TL/DR: If you're gonna check out one tech project, go with IMPAKT. If you are looking for a sample math paper, try Uniform Avoidance Coupling of Simple Random Walks. For sample teaching materials, either Discrete Mathematics for Engineers or Probability will do fine. If you need computer and operational security advice, contact me directly (but start with the wonderful resources by the Electronic Frontier Foundation.). CURRENT TECHNOLOGY PROJECTS CHANGE AGENT LABS: We're bringing together some great makers and thinkers from the hacker world and the world of progressive politics to make IMPAKT, a platform for trade unions and grassroots organising. A ZCash-based voting technology. This implementation of ZK-Snarks could let us have both voter secrecy and verifiability, something that has not been achieved in voting technology to date. Electronic voting is rightly controversial, and will never be secure enough to reliably implement in national elections. Please see the FAQ. (with A. Olchowik and B. Owczarek.) SOMEONE IS WRONG ON THE INTERNET This is a game that trains the player to detect fake news, logical manipulation and propaganda. Prototype (in Polish) It needs a way to add one's own examples, and a cleanup. (With A. Olchowik, P. Migdał et al.)
RESEARCH Uniform Avoidance Coupling of Simple Random Walks - is it possible to check if you can program two tokens to walk on a graph s that they never collide BUT if you only see one it looks like a simple random walk? For some graphs we can, and I found an algorithm to test whether you have one of these graphs. In polynomial time! Combinatorics and k-anonymity A theoretical reason k-anonimity is a good way to construct anonymity sets - rather than just what we know how to do in practice. The Total Acquisition Number of Random Geometric Graphs (with Mitsche, Prałat) Symmetric Disclosure: a Fresh Look at k-Anonymity FOCI'14, with presentation video. Social networks are very sparse, so k-anonymity gives very little cover traffic for communications unless we group users in rather large sets. This is an often ignored problem. I propose a way to use the sparsity and use this property to our advantage. Counting Restricted Dyck Paths Through Random Walks - a cute, new probabilistic way to arrive at a well known formula with Chebyshev Polynomials.Common adversaries form alliances: modelling complex networks via anti-transitivity (with Bonato, Pohkrel, Prałat), along with a correction/continuation.
TEACHING MATERIALS Discrete Mathematics for Engineers (2017, Ryerson University): propositional logic, predicate logic, set theory, induction, recursion, divisibility, congruences, RSA, RSA - proofs, graph theory I, II, III. Each of these is a 3h lecture. 3h math lectures are a terrible idea, don't try it. Here are the remaining materials. Probability (Dartmouth College), here is a backup of lecture notes. First steps in Java (with A. Olchowik and B. Owczarek): I, II, III and IV.computer securitycrypto or kids An introductory security and privacy video tutorial, with Paweł Ngei (in Polish.)
EDUCATION PhD in Mathematics, Dartmouth College (2016). Supervisor: Prof. Peter Winkler PhD thesis: Applications of Matching Theory in Avoidance Coupling and Anonymity Systems London School of Economics (MSc in Applicable Mathematics, 2011)University of Cambridge (Part III / Master of Advanced Studies in Mathematics, 2009)King's College London (BSci in Mathematics, 2008, first class honours) WHY I QUIT ACADEMIA Needless to say, I didn't last in academia. The reasons are largely the same as they are for most would-be professors in my generation: it just wasn't worth the struggle. But like most, I found that it is easier to make an impact and work on solving the problems that matter once I quit.It's the hacker world that taught me intellectual courage, not academia. The most liberating thing I ever learned was to not wait for permission or validation to work on solving a problem. Especially when it comes to the big problems. It's hackers, not academics, who shoot for the sky.
COMPUTER SECURITY AND PRIVACY Much of my political work is empowering the public to resist surveillance. While the corrupt economic system may be a more fundamental problem, surveillance and every day control is an obstacle to us finding solutions. It is having profound effects on our social structure and solidifying destructive power systems worldwide.INFORMATION IS POWER, PRIVACY IS FREEDOM. And as a mathematician and hacker, this is where I feel most empowered to effect change. I provide computer and operational security assistance to progressive organizations and NGOs. Let me know if you need help.
POLITICS I've been proud to support and take part in many progressive political campaigns. Privately, I call myself a social-anarchist. I believe in freedom. There is no freedom without economic security. I believe a large scale reversal to wealth theft is necessary, and needs to go together with a redistribution of power. In the past I've been involved with the American Civil Liberties Union, Bernie2016 campaign, the Stop C-51 iniatitive in Canada, polish progressive movement Razem and many hacktivist causes.
FAMILY There is plenty on the web on Leopold Infeld's legacy as scientist, educator and peace activist. My Grandfather and Einstein, a guest post I wrote for Fiat Physica may serve as an intro. Also, here is the full text of The Evolution of Physics by A. Einstein and L. Infeld, as well as the text of the Russel-Einstein Manifesto, which remains relevant today. Some day I hope to upload scans of my grandfather Leopold's correspondence with Einstein, but there's a lot of it. In the meantime, here is a bit of history in are letters from Frederic Joliot-Curie, Bertrand Russel and Henry Kissinger. My other grandfather is the Polish writer Józef Hen.My grandmother Helen Schlauch (later Infeld) recieved a PhD in Mathematics at Cornell at a time when few women pursued mathematics and her sister Margaret Schlauch was a pioneering linguist whose work is still relevant today.