wiki.status.im/docs/proposals/contact-sharing.md

60 lines
2.4 KiB
Markdown
Raw Blame History

This file contains invisible Unicode characters

This file contains invisible Unicode characters that are indistinguishable to humans but may be processed differently by a computer. If you think that this is intentional, you can safely ignore this warning. Use the Escape button to reveal them.

This file contains Unicode characters that might be confused with other characters. If you think that this is intentional, you can safely ignore this warning. Use the Escape button to reveal them.

# Contact Sharing
basic idea is to hash the pair of phone numbers (me, other) so that there are many collisions and then publish this (plausible deniable, because of collisions). and the contact your friend out of band if there is a hash that could be a match (which it is most likely not).
General problem:
 - Data is readable by anyone
 - The problem is not so much, that the server must not learn the contacts, but  that
     - no one must learn them, while all data is public
Alice announces its connection with Bob by:
- calculating H(A_phone_number + B_phone_number)
- applying costly scrypt or PBKDF2 hashing to derive H'
- truncating H to a low number of bits H'', so that collisions are likely
- publicly registers its unique pubkey_alice_bob for  H''
Notes so far:
- rainbow tables of 10^10^2 size (i.e. all phone number combinations) are impractical
- calculating all combinations is prohibitively costly
- collisions of H allow plausible deniability
- Problem: an adversary can impersonate Alice, need spam protection (PoW) here
Bob wants to know if Alice is participating in the network:
- Bob calculates H(A_phone_number + B_phone_number)
- Bob generates H and H'
- for all matching entries for H (including the one generated by Alice)
 - Bob encrypts truncated H(mobile_bob) for pubkey_alice_bob
 - and sends the message to Alice inbox on the server
 - Alice loads and decrypts the message
 - Alice can match  truncated H(mobile_bob) in hear contact list with a very low false positive rate
 - if Alice thinks she knows Bob, she might reply out of band
Notes:
- Bob can still plausibly deny that he knows Alice
- Bob can still plausibly deny that he participates in the system
- add some proof of work or similar for spam protection
This is hard against:
- Leaking users contact lists
- An adversary with a hypothesis about a connection can learn bobs phone number though
Limitations:
- New users (Bob) wont see others directly
- Existing users (Alice) need to invite Bob
- Quite some computation and communication overhead
 - ~ 500 x 10 messages send
 - 2x key pairs to remember for each
The Difficulty Of Private Contact Discovery
https://whispersystems.org/blog/contact-discovery/
https://news.ycombinator.com/item?id=7007554
https://news.ycombinator.com/item?id=11288169
https://news.ycombinator.com/item?id=11289223
Lame solution which is prone to rainbow table attacks.
https://github.com/SilentCircle/contact-discovery