The All Things Auth Podcast

{{ show.title }}Trailer Bonus Episode {{ selectedEpisode.number }}
{{ selectedEpisode.title }}
{{ displaySpeed }}x
{{ selectedEpisode.title }}
By {{ }}
Broadcast by


A series of interviews with researchers from the Symposium on Usable Privacy and Security (SOUPS) on deleting your data from websites, updated expert advice, why your brain actually ignores notifications, usability of password managers, and 2FA on Fortnite.

Show Notes

  1. Yixin Zou
    1. Social: @yixinzou1124
    2. University: School of Information at University of Michigan
    3. Paper: An Empirical Analysis of Data Deletion and Opt-Out Choices on 150 Websites
  2. Karoline Busse
    1. Social: @kb_usec
    2. University: Institute of Computer Science 4 Security and Networked Systems at University of Bonn
    3. Paper: Replication: No One Can Hack My Mind Revisiting a Study on Expert and Non-Expert Security Practices and Advice
  3. Anthony Vance
    1. Social: @anthonyvance,
    2. University: Center for Cybersecurity of the Fox School of Business at Temple University in collaboration with Neuro Security Lab at Brigham Young University
    3. Paper: The Fog of Warnings: How Non-essential Notifications Blur with Security Warnings
  4. Sarah Pearman and Shikun Aerin Zhang
    1. Social: in/
    2. University: CyLab at Carnegie Mellon University
    3. Paper: Why people (don’t) use password managers effectively
  5. Kyle Crichton
    1. Social: in/kyle-crichton-81b72359
    2. University: CyLab Usable Privacy and Security (CUPS) Laboratory at Carnegie Mellon University
    3. Paper: Incentives for Enabling Two-Factor Authentication in Online Gaming

You can find the host of The All Things Auth Podcast on Twitter @conorgil.

Canonical URL:

What is The All Things Auth Podcast?

Every 2 weeks, Conor Gilsenan hosts a conversation with creators, researchers, founders, and advocates who are working to improve the usability of security and privacy technologies.

Guests share what they are currently working on, how they got to where they are today, who they are trying to help, and what keeps them motivated to overcome challenges along the way.

The goal is for the rest of us to learn from their experiences and go on to promote usable security and privacy within our own projects and organizations.