mirror of
https://github.com/DP-3T/documents.git
synced 2024-12-04 15:15:42 +01:00
clarified anonymous communication question
This commit is contained in:
parent
f22559112a
commit
f9c5ba5072
8
FAQ.md
8
FAQ.md
@ -98,11 +98,9 @@ protocol.
|
|||||||
|
|
||||||
### P5: Why not use mixnets or other anonymous communication systems to query the server?
|
### P5: Why not use mixnets or other anonymous communication systems to query the server?
|
||||||
|
|
||||||
Our design does not rely on anonymous communication systems to provide its
|
Our design uses a small amount of dummy messages to provide traffic analysis protection for uploads to the backend and epidemiologists with respect to network adversaries. The use of a mixnet, Tor or other anonymous system would in addition conceal the IP address of users submitting reports with respect to the backend.
|
||||||
privacy properties, it only uses a small amount of dummy messages to hide
|
|
||||||
uploads to the backend and epidemiologists.
|
|
||||||
|
|
||||||
We considered using an anonymous communication system to efficiently query the server. However, we decided against doing so for the following reasons:
|
We considered using an anonymous communication system. However, we decided against doing so for the following reasons:
|
||||||
1. Relying on any form of anonymous communication system increases the
|
1. Relying on any form of anonymous communication system increases the
|
||||||
complexity of the system. Both in terms of integrating anonymous
|
complexity of the system. Both in terms of integrating anonymous
|
||||||
communication into the app, as well as the server infrastructure needed to
|
communication into the app, as well as the server infrastructure needed to
|
||||||
@ -116,6 +114,8 @@ We considered using an anonymous communication system to efficiently query the s
|
|||||||
global passive adversary or not? How well does the system protect against
|
global passive adversary or not? How well does the system protect against
|
||||||
intersection attacks?
|
intersection attacks?
|
||||||
|
|
||||||
|
In future versions of the app, if an approppriate anonymous communication network appears, we may include the option of submitting data anonymously to the backend.
|
||||||
|
|
||||||
### P6: Why do infected people upload a seed (which enables recreating `EphIDs`) instead of their individual EphIDs ?
|
### P6: Why do infected people upload a seed (which enables recreating `EphIDs`) instead of their individual EphIDs ?
|
||||||
|
|
||||||
This is a choice that is made purely for performance reasons. It is much more
|
This is a choice that is made purely for performance reasons. It is much more
|
||||||
|
Loading…
Reference in New Issue
Block a user