasiou, Thomas Wahl, A. Adam Ding, Yunsi Fei:
Masking Feedforward Neural Networks Against Power Analysis Attacks. 501-521 - Lennart Oldenburg, Gunes Acar, Claudia Díaz:
From "Onion Not Found" to Guard Discovery. 522-543 - Shihui Fu, Guang Gong:
Polaris: Transparent Succinct Zero-Knowledge Arguments for R1CS with Efficient Verifier. 544-564 - Vinh-Thong Ta, Max Hashem Eiza:
DataProVe: Fully Automated Conformance Verification Between Data Protection Policies and System Architectures. 565-585 - Maximilian Zinkus, Tushar M. Jois, Matthew Green:
SoK: Cryptographic Confidentiality of Data on Mobile Devices. 586-607 - Maggie Van Nortwick, Christo Wilson:
Setting the Bar Low: Are Websites Complying With the Minimum Requirements of the CCPA? 608-628 - Moses Namara, Henry Sloan, Bart P. Knijnenburg:
The Effectiveness of Adaptation Methods in Improving User Engagement and Privacy Protection on Social Network Sites. 629-648
Volume 2022, Number 2, April 2022
- Florian Kerschbaum, Michelle L. Mazurek:
Editors' Introduction. 1-5 - Konrad Kollnig, Anastasia Shuba, Reuben Binns, Max Van Kleek, Nigel Shadbolt:
Are iPhones Really Better for Privacy? A Comparative Study of iOS and Android Apps. 6-24 - Yohan Beugin, Quinn Burke, Blaine Hoak, Ryan Sheatsley, Eric Pauley, Gang Tan, Syed Rafiul Hussain, Patrick D. McDaniel:
Building a Privacy-Preserving Smart Camera System. 25-46 - Mansoor Ahmed-Rengers, Diana A. Vasile, Daniel Hugenroth, Alastair R. Beresford, Ross Anderson:
CoverDrop: Blowing the Whistle Through A News App. 47-67 - Jan Tolsdorf, Delphine Reinhardt, Luigi Lo Iacono:
Employees' privacy perceptions: exploring the dimensionality and antecedents of personal data sensitivity and willingness to disclose. 68-94 - Mariano Di Martino, Isaac Meers, Peter Quax, Ken Andries, Wim Lamotte:
Revisiting Identification Issues in GDPR 'Right Of Access' Policies: A Technical and Longitudinal Analysis. 95-113 - Mohammad Tahaei, Tianshi Li, Kami Vaniea:
Understanding Privacy-Related Advice on Stack Overflow. 114-131 - Chen Chen, Xiao Liang, Bogdan Carbunar, Radu Sion:
SoK: Plausibly Deniable Storage. 132-151 - Peter Story, Daniel Smullen, Rex Chen, Yaxing Yao, Alessandro Acquisti, Lorrie Faith Cranor, Norman M. Sadeh, Florian Schaub:
Increasing Adoption of Tor Browser Using Informational and Planning Nudges. 152-183 - Daniel Alabi, Audra McMillan, Jayshree Sarathy, Adam D. Smith, Salil P. Vadhan:
Differentially Private Simple Linear Regression. 184-204 - Samuel Adams, Chaitali Choudhary, Martine De Cock, Rafael Dowsley, David Melanson, Anderson C. A. Nascimento, Davis Railsback, Jianwei Shen:
Privacy-preserving training of tree ensembles over continuous data. 205-226 - Aidmar Wainakh, Fabrizio Ventola, Till Müßig, Jens Keim, Carlos Garcia Cordero, Ephraim Zimmer, Tim Grube, Kristian Kersting, Max Mühlhäuser:
User-Level Label Leakage from Gradients in Federated Learning. 227-244 - Rakibul Hasan, Mario Fritz:
Understanding Utility and Privacy of Demographic Data in Education Technology by Causal Analysis and Adversarial-Censoring. 245-262 - Xue Jiang, Xuebing Zhou, Jens Grossklags:
Comprehensive Analysis of Privacy Leakage in Vertical Federated Learning During Prediction. 263-281 - Karel Kubicek, Jakob Merane, Carlos Cotrini, Alexander Stremitzer, Stefan Bechtold, David A. Basin:
