Lesson 4, Concept: Input Privacy #184
-
In the lesson, it was concluded that if input privacy is ensured, then the copy problem and bundling problem can be solved. So in the case that I am running a tool that ensures input privacy, how can I know for sure that the tool I am using is not going to make copies of my data? I would have to ask the tool-makers to reveal the details of the code - which would breach the privacy of the tool. |
Beta Was this translation helpful? Give feedback.
Replies: 3 comments 4 replies
-
I would say this boils down to whether the tool itself is intentionally designed as malware or is hijacked by malware, in which case the best defence / preventive mechanisms are that of general cybersecurity best practises. You can also run diagnostics against your computer / this piece of software to understand if it is malicious in any way shape or form. |
Beta Was this translation helpful? Give feedback.
-
That is an interesting question. As with Input Privacy, we cannot find the private key even if we have access to the public key and the algorithm itself, that makes Open Source a good avenue for developing these types of technologies. Now if someone wants to develop a proprietary privacy preserving tool, they would definitely have to look for ways to overcome these 'trust' issues that these Open Source tools would already have a huge advantage on. The answer given by @hwrdtm makes perfect sense when comes to verifying if such a tool does not make or send copies of your data. |
Beta Was this translation helpful? Give feedback.
-
You have stated in your question “In the lesson, it was concluded that if input privacy is ensured, then the copy problem and bundling problem can be solved” For your main question I think privacy tools should be open source for transparency . |
Beta Was this translation helpful? Give feedback.
I would say this boils down to whether the tool itself is intentionally designed as malware or is hijacked by malware, in which case the best defence / preventive mechanisms are that of general cybersecurity best practises. You can also run diagnostics against your computer / this piece of software to understand if it is malicious in any way shape or form.