You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
This is a break off from #41, specifically focused on the the requirements for using unlinkable tokens to prevent the submission of unauthorized (fraudulent) click reports. Summarizing the requirements from that thread:
Websites have the ability to participate in a protocol which can provide proof that they can trust the reports they later receive.
The reports sent from the browser (including any proof provided by /1) should be unlinkable to individual events.
Websites should only sign tokens when it's linked to a validated session/click.
The design should be as simple as possible:
a. Simple for website developers to adopt and use
b. Relatively easy for privacy experts to analyze
c. To some extent, easy for browser engineers to implement.
d. Avoid a solution that only works for websites with a large engineering team.
Other remaining open questions:
Does the unlinkable token need to be bound to the trigger_site as well as the source_site?
How often do keys need to be rotated?What is expected to happen if a client detects a key mismatch upon event upload?
What happens if the client's chosen nonce is not random? Does the solution depend on this being random, and if so, what assurance does the server have that the client generated this value honestly?
Given that there is limited time in the F2F, it seems useful to see if we can answer some of these questions async and spend that limited F2F time for the most difficult questions. cc @johnwilander, @csharrison, and @chris-wood, I've pulled these requirements and questions from your comments on #41.
The text was updated successfully, but these errors were encountered:
For question 7, unless I am misunderstanding something about the protocol, I believe that this needs to be random. The flow, as I understand the blind signature process is:
Client: Generate random nonce
Client: Blind(nonce), send to server
Server: Sign(Blind(nonce)), send to client
Client: Unblind(Sign(Blind(nonce)) -> Sign(nonce)
Client: wait for report, send with (Sign(nonce), nonce) to server
Server: Validate Sign(nonce) is a valid signature of nonce.
If the nonce is predictable, then the server would be able to effectively guess the nonce in Step 3, and if the server knows the nonce in Step 3, they can link a report sent in Step 5 back to the original signing request.
Please let me know if I'm potentially misunderstanding this. This is essentially the clarification/correction I'm proposing in #81.
This is a break off from #41, specifically focused on the the requirements for using unlinkable tokens to prevent the submission of unauthorized (fraudulent) click reports. Summarizing the requirements from that thread:
a. Simple for website developers to adopt and use
b. Relatively easy for privacy experts to analyze
c. To some extent, easy for browser engineers to implement.
d. Avoid a solution that only works for websites with a large engineering team.
Other remaining open questions:
trigger_site
as well as thesource_site
?Given that there is limited time in the F2F, it seems useful to see if we can answer some of these questions async and spend that limited F2F time for the most difficult questions. cc @johnwilander, @csharrison, and @chris-wood, I've pulled these requirements and questions from your comments on #41.
The text was updated successfully, but these errors were encountered: