Visit

(New York, August 20, 2020) — In a letter published today, Cornell Tech’s Clinic to End Tech Abuse (CETA) and nine other organizations call on Congress to create a law empowering abuse survivors across the US to leave family phone plans they share with their abusers without burdensome fees or logistical hurdles — a measure that is especially important for those fleeing abuse during the COVID-19 crisis. 

See the letter sent to Congress here. Co-signers of the letter include the National Network to End Domestic Violence, the Electronic Frontier Foundation, Access Now, and Sanctuary for Families, among others. 

The organizations are calling on Congress to create a federal law that lets survivors, in any state, leave a family phone plan through a quick and remote process accompanied by strong privacy protections. Survivors should not have to pay fees, face burdensome or intrusive requirements to send evidence of the abuse to the phone company, or have to sign up for a new contract with the same phone carrier, as described in the letter. Survivors should also be able to keep their current phone numbers so they can more easily communicate with the family members, friends, and crucial services that can help them stay safe.

In the hands of an abuser, family phone plans can become tools for stalking and other harms. While some US states have passed laws seeking to address this problem, most abuse survivors do not yet have a legal right to get out of family phone plans easily, remotely, or for free. During the COVID-19 crisis and related lockdowns, the dangers of shared plans are particularly acute: if an abuser discovers a survivor’s location, the survivor may not be able to find new housing or travel to a safe location. Survivors experiencing poverty or unemployment also may not be able to afford the fees companies often charge when someone leaves a family plan.

“Abusers will often do anything they can to control their victims, and family phone plans can be a powerful tool for such abuse,” Sarah St.Vincent, Director of Cornell Tech’s Clinic to End Tech Abuse (CETA). “People’s lives and safety are far more important than any contract they once signed, and Congress should recognize this by creating protections now.”

Currently, some US states allow abuse survivors to get out of family phone plans — but only if they first obtain a court order. Under these laws, survivors usually also must switch to a different contract with the same phone company and pay the resulting billing and other expenses. At least two states, New York and Hawaii, give abuse survivors a right to leave their phone contracts completely and without a court order. However, they require survivors to send potentially sensitive evidence of the abuse such as police or medical reports to the phone company, which may jeopardize privacy or re-traumatize the survivor.

When abuse survivors do not have any special rights to leave family phone plans, phone companies may charge them as much as $350 per phone line to exit the plan. In addition, the survivor may also have to pay the remaining cost of their smartphones or other devices purchased under the plan. For many, these charges will be unaffordable — especially in the worsening economic crisis COVID-19 has created.

Researchers at Cornell Tech, a campus of Cornell University, and other institutions have repeatedly documented ways abusers can misuse family phone plans to track what adult survivors or children are doing. Here is more research on how intimate partner abusers exploit technology.

About Cornell Tech

Cornell Tech is Cornell University’s groundbreaking campus for technology research and education on Roosevelt Island in New York City. Our faculty, students and industry partners work together in an ultra-collaborative environment, pushing inquiry further and developing meaningful technologies for a digital society. Founded in partnership with the Technion-Israel Institute of Technology and the City of New York, Cornell Tech achieves global reach and local impact, extending Cornell University’s long history of leading innovation in computer science and engineering.


Home health care workers faced increased risks to their physical, mental and financial well-being while providing essential care to patients during the COVID-19 pandemic, according to researchers at Weill Cornell Medicine, Cornell Tech and Cornell University.

The study, published Aug. 4 in JAMA Internal Medicine, provides the first rigorous analysis of home health care workers’ experiences during the pandemic. The findings highlight the inequities faced by an already vulnerable and marginalized workforce and suggest that interventions and policies to protect them are urgently required.

“Despite facing unique challenges during the pandemic, home health care workers have not received the same attention as other front-line providers,” said lead author Dr. Madeline Sterling, an assistant professor of medicine at Weill Cornell Medicine and a member of the Cornell Center for Health Equity. “Increased awareness of their role and the challenges they face providing care is needed as more people across the United States cope at home with COVID-19 and need help from paid caregivers.”

The investigators conducted a series of one-on-one interviews with 33 home health care workers in New York City at the height of the COVID-19 pandemic in March and April. They recruited participants from 24 different home care agencies across all five boroughs, in partnership with the 1199SEIU-Home Care Industry Education Fund, part of the largest healthcare union in the United States.

Among study respondents, 97 percent were women, averaging 48 years of age, with 11 years of experience in home health care. Sixty-four percent were Black, 18 percent were Hispanic and 67 percent had completed at least some college education.

