<?xml version="1.0" encoding="utf-8"?><feed xmlns="http://www.w3.org/2005/Atom" ><generator uri="https://jekyllrb.com/" version="3.10.0">Jekyll</generator><link href="https://david.adei.love/feed.xml" rel="self" type="application/atom+xml" /><link href="https://david.adei.love/" rel="alternate" type="text/html" /><updated>2026-03-14T18:30:36+00:00</updated><id>https://david.adei.love/feed.xml</id><title type="html">David’s Homepage</title><subtitle>even the best can be better</subtitle><author><name>David L. Adei</name><email>lokingdav@gmail.com</email></author><entry><title type="html">Technology’s Great Blind Spot: Reliable Digital Identity</title><link href="https://david.adei.love/identity/" rel="alternate" type="text/html" title="Technology’s Great Blind Spot: Reliable Digital Identity" /><published>2025-07-11T00:00:00+00:00</published><updated>2025-07-11T00:00:00+00:00</updated><id>https://david.adei.love/identity</id><content type="html" xml:base="https://david.adei.love/identity/"><![CDATA[<p>We live in an era where technology can achieve incredible things.</p>

<p>AI can write, create, diagnose, and predict. Smartphones can unlock with our faces. Cars can drive themselves. Nearly everything we do is faster, smarter, and more connected than ever.</p>

<p>But for all these advances, there’s one critical problem technology still hasn’t solved: real-world identity, which remains fuzzy.</p>

<p>Despite all our apps, platforms, and digital tools, proving who someone really is—online—remains deeply fragmented and unreliable. We still create new accounts for every service, repeat the same form-filling rituals, and scatter pieces of our identity across countless databases. Control over personal information is weak at best, and transparency is almost nonexistent.</p>

<p>With the explosive rise of AI, this problem is only getting worse.</p>

<p>Synthetic identities, deepfakes, and convincing impersonations are now easier than ever to create. Attackers can leverage our fragmented digital footprints and overshared data to convincingly pretend to be anyone, opening the door to a new wave of fraud, scams, and identity-based attacks.</p>

<p>It’s a strange paradox:</p>

<p>We can teach machines to imitate our voices, generate our likenesses, and predict our next move—yet we still can’t reliably prove that someone online is who they claim to be.</p>

<p>Until we address this fundamental challenge, every breakthrough will bring new risks. It’s time for a new approach to digital identity—one built for the age of AI that prioritizes security and privacy. The future of online trust depends on it.</p>]]></content><author><name>David L. Adei</name><email>lokingdav@gmail.com</email></author><category term="AI" /><category term="security" /><category term="identity" /><category term="digital-identity" /><category term="technology" /><summary type="html"><![CDATA[We live in an era where technology can achieve incredible things.]]></summary></entry><entry><title type="html">More Than a Paper: Lessons From an Award-Winning Research Project</title><link href="https://david.adei.love/jager-journey/" rel="alternate" type="text/html" title="More Than a Paper: Lessons From an Award-Winning Research Project" /><published>2025-01-10T00:00:00+00:00</published><updated>2025-01-10T00:00:00+00:00</updated><id>https://david.adei.love/jager-journey</id><content type="html" xml:base="https://david.adei.love/jager-journey/"><![CDATA[<p>Last fall, my first Ph.D. project, “Jäger,” was recognized with both a Distinguished Paper Award and a Distinguished Artifact Award at ACM CCS.</p>

<p>While the recognition was an incredible honor, the real value came from the lessons learned during the process. For any student starting their research journey, I wanted to share a few takeaways from the experience of taking an idea from a whiteboard to an award-winning paper and artifact.</p>

<h3 id="lesson-1-tackle-problems-people-actually-have">Lesson 1: Tackle Problems People Actually Have</h3>

<p>Our work started with a simple, universal frustration: robocalls. Grounding our research in a problem that affects millions of people daily gave the project a clear sense of purpose. It’s easy to get lost in purely theoretical questions, but focusing on a tangible, real-world issue provides constant motivation and a clear benchmark for success: does this actually help solve the problem?</p>

<h3 id="lesson-2-build-it-to-believe-it">Lesson 2: Build It to Believe It</h3>

<p>The Distinguished Artifact award was, in many ways, more meaningful to me than the paper award. Theorizing is one thing; building a functional system that withstands real-world constraints is another. Creating the Jäger prototype forced us to confront messy engineering challenges and prove our approach was practical, not just plausible. The process of building something concrete deepens your understanding and makes your research infinitely more credible.</p>

