Jonkman Microblog
  • Login
Show Navigation
  • Public

    • Public
    • Network
    • Groups
    • Popular
    • People

Conversation

Notices

  1. Hypolite Petovan (hypolite@friendica.mrpetovan.com)'s status on Monday, 04-Jun-2018 21:29:27 EDT Hypolite Petovan Hypolite Petovan
    At @lightone 's request, I wrote a blurb about what it would take to protect user's private data from their node admin on a decentralized social network node. I use #Friendica as a reference (extending this Friendica GitHub issue about encrypting data at rest https://github.com/friendica/friendica/issues/4841), but this applies to #Mastodon, #Diaspora and #Hubzilla as well.

    Let me know what you think about it. blog.mrpetovan.com/web-develop… #cryptography #decentralization #socialnetworking
    In conversation Monday, 04-Jun-2018 21:29:27 EDT from friendica.mrpetovan.com permalink

    Attachments

    1. Invalid filename.
      Encrypt at rest user data only accessed during live session (paranoid mode) · Issue #4841 · friendica/friendica
      from GitHub
      This would address a pet peeve of mine concerning Friendica. The project is often touted as "secure", but the threat model is unclear. Secure from whom? One thing is clear is that all the...
    1. Hypolite Petovan (hypolite@friendica.mrpetovan.com)'s status on Monday, 04-Jun-2018 23:05:46 EDT Hypolite Petovan Hypolite Petovan
      in reply to
      @Dennis Schubert Thanks for the follow-up. Indeed, I naively assumed that an admin would run vanilla code and the client would be untampered but you're right, neither have to be.

      @🛫 Brad Koehn 🛬 Initially, I only thought about incoming content. The server would encrypt the plain text message before storage, and the decryption would only be for display. Outgoing messages would have to be plain text and again, the local copy would be encrypted with the public key before storage. But this is moot given @Dennis Schubert reservations.

      However, we already are exchanging a couple of public keys between accounts (for the diaspora and salmon protocol), so we could exchange one more so that the encryption could be done from remote servers as well.

      I'm not particularly attached to either solutions. I realize now they are bad answers to a hard question. Basically, I took the encryption at rest and brought it as far as I could, and even then I got severely blindsided.

      The obvious solution to protect people's privacy is of course to use a purposefully built end-to-end encryption messaging system. Even hosting a single-user node disseminate plain text private data on remote servers.
      In conversation Monday, 04-Jun-2018 23:05:46 EDT from friendica.mrpetovan.com permalink
  • Help
  • About
  • FAQ
  • TOS
  • Privacy
  • Source
  • Version
  • Contact

Jonkman Microblog is a social network, courtesy of SOBAC Microcomputer Services. It runs on GNU social, version 1.2.0-beta5, available under the GNU Affero General Public License.

Creative Commons Attribution 3.0 All Jonkman Microblog content and data are available under the Creative Commons Attribution 3.0 license.

Switch to desktop site layout.