Five main themes emerged from the participants’ answers. They worked on the front lines of healthcare and performed additional duties such as symptom monitoring, cleaning homes, running errands and providing emotional support, yet felt invisible to society at large. They reported a heightened risk of getting sick with or transmitting COVID-19, because many relied on public transportation and were typically caring for older adults living with multiple chronic conditions. Agencies provided varying amounts of information and training about COVID-19 and often adequate personal protective equipment (PPE), such as masks and gloves, was lacking. As a result, many participants relied on non-agency alternatives for support and purchased their own PPE and cleaning supplies to meet daily patient care needs. Finally, many were forced to make difficult trade-offs between working and putting their own health at risk or losing their wages and benefits.

The authors suggested several policies and changes to the industry. Designating home health care workers “essential” across the U.S., as they already are in New York, could help ensure safety and protect against financial hardships. Other suggested improvements included passing legislation to ensure PPE is available to home health care agencies, implementing guidelines for providing care during the COVID-19 pandemic systematically across all agencies, and assigning workers to patients on a geographic basis to minimize their need to use public transportation.

“We can do many things to improve day-to-day work for home health care workers, but having their value recognized by the broader system, patients and families, is a bigger challenge,” said senior author Dr. Nicola Dell, an assistant professor in the Jacobs Technion-Cornell Institute at Cornell Tech and also a member of the Cornell Center for Health Equity.

Dr. Sterling added that the researchers’ next steps are to conduct a quantitative study related to their findings among home health care workers and to conduct a qualitative study with other key stakeholders in home care to “try to understand the perspectives of home health care agencies, for example, which are probably also in a very difficult position.”

The study was supported in part by grants from the Robert Wood Johnson Foundation (76487) and the National Heart, Lung, and Blood Institute (K23HL150160).

This story originally appeared in the Weill Cornell Medicine Newsroom.


Choosing the right home in the right place is no easy task. A new tool, developed by students working with real estate marketplace Zillow as part of Cornell Tech’s BigCo Studio, aims to make the process smoother for home buyers. 

“It is not all theory, we were actually putting into practice what we are learning,” said team member Diana Neves, Johnson Cornell Tech MBA ’20. BigCo Studio gives graduate students the chance to innovate within the cultural and organizational structures of a large company.

Along with team members, Achal Gupta, MBA ’20, Amanda Komsky, Mandy Kong, and Shruti Patel, all Masters of Engineering in Computer Science ’20, and Serena Liu, Parsons Design and Technology Program MFA ’20, Neves developed a map-based visualization platform, Zillow ReCon, that allows buyers to carry out better neighborhood research, empowering them to make more informed decisions when purchasing their homes. 

Innovating Within a BigCo

The BigCo team members are like-minded but diverse. They have skill sets spanning computer science, UX/UI and product design, and marketing. “We didn’t want a team full of people with the same experience — we wanted to also learn from our groupmates,” said Neves.

To kickstart the collaboration, Zillow outlined several areas of identified pain points and room for improvement. After that, it was up to the team to focus in on one area and present their solutions.

Research was key. The team talked with homebuyers to identify frustrations in the purchasing process, investigated statistical data via online sources such as The National Association of Realtors, and spoke to Zillow employees. As Neves said, “We wanted to know: what are their main priorities? What are they working on currently? What opportunities do they see for improvement in the product?”

As they honed their ideas, factors such as technical feasibility and value for the company were considered. Input from Cornell Tech Fellow and BigCo Studio instructor Chad Dickerson was invaluable, said Neves. “Buying a house has so many more frustrations than the one we chose to work on. He really helped us narrow it down and to focus on what would be most valuable for the user.”

Understandability of neighborhood data emerged as a key frustration. This information tends to be scattered around the internet, said Neves. “It’s really hard to understand the vibe of the neighborhood, whether they have schools, if they have supermarkets — and not only in the neighborhood, but also within a block or smaller area.”

Bigco Zillow tech demo
A demo of the Zillow ReCon platform, built in BigCo Studio.

Building Visualization Tools to Ease User Frustrations

The Zillow ReCon platform provides a solution by integrating easily accessible neighborhood information—such as the locations of cafes and stores—and appreciation and valuation data alongside traditional property attributes, such as home type, bed and baths, and price.

The team’s diverse skill set made it easy to divide up tasks, said Kong. “The back-end focused on collecting the data using the NYC Open Data source and then, based on that data, [the back-end team] created some machine-learning models to predict the five-year appreciation.”