Checking Websites' GDPR Consent Compliance for Marketing Emails. 282-303 - Aarushi Goel, Matthew Green, Mathias Hall-Andersen, Gabriel Kaptchuk:
Efficient Set Membership Proofs using MPC-in-the-Head. 304-324 - Domien Schepers, Aanjhan Ranganathan:
Privacy-Preserving Positioning in Wi-Fi Fine Timing Measurement. 325-343 - James K. Holland, Nicholas Hopper:
RegulaTor: A Straightforward Website Fingerprinting Defense. 344-362 - Rishav Chourasia, Batnyam Enkhtaivan, Kunihiro Ito, Junki Mori, Isamu Teranishi, Hikaru Tsuchida:
Knowledge Cross-Distillation for Membership Privacy. 362-377 - Saikrishna Badrinarayanan, Peihan Miao, Tiancheng Xie:
Updatable Private Set Intersection. 378-406 - Lukas Prediger, Niki A. Loppi, Samuel Kaski, Antti Honkela:
d3p - A Python Package for Differentially-Private Probabilistic Programming. 407-425 - Daniel Kats, David Luz Silva, Johann Roturier:
Who Knows I Like Jelly Beans? An Investigation Into Search Privacy. 426-446 - Valerie Fetzer, Marcel Keller, Sven Maier, Markus Raiber, Andy Rupp, Rebecca Schwerdt:
PUBA: Privacy-Preserving User-Data Bookkeeping and Analytics. 447-516 - Pankaj Dayama, Arpita Patra, Protik Paul, Nitin Singh, Dhinakaran Vinayagamurthy:
How to prove any NP statement jointly? Efficient Distributed-prover Zero-Knowledge Protocols. 517-556 - Pouneh Nikkhah Bahrami, Umar Iqbal, Zubair Shafiq:
FP-Radar: Longitudinal Measurement and Early Detection of Browser Fingerprinting. 557-577 - Dilawer Ahmed, Anupam Das, Fareed Zaffar:
Analyzing the Feasibility and Generalizability of Fingerprinting Internet of Things Devices. 578-600 - Priyanka Nanayakkara, Johes Bater, Xi He, Jessica Hullman, Jennie Rogers:
Visualizing Privacy-Utility Trade-Offs in Differentially Private Data Releases. 601-618
Volume 2022, Number 3, July 2022
- Florian Kerschbaum, Michelle L. Mazurek:
Editors' Introduction. 1-5 - Patrick Bombik, Tom Wenzel, Jens Grossklags, Sameer Patil:
A Multi-Region Investigation of the Perceptions and Use of Smart Home Devices. 6-32 - Mohammad Tahaei, Kopo M. Ramokapane, Tianshi Li, Jason I. Hong, Awais Rashid:
Charting App Developers' Journey Through Privacy Regulation Features in Ad Networks. 33-56 - Vanessa Bracamonte, Sebastian Pape, Sascha Löbner:
"All apps do this": Comparing Privacy Concerns Towards Privacy Tools and Non-Privacy Tools for Social Media Content. 57-78 - Imane Fouad, Cristiana Santos, Arnaud Legout, Nataliia Bielova:
My Cookie is a phoenix: detection, measurement, and lawfulness of cookie respawning with browser fingerprinting. 79-98 - Ahmed Alshehri, Joseph Spielman, Amiya Prasad, Chuan Yue:
Exploring the Privacy Concerns of Bystanders in Smart Homes from the Perspectives of Both Owners and Bystanders. 99-119 - Arezoo Rajabi, Mahdieh Abbasi, Rakesh B. Bobba, Kimia Tajik:
Adversarial Images Against Super-Resolution Convolutional Neural Networks for Free. 120-139 - Dustin Kern, Timm Lauser, Christoph Krauß:
Integrating Privacy into the Electric Vehicle Charging Architecture. 140-158 - Kejsi Take, Kevin Gallagher, Andrea Forte, Damon McCoy, Rachel Greenstadt:
"It Feels Like Whack-a-mole": User Experiences of Data Removal from People Search Websites. 159-178 - Ryan Wails, Andrew Stange, Eliana Troper, Aylin Caliskan, Roger Dingledine, Rob Jansen, Micah Sherr:
Learning to Behave: Improving Covert Channel Security with Behavior-Based Designs. 179-199 - Rajat Tandon, Pithayuth Charnsethikul, Ishank Arora, Dhiraj Murthy, Jelena Mirkovic:
I know what you did on Venmo: Discovering privacy leaks in mobile social payments. 200-221 - Valentin Hartmann, Vincent Bindschaedler, Alexander Bentkamp, Robert West:
Privacy accounting εconomics: Improving differential privacy composition via a posteriori bounds. 222-246 - Amogh Pradeep, Hira Javaid, Ryan Williams, Antoine Rault, David R. Choffnes, Stevens Le Blond, Bryan Ford:
Moby: A Blackout-Resistant Anonymity Network for Mobile Devices. 247-267 - David Marco Sommer, Liwei Song, Sameer Wagh, Prateek Mittal:
Athena: Probabilistic Verification of Machine Unlearning. 268-290 - S. Dov Gordon, Carmit Hazay, Phi Hung Le:
Fully Secure PSI via MPC-in-the-Head. 291-313 - Vera Rimmer, Theodor Schnitzler, Tom van Goethem, Abel Rodríguez Romero, Wouter Joosen, Katharina Kohls:
Trace Oddity: Methodologies for Data-Driven Traffic Analysis on Tor. 314-335 - Sarah Meiklejohn, Joe DeBlasio, Devon O'Brien, Chris Thompson, Kevin Yeo, Emily Stark:
SoK: SCT Auditing in Certificate Transparency. 336-353 - Szilvia Lestyán, Gergely Ács, Gergely Biczók:
In Search of Lost Utility: Private Location Data. 354-372 - Yucheng Yang, Jack West, George K. Thiruvathukal, Neil Klingensmith, Kassem Fawaz:
Are You Really Muted?: A Privacy Analysis of Mute Buttons in Video Conferencing Apps. 373-393 - Moritz Gruber, Christian Höfig, Maximilian Golla, Tobias Urban, Matteo Große-Kampmann:
"We may share the number of diaper changes": A Privacy and Security Analysis of Mobile Child Care Applications. 394-414 - Ji Gao, Sanjam Garg, Mohammad Mahmoody, Prashant Nalini Vasudevan:
Deletion inference, reconstruction, and compliance in machine (un)learning. 415-436 - Eduard Rupp, Emmanuel Syrmoudis, Jens Grossklags:
Leave No Data Behind - Empirical Insights into Data Erasure from Online Services. 437-455 - Iness Ben Guirat, Claudia Díaz:
Mixnet optimization methods. 456-477 - Michael Toth, Nataliia Bielova, Vincent Roca:
On dark patterns and manipulation of website publishers by CMPs. 478-497 - Mona Wang, Anunay Kulshrestha, Liang Wang, Prateek Mittal:
Leveraging strategic connection migration-powered traffic splitting for privacy. 498-515 - Jeremiah Blocki, Wuwei Zhang:
DALock: Password Distribution-Aware Throttling. 516-537 - Christoph Egger, Russell W. F. Lai, Viktoria Ronge, Ivy K. Y. Woo, Hoover H. F. Yin:
On Defeating Graph Analysis of Anonymous Transactions. 538-557 - Sarah Pearman, Ellie Young, Lorrie Faith Cranor:
User-friendly yet rarely read: A case study on the redesign of an online HIPAA authorization. 558-581 - Debajyoti Das, Easwar Vivek Mangipudi, Aniket Kate:
OrgAn: Organizational Anonymity with Low Latency. 582-605 - Janus Varmarken, Jad Al Aaraj, Rahmadi Trimananda, Athina Markopoulou:
FingerprinTV: Fingerprinting Smart TV Apps. 606-629 - Yuanyi Sun, Sencun Zhu, Yu Chen:
ZoomP3: Privacy-Preserving Publishing of Online Video Conference Recordings. 630-649 - Mihai Bâce, Alia Saad, Mohamed Khamis, Stefan Schneegass, Andreas Bulling:
PrivacyScout: Assessing Vulnerability to Shoulder Surfing on Mobile Devices. 650-669 - Dominic Deuber, Viktoria Ronge, Christian Rückert:
