Please create an account to participate in the Slashdot moderation system

 



Forgot your password?
typodupeerror
Encryption Open Source

Help Wanted To Build an Open Source 'Advanced Data Protection' For Everyone (github.com) 39

Apple's end-to-end iCloud encryption product ("Advanced Data Protection") was famously removed in the U.K. after a government order demanded backdoors for accessing user data.

So now a Google software engineer wants to build an open source version of Advanced Data Protection for everyone. "We need to take action now to protect users..." they write (as long-time Slashdot reader WaywardGeek). "The whole world would be able to use it for free, protecting backups, passwords, message history, and more, if we can get existing applications to talk to the new data protection service." "I helped build Google's Advanced Data Protection (Google Cloud Key VaultService) in 2018, and Google is way ahead of Apple in this area. I know exactly how to build it and can have it done in spare time in a few weeks, at least server-side... This would be a distributed trust based system, so I need folks willing to run the protection service. I'll run mine on a Raspberry PI...

The scheme splits a secret among N protection servers, and when it is time to recover the secret, which is basically an encryption key, they must be able to get key shares from T of the original N servers. This uses a distributed oblivious pseudo random function algorithm, which is very simple.

In plain English, it provides nation-state resistance to secret back doors, and eliminates secret mass surveillance, at least when it comes to data backed up to the cloud... The UK and similarly confused governments will need to negotiate with operators in multiple countries to get access to any given users's keys. There are cases where rational folks would agree to hand over that data, and I hope we can end the encryption wars and develop sane policies that protect user data while offering a compromise where lives can be saved.

"I've got the algorithms and server-side covered," according to their original submission. "However, I need help." Specifically...
  • Running protection servers. "This is a T-of-N scheme, where users will need say 9 of 15 nodes to be available to recover their backups."
  • Android client app. "And preferably tight integration with the platform as an alternate backup service."
  • An iOS client app. (With the same tight integration with the platform as an alternate backup service.)
  • Authentication. "Users should register and login before they can use any of their limited guesses to their phone-unlock secret."

"Are you up for this challenge? Are you ready to plunge into this with me?"


In the comments he says anyone interested can ask to join the "OpenADP" project on GitHub — which is promising "Open source Advanced Data Protection for everyone."


Help Wanted To Build an Open Source 'Advanced Data Protection' For Everyone

Comments Filter:
  • The UK and similarly confused governments will need to negotiate with operators in multiple countries to get access to any given users's keys.

    Meanwhile, proverbial mafia-types and mafia-type goverments can just send their operatives to where the secret is kept and use the not-so-proveribal 5-dollar hammer [xkcd.com] negotiation tactic.

    • How many gov stooge accounts would it need to be subverted?
    • by Sloppy ( 14984 ) on Saturday May 31, 2025 @03:38PM (#65419243) Homepage Journal

      I'm just going to say the usual thing I say whenever someone claims a $5 wrench undermines encryption:

      You can't use a wrench on someone without them knowing you've done it. I can be intimidated, but I can't be intimidated without my knowledge!

      So if you're a real mafia type, fine. You win, at least in a single attack. But you can't just monitor people for years with a $5 wrench. And even in a single attack, you've gotta commit to it and murder the target after torturing them for the key. If you fail to murder them, and if you're identifiable, then the victim gets to lawyer up and have laws and courts and stuff.

      Wrenches can work, but they're overrated.

      • by test321 ( 8891681 ) on Saturday May 31, 2025 @04:00PM (#65419283)

        OP argues about the government, and the government has many metaphoric wrenches to threaten us with. Say I opened an account on that encrypted backup thing. Officers can show up at my door saying they'll call me accessory to whatever felony if I don't hand over my fraction of your key. Maybe I opened an account to protect cat pictures, or maybe to run an illegal business, but in any case I won't want to go to prison, or have a work visa cancelled, for things I haven't done and you did.

      • by bjoast ( 1310293 )
        Sure. However, the $5 wrench doesn't even have to be used to be effective. Its mere existence can function as a deterrent against the entire use of strong encryption.
      • by piojo ( 995934 )

        As test321 pointed out, there are wrenches and then there are wrenches. But there are also gag orders. If your threats are sufficiently compelling, you can threaten someone without being held accountable for it, or you can even monitor them in an ongoing fashion.

        Congrats, you are now a FBI confidential informant. If you want out, you will be charged for a crime that may not stick but will hamper your ability to get a computer job for the rest of your life.

    • hammer? Nah thats why they have 007
    • The UK and similarly confused governments will need to negotiate with operators in multiple countries to get access to any given users's keys.

      Meanwhile, proverbial mafia-types and mafia-type goverments can just send their operatives to where the secret is kept and use the not-so-proveribal 5-dollar hammer [xkcd.com] negotiation tactic.

      Until we can see and average in some real-world statistics on this, we might be forced to assume the last time this happened was as old as this joke for the average citizen.

      • by Entrope ( 68843 )

        It's been in the news recently, but in the form of organized crime going after cryptocurrency high rollers: https://www.npr.org/2025/05/28... [npr.org]

        A few governments will use wrench attacks readily. More will use it in what they think is an emergency. Using cryptography is basically never going to trigger it, though: the government will have already decided the target deserves that kind of treatment regardless of cryptography use.

