-
Notifications
You must be signed in to change notification settings - Fork 33
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Make a conceptual map of the Cambrian Explosion of contact tracing systems. #61
Comments
The first step to doing this would be to create a |
#70 has a rought first draft |
Added explanation (from issue #61)
I'd structure it this way:
But to effectively compare them, we need a common glossary. At least a correspondence table between different terminologies. After that, there is additional differentiation:
|
I've created a similar issue in DP3T: DP-3T/documents#227 |
I am trying to compare the designs on where they are different (skipping over the similarities). Some first thoughts here - before I summarize and add to that ticket #61 Stuffing/Smearing
Collusion prevention (Higher N / day cycle - e.g to 60-15 mins range)
Additional (match/clinical) metadata (skipping over de-anonymisation risks)
Notes: API - can we make an API (for app developers and mock) that lets people implement clients/mobile apps while not having to pick a protocol yet. Issues 1) metadata, 2) geo-region extra data. |
or collision? |
Maybe clients should ignore any ephemeral ids encountered after a secret key was published? Since anybody can fake them after disclosure. |
Yes. very good point. That is not explicitly in any of the papers. it should be. as it is easy to miss. Raised DP-3T/documents#228. |
yes - it works both ways. the client should recycle - and clients should ignore during hte 14 days that they may learn of that seed post infection moment. |
Additional discussion about a glossary in #74 |
Now that there's a semi-stable 0.4 protocol for apps to use while they iterate, I think it's worth trying to focus on what an 0.5 protocol would look like (#56), and I think a good first step to doing that would be doing a survey of the Cambrian explosion of contact tracing protocols and trying to map out the high-level building blocks of each proposal. Having mapped out all of the building blocks, we could try to understand each proposal as combining those building blocks in different ways, and try to synthesize a protocol that combines the best ideas from all of the existing protocols.
For instance, one basic building block could be broadcasting pseudorandom identifiers. Another could be the idea of deriving multiple pseudorandom identifiers from some secret, as is done in TCN 0.4 and the AG protocol. These use different mechanisms, but they have the same goal. Can we write this goal explicitly, and compare the mechanisms for each part? What are the benefits and costs? Another idea is the way that TCN has clients prove in zero knowledge that they generated the identifiers they report. Can we express this goal independently of the mechanism and describe its benefits to compare against its costs? Or, the latest DP3T proposal uses Bloom filters, and there are other ideas in the PACT-E and PACT-W proposals, etc.
After having mapped out these conceptual building blocks independently of the specific mechanisms, we can then express each proposal in terms of composition of a common set of blocks (though the mechanism for each of these blocks may be different for each proposal). And we can then try to create a hybrid of the proposals, first selecting one or more combinations of blocks, and then selecting the best mechanism for each one.
The text was updated successfully, but these errors were encountered: