SlideShare a Scribd company logo
1 of 26
Download to read offline
Where’s Wally? How to Privately
Discover your Friends on the Internet
Panagiotis Papadopoulos
University of Crete
& FORTH-ICS, Greece
Antonios A. Chariton University of Crete
Elias Athanasopoulos University of Cyprus
Evangelos P. Markatos FORTH-ICS
Real-time communication
The growth of real-time communication
Source: visualcapitalist.com
How does it work?
Step 1: User Discovery
Alice wants to
talk to Bob
Central Directory
Server
How does it work?
Step 2: Point-to-point secure
connection establishment
Alice wants to
talk to Bob
Central Directory
Server
"No Woman, No Cry"
"Hello Bob"
Hey! Wait a minute!
Mobile Instant Messaging (MIM) apps
• All contemporary MIM applications
leverage the phone’s address-book
• Frequently checks for newly registered
with the app friends
Privacy of the social graph
Step 1: User Discovery
Alice wants to
talk to Bob
Central Directory
Server
Bob +82-2-312-3456
Charlie +82-2-378-9012
David +82-2-334-5678
Alice is friend
with Bob, Charlie
and David
But, I am not
even a
WhatsApp user!
Bob
Charlie
David
Charlie gets his telephone number and his social connection
with Alice leaked to an app that he does not use!
The cost of “free” MIM apps (1/2)
Contact list Tel. number Current IP
Bob +82-2-312-3456 216.3.128.12
Charlie +82-2-378-9012 (not a WhatsApp user)
David +82-2-334-5678 136.79.128.22
Alice’s friends:
Cost:
• Relinquish the privacy of your social graph
App provider can
- reconstruct a global social topology (i.e., who is socially associated with whom)
- Infer interests, political beliefs, sexual preferences*
Such user info can then be sold to advertisers or handed over to agencies
* C. Jernigan and B. F. Mistree. Gaydar: Facebook friendships expose sexual orientation. First Monday, 14(10), 2009.
The cost of “free” MIM apps (2/2)
Even if service provider is benign:
• Concentration of important data lures attackers,
resulting in data breaches
• Bad design or bad maintenance may leak information
(e.g., Skype’s famous user IP leak*)
*R. Naraine, “Skype leaking user IP addresses, TCP ports”, https://www.zdnet.com/article/skype-leaking-user-
ip-addresses-tcp-ports/, 2012
Is it possible to build a User
Discovery service, without
revealing the user’s social graph?
In this paper
• We decouple the User Discovery operation from
the communication app.
• 1 User Discovery service to cover all related needs of user
(VoIP app, file sharing app, etc.)
• Users maintain their own User-to-IP mappings
• Delegate trust among users
(only friends can read these mappings)
App 2
Directory Server
App 1
Objectives
• A key-value datastore
• Existing system Immediately applicable
• Scalable Support increased load
• Distributed management No single maintaining entity
Don’t we use such a discovery
system on the web too?
How do you know the Network Address of www.cnn.com before fetching it?
The DNS!
Our Approach:
PROUD (PRivacy-preservation Of User Discovery)
Our Approach: PROUD
• PROUD: a scalable privacy-preserving user discovery service
1. enables users to control their current network address
without relying on any centralized infrastructure
2. allows users to find the network addresses of their friends
without revealing their social associations.
3. Thus goals are:
a. protect both data (user’s current IP address)
b. and metadata (who queries for whom).
PROUD in a nutshell
• Distributed directory service
• One dead-drop (key-value) per friendship
• Alice does not query for the entire address book but
for the particular user’s dead-drop
• Simple Set/Get operations
• 2 non-colluding nodes Resolvers and Registration nodes
Dead-drop
• DNS type TXT record
• Index:
o R: pseudorandom number generator
(Periodic change -> Forward Secrecy to Alice’s queries)
o SE: seed that Alice and Bob know
üR(SE).example.com
• Payload:
a) EpubA(K): Session key
b) EK(IPB): IP of Bob encrypted with the Session key
c) SprivB(H(EK(IPBT))): Timestamped and Signed payload
üEpubA(K) | EK(IPB) | SprivB(H(EK(IPBT)))
App 2
PROUD example
"No Woman, No Cry"
"Hello Bob"
Set friendship
dead-drop
Get friendship
dead-drop
Authoritative
Nameserver
(Registration node)
Local DNS Resolver
(Resolver node)
Performance Evaluation
Performance Evaluation: Latency
• Execution time per set
friendship operations
• Latency overhead <0.35 sec on
average per operation due to
cryptographic computations
Performance Evaluation: Scalability
It takes <3.5 seconds and around 0.3 KBps for Bob
to update a large address book of 500 users.
Conclusion
• We decouple User Discovery from MIM applications
• PROUD: a scalable privacy-preserving user discovery service
• protects both
üdata (user’s current IP address)
üand metadata (who queries for whom).
• Leverage existing DNS network
• minimal bandwidth requirements
• practically negligible latency to the user experience
(<0.35sec/operation)
Backup slides
Users behind NAT?
• NAT hole punching
• Like what Skype was doing back in its p2p days
• IPv6
• Current metrics put IPv6 at a minimum of 20% global adoption, and
local uses (within a country) to over 50%.
http://www.h-online.com/security/features/How-Skype-Co-get-round-firewalls-747197.htm
Client Server model
vIn some apps, users may communicate through an intermediate
server with their friends
vUser Discovery is still needed:
• In iMessage a user has to first retrieve friend’s public key from Apple’s
Directory Server
• In WhatsApp and Messenger, the client uploads at registration time
ütheir public Identity key and
üa batch of public One-Time Pre keys to a centralized server in order for any friend to
initiate a secure conversation.

More Related Content

Similar to Where’s Wally? How to Privately Discover your Friends on the Internet

Danger! Danger! Your Mobile Applications Are Not Secure
Danger! Danger! Your Mobile Applications Are Not SecureDanger! Danger! Your Mobile Applications Are Not Secure
Danger! Danger! Your Mobile Applications Are Not SecureTechWell
 
Baabtra.com template_Basics about Internet_jijojoseph
Baabtra.com template_Basics about Internet_jijojosephBaabtra.com template_Basics about Internet_jijojoseph
Baabtra.com template_Basics about Internet_jijojosephJijo Joseph
 
Basic Internet_Baabtra.com template
Basic Internet_Baabtra.com templateBasic Internet_Baabtra.com template
Basic Internet_Baabtra.com templateJijo Joseph
 
Touring the Dark Side of Internet: A Journey through IOT, TOR & Docker
Touring the Dark Side of Internet: A Journey through IOT, TOR & DockerTouring the Dark Side of Internet: A Journey through IOT, TOR & Docker
Touring the Dark Side of Internet: A Journey through IOT, TOR & DockerAbhinav Biswas
 
Protecting Your APIs Against Attack & Hijack
Protecting Your APIs Against Attack & Hijack Protecting Your APIs Against Attack & Hijack
Protecting Your APIs Against Attack & Hijack CA API Management
 
Elements of Connected Products
Elements of Connected ProductsElements of Connected Products
Elements of Connected ProductsJordan Husney
 
Our Data, Ourselves: The Data Democracy Deficit (EMF CAmp 2014)
Our Data, Ourselves: The Data Democracy Deficit (EMF CAmp 2014)Our Data, Ourselves: The Data Democracy Deficit (EMF CAmp 2014)
Our Data, Ourselves: The Data Democracy Deficit (EMF CAmp 2014)Giles Greenway
 
Luiz eduardo. introduction to mobile snitch
Luiz eduardo. introduction to mobile snitchLuiz eduardo. introduction to mobile snitch
Luiz eduardo. introduction to mobile snitchYury Chemerkin
 
iOS-Application-Security-iAmPr3m
iOS-Application-Security-iAmPr3miOS-Application-Security-iAmPr3m
iOS-Application-Security-iAmPr3mPrem Kumar (OSCP)
 
Web APIs: The future of software
Web APIs: The future of softwareWeb APIs: The future of software
Web APIs: The future of softwareReuven Lerner
 
Heartbleed Bug Vulnerability: Discovery, Impact and Solution
Heartbleed Bug Vulnerability: Discovery, Impact and SolutionHeartbleed Bug Vulnerability: Discovery, Impact and Solution
Heartbleed Bug Vulnerability: Discovery, Impact and SolutionCASCouncil
 
Building A Great API - Evan Cooke, Cloudstock, December 2010
Building A Great API - Evan Cooke, Cloudstock, December 2010Building A Great API - Evan Cooke, Cloudstock, December 2010
Building A Great API - Evan Cooke, Cloudstock, December 2010Twilio Inc
 
Jon McCoy - AppSec-USA-2014 Hacking C#(.NET) Applications:Defend by Design
Jon McCoy - AppSec-USA-2014 Hacking C#(.NET) Applications:Defend by DesignJon McCoy - AppSec-USA-2014 Hacking C#(.NET) Applications:Defend by Design
Jon McCoy - AppSec-USA-2014 Hacking C#(.NET) Applications:Defend by Designjonmccoy
 
2016 05 sanger
2016 05 sanger2016 05 sanger
2016 05 sangerChris Dwan
 
GatelessVPN technology pitch
GatelessVPN technology pitchGatelessVPN technology pitch
GatelessVPN technology pitchGVNetworks
 
StHack 2014 - Jerome "@funoverip" Nokin Turning your managed av into my botnet
StHack 2014 - Jerome "@funoverip" Nokin  Turning your managed av into my botnetStHack 2014 - Jerome "@funoverip" Nokin  Turning your managed av into my botnet
StHack 2014 - Jerome "@funoverip" Nokin Turning your managed av into my botnetStHack
 
