Privacy by from Theory to Practice in the Context of COVID-19 Contact Tracing

Prof. Carmela Troncoso @carmelatroncoso https://spring.epfl.ch/

13.01.2020 Technology to help with 2 pandemic contention Carmela Troncoso Carmela . Manual tracing overwhelmed

. The need • A complement to notify users that have been exposed to COVID19 and they are at risk of infection

• In a timely, efficient, and scalable manner The constraints: 3 Security and Privacy Carmela Troncoso Carmela

. Protect from misuse (surveillance, manipulation, etc) • Purpose limitation by default

Seda Gurses, Carmela Troncoso, Claudia Diaz. .Computers, Privacy & Data Protection. 2011 The constraints: 4 Security and Privacy Carmela Troncoso Carmela

January 2021 The constraints: 5 Security and Privacy Carmela Troncoso Carmela The constraints: 6 Security and Privacy Carmela Troncoso Carmela . Protect health-related data . Protect from misuse (surveillance, manipulation, etc) • Purpose limitation by default • hide users identity, location, and behavior (social graph)

. Preserve system integrity • Prevent false alarms & Denial of Service

Seda Gurses, Carmela Troncoso, Claudia Diaz. Engineering Privacy by Design.Computers, Privacy & Data Protection. 2011 The “hidden” constraint 7 Reality Carmela Troncoso Carmela

. High scalability and reliability

. Design under time pressure! • Need fast, robust verification . KISS principle: Keep It Simple Stupid . Avoid new technologies or non-mainstream • Use existing infrastructure . BLE beacons

. Dependencies, dependencies, dependencies

Blagovesta Kostova, Seda Gürses, Carmela Troncoso. Privacy Engineering Meets Software Engineering. On the Challenges of Engineering Privacy By Design Apps Maintenance - - - Key: ideas

and support A collaborative Decentralization of matching operations for privacy and purpose limitation purpose and privacy for operations matching of Decentralization unlinkability for Cryptography devices by recorded broadcast/ beacons BLE (some members) (some 2020 March April 2020 2020 April May 2020 2020 May July/August 2020 2020 July/August June 2020 2020 June Since September September Since August/September 2020 2020 August/September – – – – Final version DP3T version Final GAEN is announced is GAEN Pilots EU apps EU Pilots Start DP3T Start – – CT Apps launching CT Apps Presence tracing Presence Immunity Certificates – (continued) (continued) Towards interoperability EU sprint Marathon Ironman

Carmela Troncoso 8 The system design 9

The theory… . The App creates a secret key (SK) and

from this key it derives random Troncoso Carmela identifiers (EphIDs) that it broadcasts via Bluetooth . Secret keys are rotated every day SKt+1=H(SKt)

. EphID1 || ... || EphIDn = PRG(PRF(SKt,“broadcast key”) )

Iu&^#&980 . A random identifier is used for a limited amount of time A . Without the key, no-one can link two identifiers

https://github.com/DP-3T/documents/blob/master/DP3T%20White%20Paper.pdf Reality 10 Use existing infrastructure Carmela Troncoso Carmela

. Battery and CPU usage • Limited round trips • Google and Apple must be involved

. Run in the background • Apple must be involved

. Compatibility Android - iOS • Google and Apple must be involved

. Google and Apple implement the protocol and the API • Implications on privacy engineering • Implications for epidemiology and exposure estimation (no time in this talk…) • Implications for privacy when internationalizing (no time in this talk…)

Blagovesta Kostova, Seda Gürses, Carmela Troncoso. Privacy Engineering Meets Software Engineering. On the Challenges of Engineering Privacy By Design 11 The system design . The App creates a secret every day (TEK) and from this key it derives The practice random identifiers (RPIs) that it

Google and Apple decide broadcasts via Bluetooth Troncoso Carmela . A random identifier is used for a limited amount of time . Without the key, no-one can link two identifiers time

Key Iu&^#&980 derivation AES function

RPI Metadata A Key TEK derivation AES function info

https://blog.google/documents/69/Exposure_Notification_-_Cryptography_Specification_v1.2.1.pdf The system design 13

Lyvdka((@

SEEN NUMBERS ... B Iu&^#&980 Kja&#^@hk ... Iu&^#&980

A SEEN NUMBERS ... Kja&#^@hk Lyvdka((@ ...

SEEN NUMBERS C ... Lyvdka((@ ... The system design 14

AC,Keys

A

AC The system design 15

Keys (from all positive users) You’ve been exposed to COVIDLyvdka((@-positive people. Take action SEEN NUMBERS ... B Iu&^#&980 Kja&#^@hk ...

A

C 16 The system design Only information that ever leaves the phone are the TEKs broadcasted during the contagious period.

Keys (from all positive users) You’ve been exposed No identity, no location, no to COVIDLyvdka((@-positive people. Take action information about others SEEN NUMBERS ... B Iu&^#&980 AC,Keys Kja&#^@hk ... No information available for Iu&^#&980 abuse

A SEEN NUMBERS ... System sunsets-by-design Kja&#^@hk Lyvdka((@ ...

SEEN NUMBERS C AC ... Lyvdka((@ ... The system design 17

Societal impact Health system

Law

App

Mobile Epidemi OS ology Authorization mechanism 18 Theory

. Crucial for security: only true positives can upload Troncoso Carmela • Desired properties: . Privacy . Hard to delegate

• Crypto FTW! commit to content in authorization token!

A

AC

Secure Upload Authorisation for Digital proximity tracing. DP-3T project. https://github.com/DP-3T/documents/blob/master/DP3T%20-%20Upload%20Authorisation%20Analysis%20and%20Guidelines.pdf Authorization mechanism 19 Practice

. Crucial for security: only true positives can upload Troncoso Carmela • Desired properties: . Privacy . Hard to delegate

• Crypto FTW! commit to content in authorization token!

