[messaging] Presence by DP5-PIR, GNS or multicast?

carlo von lynX lynX at i.know.you.are.psyced.org
Thu Jan 15 04:30:44 PST 2015


Just saw Prof Danezis & Goldberg's 31c3 presentation
on using DP5 PIR for privacy-preserving look-ups of
presence. If you're not familiar with this new technology,
fetch the video from
	http://cdn.media.ccc.de/congress/2014/webm-sd/31c3-6140-en-de-DP5_PIR_for_Privacy-preserving_Presence_webm-sd.webm.torrent

This is obviously very interesting for developers like
us, so I have a big question: How does this differ from
using GNS, the GNU Naming System, for the same purpose?

I'll elaborate. I don't see the approach of PIR being
interesting for systems using the federation paradigm
since remote users would have to maintain their
presence on each server providing PIR presence to
their users. That neither scales very well, nor is
it likely to be effective at maintaining privacy.
This fits what Prof Goldberg elaborates on "sharding"
in the Q&A part, if I understood him correctly.

By the things Prof Goldberg says about IT-PIR it looks
like several (possibly cloud) servers are needed, not for 
distribution, but for the purpose of improving privacy.
What disturbs me in this case is that the primary purpose 
of our tools - the messaging - isn't ideally solved using 
the same architecture as DP5, so the presenters are 
proposing a complex multi-protocol architecture.

George imagines a hybrid approach. Mainting the XMPP
federation for messaging but integrating PIR as a central
service via a local proxy that intercepts presence traffic
and redirects it to the PIR database. Yet a few minutes
earlier he mentions that these services need to be run by 
trustworthy people like us - I haven't quite understood
why, but it cuts out the cloud model again.

Possibly the most privacy-respecting and scalable way of 
deploying such a service could have been to use a 
distributed data structure like one of the modern 
sybil-resistant DHTs. But if I understand Prof Goldberg's
Q&A statements correctly, PIR cannot actually be operated
in such a distributed manner as it needs to be able to do 
computational operations on the entire database. If that 
is correct, that would be quite a difference in design 
compared to GNS.

GNS however, being implemented on the most sybil-resistant 
DHT I know of, with the way it offers look-up privacy by 
combining the identity of the person being looked-up with 
a shared secret (for individuals or groups, that doesn't
matter), would arrive at similar results as PIR: A secure 
and likely scalable way to offer presence information to 
humanity. So I wonder if I missed something.

Also I gather that PIR becomes incrementally computionally
expensive the more participants use it. That is not the 
case with GNS. GNS should also work with a billion users,
whereas George's graphics suggest that running a DP5 for
a billion users would become very expensive.

So now I'm looking for further insights to be able to
judge which architecture would be best for a scalable
privacy-preserving presence protocol for humanity.
Is it DP5, GNS or anonymized multicasting?

Yes, because so far we of secushare have been considering
using pubsubs of anonymous multicasting over distributed
relays also for presence, rather than using database 
look-ups, because pubsubs push the information to 
the interested recipients in near real-time rather than 
having to poll the database. I don't know if polling the
database is a viable model from your point of view - I
just assume that to achieve acceptable realtimeness
you end up with a lot of overhead traffic. Reminds me
of ICQ in its times of scalability crisis, when people
would show up on the buddy list with fifteen minutes
of delay. That was around 1993 I think.

So the ultimate question would be, is anonymous multicast
anonymous enough and does it scale well enough such that
the higher efficiency in terms of bandwidth and latency
come to fruition and beat both DP5 and GNS. I am not sure
if the many research papers on this topic are elaborate
enough yet.

Btw, I love the "Why not just use Tor?" part of the 
talk. It nicely explains how the current mainstream model
of private messaging, XMPP+OTR+Tor, is pretty insufficient.
I assume the scientific background to that assertion is the
2009 paper on "De-anonymizing Social Networks" by Arvind 
Narayanan and Vitaly Shmatikov which demonstrates the
correlation of Twitter and Flickr users by the similarity
of the social graphs. An attacker that has access to both
the jabber.ccc.de database and, say, the Facebook social
graph, would be able to de-anonymize a relevant number of
jabber.ccc.de users. So, dear CCC, please ensure that 
server is kept in a safe place until we have a better 
messaging standard than XMPP!  :)


-- 
	    http://youbroketheinternet.org
 ircs://psyced.org/youbroketheinternet


More information about the Messaging mailing list