All About Internet Services
All About Internet ServicesAll About Internet Services
All About Internet ServicesVarun
 
Meetic Backend Mutation With Symfony
Meetic Backend Mutation With SymfonyMeetic Backend Mutation With Symfony
Meetic Backend Mutation With SymfonymeeticTech
 
Basic computers for DIU laptop project students
Basic computers for DIU laptop project studentsBasic computers for DIU laptop project students
Basic computers for DIU laptop project studentsAlauddin Azad
 
SeaBeyond 2011 ProcessOne - Diana Cheng: OneSocialWeb
SeaBeyond 2011 ProcessOne - Diana Cheng: OneSocialWebSeaBeyond 2011 ProcessOne - Diana Cheng: OneSocialWeb
SeaBeyond 2011 ProcessOne - Diana Cheng: OneSocialWebProcessOne
 

Similar to Where’s Wally? How to Privately Discover your Friends on the Internet (20)

Danger! Danger! Your Mobile Applications Are Not Secure
Danger! Danger! Your Mobile Applications Are Not SecureDanger! Danger! Your Mobile Applications Are Not Secure
Danger! Danger! Your Mobile Applications Are Not Secure
 
Baabtra.com template_Basics about Internet_jijojoseph
Baabtra.com template_Basics about Internet_jijojosephBaabtra.com template_Basics about Internet_jijojoseph
Baabtra.com template_Basics about Internet_jijojoseph
 
Basic Internet_Baabtra.com template
Basic Internet_Baabtra.com templateBasic Internet_Baabtra.com template
Basic Internet_Baabtra.com template
 
Touring the Dark Side of Internet: A Journey through IOT, TOR & Docker
Touring the Dark Side of Internet: A Journey through IOT, TOR & DockerTouring the Dark Side of Internet: A Journey through IOT, TOR & Docker
Touring the Dark Side of Internet: A Journey through IOT, TOR & Docker
 
Protecting Your APIs Against Attack & Hijack
Protecting Your APIs Against Attack & Hijack Protecting Your APIs Against Attack & Hijack
Protecting Your APIs Against Attack & Hijack
 
Elements of Connected Products
Elements of Connected ProductsElements of Connected Products
Elements of Connected Products
 
Our Data, Ourselves: The Data Democracy Deficit (EMF CAmp 2014)
Our Data, Ourselves: The Data Democracy Deficit (EMF CAmp 2014)Our Data, Ourselves: The Data Democracy Deficit (EMF CAmp 2014)
Our Data, Ourselves: The Data Democracy Deficit (EMF CAmp 2014)
 
Luiz eduardo. introduction to mobile snitch
Luiz eduardo. introduction to mobile snitchLuiz eduardo. introduction to mobile snitch
Luiz eduardo. introduction to mobile snitch
 
iOS-Application-Security-iAmPr3m
iOS-Application-Security-iAmPr3miOS-Application-Security-iAmPr3m
iOS-Application-Security-iAmPr3m
 
Web APIs: The future of software
Web APIs: The future of softwareWeb APIs: The future of software
Web APIs: The future of software
 
Heartbleed Bug Vulnerability: Discovery, Impact and Solution
Heartbleed Bug Vulnerability: Discovery, Impact and SolutionHeartbleed Bug Vulnerability: Discovery, Impact and Solution
Heartbleed Bug Vulnerability: Discovery, Impact and Solution
 
Building A Great API - Evan Cooke, Cloudstock, December 2010
Building A Great API - Evan Cooke, Cloudstock, December 2010Building A Great API - Evan Cooke, Cloudstock, December 2010
Building A Great API - Evan Cooke, Cloudstock, December 2010
 
Jon McCoy - AppSec-USA-2014 Hacking C#(.NET) Applications:Defend by Design
Jon McCoy - AppSec-USA-2014 Hacking C#(.NET) Applications:Defend by DesignJon McCoy - AppSec-USA-2014 Hacking C#(.NET) Applications:Defend by Design
Jon McCoy - AppSec-USA-2014 Hacking C#(.NET) Applications:Defend by Design
 
2016 05 sanger
2016 05 sanger2016 05 sanger
2016 05 sanger
 
GatelessVPN technology pitch
GatelessVPN technology pitchGatelessVPN technology pitch
GatelessVPN technology pitch
 
StHack 2014 - Jerome "@funoverip" Nokin Turning your managed av into my botnet
StHack 2014 - Jerome "@funoverip" Nokin  Turning your managed av into my botnetStHack 2014 - Jerome "@funoverip" Nokin  Turning your managed av into my botnet
StHack 2014 - Jerome "@funoverip" Nokin Turning your managed av into my botnet
 
All About Internet Services
All About Internet ServicesAll About Internet Services
All About Internet Services
 
Meetic Backend Mutation With Symfony
Meetic Backend Mutation With SymfonyMeetic Backend Mutation With Symfony
Meetic Backend Mutation With Symfony
 
