schoen
5 days ago
When I was working at EFF, I started writing (but never finished) a couple of essays along the lines of "the degree of trackability of mobile phones is an unfortunate accident, and we should fix it".
It basically comes from routing requirements (especially to receive incoming phone calls) combined with billing requirements (to make people pay for their connectivity) combined with the empirical requirement to see which base station a device is connected to, and which other base stations can see it at a given moment.
If you aggregate all of that data, then you know a (geographically moderate-resolution) complete history of where almost all people have been at almost all times, and patterns of their habits and whom they probably recurrently spent time with.
Not all of this data has to be collectable, because these things could be disaggregated by introducing different protocol layers. For example, you could pay the mobile company for data connectivity, but use cryptographic blinding mechanisms so that it doesn't know which specific subscriber obtained connectivity at a particular place and time. (Those blinding mechanisms could be implemented inside of SIM cards, so the SIM card's task is to cryptographically prove "I am a SIM card of a current paying subscriber of carrier X" rather than "I am SIM card number 42d1b5c0".) You could have device hardware IDs be ephemeral rather than permanent. Actual messaging and call services could all be "over the top" (as phone industry jargon puts it), provided by people who are not the phone company itself.
This disaggregation is a straightforward improvement from a privacy point of view because it prevents companies from knowing things about you that they didn't need to know in order to provide services.
Meanwhile, in the world we live in, we see governments trying to make it harder to make phones less trackable, by putting legal restrictions on changing hardware addresses, or requiring legal ID in order to establish service. I imagine that an additional cryptographic indirection layer in SIMs to prevent carriers from linking a permanent identifier to a network registration (or specific data use) would also be banned in some places if it were invented.
This shouldn't be inevitable. One thing that made me think about this was when there was a little scandal (which I was a small part of) about companies tracking device wifi MAC addresses for commercial purposes. There was a little industry that would try to recognize people and build commercial profiles based on recognizing that the same device was present (in fact, at the time, even if it didn't actually connect to the wifi -- because a typical wifi-enabled mobile device was sending broadcast wifi probe packets that included its MAC address). So Apple was like "this is a bad use of MAC addresses, which only exist to distinguish devices that happen to be on the LAN at the same time, and perhaps to allow network administrators to assign permanent IP addresses to specific devices", and they made iPhones randomize wifi MAC addresses for some purposes, mostly fixing that particular issue.
We could think just the same way about GSM networks: "these identifiers exist for specific protocol reasons; using them for device or user tracking is an abuse that should be mitigated technically".
eduction
5 days ago
Stellar reasoning.
Did you ever get to the point of hypothesizing good ways to align incentives to make this happen? It is hard to tell (having not thought much about it) whether this is a “smart well meaning engineers need to make new standards” problem, a “we need to harness the power of corporate greed problem,” or something else.
codethief
5 days ago
I seem to remember a discussion here on HN a few years back about a paper which outlined ways to decouple technical identifiers from personal identifiers on mobile networks.
My memory is a bit hazy but maybe it was the whitepaper for PGPP[0] that OP mentioned?
thfuran
5 days ago
I don’t think it’s possible to align incentives in favor of rolling out such a statement in the US without another coup.
coderatlarge
5 days ago
isn’t detailed information about the user equal to additional billing power? perhaps the only disincentive that exists to having that information would be such overwhelming risk/liability that it would outweigh the profit potential of having it in the first place. it seems to me the relative incentives have reached a oretty stable equilibrium…
Terr_
5 days ago
> combined with billing requirements
There's a certain flavor of US libertarian that complains that they should only be taxed for exactly the road-surfaces they personally use in proportion to how much they use them.
In response, I like to point out to them that their dream of "fair billing" can't occur without a nightmare of surveillance, making it easy for the government (or road-owners, and indirectly the government) to track and remember everybody's movements in excruciating detail.
Is that worth it? Perhaps a "sloppy" billing system (e.g. fuel/mileage taxes for roads) is actually an extraordinarily good deal in terms of the privacy we take for granted.
schoen
4 days ago
There's a potential family of cryptographic methods where people prove that they paid for things without revealing who they are.
https://www.eff.org/files/eff-locational-privacy.pdf (2009)
The technical paper mentioned is now at
https://web.ma.utexas.edu/users/blumberg/vpriv.pdf
(I guess Andrew Blumberg moved from Stanford to the University of Texas.)
There might be an inherent tradeoff where you need at least one of {tamper-resistant trusted meters, at least slightly noisy measurements, potential deanonymization}. For example, the short paper mentions that "point tolls" are easy to make anonymous using any form of anonymous digital cash (or blinded tokens issued by the tolling authority!), but the exact usage billing you mention people wanting is much more detailed than a point toll like that. It might indeed be inherently impossible to get all the way there without detailed surveillance.
m463
4 days ago
I though gnu taler sounded pretty interesting:
https://www.taler.net/en/features.html
don't know anyone who uses it though. (is it usable?)
teekert
5 days ago
Agreed, I always think that all these taxes should indeed just go through fuel. Want a bigger, heavier, more polluting car? Want to drive like a F1 driver? Fine, you pay more. Want to drive a long distance? You'll pay per distance*car_size. Want to go electric? You'll pay tax on electricity in concordance with it's economic price and influence on the planet.
One problem in the EU is is that this would need to be rolled out across the EU, because we already have large difference in price ranges for fuel leading to weird situations neer the border.
Terr_
5 days ago
> Want to go electric? You'll pay tax on electricity in concordance with it's economic price and influence on the planet.
The problem is that generic electrical consumption is not (unlike gasoline pumped at a gas-station) a decent proxy for how heavily the purchaser occupies and wears-down roads.
In turn, it makes it harder to connect fair (proportional) amounts to fix the roads.
teekert
5 days ago
That is true. Idk how to tax that. Through the tires? Would also stimulate going for durable ones. Although electric cars produce much less breaking dust, contributing to clean air again. Okok, it's complicated. Just tax anything based on it's environmental impact, then add some percentage for the roads?
Terr_
4 days ago
Given that odometers are already tamper-resistant for other economic reasons, a "mileage this year by vehicle weight class" might work.
FireBeyond
3 days ago
> Agreed, I always think that all these taxes should indeed just go through fuel. Want a bigger, heavier, more polluting car? Want to drive like a F1 driver? Fine, you pay more.
That already happens in some states. I have a performance car, and in Washington that came with a "gas guzzler tax" built in to the purchase breakdown, so I paid a lump sum (in addition to the ongoing higher fuel costs).
lan321
5 days ago
I don't see the issue?
Get on a toll road, pay for a ticket, done. Drive on a normal road, pay for gas, done.
I guess you could make it extremely specific, but then the problem isn't the surveillance, but the price of the cost analysis of driving 1,7 miles on a road in bumfuck nowhere with a J lbs vehicle, exerting X pressure on the road at a standstill going at [Y] speeds, thus generating Z total pressure over time H. In addition the road was I% wet due to rain the day prior.
Terr_
5 days ago
> I don't see the issue [...] pay for gas
"Them durn politicians are taxin' mah gasoline to build roads clear on the other end 'o town!"
markus_zhang
5 days ago
Thanks for sharing. I figured it is extremely difficult to spoof or disaggregate the data by ourselves, given the SIM tracking wifi tracking thing basically 7/24, or is there a way to fix it?
BLKNSLVR
5 days ago
I have no technical knowledge about these, and being cryptocurrency related there will be lots of exasperated huffs, but there are a couple of alternative mobile network related projects: World Mobile and Helium.
World Mobile claims 99% coverage of the US, although I think it uses existing networks where there's no native coverage.
They're "interesting", but only early days, and I don't know how close they come to what you describe for privacy and opposition to data aggregation. Large-geographic-area comms coverage isn't something that there's ever going to be a lot of options for.
schoen
5 days ago
I was imagining mobile operators that cooperated to some extent with the changes I was proposing, or at least didn't obstruct them. If it's using existing GSM protocols, the IMEI would have to be rotated frequently (and it's not that obvious how to do that without making the connection between the old IMEI and the new IMEI apparent), and the SIM technology would have to change. (What it's trying to prove in a privacy-friendly communications system is more like subscriber entitlement, not subscriber identity!)
There's also the "netheads and Bellheads" theory from the 1990s which can be taken to say that phone companies would never make technical changes to make themselves collect less data, or to be less helpful to government surveillance. Sometimes I think this is right. I still remember how I took part in a meeting with a mobile phone industry association or industry consortium of some sort about a year before the Snowden stuff. Someone on my side said "so, let's talk a bit about surveillance issues", and someone on the other side replied "sorry, that's something we don't talk about". Imagine an industry meeting with privacy advocates where the industry people are completely precommitted to not talking about surveillance!
toast0
5 days ago
> There's also the "netheads and Bellheads" theory from the 1990s which can be taken to say that phone companies would never make technical changes to make themselves collect less data, or to be less helpful to government surveillance.
You've got to sell them on something that's useful for them. Present the case that eliminating data collection simplified their network, saves money, reduces staffing, and reduces interaction with government.
giggyhack
5 days ago
I absolutely understand the sentiment and the goals that citizens should, by default, not be tracked. However, how do you square that with the proof, time and again, that truly secure and encrypted networks are primarily use by criminals (drug/human traffickers, and plenty of other people) who, through their trade, make the world a shittier place for the rest of us?
xethos
5 days ago
If we accept that the right to privacy is real, that not being followed, watched, and monitored every hour of my life, is something democratic societies should strive for:
Why do criminals have more rights than I do?
soulofmischief
5 days ago
That's very easy to square by just accepting that people are allowed to have private communications.
alisonatwork
5 days ago
That's only the case because the truly secure and encrypted networks are not the default.
Moru
5 days ago
This has changed before. HTTP used to be just fine. Only your bank used HTTPS. Now everyone uses HTTPS. It's the default, if you don't support it on your webserver, customers will have troubles reaching it.
kome
5 days ago
Your reasoning is so biased that it is hard for me to wrap my head around it, but at the same time it's very common because it confuses the tool with the crime. Criminals use cars and phones, too, but we don't ban them for everyone.
The argument ignores the catastrophic cost of the solution: destroying privacy for all of us. Creating a backdoor for police doesn't just hinder criminals; it makes everyone's data, from journalists to your medical records, vulnerable to hackers and abuse.
I believe we stop crime with good policing, not by building a system of total surveillance that sacrifices the very freedom we're trying to protect.
Levitz
5 days ago
But this has been "squared" already. Can the police enter your home without a warrant? No? Why? I bet criminals are pretty secretive around their stuff too, no?
wraptile
5 days ago
I'm unconvinced that secure communications is the bottle neck when it comes to criminal prosecution. We can expand police power without sacrificing our communications like that.
Anecdotally, take a look at China where privacy doesn't exist and yet Chinese syndicates are responsible for a major chunk of the issues you've listed. So clearly lack of privacy doesn't even correlate with decreased criminal behavior.
wildzzz
4 days ago
Probably because any successful Chinese crime syndicate has the backing of both the government and big business.
wraptile
4 days ago
Which happens due to totalitarian control of CCP which prohibits self correction mechanisms we have in democratic societies, so what's the Goldilocks area of authoritarianism here? My bet is that compromising all secure communications is all the way in the big bears bed, if we're sticking to the Goldilocks analogy. It's just a fundamental dead-end without fantasy scenarios like benevolent dictatorship which we all know doesn't exist in the real world.
miki123211
5 days ago
This is the "witch hunt" problem.