The front-end side was then responsible for making the data, such as appreciation and valuation, accessible. “We wanted to show the data in a very easy-to-understand manner, so we decided to use a heat map showing different intervals of values in different colors,” said Kong.

Working within a large company fostered collaborations and provided the BigCo team with access to invaluable resources and deep technical expertise. Interacting with the Trulia and StreetEasy developer teams — who are also part of the Zillow group — gave UX/UI designer Liu real-world insight into how digitization is impacting real estate marketplaces. “Now most of the work is done by the real estate agent, but, actually, there are a lot of processes that could be digitized,” said Kong.

The team has presented their solution to those at Zillow and it will be used as a source of insights by the engineering team going forward.







The inspiration for innovative technology often comes from personal experience. That was the case for Vini Tripathii, Master of Engineering in Electrical and Computer Engineering ‘20. “Two years ago my mother got very sick, and it got so bad that doctors thought she was going to die. They had to amputate her hand to save her life,” she said. As her mother recovered and began using a prosthetic, Tripathii saw its limitations. “The prosthetic was just so inadequate. It made it so difficult for her to do simple everyday tasks, and she is someone who is really active and independent,” she said. 

Tripathii interviewed other people with amputated upper limbs to learn about their experiences and found that even high-end prosthetics offer limited hand movements, are uncomfortable, and can be difficult to use. In her interviews, she found that more than 60% of people with amputated upper limbs gave up on using prosthetics. 

In 2017, there were approximately 400,000 people with amputated upper limbs in the U.S. alone, and that number is projected to double by 2050, according to research published in Eplasty. Tripathii and her brother Eeshan, an undergraduate student at MIT, created a solution for their mother and hundreds of thousands of people with amputated upper limbs worldwide. 

Eeshan and Vini Tripathii sitting on a wall at Cornell University.
Eeshan and Vini Tripathii at Cornell University.

The Solution

Tripathii discovered that the issue isn’t the mechanical part of the prosthetic, but rather the control system that is hard to use. Mechanical hand prostheses are manipulated by using a button or manually changing the position or grasp. Myoelectric-controlled hand prostheses use the muscles in someone’s residual limb to control its functions, but it takes training to learn to flex different muscles to get the desired response. She also learned about a technology called a brain-computer interface (BCI) — a computer-based system that captures and analyzes brain signals and translates them into commands that are sent to an output device to make the desired action, such as moving a prosthetic hand. 

Instead of manufacturing prosthetics, Tripathii decided to use technology to turn any prosthetic into a non-invasive neuroprosthetic with near-natural functionality. Her solution, Invictus BCI, uses BCI technology to create an algorithm that allows people to use their prosthetic hands more effortlessly. “By tapping into the same neural pathways that you use to control your hand and by using those to control the prosthetic, it is basically like turning your prosthetic into the same level of control you had over your real hand,” she said. 

The Tripathiis started their company two years ago and she has continued to work on it as a student at Cornell Tech. “The Invictus in Invictus BCI comes from William Ernest Henley’s poem ‘Invictus’ — Henley himself was an amputee. Invictus is Latin for ‘unconquerable,'” she said. 

How It Works

Invictus BCI uses an electroencephalogram (EEG) to non-invasively record brain signals and an electromyography (EMG) sensor array to non-invasively record muscle signals. The user wears a headset and prosthetic sleeve with the EEG and EMG electrode stickers, then the BCI decodes the EEG and EMG signals using Invictus BCI’s proprietary algorithm and the prosthetic hand moves based on the same neural pathways as hand movement. Instead of using specific muscle movements to control the hand, the control interface she created uses advances in machine-learning and neuroscience to allow people to move their prosthetic hand effortlessly. Right now the prototype works for the six most common hand movements, but Tripathii said the goal is to return near-natural functionality so everything you can do with your hand, you can do with Invictus BCI.

Using Classwork to Build a Company

Tripathii started her research for the company before coming to Cornell Tech and said that the Cornell Tech curriculum has accelerated the progress. “It would have been much harder without the guidance I received at Cornell Tech. The curriculum and structure and the professors are so wonderful that it made it a lot easier, and the professors are all so open,” she said. She learned from the lectures and guest speakers and especially from individual meetings with professors who gave her advice and guidance as she used the skills she learned in class to build the prototype. 

Tripathii worked on Invictus BCI as part of the Startup Studio curriculum. Throughout the course, she learned from professors and industry leaders and spoke with medical care providers, insurance companies, and clinicians to develop the business plan. The Cornell Tech curriculum not only taught her technical skills, but also necessary marketing and business development skills as she continues to build the company.

