CORDIS - Forschungsergebnisse der EU
CORDIS

NEXTLEAP

Leistungen

Principles for Decentralized Protocol Design

An abstract framework and easy-to-use cookbook for principles of decentralized and rights-preserving protocol design that finalizes the solutions found to the hard problems of Internet Science for decentralized systems given in D2.1.

Review 2 Assessment

This deliverable will review and assess the activities, results, and progresses for the second review period, with a focus on privacy-enhanced collective intelligence and privacy-preserving messaging. This will provide a basis for each consortium member and engaged stakeholder (including other CAPS projects) to engage in further projects with increased performance and efficiency, but most importantly lay the scientific groundwork for a truly distributed and decentralized architecture for Europe.

Yearly Technical and Dissemination Assessment 1

First yearly update on technical progress and dissemination, focus on the secure address book use-case. Technical progress and dissemination reports will be delivered yearly and the dissemination plan will be updated if necessary. It will include all presentations, papers, videos, and all other outreach material to be archived - as well as links to any running code, demos, and in-depth technical analysis of the primary challenges and next steps. This will include the advise of the advisory board and an updated communications strategy that takes into account whether the previous technical and dissemination objectives were met or not, and how they can be achieved in the next period. Dissemination and technical progress in each of the appointed sectors will be tracked against objectives and goals.

Draft Decentralized Case-studies

This subset of the list of case-studies will be finalized, and initial analysis completed over the communities to feed into the fundamental science of protocol design in WP2.

Privacy-Enhanced Analytics for Wisdom of the Crowds Simulation

Simulation-based evaluation of the scalability of privacy-enhanced crowd-sourcing analytics built on a private information retrieval framework. Depends on D2.4

Publication-ready Philosophy of the Internet

Due to discussion with NEXTLEAP and a to-be-chosen publisher (one that should enable 'green' access), the book on the Philosophy of the Internet should by the end of the project be publication-ready.

– Draft of Philosophy of the Internet and web hermeneutics book

This will list chapters and general philosophical theses, to be discussed among the NEXTLEAP project partners. The history of the Internet and Web section should be completed by then.

Identifying communities, Use cases, Development flows

This deliverable will select the projects (including but not limited to other CAPS projects) where we aim to integrate the decentralized protocols, describe accordingly their various use cases for these protocols, and outline development guidelines and roles within the development and validation processes.

Yearly Technical and Dissemination Assessment 2

Second yearly update on technical progress and dissemination, focus on the privacy-preserving messaging use-case. Technical progress and dissemination reports will be delivered yearly and the dissemination plan will be updated if necessary. It will include all presentations, papers, videos, and all other outreach material to be archived - as well as links to any running code, demos, and in-depth technical analysis of the primary challenges and next steps. This will include the advise of the advisory board and an updated communications strategy that takes into account whether the previous technical and dissemination objectives were met or not, and how they can be achieved in the next period. Dissemination and technical progress in each of the appointed sectors will be tracked against objectives and goals.

Privacy Preserving Messaging Scalability Simulations

Simulation-based evaluation showing the scalability of NEXTLEAP private messaging protocols, with a key focus on quality of performance in comparison to centralized systems, in terms of properties like decentralization, privacy, security, or anonymity.

Dissemination Plan

A dissemination plan will be outlined, where dissemination activities via various channels will be planned as described in Task 2.1. The advisory board will be notified for input. The dissemination plan will also set objectives for each of the target audiences and develop a communication strategy tailored to the audience. Each of the target areas of outreach will have a champion from the Advisory Board.

– Principles of Decentralized Internet Governance

The principles of internet governance will be explored using the standpoint of science technology studies, with a focus on how to improve citizen participation and decentralization, as well as “fundamental rights” inspired by Berners-Lee's concept of a “magna carta” for the Web.

Initial Decentralization Case-studies

This list of case-studies will be an initial list of up to 30 communities that could be investigated with ethnographic and social scientific methods. These communities will include ideally the open-source projects that will implement the NEXTLEAP protocols and existing CAPS projects.

Finalized Decentralized Case-studies

The final analysis completed over the communities, including understanding the impact of any new protocols from NEXTLEAP into these communities.

Preliminary Education Plan and Draft Net Rights

In this deliverable the first version of education plan will be presented with topics and speakers on the philosophy of collective intelligence, Net Rights, the 'magna carta' for the Web, user privacy and encryption, contributive categorization, and more. It will be aligned with a seminar series focussed on a unified internet science around digital studies, rights, and protocols as well as an in-face summer school. A draft list of net rights will be selected for crowd-sourcing support.

Exploitation Plan for Decentralization Sustainability Models

Final update of the exploitation plan that takes into account first and foremost the long-term sustainability of decentralized Internet eco-systems. A focus will exist on commons-based non-market solutions and other metrics outside of profit, although the potential for profit-making enterprises, public-private partnerships, and the “privacy market” will also be assessed. This will be presented and a list of exploitation activities performed during the last year of the project will be reported.

Formal Modelling of Federated Identity

Formal definitions of decentralization, privacy, security, and anonymity properties will be developed and proven using automatic proof-proving on the federated identity protocol. Results will be validated against open-source code. Depends on D2.2.

Yearly Technical and Dissemination Assessment 3

Third yearly update on technical progress and dissemination, focus on the secure address book use-case. Technical progress and dissemination reports will be delivered yearly and the dissemination plan will be updated if necessary. It will include all presentations, papers, videos, and all other outreach material to be archived - as well as links to any running code, demos, and in-depth technical analysis of the primary challenges and next steps. This will include the advise of the advisory board and an updated communications strategy that takes into account whether the previous technical and dissemination objectives were met or not, and how they can be achieved in the next period. Dissemination and technical progress in each of the appointed sectors will be tracked against objectives and goals.

Policy Recommendations for Decentralized Systems

This deliverable describes in a more 'easy-to-understand' language on a high-level the results on the previous deliverables on formal methods and simulations and so provides recommendations on a policy level for those wishing to support decentralization within an institutional framework in order to achieve data sovereignty.

Internet Science Vocabulary and Key Questions

A list of key questions facing decentralized systems and initial agreed-upon common interdisciplinary vocabulary terms based on Internet Science.

Review 1 Assessment

This deliverable will review and assess the activities, results, and progress of the first review period. This will provide a basis for moving into the second review period and examine where the consortium was successful and where improvements are needed for the following review period. This deliverable will focus on assessing the progress made on the sociological case studies for decentralization and the secure address-book.

Standardization Report

The standardization-related efforts and achievements will be collected in this report, with a focus on federated identity, secure asynchronous messaging (email), synchronous messaging, and privacy-enhanced crowd-sourcing for collective intelligence via privacy-enhanced cloud analytics. The state of the standardization of each of these deliverables and their uptake by both grassroots-activists, governments, and industry will be assessed.

Scalability Simulations for Federated Identity

Simulation-based evaluation showing the scalability of NEXTLEAP federated identity protocols in terms of properties like decentralization, privacy, security, or anonymity.

Privacy Preserving Messaging Formal Modelling

Models of messaging protocols from WP2 with respect to a number of possible primitives for properties related to decentralization, privacy, security, and anonymity.

Complete Education Report and Finalized Net Rights

We will update D6.4 with exploitation activities already performed and results from the online categorization and participatory contributions in the seminar series. The list of net rights, based on crowd-sourced support, will be finalized.

Privacy-enhanced Analytics for Wisdom of the Crowds Open Source Module

A module producing code for private information retrieval for crowd-sourcing analytics will be produced. Since the module will be used primarily to ask questions of users, a “lean design” round will not be needed proof-proving results.

Releasing Initial Prototypes

Initial prototypes for protocols for identity and privacy-preserving are released to the public and communicated to previously identified communities.

Privacy-Preserving End-to-End Encrypted Messaging

Two protocols, with an upgrade path, for both secure and privacy-preserving end-to-end encrypted synchronous and asynchronous messaging across decentralized systems. A revised federated secure identity protocol may be included based on feedback.

Federated Secure Identity Protocol

An initial design of a federated identity system that protects the user's social graph using a secure address-book and associates an identity with key material across different systems in a privacy-preserving manner.

Privacy-Preserving Analytics for Wisdom of Crowds

A protocol for privacy-preserving analytics that allow collective intelligence tasks based on machine-learning to be accomplished over end-to-end encrypted and decentralized systems.

Validated modules for Federated Identity and Privacy-Preserving End-to-End Encrypted Messaging

Based on feedback and user-experience “lean design” rounds prototypes with the selected user-bases will be refactored and improved to the point of being ready for integration with real-life projects.

Public Web Page

A public webpage, including a repository of all videos, contributions, seminars, and will be created and updated throughout the duration of the project.

Veröffentlichungen

LEAP: A next-generation client VPN and encrypted email provider

Autoren: Sparrow, Elijah; Halpin, Harry; Kaneko, Kali; Pollan, Ruben
Veröffentlicht in: Proceedings of the Cryptography and Applied Network Security Conference, Ausgabe 6, 2016
Herausgeber: Springer
DOI: 10.1007/978-3-319-48965-0_11

Automated Verification for Secure Messaging Protocols and Their Implementations: A Symbolic and Computational Approach

Autoren: Nadim Kobeissi, Karthikeyan Bhargavan, Bruno Blanchet
Veröffentlicht in: 2017 IEEE European Symposium on Security and Privacy (EuroS&P), Ausgabe 2017, 2017, Seite(n) 435-450, ISBN 978-1-5090-5762-7
Herausgeber: IEEE
DOI: 10.1109/EuroSP.2017.38

End-to-End Encrypted Messaging Protocols: An Overview

Autoren: Ksenia Ermoshina, Francesca Musiani, Harry Halpin
Veröffentlicht in: Proceedings of the Internet Science Conference, Ausgabe 2016, 2016, Seite(n) 244-254
Herausgeber: Springer International Publishing
DOI: 10.1007/978-3-319-45982-0_22

On the (In)security of SNARKs in the Presence of Oracles

Autoren: Fiore, Dario; Nitulescu, Anca
Veröffentlicht in: TCC 2016-B - Fourteenth IACR Theory of Cryptography Conference, Ausgabe 7, 2016, Seite(n) 138-144
Herausgeber: Springer
DOI: 10.1007/978-3-662-53641-4_5

