Ewa (Eva) Joanna Infeld, b. 1986 in Warsaw. Polish-Canadian.
Mathematician, educator, activist.

CURRENT TECHNOLOGY PROJECTS

CHANGE AGENT: I'm bringing together some great makers and thinkers from the hacker world and the world of progressive politics to make an AR platform that will help to gamify grassroots organising.

A ZCash-based voting technology. This implementation of ZK-Snarks could let us have both voter secrecy and verifiability, something that has not been achieved in voting technology to date. Electronic voting is rightly controversial, and will never be secure enough to reliably implement in national elections. Please see the FAQ. (with A. Olchowik and B. Owczarek.)

SOMEONE IS WRONG ON THE INTERNET This is a game that trains the player to detect fake news, logical manipulation and propaganda. Prototype (in Polish) It needs a way to add one's own examples, and a cleanup. (With A. Olchowik, P. Migdał et al.)

RESEARCH

Uniform Avoidance Coupling of Simple Random Walks - is it possible to check if you can program two tokens to walk on a graph s that they never collide BUT if you only see one it looks like a simple random walk? For some graphs we can, and I found an algorithm to test whether you have one of these graphs. In polynomial time!

Combinatorics and k-anonymity A theoretical reason k-anonimity is a good way to construct anonymity sets - rather than just what we know how to do in practice.

The Total Acquisition Number of Random Geometric Graphs (with Mitsche, Prałat)

Symmetric Disclosure: a Fresh Look at k-Anonymity FOCI'14, with presentation video. Social networks are very sparse, so k-anonymity gives very little cover traffic for communications unless we group users in rather large sets. This is an often ignored problem. I propose a way to use the sparsity and use this property to our advantage.

Counting Restricted Dyck Paths Through Random Walks - a cute, new probabilistic way to arrive at a well known formula with Chebyshev Polynomials.

Common adversaries form alliances: modelling complex networks via anti-transitivity (with Bonato, Pohkrel, Prałat), along with a correction/continuation.

TEACHING MATERIALS

Discrete Mathematics for Engineers (2017, Ryerson University): propositional logic, predicate logic, set theory, induction, recursion, divisibility, congruences, RSA, RSA - proofs, graph theory I, II, III. Each of these is a 3h lecture. 3h math lectures are a terrible idea, don't try it. Here are the remaining materials.

Probability (Dartmouth College), here is a backup of lecture notes.

First steps in Java (with A. Olchowik and B. Owczarek): I, II, III and IV.

computer security

crypto or kids

An introductory security and privacy video tutorial, with Paweł Ngei (in Polish.)

EDUCATION

PhD in Mathematics, Dartmouth College (2016). Supervisor: Prof. Peter Winkler

PhD thesis: Applications of Matching Theory in Avoidance Coupling and Anonymity Systems

London School of Economics (MSc in Applicable Mathematics, 2011)

University of Cambridge (Part III / Master of Advanced Studies in Mathematics, 2009)

King's College London (BSci in Mathematics, 2008, first class honours)

WHY I QUIT ACADEMIA

Needless to say, I didn't last in academia. The reasons are largely the same as they are for most would-be professors in my generation: it just wasn't worth the struggle.

But like most, I found that it is easier to make an impact and work on solving the problems that matter once I quit.

It's the hacker world that taught me intellectual courage, not academia. The most liberating thing I ever learned was to not wait for permission or validation to work on solving a problem. Especially when it comes to the big problems. It's hackers, not academics, who shoot for the sky.

COMPUTER SECURITY AND PRIVACY

Much of my political work is empowering the public to resist surveillance. While the corrupt economic system may be a more fundamental problem, surveillance and every day control is an obstacle to us finding solutions. It is having profound effects on our social structure and solidifying destructive power systems worldwide.

INFORMATION IS POWER, PRIVACY IS FREEDOM.

And as a mathematician and hacker, this is where I feel most empowered to effect change. I provide computer and operational security assistance to progressive organizations and NGOs. Let me know if you need help.

POLITICS

I'm a proud member of the Warsaw chapter of Razem (wiki), a Polish progressive political party, and served as a member of the chapter's executive board in 2018. The party belongs to the European Spring coalition and the Progressive International.

In the past I've been involved with the American Civil Liberties Union, Bernie2016 campaign and the Stop C-51 iniatitive in Canada.

FAMILY

There is plenty on the web on Leopold Infeld's legacy as scientist, educator and peace activist. My Grandfather and Einstein, a guest post I wrote for Fiat Physica may serve as an intro. Also, here is the full text of The Evolution of Physics by A. Einstein and L. Infeld, as well as the text of the Russel-Einstein Manifesto, which remains relevant today.

Some day I hope to upload scans of my grandfather Leopold's correspondence with Einstein, but there's a lot of it. In the meantime, here is a bit of history in are letters from Frederic Joliot-Curie, Bertrand Russel and Henry Kissinger.

My other grandfather is Polish writer Józef Hen.

GPG key ID: 376DD9C9

1B86 8E43 FBEE BFA0 88C9 25D3 EF02 699D 376D D9C9

Pop-scientific content:

A stirring (if scientifically slightly outdated) commentary on the hardships of academia, shot at the AEI in Potsdam: No Higgs [At the LHC], full credits in description.

A cartoon for some of my anonymity work by Eleri Harris of elerimai.com.

You can also find me on Twitter and Instagram.