A . Health systems/staff are not digitalized everywhere • Simple activation codes sent via phone/mail/sms • Different of automatization • Belgium went for (light) commitments! AC

Secure Upload Authorisation for Digital proximity tracing. DP-3T project. https://github.com/DP-3T/documents/blob/master/DP3T%20-%20Upload%20Authorisation%20Analysis%20and%20Guidelines.pdf Privacy engineering 20 Are we done? Carmela Troncoso Carmela

AC,Keys

A

AC Privacy of uploads 21 Theory Existence of upload Carmela Troncoso Carmela

the user is COVID+

AC,Keys DP3T design paper

A

AC

https://github.com/DP-3T/documents/blob/master/DP3T%20White%20Paper.pdf Privacy of uploads 22 Practice

. Unknown environment Troncoso Carmela • What is users’ behavior?

. Constraints associated to the platform • Bandwidth AC,Keys • Server capacity • Battery

A . Anonymity and delays not possible

AC Plausible deniability (constant time & size)

https://github.com/DP-3T/documents/blob/master/DP3T%20-%20Best%20Practices%20for%20Operation%20Security%20in%20Proximity%20Tracing.pdf Privacy of uploads 23 Practice – there is authentication! Carmela Troncoso Carmela

. Dummies also must realize the token,Keys authentication step token • Servers must consider dummies • Ensure equal timing and volume AC AC A

AC

https://github.com/DP-3T/documents/blob/master/DP3T%20White%20Paper.pdf Privacy of uploads 24 Practice – . Exposure Notification API (

token token’ . Implications on authorization and token keys-1 last key dummy strategy AC AC • Cannot delay all keys! • Dummies must mimic second upload

AC . Phone does not always wake up… Privacy of uploads 25 Practice – servers don’t exist in the vacuum

token’

token token’ keys-1 token last key

AC AC

AC

https://github.com/DP-3T/documents/blob/master/DP3T%20-%20Best%20Practices%20for%20Operation%20Security%20in%20Proximity%20Tracing.pdf Privacy of uploads 26 Practice – servers don’t exist in the vacuum

. Load Balancer, Firewall • More information than expected! • Off the shelf cloud managing tools

. Careful design of logging to avoid forensics • Coarse logging at key server • Only counts logged for statistics . e.g, active users based on dummy traffic

. Logging strategy re-designed N times

https://github.com/DP-3T/documents/blob/master/DP3T%20-%20Best%20Practices%20for%20Operation%20Security%20in%20Proximity%20Tracing.pdf https:// www.medrxiv.org/content/10.1101/2020.12.21.20248619v1.full.pdf https://www.ebpi.uzh.ch/dam/jcr:5fc56fb7 https://github.com/digitalepidemiologylab/swisscovid_efficacy/blob/master/SwissCovid_efficacy_MS.pdf https://www.experimental.bfs.admin.ch/expstat/en/home/innovative Where is is Wherethis deployed? Field experimentFieldZurichOctober 2020 in COVID ~18000 1.87 • • • • • Millionactive users (~22% population) Speed: ~1 day faster notification for non - for notification faster day ~1 Speed: Manual to Contact respect positives with Tracing of 5% in Zurich notification positive after in 10tested 1 quarantine sent 22% - COVID 80% -3e7e -40bf - -8df4 positive users uploaded their keys in December (15% of PCR in Switzerland)usersin positive uploaded DecemberPCR their keysinof (15% positive upload positive app users codes their -1852a067a625/Estimation%20of%20SwissCovid%20effectiveness%20for%20the%20Canton%2 -methods/swisscovid -monitoring.html -app household exosures (70% (70% cases) the of 0of%20Zurich%20in%20September%202020_V1.5.pdf 27 Carmela Troncoso 28 Key lessons Carmela Troncoso Carmela

. Data is not a must!

. Privacy engineering goes well beyond crypto

. Privacy engineering in an agile/service world is exhausting • Platforms and requirements continuously change

. Good socio-technical integration is key to success and it is hard • Purpose limitation and abuse prevention is a must . . . Digital contact tracing solved? tracing contact Digital here go Where to from Can we eliminate beacon we eliminate Can trust? reduce least At dependency Google/Apple • • • • • Device beeliminated? Can it Without Google and Apple’s collaboration? and Apple’s Google Without them? seeing without libraries their we verify Can keys? the of randomness the Can we verify based contact tracing is a possibility? (free from Bluetooth?!) from (free possibility? a is tracing -based contact authentication related attacks? related -authentication (and also Amazon!) also (and 29 Carmela Troncoso More technologies to theMore technologies rescueto here still The pandemic is Implementations appearing . . . Register of (any) events Unique identifiers (phone / name / address) Databases positiveof and negative and people 30 Carmela Troncoso (link towhite paper at the bottom) (new pairing- https More technologies to theMore technologies rescueto here still The pandemic is :// basedversion soon!) notify - me.ch/en Our proposal . . . Abuse preventiondesign by -CoV for SARS Privacy Privacy for users (from locations, databases) -2 -positive location 31 Carmela Troncoso More technologies to theMore technologies rescueto here still The pandemic is Implementations ??? . Danger of… . . . . function creep discrimination g central database lobal tracking of users 32 Carmela Troncoso More technologies to theMore technologies rescueto here still The pandemic is purposedesign by (nor the longstanding (nor Cannot limit the the limit Cannot impact) 33 Carmela Troncoso Post-doctoral position SPRING Lab

Do you want to use your crypto skills to deploy socially-responsible technologies?

Come help us in our privacy-engineering efforts. Example partners:

Position for 1 year (extendable)

More info: https://spring.epfl.ch/ Our projects: https://github.com/spring-epfl

Applying: email [email protected]