UnlimitID - Privacy-Preserving Federated Identity Management using Algebraic MACs

Autoren: Marios Isaakidis, Harry Halpin, George Danezis
Veröffentlicht in: Proceedings of the 2016 ACM on Workshop on Privacy in the Electronic Society - WPES'16, Ausgabe 2016, 2016, Seite(n) 139-142, ISBN 9781-450345699
Herausgeber: ACM Press
DOI: 10.1145/2994620.2994637

The Responsibility of Open Standards in the Era of Surveillance

Autoren: Halpin, Harry
Veröffentlicht in: Proceedings of Hot Topics in Privacy Enhancing Technolgies, Ausgabe 10, 2016, Seite(n) https://www.petsymposium.org/2016/hotpets.php
Herausgeber: Online

Security Analysis of the W3C Web Cryptography API

Autoren: Kelsey Cairns, Harry Halpin, Graham Steel
Veröffentlicht in: Proceedings of the Security Standardisation Research Conference, Ausgabe 2016, 2016, Seite(n) 112-140
Herausgeber: Springer International Publishing
DOI: 10.1007/978-3-319-49100-4_5

Formal verification of the W3C web authentication protocol

Autoren: Iness Ben Guirat, Harry Halpin
Veröffentlicht in: Proceedings of the 5th Annual Symposium and Bootcamp on Hot Topics in the Science of Security - HoTSoS '18, Ausgabe 6, 2018, Seite(n) 1-10, ISBN 9781-450364553
Herausgeber: ACM Press
DOI: 10.1145/3190619.3190640

ClaimChain - Improving the Security and Privacy of In-band Key Distribution for Messaging

Autoren: Bogdan Kulynych, Wouter Lueks, Marios Isaakidis, George Danezis, Carmela Troncoso
Veröffentlicht in: Proceedings of the 2018 Workshop on Privacy in the Electronic Society - WPES'18, Ausgabe 2018, 2018, Seite(n) 86-103, ISBN 9781-450359894
Herausgeber: ACM Press
DOI: 10.1145/3267323.3268947

The decentralization of knowledge: How Carnap and Heidegger influenced the Web

Autoren: Harry Halpin, Alexandre Monnin
Veröffentlicht in: First Monday, Ausgabe 21/12, 2016, ISSN 1396-0466
Herausgeber: Munksgaard International Publishers
DOI: 10.5210/fm.v21i12.7109

Systematizing Decentralization and Privacy: Lessons from 15 Years of Research and Deployments

Autoren: Carmela Troncoso, Marios Isaakidis, George Danezis, Harry Halpin
Veröffentlicht in: Proceedings on Privacy Enhancing Technologies, Ausgabe 2017/4, 2017, Seite(n) 404-426, ISSN 2299-0984
Herausgeber: DeGruyter Press
DOI: 10.1515/popets-2017-0056

What is a Good Secure Messaging Tool? The EFF Secure Messaging Scorecard and the Shaping of Digital (Usable) Security

Autoren: Francesca Musiani, Ksenia Ermoshina
Veröffentlicht in: Westminster Papers in Communication and Culture, Ausgabe 12/3, 2017, Seite(n) 51-71, ISSN 1744-6716
Herausgeber: University of Westminister
DOI: 10.16997/wpcc.265

Migrating Servers, Elusive Users: Reconfigurations of the Russian Internet in the Post-Snowden Era

Autoren: Ksenia Ermoshina, Francesca Musiani
Veröffentlicht in: Media and Communication, Ausgabe 5/1, 2017, Seite(n) 42, ISSN 2183-2439
Herausgeber: Cogitatio Press
DOI: 10.17645/mac.v5i1.816

Co-ordinating Developers and High-Risk Users of Privacy-Enhanced Secure Messaging Protocols

Autoren: Harry Halpin, Ksenia Ermoshina, Francesca Musiani
Veröffentlicht in: Security Standardisation Research - 4th International Conference, SSR 2018, Darmstadt, Germany, November 26-27, 2018, Proceedings, Ausgabe 11322, 2018, Seite(n) 56-75, ISBN 978-3-030-04761-0
Herausgeber: Springer International Publishing
DOI: 10.1007/978-3-030-04762-7_4

The Crisis of Standardizing DRM: The Case of W3C Encrypted Media Extensions

Autoren: Harry Halpin
Veröffentlicht in: Security, Privacy, and Applied Cryptography Engineering, Ausgabe 10662, 2017, Seite(n) 10-29, ISBN 978-3-319-71500-1
Herausgeber: Springer International Publishing
DOI: 10.1007/978-3-319-71501-8_2

The Neganthropocene

Autoren: Bernard Stiegler
Veröffentlicht in: Critical Climate Chaos, 2018, Seite(n) 349, ISBN 978-1-78542-049-8
Herausgeber: Open Humanities Press

Suche nach OpenAIRE-Daten ...

Bei der Suche nach OpenAIRE-Daten ist ein Fehler aufgetreten

Es liegen keine Ergebnisse vor