Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Reference to DP-3T Difference with #32

Open
pelinquin opened this issue Apr 20, 2020 · 4 comments
Open

Reference to DP-3T Difference with #32

pelinquin opened this issue Apr 20, 2020 · 4 comments

Comments

@pelinquin
Copy link

It seems that today, the DP-3T is more developped.

What are the differences ?
Why you do not collaborate with them ?

@vaudenay
Copy link

That's a good question.
My take on this is that as academics, we must be open-minded.
We should also realize that there are lots of difference between ROBERT and DP-3T in terms of privacy protection and it is not clear (at least to me) that DP-3T is better.

ROBERT takes as an assumption that the server's key will be honestly used. It is a big assumption and it really stinks if it can me misused. We must trust the authority for that.

Conversely, DP-3T opens the way to massive deanonymization of diagnosed cases. So far, there is no protection to that applications such as social media apps or even the OS of the phone itself will not transmit the ephemeral identifier which could later be matched to a publicly reported diagnosed case. It stinks too. DP-3T makes the assumption that neither installed apps nor Apple/Google will collect identifiers.

@LilithWittmann
Copy link

Conversely, DP-3T opens the way to massive deanonymization of diagnosed cases. So far, there is no protection to that applications such as social media apps or even the OS of the phone itself will not transmit the ephemeral identifier which could later be matched to a publicly reported diagnosed case. It stinks too. DP-3T makes the assumption that neither installed apps nor Apple/Google will collect identifiers.

As far as I understand, the protocol and the discussion in #6 DP-3T still would allow the deanonymization via these attack vectors. (by just creating a lot of backend accounts 🤷)

@pdehaye
Copy link

pdehaye commented Apr 20, 2020

@LilithWittmann Weaknesses depend on the exact version of the protocol used, but in any case this is not a democratic choice since Apple and Google are only agreeing to release some APIs, in particular they have not agreed so far in releasing the APIs that would enable safer versions of DP3T to be deployed. We are all playing in someone else's garden here, which is a problem.

@vaudenay thanks for your work on those issues so far. the discussion between DP-3T, ROBERT and Apple/Google could be greatly facilitated if a proper data protection analysis was done. Both the DP-3T and ROBERT protocols seek to achieve multiple purposes and pretend to exist in a vacuum. If those purposes are analyzed more granularily, it would be possible - I strongly suspect - to carefully design a more complex protocol whereby consent-to-upload and consent-to-be-uploaded are decoupled, and both operate under different trust assumptions at different stages, some of this trust delegation being implemented by punting back to the end user. Both approaches could be strengthened by enacting stronger law protecting Bluetooth data (to address #6 ). A model for this are the US legal protections around census data (jail time!). Of course this is all dependent on the Giants enabling this through more evolved APIs, which we can certainly force them to do if there is strong unified will behind the idea. Unfortunately at the moment a privacy/security first approach (which is a classic mistake by technologists, particularly when they are playing on strong political contacts), is leading to more fracture than anything, and has preempted any good discussion around the common objectives of such systems and how to achieve them. This focus on competition between security researchers is preventing a recently-unfathomable strong coalition of political leaders, security experts, and civil society human rights advocates(!) to emerge and bend the Giants (be them American or Chinese) to their democratic will.

@lcoulet
Copy link

lcoulet commented May 13, 2020

ROBERT takes as an assumption that the server's key will be honestly used. It is a big assumption and it really stinks if it can me misused. We must trust the authority for that.

Everything resides in this sentence - Maybe you do, but very few people trust the authority.

Maybe people should... But I bet that they never will.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

5 participants