Basic computers for DIU laptop project students
Basic computers for DIU laptop project studentsBasic computers for DIU laptop project students
Basic computers for DIU laptop project students
 
SeaBeyond 2011 ProcessOne - Diana Cheng: OneSocialWeb
SeaBeyond 2011 ProcessOne - Diana Cheng: OneSocialWebSeaBeyond 2011 ProcessOne - Diana Cheng: OneSocialWeb
SeaBeyond 2011 ProcessOne - Diana Cheng: OneSocialWeb
 

More from Panagiotis Papadopoulos

Keeping out the Masses: Understanding the Popularity and Implications of Int...
 Keeping out the Masses: Understanding the Popularity and Implications of Int... Keeping out the Masses: Understanding the Popularity and Implications of Int...
Keeping out the Masses: Understanding the Popularity and Implications of Int...Panagiotis Papadopoulos
 
Truth in Web Mining: Measuring the Profitability and the Imposed Overheads of...
Truth in Web Mining: Measuring the Profitability and the Imposed Overheads of...Truth in Web Mining: Measuring the Profitability and the Imposed Overheads of...
Truth in Web Mining: Measuring the Profitability and the Imposed Overheads of...Panagiotis Papadopoulos
 
Cookie Synchronization: Everything You Always Wanted to Know But Were Afraid ...
Cookie Synchronization: Everything You Always Wanted to Know But Were Afraid ...Cookie Synchronization: Everything You Always Wanted to Know But Were Afraid ...
Cookie Synchronization: Everything You Always Wanted to Know But Were Afraid ...Panagiotis Papadopoulos
 
Is privacy possible without Anonymity? The case for microblogging services
Is privacy possible without Anonymity? The case for microblogging servicesIs privacy possible without Anonymity? The case for microblogging services
Is privacy possible without Anonymity? The case for microblogging servicesPanagiotis Papadopoulos
 
Master of Web Puppets: Abusing Web Browsers for Persistent and Stealthy Compu...
Master of Web Puppets: Abusing Web Browsers for Persistent and Stealthy Compu...Master of Web Puppets: Abusing Web Browsers for Persistent and Stealthy Compu...
Master of Web Puppets: Abusing Web Browsers for Persistent and Stealthy Compu...Panagiotis Papadopoulos
 
The Cost of Digital Advertisement: Comparing User and Advertiser Views
The Cost of Digital Advertisement: Comparing User and Advertiser ViewsThe Cost of Digital Advertisement: Comparing User and Advertiser Views
The Cost of Digital Advertisement: Comparing User and Advertiser ViewsPanagiotis Papadopoulos
 
Exclusive: How the (synced) Cookie Monster breached my encrypted VPN session
Exclusive: How the (synced) Cookie Monster breached my encrypted VPN sessionExclusive: How the (synced) Cookie Monster breached my encrypted VPN session
Exclusive: How the (synced) Cookie Monster breached my encrypted VPN sessionPanagiotis Papadopoulos
 
0pass: Zero-storage Password Management Based on Password Reminders
0pass: Zero-storage Password Management Based on Password Reminders0pass: Zero-storage Password Management Based on Password Reminders
0pass: Zero-storage Password Management Based on Password RemindersPanagiotis Papadopoulos
 
If you are not paying for it, you are the product: How much do advertisers p...
 If you are not paying for it, you are the product: How much do advertisers p... If you are not paying for it, you are the product: How much do advertisers p...
If you are not paying for it, you are the product: How much do advertisers p...Panagiotis Papadopoulos
 
MAD: A Middleware Framework for Multi-Step Attack Detection
MAD: A Middleware Framework for Multi-Step Attack DetectionMAD: A Middleware Framework for Multi-Step Attack Detection
MAD: A Middleware Framework for Multi-Step Attack DetectionPanagiotis Papadopoulos
 
Cassandra Consistency: Tradeoffs and Limitations
Cassandra Consistency: Tradeoffs and LimitationsCassandra Consistency: Tradeoffs and Limitations
Cassandra Consistency: Tradeoffs and LimitationsPanagiotis Papadopoulos
 

More from Panagiotis Papadopoulos (11)

Keeping out the Masses: Understanding the Popularity and Implications of Int...
 Keeping out the Masses: Understanding the Popularity and Implications of Int... Keeping out the Masses: Understanding the Popularity and Implications of Int...
Keeping out the Masses: Understanding the Popularity and Implications of Int...
 
Truth in Web Mining: Measuring the Profitability and the Imposed Overheads of...
Truth in Web Mining: Measuring the Profitability and the Imposed Overheads of...Truth in Web Mining: Measuring the Profitability and the Imposed Overheads of...
Truth in Web Mining: Measuring the Profitability and the Imposed Overheads of...
 
