Don't Ask, Don't Tell - The Virtues of Privacy By Design

60
DON'T ASK, DON'T TELL THE VIRTUES OF PRIVACY BY DESIGN Eleanor McHugh

Transcript of Don't Ask, Don't Tell - The Virtues of Privacy By Design

Page 1: Don't Ask, Don't Tell - The Virtues of Privacy By Design

DON'T ASK, DON'T TELL THE VIRTUES OF PRIVACY BY DESIGN

Eleanor McHugh

Page 2: Don't Ask, Don't Tell - The Virtues of Privacy By Design

Cryptographer Security Architect

Physicist Privacy Architecture

1998 PKI

elliptic curves

satellite PSN

1999 π-calculus VM

2000 control networks

2001 mobile identity

secure documents

2003 ENUM

2006 dotTel

hybrid encryption

2007 encrypted DNS

2010 concurrent VM

2011 national eID

2012 encrypted SQL

privacy by design

2014 uPass

2017 Identity Lab

Page 3: Don't Ask, Don't Tell - The Virtues of Privacy By Design

Barely a day passes without news of another high-profile data breach or mass identity

fraud and even household names have fallen foul to criminal hackers.

In response to the public outcry

ambitious regulations have been introduced such as the European Union’s GDPR and the Payment Card Industry’s PSD2 which aim to safe-guard privacy and reduce security breaches.

You already understand how you need to use identity to service the needs of your business and customers, the question is how do you adapt existing solutions to comply with these regulations?

The GDPR will take effect for all UK businesses on 25 May 2018 and reports are already circling of top-tier law firms preparing high=profile test cases for that date with the first rulings likely to be delivered in October 2018. Big name brands will be amongst those feeling the

regulation’s bite.

Whenever your organisation processes personal data for individuals living in the EU the GDPR rules and restrictions apply even if that processing happens in another jurisdiction.

Personal data encompasses

everything relating to genetic, mental, cultural, economic, and social identifiers.

Whenever your organisation processes any personal data you must have explicit consent from its subject or their legal guardian and you may be called upon to prove their consent in a court of law.

If this weren’t onerous enough, not only can the subjects of processing demand all

personal data held on them at any time, delivered in a portable data format, they also have the right to be forgotten.

The implications of these guaranteed rights for existing IT systems are far-reaching.

Day-to-day operations must be brought under internal governance procedures proving compliance to standards such as ISO 27001 and BS 10012.

More significantly software development processes must embrace privacy by design principles from their very earliest stages. A generation of developers will need training and many industry practices must change.

privacy by demand

"If your organisation can't demonstrate that good data protection

is a cornerstone of your business policy and practices, you're leaving

your organisation open to enforcement action that can damage

both public reputation and bank balance."

— Elizabeth Denham, Information Commissioner

Barely a day passes without news of another high-profile data breach or mass identity

fraud and even household names have fallen foul to criminal hackers.

In response to the public outcry

ambitious regulations have been introduced such as the European Union’s GDPR and the Payment Card Industry’s PSD2 which aim to safe-guard privacy and reduce security breaches.

You already understand how you need to use identity to service the needs of your business and customers, the question is how do you adapt existing solutions to comply with these regulations?

The GDPR will take effect for all UK businesses on 25 May 2018 and reports are already circling of top-tier law firms preparing high=profile test cases for that date with the first rulings likely to be delivered in October 2018. Big name brands will be amongst those feeling the

regulation’s bite.

Whenever your organisation processes personal data for individuals living in the EU the GDPR rules and restrictions apply even if that processing happens in another jurisdiction.

Personal data encompasses

everything relating to genetic, mental, cultural, economic, and social identifiers.

Whenever your organisation processes any personal data you must have explicit consent from its subject or their legal guardian and you may be called upon to prove their consent in a court of law.

If this weren’t onerous enough, not only can the subjects of processing demand all

personal data held on them at any time, delivered in a portable data format, they also have the right to be forgotten.

