Input on privacy goal
Volker Krause
vkrause at kde.org
Mon Jan 22 18:14:27 GMT 2018
On Monday, 22 January 2018 13:25:55 CET Sebastian Kügler wrote:
> On vrijdag 19 januari 2018 15:30:25 CET Volker Krause wrote:
> > On Friday, 19 January 2018 14:49:58 CET Sebastian Kügler wrote:
> > > I'd like to collect some more input from the wider KDE community about
> > > our
> > > privacy goal for the next years. If you're unsure what I'm talking
> > > about,
> > > please have a look at
> > > https://vizzzion.org/blog/2017/11/kdes-goal-privacy/
> >
> > Here are some thoughts on threat models for this, as a possible way to
> > better capture what we want to achieve.
>
> [...]
>
> excellent! I've added these threat models to the phabricator task at
> https:// phabricator.kde.org/T7050
>
> > What else? Which of those do we want to address? Do you think that's a
> > useful approach to guide/validate our work?
>
> This is something I want to direct at the community. We really need to get
> out of the mindset of sitting on our hands and waiting for others to start
> moving. This goal is not something that can be driven by just a few people,
> it needs a coherent movement by many of us. In that sense, there must be
> more input from people especially regarding specific plans, and if there
> isn't, we're collecting a whole lot of useful academic and probably
> technically sound opinions and ideas which end up bearing little practical
> impact.
>
> So, can more people please share their plans, even if small, that impact
> privacy in KDE software?
Sure, I have specific plans too, I just wanted something to evaluate them
against first :)
On-going work:
* Investigate what's possible regarding a free alternative to the digital
travel assistance services like Google Now.
- extracting reservation information from booking confirmation emails: to make
their life easier Google is pushing a structured data standard there, which we
can use as well. We have flights, train trips and hotel bookings implemented
for this. We also have a fallback extractor mechanism for providers not
supporting this.
- augmenting itineraries with static information (such as the geo position or
time zones of the involved airports/stations): implemented for airports based
on compiled-in Wikidata data (ie. fully offline)
- augmenting with dynamic information (flight delays etc): no implementation
yet, there is no free source for this data, but some providers (e.g. DB or LH)
offer cost-free REST APIs that might be usable.
The code is in a KMail plugin right now (as the booking email is the entry
point), but besides adding your trip to your calendar with correct timezone
data and showing you the involved stops on a map it can't do much yet.
Lots of possible integration points of course (navigation to/from the airport
using Marble and/or PublicTransport, a mobile itinerary and boarding pass
management app, feeding the data into Mycroft, etc).
https://cgit.kde.org/kdepim-addons.git/tree/plugins/messageviewer/
bodypartformatter/semantic
https://cgit.kde.org/kdepim-addons.git/tree/plugins/messageviewer/
bodypartformatter/pkpass
This is addressing one tiny aspect of threat 3.
* The telemetry policy is still waiting for a final decision on how to resolve
the Kexi exception issue.
Plans:
I'd like to look into better tools to verify our use of network connections
and transport encryption. Ie. something that helps us to easily find our own
bugs rather than find software that tries to evade detection.
- short and low-frequent connections (such as telemetry ones) should be
detectable and not drown in e.g. the video streaming data
- what data am I leaking by DNS queries?
- are all connections encrypted?
tcpdump/wireshark produce way too much data and overhead, the eBPF-based TCP
connection tracking example of the bcc tools looks very promising (and has
found a few issues on a first test in the past), but for a long-time recording
it's still missing aggregation, PID resolution, correlation with DNS queries,
etc. Should be fairly straightforward to implement though.
- for encrypted connections, are we using the best possible cipher, and do we
properly check the certificate validity? Essentially a client-side counter-
part to server scanners like https://www.ssllabs.com/ssltest/.
This looks a bit more tricky, I have no concrete idea yet about how to
approach that.
My suspicion is that those two tools would find the occasional accidental
http:// connection, but also show some shortcomings in our network stacks
regarding things like CAA or encrypted DNS that we need to address deeper down
in the stack.
This would help to address aspects of threat 1 and 4.
Privacy is also a topic for the KDE PIM Sprint, see https://marc.info/?l=kde-pim&m=151645518010920&w=2 for some concrete plans/proposals. I'd expect that
topics like Tor or VPN support would need to be addressed on a wider scope
than just PIM though.
Regards,
Volker
-------------- next part --------------
A non-text attachment was scrubbed...
Name: signature.asc
Type: application/pgp-signature
Size: 195 bytes
Desc: This is a digitally signed message part.
URL: <http://mail.kde.org/pipermail/kde-community/attachments/20180122/fb19a9e2/attachment.sig>
More information about the kde-community
mailing list