← All episodes

Ep 3: James Larus | Privacy-preserving Covid Tracing and the Hardware-Software Stack

Summary

In this episode of the Computer Architecture Podcast, hosts Suvinay Subramanian and Lisa Hsu welcome Professor Jim Larus, a distinguished figure in computer science. Professor Larus is currently the Dean of the School of Computer and Communication Sciences at EPFL in Lausanne, Switzerland. His extensive career includes over 16 years at Microsoft Research as a researcher, manager, and director, as well as a professorship at the University of Wisconsin. Professor Larus has made significant contributions to various fields such as programming languages, compilers, computer architecture, and computer systems, including notable projects like the Wisconsin Wind Tunnel, the Singularity project at Microsoft, and the Orleans framework for cloud programming.

The central theme of this episode revolves around the evolving landscape of hardware-software systems, with a particular focus on security, privacy, and the control exerted by major tech companies over these ecosystems. Professor Larus shares his insights on the challenges and opportunities in both academic and industrial research environments. A significant portion of the discussion is dedicated to the development and implications of contact tracing protocols, like the DP3T protocol he was involved with during the COVID-19 pandemic. This serves as a case study to explore broader issues of user privacy, data control, and the power dynamics between national governments and large technology corporations such as Apple and Google.

Professor Larus delves into the intricacies of app permissions, the design of privacy-preserving technologies, and the trade-offs inherent in building secure yet functional systems. He reflects on his experiences leading rapid, multi-domain collaborative projects and discusses the different motivations and operational styles in academia versus industry. The conversation also touches upon the future of computer architecture, the importance of interdisciplinary collaboration, and the evolving role of hardware in ensuring system security and user privacy.

---

Chapters

Takeaways