<h3 id="lesson-3-research-is-a-team-sport">Lesson 3: Research is a Team Sport</h3>

<p>Jäger would not exist without my collaborators, Varun Madathil and Sathvik Prasad, and my advisors, Dr. Bradley Reaves and Dr. Alessandra Scafuro. Every hard problem was solved through discussion, debate, and combining different perspectives. Don’t try to go it alone. Actively seek out collaboration—it’s the fastest way to find the flaws in your own thinking and build something better than you could on your own.</p>

<h3 id="lesson-4-the-real-work-happens-in-the-dead-ends">Lesson 4: The Real Work Happens in the Dead Ends</h3>

<p>A final paper presents a clean, linear story. The reality is anything but. Our path was filled with failed experiments and dead ends that will never see the light of day. That’s not a sign of failure; it’s the definition of research. Pushing through that uncertainty is where the breakthroughs happen. The persistence required to navigate the “grind” is the most critical skill.</p>

<p>These awards are a welcome validation, but they are a snapshot of a long process. The real takeaways are the habits and principles that lead to good work. As I look towards graduating in 2026, these are the lessons I’ll be taking with me: find important problems, build real solutions, work with great people, and don’t be afraid of the grind.</p>]]></content><author><name>David L. Adei</name><email>lokingdav@gmail.com</email></author><category term="research" /><category term="phd-journey" /><category term="security" /><category term="advice" /><category term="ccs" /><summary type="html"><![CDATA[Last fall, my first Ph.D. project, “Jäger,” was recognized with both a Distinguished Paper Award and a Distinguished Artifact Award at ACM CCS.]]></summary></entry><entry><title type="html">ACM CCS 2024 Conference Experience: A Week of Inspiration</title><link href="https://david.adei.love/posts/2024/10/17-acm-ccs-24/" rel="alternate" type="text/html" title="ACM CCS 2024 Conference Experience: A Week of Inspiration" /><published>2024-10-17T00:00:00+00:00</published><updated>2024-10-17T00:00:00+00:00</updated><id>https://david.adei.love/posts/2024/10/acm-ccs-experience</id><content type="html" xml:base="https://david.adei.love/posts/2024/10/17-acm-ccs-24/"><![CDATA[<p>I’ve just returned from a whirlwind week in Salt Lake City for the ACM Conference on Computer and Communications Security (CCS) 2024, and I’m still processing everything.</p>

<p>Attending a top-tier conference is always an incredible learning experience, but this one was truly special.</p>

<p>Presenting our paper, “Jäger: Automated Telephone Call Traceback,” was a highlight. It’s one thing to work on a project for months in the lab, but it’s another to share it with a room full of the leading experts in your field. The questions and discussions that followed were insightful and gave me new perspectives on our work.</p>

<p>The most surreal moment of the week, however, came during the awards ceremony. Hearing “Jäger” announced not once, but twice—for both the <strong>Distinguished Paper Award</strong> and the <strong>Distinguished Artifact Award</strong>—was an absolute shock. To receive that level of recognition for my first Ph.D. paper, from a community I respect so deeply, is an honor I find difficult to put into words. It was a powerful validation of our team’s hard work and our belief that building practical, deployable systems is crucial for security research.</p>

<p>Beyond our own presentation, the week was packed with fascinating talks on everything from new cryptographic methods to the security of large language models. The “hallway track” was just as valuable, offering a chance to connect with researchers whose papers I’ve admired and to spark ideas for future collaborations.</p>

<p>I’m leaving CCS feeling energized, inspired, and more motivated than ever. This experience was a powerful reminder of why I chose this path and the incredible potential our community has to solve meaningful problems. Now, it’s time to get back to work.</p>]]></content><author><name>David L. Adei</name><email>lokingdav@gmail.com</email></author><category term="conference" /><category term="ccs" /><category term="security" /><category term="research" /><category term="awards" /><category term="phd-journey" /><summary type="html"><![CDATA[I’ve just returned from a whirlwind week in Salt Lake City for the ACM Conference on Computer and Communications Security (CCS) 2024, and I’m still processing everything.]]></summary></entry></feed>