SoK: Assumptions Underlying Cryptocurrency Deanonymizations. 670-691 - Marcos Tileria, Jorge Blasco:
Watch Over Your TV: A Security and Privacy Analysis of the Android TV Ecosystem. 692-710 - Rujia Li, Qin Wang, Qi Wang, David Galindo, Mark Ryan:
SoK: TEE-Assisted Confidential Smart Contract. 711-731 - Anisa Halimi, Leonard Dervishi, Erman Ayday, Apostolos Pyrgelis, Juan Ramón Troncoso-Pastoriza, Jean-Pierre Hubaux, Xiaoqian Jiang, Jaideep Vaidya:
Privacy-Preserving and Efficient Verification of the Outcome in Genome-Wide Association Studies. 732-753
Volume 2022, Number 4, October 2022
- Florian Kerschbaum, Michelle L. Mazurek:
Editors' Introduction. 1-5 - Michael Smith, Peter Snyder, Moritz Haller, Benjamin Livshits, Deian Stefan, Hamed Haddadi:
Blocked or Broken? Automatically Detecting When Privacy Interventions Break Websites. 6-23 - Igor Zavalyshyn, Axel Legay, Annanda Rath, Etienne Rivière:
SoK: Privacy-enhancing Smart Home Hubs. 24-43 - Megumi Ando, Marilyn George:
On the Cost of Suppressing Volume for Encrypted Multi-maps. 44-65 - Kevin Deforth, Marc Desgroseilliers, Nicolas Gama, Mariya Georgieva, Dimitar Jetchev, Marius Vuille:
XORBoost: Tree Boosting in the Multiparty Computation Setting. 66-85 - Abhishek Jana, Bipin Paudel, Md. Kamruzzaman Sarker, Monireh Ebrahimi, Pascal Hitzler, George T. Amariucai:
Neural Fuzzy Extractors: A Secure Way to Use Artificial Neural Networks for Biometric User Authentication. 86-104 - Cassidy Gibson, Vanessa Frost, Katie Platt, Washington Garcia, Luis Vargas, Sara Rampazzi, Vincent Bindschaedler, Patrick Traynor, Kevin R. B. Butler:
Analyzing the Monetization Ecosystem of Stalkerware. 105-119 - Majed Almansoori, Andrea Gallardo, Julio Poveda, Adil Ahmed, Rahul Chatterjee:
A Global Survey of Android Dual-Use Applications Used in Intimate Partner Surveillance. 120-139 - Kazuki Nomoto, Mitsuaki Akiyama, Masashi Eto, Atsuo Inomata, Tatsuya Mori:
On the Feasibility of Linking Attack to Google/Apple Exposure Notification Framework. 140-161 - Eugene Bagdasaryan, Peter Kairouz, Stefan Mellem, Adrià Gascón, Kallista A. Bonawitz, Deborah Estrin, Marco Gruteser:
Towards Sparse Federated Analytics: Location Heatmaps under Distributed Differential Privacy with Secure Aggregation. 162-182 - Yue Niu, Ramy E. Ali, Salman Avestimehr:
3LegRace: Privacy-Preserving DNN Training over TEEs and GPUs. 183-203 - Shikun Zhang, Yuanyuan Feng, Yaxing Yao, Lorrie Faith Cranor, Norman Sadeh:
How Usable Are iOS App Privacy Labels? 204-228 - Foteini Baldimtsi, Panagiotis Chatzigiannis, S. Dov Gordon, Phi Hung Le, Daniel McVicker:
gOTzilla: Efficient Disjunctive Zero-Knowledge Proofs from MPC in the Head, with Application to Proofs of Assets in Cryptocurrencies. 229-249 - Noura Alomar, Serge Egelman:
Developers Say the Darnedest Things: Privacy Compliance Processes Followed by Developers of Child-Directed Apps. 250-273 - Kanav Gupta, Deepak Kumaraswamy, Nishanth Chandran, Divya Gupta:
LLAMA: A Low Latency Math Library for Secure Inference. 274-294 - Maaz Bin Musa, Rishab Nithyanand:
ATOM: Ad-network Tomography. 295-313 - Marlene Saemann, Daniel Theis, Tobias Urban, Martin Degeling:
