-
Notifications
You must be signed in to change notification settings - Fork 18
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Difference to Singapore's BlueTrace/TraceTogether #23
Comments
I agree, it is essentially the same protocol as BlueTrace.
It is more fair, imho, when no specific transport protocol is recommended, feasible and enforced on the client app, to explicitly mention that from the trusted entity point of view the phone number is known and correctly managed (used only for the purpose and deleted) as well as other sources of identification such as networkid - the source IP for instance-. This is equivalent, and without probabilistic obfuscation of the network id it is false to say that user's are anonymized to the trusted entity simply by the ROBERT protocol. This is a problem not in the scope of the ROBERT protocol, it is a problem of the tansport protocol. Of course, the phone number is a direct identification of the user, hence it causes a more important issue in case of leak of the trusted entities information and it should not be transmitted as it is not necessary. My points if that can be useful are:
|
+1 |
It can be considered as being part of the scope of the ROBERT protocol.
This article is the genesis of all existing mixnet and onion routing solutions, the most well known being Tor. |
This aspect is discussed in issue #6. |
Yes Indeed. Sorry the ambiguous assertion. This is indeed discussed more lengthtly in #6 (which mixes several discussions in addition to the sole networkid issue). |
How does the described protocol differ from the BlueTrace/TraceTogether Whitepaper ( https://bluetrace.io/static/bluetrace_whitepaper-938063656596c104632def383eb33b3c.pdf ) which was released some time ago?
Parts that are the same in BlueTrace and ROBERT:
The only difference I can spot so far, is that no BlueTrace/TraceTogether requires people to provide a phone number. But this is not essential to their design.
ROBERT also does not explain how an infected user can upload the PoximityList to the server without leaking its identiy in form of it's permanent identifier or in form of a verification token. BlueTrace uses authorization codes to determine if an upload legitimate. This helps the health authority to deanonymize other users.
The text was updated successfully, but these errors were encountered: