by istingray on 9/6/21, 7:57 PM with 5 comments
by Comevius on 9/6/21, 9:05 PM
For example online services today use data in transit encryption against man-in-the-middle adversaries, and data at rest encryption against snapshot adversaries, but without protecting the metadata created when the data is searched or accessed. Even data in use encryption would not protect the metadata. The data is also exposed to persistent adversaries when you don't control the encryption key.
I'm working on a cloud database that uses searchable encryption, the first of it's kind and it's a monumental challenge. Encryption is the easy part, hiding the metadata is what's hard, the way encrypted data is accessed and searched paints a picture about the data. And the server can't be trusted, so the client or trusted third party must never share the encryption key with it, it also have to be able to verify the authenticity, soundness, completeness and freshness of the data.
In other words, don't expect much privacy. Privacy is very hard, and it's not a lucrative business to get into it. From companies to governments everyone wants to feed your data to their statistical machines to predict you. Don't try to hide, you will stick out like a sore thumb, try to blend in, use fake data, make it look real.
by ev1 on 9/6/21, 7:59 PM
If you are an "activist" vs a "person that just doesn't want their email scanned for ads" there are very different vendor pools.