the rise and fall of de centralized automatic contact
play

The Rise (and Fall?) of (De)Centralized Automatic Contact Tracing - PowerPoint PPT Presentation

The Rise (and Fall?) of (De)Centralized Automatic Contact Tracing Gennaro Avitabile, Vincenzo Botta, Vincenzo Iovino, Ivan Visconti (DIEM - University of Salerno) How to Notify Risks of Infection? Matthew Green on March 19: (more or less)


  1. The Rise (and Fall?) of (De)Centralized Automatic Contact Tracing Gennaro Avitabile, Vincenzo Botta, Vincenzo Iovino, Ivan Visconti (DIEM - University of Salerno)

  2. How to Notify Risks of Infection? Matthew Green on March 19: (more or less) just use rotating pseudonyms as identifier beacons using Bluetooth-Low-Energy, like in Apple's "Find my" system... the solution is already there IDs of infected citizens can then be sent to a server that sends them back to everyone interested in checking recent proximity to them it is simple, efficient, seemingly decentralized/privacy preserving …then…. DP3T, PACT -MIT, PACT-UW... and Apple-Google APIs.... …the rise of so called "decentralized contact tracing"... Severe criticism for PEPP-PT and ROBERT that proposed a centralized version where pseudonyms are generated by the server

  3. How to Notify Risks of Infection? Matthew Green on March 19: (more or less) just use rotating pseudonyms as identifier beacons using Bluetooth-Low-Energy, like in Apple's "Find my" system... the solution is already there IDs of infected citizens can then be sent to a server that sends them back to everyone interested in checking recent proximity to them it is simple, efficient, seemingly decentralized/privacy preserving …then…. DP3T, PACT -MIT, PACT-UW... and Apple-Google APIs.... …the rise of so called "decentralized contact tracing"... Severe criticism for PEPP-PT and ROBERT that proposed a centralized version where pseudonyms are generated by the server

  4. How to Notify Risks of Infection? Matthew Green on March 19: (more or less) just use rotating pseudonyms as identifier beacons using Bluetooth-Low-Energy, like in Apple's "Find my" system... the solution is already there IDs of infected citizens can then be sent to a server that sends them back to everyone interested in checking recent proximity to them it is simple, efficient, seemingly decentralized/privacy preserving …then…. DP -3T, PACT-... and Apple-Google APIs.... …the rise of so called "decentralized contact tracing"... severe criticism against PEPP-PT and ROBERT that propose a centralized version where pseudonyms are generated by the server

  5. How to Notify Risks of Infection? Matthew Green on March 19: (more or less) just use rotating pseudonyms as identifier beacons using Bluetooth-Low-Energy, like in Apple's "Find my" system... the solution is already there IDs of infected citizens can then be sent to a server that sends them back to everyone interested in checking recent proximity to them it is simple, efficient, seemingly decentralized/privacy preserving …then…. DP -3T, PACT-... and Apple-Google APIs.... …the rise of so called "decentralized contact tracing"... severe criticism against PEPP-PT and ROBERT that proposed a centralized version where pseudonyms are generated by the server

  6. Serge Vaudenay: Paparazzi Attack! https://eprint.iacr.org/2020/399 Evil Corp.

  7. Paparazzi Attack: Passive and Undetectable, Very Hard to Mitigate!! Evil Corp.

  8. Paparazzi Attack: Private data of Citizens directly exposed to Unknown Entities!!! SK A , SK B , SK C SK B, Auth B

  9. and then....

  10. Mass Surveillance!!!! This is very scary!!!!! SK A SK B SK C

  11. Paparazzi Attack - Mass Surveillance • DP-3T low-cost design is affected by this attack https://github.com/DP-3T/documents

  12. Paparazzi Attack - Mass Surveillance • DP-3T low-cost design is affected by this attack https://github.com/DP-3T/documents • Otto Seiskari showed a PoC implementation of the attack to DP-3T https://github.com/oseiskar/corona-sniffer

  13. Paparazzi Attack - Mass Surveillance • DP-3T low-cost design is affected by this attack https://github.com/DP-3T/documents • Otto Seiskari showed a PoC implementation of the attack to DP-3T https://github.com/oseiskar/corona-sniffer • Surprise: ROBERT instead withstands this attack https://github.com/ROBERT-proximity-tracing/documents

  14. Paparazzi Attack - Mass Surveillance • DP-3T low-cost design is affected by this attack https://github.com/DP-3T/documents • Otto Seiskari showed a PoC implementation of the attack to DP-3T https://github.com/oseiskar/corona-sniffer • Surprise: ROBERT instead withstands this attack https://github.com/ROBERT-proximity-tracing/documents • DP-3T unlinkable design withstands this attack... but...

  15. DP-3T Unlinkable Design IDs B, Auth B Unlinked Data

  16. Orwell Attack - Mass Surveillance!!!! IDs B, Auth B Linked Data!!!!

  17. Orwell Attack - Mass Surveillance – Passive BLE receivers – Hard to Mitigate!!!!! SK A SK B SK C

  18. Brutus Attack - Mass Surveillance AUTH CODE

  19. Brutus Attack + Orwell Attack!!!!!! SK ALICE SK BOB SK CHARLIE

  20. Contact Tracing: Decentralization? Privacy? • DP-3T: Low-cost design: decentralized, but with serious privacy issues w.r.t. hard-to-mitigate attacks (i.e., Paparazzi, Orwell, Brutus attacks) • DP-3T: Unlinkable design: semi-centralized, with serious privacy issues w.r.t. hard-to-mitigate government attacks (i.e., Orwell, Brutus attacks) • Robert: centralized, with very serious privacy issues w.r.t. government attacks (i.e., Orwell Attack) • Serge Vaudenay: "We should look for a third way" https://eprint.iacr.org/2020/531

  21. Pronto-C2 (https://eprint.iacr.org/2020/493) Anonymous Calls Features Pronto-C2 Low-cost DP-3T UnlinkableDP-3T Endorsedby A&G Resilience to Paparazzi Atk 70’s Crypto Resilience to Orwell Atk Resilience to Brutus Atk Pointers Decentralized

  22. Edward Snowden, about 5 weeks ago • Do you truly believe that when the first wave, the second wave, the 16th wave of the coronavirus is a long-forgotten memory, that these capabilities will not be kept, that these data sets will not be kept? Will those capabilities begin to be applied to small-time criminality? Will they begin to be applied to political analysis? Will they begin to be applied for doing things like performing a census? Will they be used for political polling? No matter how it is being used, what is being built is the architecture of oppression. And you might trust who is dealing with it , you might trust who runs it. You might go, "You know, I don't care about Mark Zuckerberg." But someone else will have this data eventually . Some other country will have this data eventually. In your country, a different president will have control of this data eventually, and someone will abuse it . • https://www.youtube.com/watch?v=k5OAjnveyJo Thanks a lot for your attention! Work done with our very limited but valuable resources.... our time.

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend