Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Strawman: Target Security Constraints #18

Open
benjaminsavage opened this issue Jun 23, 2022 · 1 comment
Open

Strawman: Target Security Constraints #18

benjaminsavage opened this issue Jun 23, 2022 · 1 comment
Labels

Comments

@benjaminsavage
Copy link

Strawman Security constraints

If any single entity involved in operating a private measurement API becomes:

  • Curious (that is, it tries to learn more information that it is supposed to)
  • Compromised (that is, it is taken over by an attacker)
  • Compelled (that is, a government forces it to try to break the privacy of the system)

The API should continue to provide the privacy protections outlined above.

Implications for client-side code

If a private measurement API relies upon Client-side code (in a browser or mobile operating system), it should be the case that:

  1. Such code is open-source and auditable, so that independent security experts can validate it follows the specification, and no back-doors have been added. (Where the browser / OS is operated by an entity which also runs an ads business, this has the added benefit of boosting confidence in competitors that there is no self-preferencing or self-dealing going on.)
  2. Individuals can validate that their installation is running code which matches the open-source specification, so that they can make sure they were not provided with a compromised, or back-door enabled version.

Implications for server-side code

If a private measurement API relies upon Server-side code, then for every entity operating some portion of that server-side infrastructure it should be the case that:

  1. It is not capable of acquiring private user-information, even if it were to deviate from the specification to attack the system in arbitrary ways.
  2. It has undergone an (at this time unspecified) certification process to become authorised to help run the service. This will likely involve being certified by browser vendors and OS operators.
@AramZS
Copy link
Contributor

AramZS commented Jul 18, 2023

Would we like to present these in an upcoming meeting?

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
Projects
None yet
Development

No branches or pull requests

2 participants