Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Add privacy considerations #99

Closed
wants to merge 13 commits into from
4 changes: 2 additions & 2 deletions spec/index.html
Original file line number Diff line number Diff line change
Expand Up @@ -2758,7 +2758,7 @@ <h4>Possible Leakage via Canonical Labeling</h4>
<p>However, in this example, anyone can guess the unrevealed statement by exploiting the canonical identifiers and order.</p>

<p>Since the dataset was sorted in the canonical order, we can get to know that the hidden statement must start with
`_:c14n1 &lt;http://schema.org/[f-g]`, which helps us guess that the hidden predicate is, with high probability,
`_:c14n1 &lt;http://schema.org/[f-g]`, which helps us guess with high probability that the hidden predicate is
`&lt;http://schema.org/gender&gt;` . Alternatively, we can assume that the guesser already has
yamdan marked this conversation as resolved.
Show resolved Hide resolved
such knowledge via the public credential schema.</p>

Expand Down Expand Up @@ -2796,7 +2796,7 @@ <h4>Possible Leakage via Canonical Labeling</h4>
</pre>

<p>Note that we can use the same approach to guess non-boolean values if the range of possible values is still of a
reasonably small size for to try all the possibilities.</p>
reasonably small size, allowing us to try all possibilities.</p>

<p>By making the canonicalization process private, we can prevent a brute-forcing attacker from trying to see the
labeling change by trying multiple possible attribute values.
Expand Down