Cookie Synchronization: Everything You Always Wanted to Know But Were Afraid ...
Cookie Synchronization: Everything You Always Wanted to Know But Were Afraid ...Cookie Synchronization: Everything You Always Wanted to Know But Were Afraid ...
Cookie Synchronization: Everything You Always Wanted to Know But Were Afraid ...
 
Is privacy possible without Anonymity? The case for microblogging services
Is privacy possible without Anonymity? The case for microblogging servicesIs privacy possible without Anonymity? The case for microblogging services
Is privacy possible without Anonymity? The case for microblogging services
 
Master of Web Puppets: Abusing Web Browsers for Persistent and Stealthy Compu...
Master of Web Puppets: Abusing Web Browsers for Persistent and Stealthy Compu...Master of Web Puppets: Abusing Web Browsers for Persistent and Stealthy Compu...
Master of Web Puppets: Abusing Web Browsers for Persistent and Stealthy Compu...
 
The Cost of Digital Advertisement: Comparing User and Advertiser Views
The Cost of Digital Advertisement: Comparing User and Advertiser ViewsThe Cost of Digital Advertisement: Comparing User and Advertiser Views
The Cost of Digital Advertisement: Comparing User and Advertiser Views
 
Exclusive: How the (synced) Cookie Monster breached my encrypted VPN session
Exclusive: How the (synced) Cookie Monster breached my encrypted VPN sessionExclusive: How the (synced) Cookie Monster breached my encrypted VPN session
Exclusive: How the (synced) Cookie Monster breached my encrypted VPN session
 
0pass: Zero-storage Password Management Based on Password Reminders
0pass: Zero-storage Password Management Based on Password Reminders0pass: Zero-storage Password Management Based on Password Reminders
0pass: Zero-storage Password Management Based on Password Reminders
 
If you are not paying for it, you are the product: How much do advertisers p...
 If you are not paying for it, you are the product: How much do advertisers p... If you are not paying for it, you are the product: How much do advertisers p...
If you are not paying for it, you are the product: How much do advertisers p...
 
MAD: A Middleware Framework for Multi-Step Attack Detection
MAD: A Middleware Framework for Multi-Step Attack DetectionMAD: A Middleware Framework for Multi-Step Attack Detection
MAD: A Middleware Framework for Multi-Step Attack Detection
 
Cassandra Consistency: Tradeoffs and Limitations
Cassandra Consistency: Tradeoffs and LimitationsCassandra Consistency: Tradeoffs and Limitations
Cassandra Consistency: Tradeoffs and Limitations
 

Recently uploaded

(9818099198) Call Girls In Noida Sector 14 (NOIDA ESCORTS)
(9818099198) Call Girls In Noida Sector 14 (NOIDA ESCORTS)(9818099198) Call Girls In Noida Sector 14 (NOIDA ESCORTS)
(9818099198) Call Girls In Noida Sector 14 (NOIDA ESCORTS)riyaescorts54
 
《Queensland毕业文凭-昆士兰大学毕业证成绩单》
《Queensland毕业文凭-昆士兰大学毕业证成绩单》《Queensland毕业文凭-昆士兰大学毕业证成绩单》
《Queensland毕业文凭-昆士兰大学毕业证成绩单》rnrncn29
 
BUMI DAN ANTARIKSA PROJEK IPAS SMK KELAS X.pdf
BUMI DAN ANTARIKSA PROJEK IPAS SMK KELAS X.pdfBUMI DAN ANTARIKSA PROJEK IPAS SMK KELAS X.pdf
BUMI DAN ANTARIKSA PROJEK IPAS SMK KELAS X.pdfWildaNurAmalia2
 
Base editing, prime editing, Cas13 & RNA editing and organelle base editing
Base editing, prime editing, Cas13 & RNA editing and organelle base editingBase editing, prime editing, Cas13 & RNA editing and organelle base editing
Base editing, prime editing, Cas13 & RNA editing and organelle base editingNetHelix
 
User Guide: Capricorn FLX™ Weather Station
User Guide: Capricorn FLX™ Weather StationUser Guide: Capricorn FLX™ Weather Station
User Guide: Capricorn FLX™ Weather StationColumbia Weather Systems
 
Speech, hearing, noise, intelligibility.pptx
Speech, hearing, noise, intelligibility.pptxSpeech, hearing, noise, intelligibility.pptx
Speech, hearing, noise, intelligibility.pptxpriyankatabhane
 
Topic 9- General Principles of International Law.pptx
Topic 9- General Principles of International Law.pptxTopic 9- General Principles of International Law.pptx
Topic 9- General Principles of International Law.pptxJorenAcuavera1
 
Call Girls in Majnu Ka Tilla Delhi 🔝9711014705🔝 Genuine
Call Girls in Majnu Ka Tilla Delhi 🔝9711014705🔝 GenuineCall Girls in Majnu Ka Tilla Delhi 🔝9711014705🔝 Genuine
Call Girls in Majnu Ka Tilla Delhi 🔝9711014705🔝 Genuinethapagita
 
Pests of Blackgram, greengram, cowpea_Dr.UPR.pdf
Pests of Blackgram, greengram, cowpea_Dr.UPR.pdfPests of Blackgram, greengram, cowpea_Dr.UPR.pdf
Pests of Blackgram, greengram, cowpea_Dr.UPR.pdfPirithiRaju
 
RESPIRATORY ADAPTATIONS TO HYPOXIA IN HUMNAS.pptx
RESPIRATORY ADAPTATIONS TO HYPOXIA IN HUMNAS.pptxRESPIRATORY ADAPTATIONS TO HYPOXIA IN HUMNAS.pptx
RESPIRATORY ADAPTATIONS TO HYPOXIA IN HUMNAS.pptxFarihaAbdulRasheed
 
Behavioral Disorder: Schizophrenia & it's Case Study.pdf
Behavioral Disorder: Schizophrenia & it's Case Study.pdfBehavioral Disorder: Schizophrenia & it's Case Study.pdf
Behavioral Disorder: Schizophrenia & it's Case Study.pdfSELF-EXPLANATORY
 
Fertilization: Sperm and the egg—collectively called the gametes—fuse togethe...
Fertilization: Sperm and the egg—collectively called the gametes—fuse togethe...Fertilization: Sperm and the egg—collectively called the gametes—fuse togethe...
Fertilization: Sperm and the egg—collectively called the gametes—fuse togethe...D. B. S. College Kanpur
 
Citronella presentation SlideShare mani upadhyay
Citronella presentation SlideShare mani upadhyayCitronella presentation SlideShare mani upadhyay
Citronella presentation SlideShare mani upadhyayupadhyaymani499
 
Call Girls in Munirka Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Munirka Delhi 💯Call Us 🔝8264348440🔝Call Girls in Munirka Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Munirka Delhi 💯Call Us 🔝8264348440🔝soniya singh
 
User Guide: Orion™ Weather Station (Columbia Weather Systems)
User Guide: Orion™ Weather Station (Columbia Weather Systems)User Guide: Orion™ Weather Station (Columbia Weather Systems)
User Guide: Orion™ Weather Station (Columbia Weather Systems)Columbia Weather Systems
 
Harmful and Useful Microorganisms Presentation
Harmful and Useful Microorganisms PresentationHarmful and Useful Microorganisms Presentation
Harmful and Useful Microorganisms Presentationtahreemzahra82
 
Neurodevelopmental disorders according to the dsm 5 tr
Neurodevelopmental disorders according to the dsm 5 trNeurodevelopmental disorders according to the dsm 5 tr
Neurodevelopmental disorders according to the dsm 5 trssuser06f238
 
LIGHT-PHENOMENA-BY-CABUALDIONALDOPANOGANCADIENTE-CONDEZA (1).pptx
LIGHT-PHENOMENA-BY-CABUALDIONALDOPANOGANCADIENTE-CONDEZA (1).pptxLIGHT-PHENOMENA-BY-CABUALDIONALDOPANOGANCADIENTE-CONDEZA (1).pptx
LIGHT-PHENOMENA-BY-CABUALDIONALDOPANOGANCADIENTE-CONDEZA (1).pptxmalonesandreagweneth
 

Recently uploaded (20)

(9818099198) Call Girls In Noida Sector 14 (NOIDA ESCORTS)
(9818099198) Call Girls In Noida Sector 14 (NOIDA ESCORTS)(9818099198) Call Girls In Noida Sector 14 (NOIDA ESCORTS)
(9818099198) Call Girls In Noida Sector 14 (NOIDA ESCORTS)
 
《Queensland毕业文凭-昆士兰大学毕业证成绩单》
《Queensland毕业文凭-昆士兰大学毕业证成绩单》《Queensland毕业文凭-昆士兰大学毕业证成绩单》
《Queensland毕业文凭-昆士兰大学毕业证成绩单》
 
BUMI DAN ANTARIKSA PROJEK IPAS SMK KELAS X.pdf
BUMI DAN ANTARIKSA PROJEK IPAS SMK KELAS X.pdfBUMI DAN ANTARIKSA PROJEK IPAS SMK KELAS X.pdf
BUMI DAN ANTARIKSA PROJEK IPAS SMK KELAS X.pdf
 
Volatile Oils Pharmacognosy And Phytochemistry -I
Volatile Oils Pharmacognosy And Phytochemistry -IVolatile Oils Pharmacognosy And Phytochemistry -I
Volatile Oils Pharmacognosy And Phytochemistry -I
 
Base editing, prime editing, Cas13 & RNA editing and organelle base editing
Base editing, prime editing, Cas13 & RNA editing and organelle base editingBase editing, prime editing, Cas13 & RNA editing and organelle base editing
Base editing, prime editing, Cas13 & RNA editing and organelle base editing
 
