Periodic Reporting for period 1 - ProPriM (Provable Privacy for Metadata)
Reporting period: 2023-08-01 to 2025-07-31
Our goal is to design new solutions, called network protocols, to guarantee that metadata is protected during transit. An added challenge of designing these protocols is that they need to be efficient enough for anyone to use—it would be unacceptable to use a protocol that will immediately drain your phone’s battery, and it would also not be acceptable if for example a website took several minutes to load. As a consequence, protocols need to be designed with a suitable trade-off between the protection they offer, and the performance they offer.
To reason about the privacy of our DenIM protocol, we have formally proved that DenIM maintains privacy against a potential attacker both able to listen to network communication and actively communicate with users.
Our results include the protocol itself, and we also introduce a new technique to prove security for metadata private protocols. These techniques have previously been used in the domain of programming languages and information flow, but have not been used to reason about metadata privacy in network protocols. The next step is to further the understanding of how generalizable our technique is: can we use it to prove security for any metadata private protocol? Additionally, the DenIM protocol itself has the potential to be impactful for instant messaging platforms, if they decide to offer metadata privacy to their users.
Another insight from designing DenIM is that it is not enough to protect communication on the network layer. Essentially, the communication is merely a symptom of a user’s interaction with an app, the real source of the communication is the user’s behavior. In other words, what we really want to achieve is privacy by hiding a user’s behavior. Our technical insight is that in order to treat the source rather than the symptoms, protocols need to be designed such that they are aware of a user’s behavior—otherwise the protocol cannot determine which information needs to be protected. The next step in this direction is inevitable to design more tailored protocols for metadata privacy, such that all internet communication is possible to hide.