Pep White Paper
Total Page:16
File Type:pdf, Size:1020Kb
Privacy by Default. White Paper p≡p foundation council 2016–07–18 (v1.0.5) Contact: mailto:[email protected] Website: https://pep.foundation2 1OpenPGP fingerprint: EC55 39C8 FECF 7C4F 324B F027 A9DE 30FC 56BB B555 2Or using CAcert certificate cf. URL https://cacert.pep.foundation Document versions • v1.0.5 (2016-07-18): Update modules graphics (pEp for iOS; no Inboxcube patch) • v1.0.4 (2016-07-02): Change OpenPGP fingerprint in the title page • v1.0.3 (2016-03-03): Rename “Conceptual White Paper” in “White Paper” • v1.0.2 (2016-03-02): One typographical fix • v1.0.1 (2016-02-29): Stylistic changes and typographical fixes • v1.0 (2016-02-29): First public version • v0.6 (2016-02-29): Draft version • v0.5 (2016-02-28): Second revised early draft • v0.4 (2016-02-21): First early draft 1 Contents 1 Introduction and Motivation 3 2 p≡p at a glance: privacy without compromise 5 3 Design principles 7 3.1 Ease of use: hassle-free installation, automatic configuration and integration 7 3.2 Understandability: traffic lights semantics / Privacy Status .......... 7 3.3 Interoperability: convergence of messaging systems ............. 8 3.4 Cross-platform support: free choice of platforms ............... 8 3.5 100% peer-to-peer: no central providers .................... 9 4 Cryptography being used and communication strategy 10 5 Architectural aspects: p≡p engine and adapters 11 2 1 Introduction and Motivation The Right to Privacy and the Right of the whereabouts of all the personal, to Freedom of Information are part collective or corporate data involved. of the inalienable Human Rights. In the future, mass deployment of These rights are listed in Article 12 and Internet of Things (IoT) technologies is Article 19 of the Universal Declaration expected, meaning that many of the of Human Rights based on Resolution objects we know today – may that be 217 A (III) of the UN General Assem- implants in our bodies, (parts of) our bly as Objects of Legal Protection. clothes, all kind of sensor systems in our homes, streets or organizations In a time when Chartered Rights are – will get “on-line” and “talk” to each being more and more threatened, mea- other. Such developments have the sures have to be taken into our own potential to completely eradicate the hands in order to protect and preserve notion of privacy. This puts in dan- them. Especially because of the Inter- ger an open and democratic society. net the circumstances for a majority of people have changed completely, All that said, it’s vital to act now and and unfortunately not for the better. in the most effective way possible: p≡p stands for pretty Easy privacy Taking a deep breath, we must real- (abbreviated as p≡p) – the “E” or ize that the entrance of humanity into “≡” to be emphasized, but without digital age is accompanied by all of us compromise in privacy. We want the continuously losing more and more of Internet to become a secure place, our privacy rights, which we believe where people and organizations gain are paramount for citizens, families, back their constitutional rights to enterprises, public offices, lawyers, communicate in private by default. NGOs, journalists and political activists for being able not just to feel, but also We start our mission by radically easing to act and interact freely – without the use of well-known and established any fears of becoming discriminated end-to-end cryptographic tools for al- or suppressed based on past behav- ready existing and widely used written iors, opinions expressed or the social digital communication channels (like communication network an actor is in. e-mail, SMS or chat), without forcing users to adhere to new communica- Today, any individual or collective ac- tions channels and by providing the tor engaged in any digital activity, must necessary tools for gluing already assume not only to be just constantly existing – but not easy to use – compo- monitored, but having its behavior auto- nents together and helping businesses matically analyzed by text and data min- to spread p≡p and the technologies ing or other technologies of machine it employs as industry standards. learning3 – leading for literally everyone being scored and categorized. This gen- However, considering the different erally happens without the actors’ con- use cases the Internet has today (e. g. sent and without a clear consciousness it’s also used for voice calls or to carry 3Sometimes also just called “big data” technologies involving (complex) algorithmic methods. 3 out payments), we don’t want p≡p to munciations: at least, we let that be be seen as forever bound and ending the beginning of our efforts to help to in “just” securing written digital com- secure the Internet and its users. 