User Guide: Capricorn FLX™ Weather Station
User Guide: Capricorn FLX™ Weather StationUser Guide: Capricorn FLX™ Weather Station
User Guide: Capricorn FLX™ Weather Station
 
Speech, hearing, noise, intelligibility.pptx
Speech, hearing, noise, intelligibility.pptxSpeech, hearing, noise, intelligibility.pptx
Speech, hearing, noise, intelligibility.pptx
 
Hot Sexy call girls in Moti Nagar,🔝 9953056974 🔝 escort Service
Hot Sexy call girls in  Moti Nagar,🔝 9953056974 🔝 escort ServiceHot Sexy call girls in  Moti Nagar,🔝 9953056974 🔝 escort Service
Hot Sexy call girls in Moti Nagar,🔝 9953056974 🔝 escort Service
 
Topic 9- General Principles of International Law.pptx
Topic 9- General Principles of International Law.pptxTopic 9- General Principles of International Law.pptx
Topic 9- General Principles of International Law.pptx
 
Call Girls in Majnu Ka Tilla Delhi 🔝9711014705🔝 Genuine
Call Girls in Majnu Ka Tilla Delhi 🔝9711014705🔝 GenuineCall Girls in Majnu Ka Tilla Delhi 🔝9711014705🔝 Genuine
Call Girls in Majnu Ka Tilla Delhi 🔝9711014705🔝 Genuine
 
Pests of Blackgram, greengram, cowpea_Dr.UPR.pdf
Pests of Blackgram, greengram, cowpea_Dr.UPR.pdfPests of Blackgram, greengram, cowpea_Dr.UPR.pdf
Pests of Blackgram, greengram, cowpea_Dr.UPR.pdf
 
RESPIRATORY ADAPTATIONS TO HYPOXIA IN HUMNAS.pptx
RESPIRATORY ADAPTATIONS TO HYPOXIA IN HUMNAS.pptxRESPIRATORY ADAPTATIONS TO HYPOXIA IN HUMNAS.pptx
RESPIRATORY ADAPTATIONS TO HYPOXIA IN HUMNAS.pptx
 
Behavioral Disorder: Schizophrenia & it's Case Study.pdf
Behavioral Disorder: Schizophrenia & it's Case Study.pdfBehavioral Disorder: Schizophrenia & it's Case Study.pdf
Behavioral Disorder: Schizophrenia & it's Case Study.pdf
 
Fertilization: Sperm and the egg—collectively called the gametes—fuse togethe...
Fertilization: Sperm and the egg—collectively called the gametes—fuse togethe...Fertilization: Sperm and the egg—collectively called the gametes—fuse togethe...
Fertilization: Sperm and the egg—collectively called the gametes—fuse togethe...
 
Citronella presentation SlideShare mani upadhyay
Citronella presentation SlideShare mani upadhyayCitronella presentation SlideShare mani upadhyay
Citronella presentation SlideShare mani upadhyay
 
Call Girls in Munirka Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Munirka Delhi 💯Call Us 🔝8264348440🔝Call Girls in Munirka Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Munirka Delhi 💯Call Us 🔝8264348440🔝
 
User Guide: Orion™ Weather Station (Columbia Weather Systems)
User Guide: Orion™ Weather Station (Columbia Weather Systems)User Guide: Orion™ Weather Station (Columbia Weather Systems)
User Guide: Orion™ Weather Station (Columbia Weather Systems)
 
Harmful and Useful Microorganisms Presentation
Harmful and Useful Microorganisms PresentationHarmful and Useful Microorganisms Presentation
Harmful and Useful Microorganisms Presentation
 
Neurodevelopmental disorders according to the dsm 5 tr
Neurodevelopmental disorders according to the dsm 5 trNeurodevelopmental disorders according to the dsm 5 tr
Neurodevelopmental disorders according to the dsm 5 tr
 
LIGHT-PHENOMENA-BY-CABUALDIONALDOPANOGANCADIENTE-CONDEZA (1).pptx
LIGHT-PHENOMENA-BY-CABUALDIONALDOPANOGANCADIENTE-CONDEZA (1).pptxLIGHT-PHENOMENA-BY-CABUALDIONALDOPANOGANCADIENTE-CONDEZA (1).pptx
LIGHT-PHENOMENA-BY-CABUALDIONALDOPANOGANCADIENTE-CONDEZA (1).pptx
 

Where’s Wally? How to Privately Discover your Friends on the Internet

  • 1. Where’s Wally? How to Privately Discover your Friends on the Internet Panagiotis Papadopoulos University of Crete & FORTH-ICS, Greece Antonios A. Chariton University of Crete Elias Athanasopoulos University of Cyprus Evangelos P. Markatos FORTH-ICS
  • 3. The growth of real-time communication Source: visualcapitalist.com
  • 4. How does it work? Step 1: User Discovery Alice wants to talk to Bob Central Directory Server
  • 5. How does it work? Step 2: Point-to-point secure connection establishment Alice wants to talk to Bob Central Directory Server "No Woman, No Cry" "Hello Bob"
  • 6. Hey! Wait a minute!
  • 7. Mobile Instant Messaging (MIM) apps • All contemporary MIM applications leverage the phone’s address-book • Frequently checks for newly registered with the app friends
  • 8. Privacy of the social graph Step 1: User Discovery Alice wants to talk to Bob Central Directory Server Bob +82-2-312-3456 Charlie +82-2-378-9012 David +82-2-334-5678 Alice is friend with Bob, Charlie and David But, I am not even a WhatsApp user! Bob Charlie David Charlie gets his telephone number and his social connection with Alice leaked to an app that he does not use!
  • 9. The cost of “free” MIM apps (1/2) Contact list Tel. number Current IP Bob +82-2-312-3456 216.3.128.12 Charlie +82-2-378-9012 (not a WhatsApp user) David +82-2-334-5678 136.79.128.22 Alice’s friends: Cost: • Relinquish the privacy of your social graph App provider can - reconstruct a global social topology (i.e., who is socially associated with whom) - Infer interests, political beliefs, sexual preferences* Such user info can then be sold to advertisers or handed over to agencies * C. Jernigan and B. F. Mistree. Gaydar: Facebook friendships expose sexual orientation. First Monday, 14(10), 2009.
  • 10. The cost of “free” MIM apps (2/2) Even if service provider is benign: • Concentration of important data lures attackers, resulting in data breaches • Bad design or bad maintenance may leak information (e.g., Skype’s famous user IP leak*) *R. Naraine, “Skype leaking user IP addresses, TCP ports”, https://www.zdnet.com/article/skype-leaking-user- ip-addresses-tcp-ports/, 2012
  • 11. Is it possible to build a User Discovery service, without revealing the user’s social graph?
  • 12. In this paper • We decouple the User Discovery operation from the communication app. • 1 User Discovery service to cover all related needs of user (VoIP app, file sharing app, etc.) • Users maintain their own User-to-IP mappings • Delegate trust among users (only friends can read these mappings) App 2 Directory Server App 1
  • 13. Objectives • A key-value datastore • Existing system Immediately applicable • Scalable Support increased load • Distributed management No single maintaining entity
  • 14. Don’t we use such a discovery system on the web too? How do you know the Network Address of www.cnn.com before fetching it? The DNS!
  • 16. Our Approach: PROUD • PROUD: a scalable privacy-preserving user discovery service 1. enables users to control their current network address without relying on any centralized infrastructure 2. allows users to find the network addresses of their friends without revealing their social associations. 3. Thus goals are: a. protect both data (user’s current IP address) b. and metadata (who queries for whom).
  • 17. PROUD in a nutshell • Distributed directory service • One dead-drop (key-value) per friendship • Alice does not query for the entire address book but for the particular user’s dead-drop • Simple Set/Get operations • 2 non-colluding nodes Resolvers and Registration nodes
  • 18. Dead-drop • DNS type TXT record • Index: o R: pseudorandom number generator (Periodic change -> Forward Secrecy to Alice’s queries) o SE: seed that Alice and Bob know üR(SE).example.com • Payload: a) EpubA(K): Session key b) EK(IPB): IP of Bob encrypted with the Session key c) SprivB(H(EK(IPBT))): Timestamped and Signed payload üEpubA(K) | EK(IPB) | SprivB(H(EK(IPBT)))
  • 19. App 2 PROUD example "No Woman, No Cry" "Hello Bob" Set friendship dead-drop Get friendship dead-drop Authoritative Nameserver (Registration node) Local DNS Resolver (Resolver node)
  • 21. Performance Evaluation: Latency • Execution time per set friendship operations • Latency overhead <0.35 sec on average per operation due to cryptographic computations
  • 22. Performance Evaluation: Scalability It takes <3.5 seconds and around 0.3 KBps for Bob to update a large address book of 500 users.
  • 23. Conclusion • We decouple User Discovery from MIM applications • PROUD: a scalable privacy-preserving user discovery service • protects both üdata (user’s current IP address) üand metadata (who queries for whom). • Leverage existing DNS network • minimal bandwidth requirements • practically negligible latency to the user experience (<0.35sec/operation)
  • 25. Users behind NAT? • NAT hole punching • Like what Skype was doing back in its p2p days • IPv6 • Current metrics put IPv6 at a minimum of 20% global adoption, and local uses (within a country) to over 50%. http://www.h-online.com/security/features/How-Skype-Co-get-round-firewalls-747197.htm
  • 26. Client Server model vIn some apps, users may communicate through an intermediate server with their friends vUser Discovery is still needed: • In iMessage a user has to first retrieve friend’s public key from Apple’s Directory Server • In WhatsApp and Messenger, the client uploads at registration time ütheir public Identity key and üa batch of public One-Time Pre keys to a centralized server in order for any friend to initiate a secure conversation.