{"id":137,"date":"2014-07-21T09:56:30","date_gmt":"2014-07-21T09:56:30","guid":{"rendered":"https:\/\/blogs.ncl.ac.uk\/security\/?p=137"},"modified":"2014-07-30T13:24:56","modified_gmt":"2014-07-30T13:24:56","slug":"radio-interview-with-ehsan-toreini-about-private-browsing","status":"publish","type":"post","link":"https:\/\/blogs.ncl.ac.uk\/security\/2014\/07\/21\/radio-interview-with-ehsan-toreini-about-private-browsing\/","title":{"rendered":"Radio interview with Ehsan Toreini about private browsing"},"content":{"rendered":"<p>Ehsan was interviewed on a radio show last Thursday (17 July, 2015) by an Australian radio station LifeFM, on the security issues of private browsing in modern browsers. It was related to a recently published paper which Ehsan co-authored: &#8220;On the privacy of private browsing \u2013 A forensic approach&#8221; (2014, <a href=\"http:\/\/www.sciencedirect.com\/science\/article\/pii\/S2214212614000118\">ScienceDirect<\/a>).<\/p>\n<p>The interview recording can be found <a href=\"http:\/\/cifipro.wordpress.com\/2014\/07\/17\/ehsan-toreini-talks-private-browsing\/\">here<\/a>.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Ehsan was interviewed on a radio show last Thursday (17 July, 2015) by an Australian radio station LifeFM, on the security issues of private browsing in modern browsers. It was related to a recently published paper which Ehsan co-authored: &#8220;On &hellip; <a href=\"https:\/\/blogs.ncl.ac.uk\/security\/2014\/07\/21\/radio-interview-with-ehsan-toreini-about-private-browsing\/\">Continue reading <span class=\"meta-nav\">&rarr;<\/span><\/a><\/p>\n","protected":false},"author":4854,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[14],"tags":[18],"class_list":["post-137","post","type-post","status-publish","format-standard","hentry","category-dissemination-events","tag-dissemination-events"],"_links":{"self":[{"href":"https:\/\/blogs.ncl.ac.uk\/security\/wp-json\/wp\/v2\/posts\/137","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/blogs.ncl.ac.uk\/security\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/blogs.ncl.ac.uk\/security\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/blogs.ncl.ac.uk\/security\/wp-json\/wp\/v2\/users\/4854"}],"replies":[{"embeddable":true,"href":"https:\/\/blogs.ncl.ac.uk\/security\/wp-json\/wp\/v2\/comments?post=137"}],"version-history":[{"count":3,"href":"https:\/\/blogs.ncl.ac.uk\/security\/wp-json\/wp\/v2\/posts\/137\/revisions"}],"predecessor-version":[{"id":140,"href":"https:\/\/blogs.ncl.ac.uk\/security\/wp-json\/wp\/v2\/posts\/137\/revisions\/140"}],"wp:attachment":[{"href":"https:\/\/blogs.ncl.ac.uk\/security\/wp-json\/wp\/v2\/media?parent=137"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/blogs.ncl.ac.uk\/security\/wp-json\/wp\/v2\/categories?post=137"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/blogs.ncl.ac.uk\/security\/wp-json\/wp\/v2\/tags?post=137"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}