The implications of these guaranteed rights for existing IT systems are far-reaching.

Day-to-day operations must be brought under internal governance procedures proving compliance to standards such as ISO 27001 and BS 10012.

More significantly software development processes must embrace privacy by design principles from their very earliest stages. A generation of developers will need training and many industry practices must change.

privacy by demand

"If your organisation can't demonstrate that good data protection

is a cornerstone of your business policy and practices, you're leaving

your organisation open to enforcement action that can damage

both public reputation and bank balance."

— Elizabeth Denham, Information Commissioner

Barely a day passes without news of another high-profile data breach or mass identity

fraud and even household names have fallen foul to criminal hackers.

In response to the public outcry

ambitious regulations have been introduced such as the European Union’s GDPR and the Payment Card Industry’s PSD2 which aim to safe-guard privacy and reduce security breaches.

You already understand how you need to use identity to service the needs of your business and customers, the question is how do you adapt existing solutions to comply with these regulations?

The GDPR will take effect for all UK businesses on 25 May 2018 and reports are already circling of top-tier law firms preparing high=profile test cases for that date with the first rulings likely to be delivered in October 2018. Big name brands will be amongst those feeling the

regulation’s bite.

Whenever your organisation processes personal data for individuals living in the EU the GDPR rules and restrictions apply even if that processing happens in another jurisdiction.

Personal data encompasses

everything relating to genetic, mental, cultural, economic, and social identifiers.

Whenever your organisation processes any personal data you must have explicit consent from its subject or their legal guardian and you may be called upon to prove their consent in a court of law.

If this weren’t onerous enough, not only can the subjects of processing demand all

personal data held on them at any time, delivered in a portable data format, they also have the right to be forgotten.

The implications of these guaranteed rights for existing IT systems are far-reaching.

Day-to-day operations must be brought under internal governance procedures proving compliance to standards such as ISO 27001 and BS 10012.

More significantly software development processes must embrace privacy by design principles from their very earliest stages. A generation of developers will need training and many industry practices must change.

privacy by demand

"If your organisation can't demonstrate that good data protection

is a cornerstone of your business policy and practices, you're leaving

your organisation open to enforcement action that can damage

both public reputation and bank balance."

— Elizabeth Denham, Information Commissioner

Page 4: Don't Ask, Don't Tell - The Virtues of Privacy By Design

Barely a day passes without news of another high-profile data breach or mass identity

fraud and even household names have fallen foul to criminal hackers.

In response to the public outcry

ambitious regulations have been introduced such as the European Union’s GDPR and the Payment Card Industry’s PSD2 which aim to safe-guard privacy and reduce security breaches.

You already understand how you need to use identity to service the needs of your business and customers, the question is how do you adapt existing solutions to comply with these regulations?

The GDPR will take effect for all UK businesses on 25 May 2018 and reports are already circling of top-tier law firms preparing high=profile test cases for that date with the first rulings likely to be delivered in October 2018. Big name brands will be amongst those feeling the

regulation’s bite.

Whenever your organisation processes personal data for individuals living in the EU the GDPR rules and restrictions apply even if that processing happens in another jurisdiction.

Personal data encompasses

everything relating to genetic, mental, cultural, economic, and social identifiers.

Whenever your organisation processes any personal data you must have explicit consent from its subject or their legal guardian and you may be called upon to prove their consent in a court of law.

If this weren’t onerous enough, not only can the subjects of processing demand all

personal data held on them at any time, delivered in a portable data format, they also have the right to be forgotten.

The implications of these guaranteed rights for existing IT systems are far-reaching.

Day-to-day operations must be brought under internal governance procedures proving compliance to standards such as ISO 27001 and BS 10012.

More significantly software development processes must embrace privacy by design principles from their very earliest stages. A generation of developers will need training and many industry practices must change.

privacy by demand

"If your organisation can't demonstrate that good data protection

is a cornerstone of your business policy and practices, you're leaving

your organisation open to enforcement action that can damage

both public reputation and bank balance."

— Elizabeth Denham, Information Commissioner

Page 5: Don't Ask, Don't Tell - The Virtues of Privacy By Design
Page 6: Don't Ask, Don't Tell - The Virtues of Privacy By Design
Page 7: Don't Ask, Don't Tell - The Virtues of Privacy By Design
Page 8: Don't Ask, Don't Tell - The Virtues of Privacy By Design

8

Page 9: Don't Ask, Don't Tell - The Virtues of Privacy By Design

PRIVACY STORIES

Page 10: Don't Ask, Don't Tell - The Virtues of Privacy By Design

as an aggressive marketeerI want to access your visitor data

to guess who might pay for miracle product X

don’t make my life difficult if it affects sales

I’m higher up the food chain than you!

insider threat

Page 11: Don't Ask, Don't Tell - The Virtues of Privacy By Design

as a disgruntled employeeI want to access your service

to make you pay for the pain I’m feeling

I’ve had privileged access in the past

and you’re too dumb to have cancelled it

insider threat

Page 12: Don't Ask, Don't Tell - The Virtues of Privacy By Design

as a script kiddieI want to access your service

because it’s a rush to break into your stuff

I’ve lots of different scripts to play with

coz all lolz belong to us

external threat

Page 13: Don't Ask, Don't Tell - The Virtues of Privacy By Design

as an online fraudsterI want to access your service

so I can steal credentials and data

if that’s hard I’ll move onto a fresh target

there’s always another sucker ripe for scamming

external threat

Page 14: Don't Ask, Don't Tell - The Virtues of Privacy By Design

as a malicious attackerI want to access your service

to monitor user behaviour and steal identities

I’m waaaay more skilled than your team

and I’m being paid for results

external threat

Page 15: Don't Ask, Don't Tell - The Virtues of Privacy By Design

as a system administrationI want to roll-back errors and monitor security breaches

so I can protect my users and my business from fraud or loss

but it’s okay if I can only see data relevant to a particular incident

so that I know the bare minimum about you or any other user

Page 16: Don't Ask, Don't Tell - The Virtues of Privacy By Design

as a law enforcement officerI want to perform lawful interception queries

so I can catch criminals and terrorists

but it’s okay if you control my access and require court orders

so that criminal investigate is never a cover for political oppression

Page 17: Don't Ask, Don't Tell - The Virtues of Privacy By Design

as a regulatorI want to ensure this service complies with all applicable rules

so I can confirm that the service is trustworthy and legitimate

but it’s okay if you restrict my access to how you operate this service

so that I know neither your users nor their interactions

Page 18: Don't Ask, Don't Tell - The Virtues of Privacy By Design

SOME BASIC RULES➤ users are users because they

give their informed consent

➤ you should know your users well enough to aid them

➤ but your users own their identities not you

➤ secure all transports and storage where identifying user data exists

➤ and ensure your users know what you know about them and why you've collected that information

Page 19: Don't Ask, Don't Tell - The Virtues of Privacy By Design

DIGITAL IDENTITY

Page 20: Don't Ask, Don't Tell - The Virtues of Privacy By Design

PRIVACY➤ digital data is easily duplicated

➤ when this data moves or is stored it generates metadata

➤ metadata is also digital data

➤ processing data or metadata can reveal identity

➤ so a system which respects privacy needs to know as little as possible about

➤ the data it processes

➤ the metadata it produces

Page 21: Don't Ask, Don't Tell - The Virtues of Privacy By Design

ID CARD➤ photo for visual comparison

➤ hologram to assert validity

➤ date of birth reveals age

➤ serial number allows this card to be recorded and tracked

➤ physical security increases cost of counterfeiting

➤ smart card features allow use with digital scanners

➤ not government issued

Page 22: Don't Ask, Don't Tell - The Virtues of Privacy By Design

BIOMETRICS➤ if it can be measured and tends

towards uniqueness…

➤ faces

➤ fingerprints

➤ iris patterns

➤ retina patterns

➤ genetic fingerprints

➤ electrocardiogram

➤ electroencephalogram

➤ it can also be counterfeited!

Page 23: Don't Ask, Don't Tell - The Virtues of Privacy By Design

LIVENESS➤ digital data is easily copied

➤ replay attacks repeat a previously captured biometric

➤ spoofing creates a facsimile of a biometric capable of fooling a digital system

➤ proofs

➤ is data being captured now

➤ is it from a genuine source

➤ has it been tampered with

➤ is it likely to be unique

Page 24: Don't Ask, Don't Tell - The Virtues of Privacy By Design

ATTRIBUTES➤ attributes are discrete facts

➤ dark hair

➤ wears black

➤ professional cryptographer

➤ fragments of an identity

➤ an identity may have none

➤ or some may be imprecise

➤ even as a complete set they may not be unique

➤ anonymity is the lack of attributes

Page 25: Don't Ask, Don't Tell - The Virtues of Privacy By Design

UK LEGAL IDENTITY➤ birth certificate and gender

recognition certificate are the primary identity documents

➤ with either it's possible to get

➤ national insurance number

➤ NHS medical card

➤ passport

➤ name can be changed with a deed poll or a statutory declaration

➤ none of these documents include biometrics

Page 26: Don't Ask, Don't Tell - The Virtues of Privacy By Design

BAD BOOKKEEPINGit doesn't matter… right up until it does

Page 27: Don't Ask, Don't Tell - The Virtues of Privacy By Design

PROOF OF IDENTITY CHECKS➤ each exchange of identity comes

with proof that the exchange occurred

➤ proof engenders trust

➤ we anchor trust in information based on its provenance and its tamper-resistance

➤ we can also capture proof of why the exchange occurred

➤ we can record these proofs for future reference

➤ good bookkeeping is at the heart of all identity schemes

Page 28: Don't Ask, Don't Tell - The Virtues of Privacy By Design

TOOLS FOR

TRUST

Page 29: Don't Ask, Don't Tell - The Virtues of Privacy By Design

OBSCURITY➤ HMAC hashes are large numbers

computed from a set of data with cryptography

➤ any change to the set of data will result in a different HMAC value being calculated

➤ symmetric encryption allows two parties with the same key to communicate securely

➤ public key encryption keeps the decryption key secret

➤ hybrid encryption allows a symmetric key to be sent as data encrypted with a public key

Page 30: Don't Ask, Don't Tell - The Virtues of Privacy By Design

UNIQUENESS➤ a one-time pad is a single use

key for encrypting a message

➤ it provides a unique mapping between the encrypted content and the keys to generate and recover that content

➤ it provides perfect secrecy as there are no variant encrypted texts which can reveal elements of the keys

➤ one-time pads require key management which guarantees uniqueness and randomness

Page 32: Don't Ask, Don't Tell - The Virtues of Privacy By Design

IMMUTABILITY➤ singly-linked list are a popular

tool in computer science

➤ they allow several lists to share common head segments

➤ a hash chain extends this concept with computed hashes for each node and an optional signature to validate them

➤ alter one item in the chain and all subsequent hashes must be recalculated

Page 33: Don't Ask, Don't Tell - The Virtues of Privacy By Design

TRUST ARBITRATION➤ a contract is an agreement to do

something between two parties

➤ in Common Law this requires both intent and a demonstrable exchange of consideration

➤ a contract can be enforced by the courts

➤ trust relies on recognised authority and on witnesses

➤ the internet has no courts and machines lack intent

➤ so we need provable witnesses

Page 35: Don't Ask, Don't Tell - The Virtues of Privacy By Design

INTEGRITY➤ trees are similar to lists but

used to capture hierarchical structures and speed searches

➤ Merkle trees are trees built from hash chains

➤ adding to the tree creates a new root node whose hash proves the integrity of its links and terminal nodes

➤ building many overlapping trees ensures that changes to one tree invalidates other trees

Page 36: Don't Ask, Don't Tell - The Virtues of Privacy By Design

BLOCKCHAIN➤ Bitcoin uses a hash chain of

Merkle trees packaged as blocks of information to provide nonrepudiation

➤ the hash chain can be forked deliberately or as a result of network partitioning

➤ its consensus algorithm is based on proof of work

➤ so if the forks are merged the shorter fork is discarded

➤ forks can overcome this by using sidechains for exchange

Page 37: Don't Ask, Don't Tell - The Virtues of Privacy By Design

ROUTING➤ the internet comprises a

decentralised physical infrastructure

➤ most applications are built with a centralised client-server model which hides this reality

➤ servers act as trust anchors

➤ blockchain mining & etherium dApps are fully distributed

➤ lacking servers they require a consensus algorithms to agree a trusted reality

Page 38: Don't Ask, Don't Tell - The Virtues of Privacy By Design
Page 40: Don't Ask, Don't Tell - The Virtues of Privacy By Design

anon

ymity

pseudonymity

Page 41: Don't Ask, Don't Tell - The Virtues of Privacy By Design

anon

ymity

pseudonymity

Page 42: Don't Ask, Don't Tell - The Virtues of Privacy By Design

anon

ymity

pseudonymity

Page 43: Don't Ask, Don't Tell - The Virtues of Privacy By Design

anon

ymity

pseudonymity

Page 44: Don't Ask, Don't Tell - The Virtues of Privacy By Design

anon

ymity

pseudonymity

Page 45: Don't Ask, Don't Tell - The Virtues of Privacy By Design

anon

ymity

pseudonymity

Page 46: Don't Ask, Don't Tell - The Virtues of Privacy By Design

CASE STUDY: UPASS

Page 47: Don't Ask, Don't Tell - The Virtues of Privacy By Design

TO PROVE YOUR

AGEseeing is believing

Page 48: Don't Ask, Don't Tell - The Virtues of Privacy By Design

PRINCIPLES➤ embodies UK common law

understanding of identity

➤ supports true anonymity

➤ prevents mass surveillance

➤ reliable source of potentially unreliable information

➤ transactions are fast with minimal need for consensus

➤ can scale to a global system

➤ works on desktop, mobile & IoT platforms

Page 49: Don't Ask, Don't Tell - The Virtues of Privacy By Design

OVERVIEW➤ anchor document

➤ mobile device

➤ validation service

➤ secure store (proprietary)

➤ one-directional flows

➤ applications

➤ US 20160239653

➤ US 20160239657

➤ US 20160239658

Page 50: Don't Ask, Don't Tell - The Virtues of Privacy By Design

REGISTRATION➤ read anchor document

➤ capture selfie

➤ create profiles

➤ anonymous

➤ date of birth

➤ name

➤ nationality

➤ generate encryption keys

➤ record phone address

➤ issue profile credential

Page 51: Don't Ask, Don't Tell - The Virtues of Privacy By Design

TRANSACTIONS➤ a customer presents a profile

credential to a merchant

➤ merchant adds their credential

➤ the two credentials are sent to a validation server

➤ the validation server confirms the credentials are known

➤ it invalidates these and sends receipts directly to both transactees

➤ only the server knows delivery addresses & credentials

Page 52: Don't Ask, Don't Tell - The Virtues of Privacy By Design

PROFILES➤ a set of keys and their

associated values

➤ has a confidence value based on its provenance and usage

➤ is immutable and links to previous versions of itself

➤ has an associated selfie chain with photos of its subject

➤ anchored to a document or assigned by another profile

Page 53: Don't Ask, Don't Tell - The Virtues of Privacy By Design

CONFIDENCE➤ courts base judgements on

credibility of evidence

➤ a profile's associated selfie can be inspected by its recipient at the time the transaction takes place and compared with the presenter's face

➤ a profile's confidence value warns of a potentially untrustworthy source

➤ application US 20160241531

Page 54: Don't Ask, Don't Tell - The Virtues of Privacy By Design

RECEIPTS➤ receipts come in pairs

➤ each receipt has links to the relevant information about the other transactee

➤ these links to the profile presented and any previously assigned by the recipient

➤ they're encrypted with the recipient's published key

➤ and they contain a shared key which is unique to this transaction

Page 55: Don't Ask, Don't Tell - The Virtues of Privacy By Design

MASTER RECEIPTS➤ receipt pairs are recorded

opaquely as master receipts in the secure store

➤ a master receipt is encrypted with the transaction key

➤ the transaction key is never recorded in the secure store

➤ master receipts form a chain

➤ the index for this chain is calculated from the credentials used but these are only stored in the receipt pair

Page 56: Don't Ask, Don't Tell - The Virtues of Privacy By Design

BIOMETRIC LIVENESS➤ a biometric must be simple to

capture & tamper resistant

➤ pupillary response to a successive bright flashes of light has calculable properties

➤ eye movement hardened with a shared cryptographic secret unique to a particular device

➤ the server sets the parameters randomly and the device must produce expected responses

➤ application US 20170046583

FIG. 5D

time

Pupillary area

Constriction

δt

first pulse applied

second pulse applied

t1 t2

FIG. 4

D

SF_t

SF_(t_n)

FIG. 9

W

FIG. 8

W

W

FIG. 9

W

FIG. 8

W

W

104

120a

120b

120c

δt

time

Pupillary area

y

x

Pupil dilation

Liveness

Eye tracking

Enrolment

FIG. 11

S1102a

S1102b

S1104a

S1104b

S1106

S1108a

S1108b

S1112

S1110a

S1110b

130

Cv Cv’

PD params

ET params

Collect liveness detection data

S1107

1102a

1102b

PD results PD+ET sig

ET results PD+ET sig

PD+ET params+PD and ET server URIs

1101

PD results+ sig+URI

ET results+ sig+URI

Access control

214

Page 57: Don't Ask, Don't Tell - The Virtues of Privacy By Design

104

120a

120b

120c

δt

time

Pupillary area

y

x

Pupil dilation

Liveness

Eye tracking

Enrolment

FIG. 11

S1102a

S1102b

S1104a

S1104b

S1106

S1108a

S1108b

S1112

S1110a

S1110b

130

Cv Cv’

PD params

ET params

Collect liveness detection data

S1107

1102a

1102b

PD results PD+ET sig

ET results PD+ET sig

PD+ET params+PD and ET server URIs

1101

PD results+ sig+URI

ET results+ sig+URI

Access control

214

DEVICE LIVENESS➤ live biometric responses give us

unique values

➤ by controlling where and how these are delivered we can prove uniqueness of our current interaction

➤ and as a result we can prove the device is live

➤ as with a uPass transaction we use one-way messaging

➤ application US 20170048244

Page 58: Don't Ask, Don't Tell - The Virtues of Privacy By Design

WEB CONNECT+➤ sometimes we need to perform

transactions via an untrusted intermediary

➤ Man-in-the-Middle attacks

➤ by having a remote server use our device as a validator we can perform a transaction and give them access to a secure back channel

➤ now we can monitor & control the connection to our untrusted intermediary

➤ patent US 9,648,496

Page 59: Don't Ask, Don't Tell - The Virtues of Privacy By Design

ASSET TRACKING➤ the building blocks of uPass can

provide identity to things as well as people

➤ we can use this fact to create private identity spaces unique to a particular asset class such as event tickets

➤ this can be used to control how the asset changes hands

➤ patent US 9,519,796

➤ application

➤ US 20160350861

➤ US 20170169362

Page 60: Don't Ask, Don't Tell - The Virtues of Privacy By Design

DON'T ASK, DON'T TELL THE VIRTUES OF PRIVACY BY DESIGN

Eleanor McHugh