If you have two networks, one encrypted and one not, and the unencrypted network is significantly easier / cheaper to use or has better network effects, that's where most people will naturally flock. The only ones who will put in the effort to use the encrypted one are criminals and a few principled technologists / civil libertarians. In such a world, the mere fact of using the encrypted network is suspicious in itself.
We define "criminals" here as "anybody the government doesn't like." In the US, this is mostly child predators, drug traffickers, thieves, and maybe a few (legal) sex workers. In other places, this is mostly homosexuals, human-rights activists, journalists and the opposition.
The way to fix the "witch hunt" problem is to make all networks encrypted and secure.
While cryptocurrency is mostly used by criminals, as the traditional financial system is just good enough for most people, TLS is used by everybody, as it is just the default way to do things on the internet nowadays. This is despite the fact that TLS makes wiretapping criminals' communications much harder.
The US and Europe[1] should use the influence they have over standards bodies to make prosecuting the latter group of "criminals" much harder, recognizing that this comes at the expense of also letting some criminals in the EU/US sense of the word run free. It is just the morally right thing to do.
[1] I mostly mean American and European companies and organizations which participate in the process of standard setting, not governments, which mostly cannot do things for complicated political reasons.
jjkaczor
5 days ago
Historically in the US - yes.
However, with the current "regime change", the targets of tracking are expanding exponentially to basically anyone who says or does anything the current leadership does not like.
This has been warned about repeatedly with this type of tracking for decades - when "bad actors" take power and abuse that power, then everyone becomes a target. Fascists love data collection, aggregation and data-based decision-making.
ygritte
5 days ago
So get ready to be legally bound to leave your front door unlocked because some people store stolen loot behind locked doors!
_Algernon_
5 days ago
Better remove the locks on your house and bathroom and set up a public webcam while you're at it. After all, I'm not sure you're not a criminal, and to be sure of that I — and the rest of society — need to be able to observe you in your bathroom.
"innocent until proven guilty" exists for a reason.
neilv
5 days ago
> However, how do you square that with the proof, time and again, that truly secure and encrypted networks are primarily use by criminals
Do you have a URL for this proof?
(If it's true, that would be good to know.)
01HNNWZ0MV43FF
5 days ago
Me and the government have slightly differing opinions of what a "criminal" should be. I am a gender outlaw in many states
esseph
5 days ago
You ready to drop encryption between you and your bank?
Terr_
5 days ago
... They said, on a forum where everyone is posting and reading using connections encrypted by TLS/HTTPS.
I don't see how you've become a criminal just because you don't want somebody in the same coffee shop to see what you're posting or browsing.
Is it fine because it's not "truly" secure? How secure is so secure that it crosses the line and becomes evil?
wpm
5 days ago
It’s quite easy to square: your argument is nonsense through and through, barely deserving an iota of rebuttal. I could justify absolutely appalling invasions of privacy with what you’re saying.
We are not beholden to ruining everything for almost everyone to stop a small fee from doing bad things. It’s not any more complicated than that.
user
5 days ago
tmpfs
5 days ago
This is nonsense. By your logic me and the majority of people using Signal are criminals.
As the other commenter mentioned please provide proof for these hyperbolic claims.
Arainach
5 days ago
>By your logic me and the majority of people using Signal are criminals
False. "The majority of X are Y" does not imply that any particular X is Y.
I don't have data for Signal. I use it extensively. Even setting aside that the American legal system makes everyone a criminal several times a day so that the laws can be selectively enforced against anyone who becomes a target, I have no data on whether the majority of Signal users are criminals, but given that criminals have significantly higher interest in secure communications than the general population it wouldn't shock me if evidence came out that it was the case.
esseph
5 days ago
How long before UK VPN users are criminals?
How long before US states that are enforcing online ID laws will be doing the same?
coderatlarge
5 days ago
maybe we need a law against selective enforcement of laws. together with the comprehensive statistics collection agency that would be required to enforce it.