Invictus BCI was one of four student companies to win at the sixth-annual Startup Awards. A panel of tech industry leaders and executives chose the winning student teams who receive coworking space at the Tata Innovation Center on Cornell Tech’s campus and $100,000 in pre-seed funding to pursue their startups after graduation. Right now, Invictus BCI costs $9,000, although Tripathii is talking to insurance companies about pricing. “With Invictus BCI, lower range prosthetics become capable of mid-range performance, mid-range prosthetics are able to perform like high-end prosthetics, and high-end prosthetics are elevated even further to something beyond what is currently available.”


By Melanie Lefkowitz.

Is there an unbreakable code?

The question has been central to cryptography for thousands of years, and lies at the heart of efforts to secure private information on the internet. In a new paper, Cornell Tech researchers identified a problem that holds the key to whether all encryption can be broken – as well as a surprising connection to a mathematical concept that aims to define and measure randomness.

“Our result not only shows that cryptography has a natural ‘mother’ problem, it also shows a deep connection between two quite separate areas of mathematics and computer science – cryptography and algorithmic information theory,” said Rafael Pass, professor of computer science at Cornell Tech.

Pass is co-author of “On One-Way Functions and Kolmogorov Complexity,” which will be presented at the IEEE Symposium on Foundations of Computer Science, to be held Nov. 16-19 in Durham, North Carolina.

“The result,” he said, “is that a natural computational problem introduced in the 1960s in the Soviet Union characterizes the feasibility of basic cryptography – private-key encryption, digital signatures and authentication, for example.”

For millennia, cryptography was considered a cycle: Someone invented a code, the code was effective until someone eventually broke it, and the code became ineffective. In the 1970s, researchers seeking a better theory of cryptography introduced the concept of the one-way function – an easy task or problem in one direction that is impossible in the other.

For example, it’s easy to light a match, but impossible to return a burning match to its unlit state without rearranging its atoms – an immensely difficult task.

“The idea was, if we have such a one-way function, maybe that’s a very good starting point for understanding cryptography,” Pass said. “Encrypting the message is very easy. And if you have the key, you can also decrypt it. But someone who doesn’t know the key should have to do the same thing as restoring a lit match.”

But researchers have not been able to prove the existence of a one-way function. The most well-known candidate – which is also the basis of the most commonly used encryption schemes on the internet – relies on integer factorization. It’s easy to multiply two random prime numbers – for instance, 23 and 47 – but significantly harder to find those two factors if only given their product, 1,081.

It is believed that no efficient factoring algorithm exists for large numbers, Pass said, though researchers may not have found the right algorithms yet.

“The central question we’re addressing is: Does it exist? Is there some natural problem that characterizes the existence of one-way functions?” he said. “If it does, that’s the mother of all problems, and if you have a way to solve that problem, you can break all purported one-way functions. And if you don’t know how to solve that problem, you can actually get secure cryptography.”

Meanwhile, mathematicians in the 1960s identified what’s known as Kolmogorov Complexity, which refers to quantifying the amount of randomness or pattern of a string of numbers. The Kolmogorov Complexity of a string of numbers is defined as the length of the shortest computer program that can generate the string; for some strings, such as 121212121212121212121212121212, there is a short program that generates it – alternate 1s and 2s. But for more complicated and apparently random strings of numbers, such as 37539017332840393452954329, there may not exist a program that is shorter than the length of the string itself.

The problem has long interested mathematicians and computer scientists, including Juris Hartmanis, the Walter R. Reed Professor of Computer Science and Engineering emeritus. Because the computer program attempting to generate the number could take millions or even billions of years, researchers in the Soviet Union in the 1960s, as well as Hartmanis and others in the 1980s, developed the time-bounded Kolmogorov Complexity – the length of the shortest program that can output a string of numbers in a certain amount of time.

In the paper, Pass and doctoral student Yanyi Liu showed that if computing time-bounded Kolmogorov Complexity is hard, then one-way functions exist.

Although their finding is theoretical, it has potential implications across cryptography, including internet security.

“If you can come up with an algorithm to solve the time-bounded Kolmogorov complexity problem, then you can break all crypto, all encryption schemes, all digital signatures,” Pass said. “However, if no efficient algorithm exists to solve this problem, you can get a one-way function, and therefore you can get secure encryption and digital signatures and so forth.”

The research was funded in part by the National Science Foundation and the Air Force Office of Scientific Research, and was based on research funded by the Intelligence Advanced Research Projects Activity in the Office of the Director of National Intelligence.

Originally published in the Cornell Chronicle.