Investigating GDPR Fines in the Light of Data Flows. 314-331 - Xinyu Tang, Milad Nasr, Saeed Mahloujifar, Virat Shejwalkar, Liwei Song, Amir Houmansadr, Prateek Mittal:
Machine Learning with Differentially Private Labels: Mechanisms and Frameworks. 332-350 - Sameer Wagh:
Pika: Secure Computation using Function Secret Sharing over Rings. 351-377 - Mário S. Alvim, Natasha Fernandes, Annabelle McIver, Carroll Morgan, Gabriel Henrique Nunes:
Flexible and scalable privacy assessment for very large datasets, with an application to official governmental microdata. 378-399 - Karola Marky, Nina Gerber, Michelle Gabriela Pelzer, Mohamed Khamis, Max Mühlhäuser:
"You offer privacy like you offer tea": Investigating Mechanisms for Improving Guest Privacy in IoT-Equipped Households. 400-420 - Gary Liu, Nathan Malkin:
Effects of Privacy Permissions on User Choices in Voice Assistant App Stores. 421-439 - Alexandra Kapp:
Collection, usage and privacy of mobility data in the enterprise and public administrations. 440-456 - Angelica Goetzen, Samuel Dooley, Elissa M. Redmiles:
Ctrl-Shift: How Privacy Sentiment Changed from 2019 to 2021. 457-485 - Simon Koch, Malte Wessels, Benjamin Altpeter, Madita Olvermann, Martin Johns:
Keeping Privacy Labels Honest. 486-506 - Felix Engelmann, Thomas Kerber, Markulf Kohlweiss, Mikhail Volkhov:
Zswap: zk-SNARK Based Non-Interactive Multi-Asset Swaps. 507-527 - Anshuman Suri, David Evans:
Formalizing and Estimating Distribution Inference Risks. 528-551 - Vadym Doroshenko, Badih Ghazi, Pritish Kamath, Ravi Kumar, Pasin Manurangsi:
Connect the Dots: Tighter Discrete Approximations of Privacy Loss Distributions. 552-570 - Daniel Bosk, Davide Frey, Mathieu Gestin, Guillaume Piolle:
Hidden Issuer Anonymous Credential. 571-607 - Danilo Fabrino Favato, Gabriel Coutinho, Mário S. Alvim, Natasha Fernandes:
A novel reconstruction attack on foreign-trade official statistics, with a Brazilian case study. 608-625 - Badih Ghazi, Neel Kamal, Ravi Kumar, Pasin Manurangsi, Annika Zhang:
Private Aggregation of Trajectories. 626-644 - Tom Biselli, Enno Steinbrink, Franziska Herbert, Gina Maria Schmidbauer-Wolf, Christian Reuter:
On the Challenges of Developing a Concise Questionnaire to Identify Privacy Personas. 645-669 - Ilia Iliashenko, Malika Izabachène, Axel Mertens, Hilder V. L. Pereira:
Homomorphically counting elements with the same property. 670-683 - Zachary Espiritu, Evangelia Anna Markatou, Roberto Tamassia:
Time- and Space-Efficient Aggregate Range Queries over Encrypted Databases. 684-704 - Michal Kepkowski, Lucjan Hanzlik, Ian D. Wood, Mohamed Ali Kâafar:
How Not to Handle Keys: Timing Attacks on FIDO Authenticator Privacy. 705-726 - Christopher Ellis, Haohuang Wen, Zhiqiang Lin, Anish Arora:
Replay (Far) Away: Exploiting and Fixing Google/Apple Exposure Notification Contact Tracing. 727-745 - Nuttapong Attrapadung, Koki Hamada, Dai Ikarashi, Ryo Kikuchi, Takahiro Matsuda, Ibuki Mishina, Hiraku Morita, Jacob C. N. Schuldt:
Adam in Private: Secure and Fast Training of Deep Neural Networks with Adaptive Moment Estimation. 746-767 - Alexandros Bampoulidis, Alessandro Bruni, Lukas Helminger, Daniel Kales, Christian Rechberger, Roman Walch:
Privately Connecting Mobility to Infectious Diseases via Applied Cryptography. 768-788
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.