4 2 p≡p at a glance: privacy without compromise What is p≡p? p≡p motivates a new standard to tificate authorities) by default, even securely encrypt and verify written though p≡p (for compatibility reasons communications, without reinvent- and integration purposes) supports ing the wheel. p≡p, by design, eases S/MIME (e. g. used in organizations secure communications relying on for e-mail encryption). However, de- well-established end-to-end cryp- fault p≡p installations shall not be tographic methods (following stan- expected to support non-end-to-end dards like OpenPGP or OTR) by in- approaches of cryptography: for p≡p tegrating into existing systems for centralized cryptographic approaches written digital communications and provide weak cryptography only and automating key management tasks. are considered an unreliable communi- cation type in terms of our approach Ultimately, p≡p wants to change of privacy without compromise. the default in written digital com- munications: from unencrypted, To achieve the goal of spread, from unverified and unanonymized to en- an organizational point of view, the p≡p crypted, verifiable and anonymized.4 project founders set up two different types of entities, distinguished by sep- p≡p restores security and privacy arated legal entities in two different without requiring user interaction for European countries: its basic operation and never putting communications’ security over the • p≡p foundation, a non-profit organiza- ability to communicate: thus, if no tion established as foundation under secure communication channel be- Swiss law holding the trademarks on tween two peers can be established, p≡p and the copyrights of the p≡p the text message is sent unencrypted engine and the p≡p adapters for dif- (cf. 4 for some more details) rather ferent programming languages and than hassling the users involved. development environments. It is sup- porting Free and Open Source Soft- Whenever two p≡p peers established ware Projects (FOSS) to integrate a technically secure communication p≡p. channel, they can add human trust to it by verifying each other’s digital identity • p≡p security, a enterprise incorpo- by comparing Trustwords (cf. 3.2 for rated in Switzerland and Luxem- some more details): like that two peers bourg and licensed by p≡p founda- can increase confidence they are really tion to spread p≡p software to both communicating with each other and Business-to-Business (B2B) and no Man-In-The-Middle (MITM) attack Business-To-Consumer (B2C) mar- is taking place. No trust will be put kets by creating, distributing and pro- into key servers or centralized trust viding support for add-ons, plug-ins infrastructures (like commercial cer- and apps enabling users and organiza- tions to use p≡p technology.5 4For anonymization, GNUnet message transport is considered, cf. https://www.gnunet.org. 5Cf. https://www.prettyeasyprivacy.com/ 5 All software published by p≡p foun- dependent entities for each public dation will be and forever remain release. By all of these measures we freely available for the general pub- do our best effort to make sure p≡p lic under the GNU General Public Li- software is and stays backdoor-free cense version 3 (GPLv3) or any later even if it’s distributed by third party. version. All software will be subject to an independent code review for p≡p software will be cryptographically any release, disclosing the full tech- signed and provided with detailed build nical report. As part of its its model instructions and a fully documented of security by design providing the build chain for each platform involved, most trust possible, p≡p foundation to make transparent how deterministic will make sure that all licensed p≡p builds6 can be created from source. software gets code-reviewed by in- 6Cf. https://blog.torproject.org/blog/deterministic-builds-part-one-cyberwar-and-global- compromise 6 3 Design principles Above all, p≡p – contrary to existing Furthermore, for their communications cryptographic solutions – shall be p≡p users don’t depend on any specific easy to install, use and understand. (web or operating system) platform, message transport system (SMS, E- In our opinion, not just power Mail, XMPP etc.) or centrally provided users, but all users have the right client–server or “cloud” infrastructures: to use end-to-end cryptography. p≡p is 100% peer-to-peer by design. 3.1 Ease of use: hassle-free installation, automatic configuration and inte- gration p≡p software shall integrate into ex- for regular users, of course power isting systems for written digital com- users will remain free to configure their munications like e-mail clients (e. g. installation by themselves and turn Thunderbird, Apple Mail or Outlook) off the automation proposed by p≡p. and messaging clients, or be provided as apps for smartphones (e. g. for An- From the beginning, the p≡p concept droid or iOS) in a hassle-free way: in bears in mind to be installed not just case of e-mail this means that upon on end user devices, but also in or- installation existing OpenPGP keys ganizations with thousands of users: will be used by p≡p automatically for important features for such settings, any further communication; should like distribution lists, BCC mailings no OpenPGP keys be available, p≡p and unencrypted archiving of e-mails, automatically creates a private and which were sent or received encrypted, public key for the e-mail address con- is possible.