        On the other hand, using a cryptography back door leaves almost no evidence and may

        • As for those crypto guys you mention: if you want to be the banker of the underworld, be prepared to have to deal with your clients
        • It's been in the news recently, but in the form of organized crime going after cryptocurrency high rollers: https://www.npr.org/2025/05/28... [npr.org]

          I'd put that in the same idiot class as the moron who got millions stolen off his damn forehead. [youtube.com]

          The unspoken rule of the high target club, is you don't fucking brag about how you're part of the high target club. (Naturally an addiction to narcissism prevents this. Every damn time.)

          A few governments will use wrench attacks readily. More will use it in what they think is an emergency. Using cryptography is basically never going to trigger it, though: the government will have already decided the target deserves that kind of treatment regardless of cryptography use.

          Let's get back to reality again. As in average citizen. That means the 99.999% of us who aren't on any already decided list and never will be. And if cryptography is null and void, so is the grandparents argument. Any moron

    • Offtopic. This is about distribution of key fragments around several servers.

      You gonna start beating up servers? In different countries?
      • by davidwr ( 791652 )

        You [meaning the mafia-type] gonna start beating up servers? In different countries?

        The server operators, yes, that's what I was getting at.

        Real mafiosos don't always respect national borders.

        • How tech savvy are Mafiosos? Tech people are clearly running circles around everybody these days. Sooo...They're going to track down ip addresses in up 15 countries? Then send goons to figure out who's the sysop, then beat 15 different peeps with wrenches, to what end? I'm making an assumption that Mr. Ex Google here, who claims to have the technical side of things all worked out, has encrypted the fudge out of everything...
          No. The Mob won't beat this system. Far to expensive and impractical to game it that
  • by Kernel Kurtz ( 182424 ) on Saturday May 31, 2025 @03:27PM (#65419227)
    How much storage does it need? If it is like a blockchain that could be problematic. Otherwise I'd be willing to put an instance on my Tor node.
    • by WaywardGeek ( 1480513 ) on Saturday May 31, 2025 @05:28PM (#65419419) Journal

      Data can eventually add up. It isn't like a block chain, but we might have say 1KiB per device, and 8 billion devices globally, so maybe 10 TiB? That's assuming we don't ever shard into different quorums, and 15-ish nodes run the world, which is probably unrealistic. With say 150 nodes by then, it could add up to 1TiB per node.

      Queries per second would always be low. Using a public key for incremental backups and only rotating the private key every month or two, 8 billion devices registering once a month is only 3,000 QPS globally, and again dividing by 10, that's only 300, which a Raspberry PI can probably handle.

      So... it's dumb, but I will find it entertaining to run my node on a Raspberry PI until I start having security concerns. That would be roughly when enough devices are enrolled to make the system a juicy target, probably at least 2 years out. We'll need improved security at that point, e.g. running nodes in data centers with multi party with for any changes, and maybe Tor routing.

      • For data sovereignty I'll run a node on my pi-cluster, or my cloud instance.

      • by AmiMoJo ( 196126 )

        Talk about letting perfect be the enemy of good. You jump straight to "what is 8 billion devices tried to use it" when realistically it's unlikely to scale beyond 8 thousands devices in the foreseeable future, and if it ever does become a problem that will be extremely good news and well worth investing the effort in solving.

  • I work in data, this is so badly needed. Governments are the problem. This is the solution. OP: Iâ(TM)m in, just let me know what to do.
  • In many cases the solution could be Cryptographic Message Syntax, RFC 5652. We have this, people should use it. Outlook is the biggest user when configured for PKI based encryption. Openssl supports it. In general the problem is the widespread failure of public key infrastructure, not an actual technology problem.
  • by WhyMustILogIn ( 7006886 ) on Saturday May 31, 2025 @04:10PM (#65419295)
    > The UK and similarly confused governments will need to negotiate with operators in multiple countries to get access to any given users's keys. There are cases where rational folks would agree to hand over that data...

    If there are keys to be handed over by anyone other than the original user it's not an open source version of Apple's Advanced Data Protection.

    > "I helped build Google's Advanced Data Protection (Google Cloud Key VaultService) in 2018, and Google is way ahead of Apple in this area."

    If he's typical of Google's engineers it would make me question the integrity of their encrypted services.
    • by AmiMoJo ( 196126 )

      The user would also need to hand over their key. Essentially the encryption key is itself encrypted with a hash of a password before being distributed among the network nodes.

      That's how most encryption works. The encryption key is generated using a secure random number generator, and then that key is encrypted using the user's password hash as a key.

      I'm not sure how resilient this is to UK law though. Legally if the police request you decrypt data, you must or you are guilty of a crime that carries up to 2

  • To get around secure communications the UK Government can simply mandate that all phones they want to monitor are pushed a backdoor that allows 'lawful access' to data before it is encrypted and after replies are decrypted. This is of course a very stupid thing to do that will cause massive security problems but it is likely to happen. The legislation is already in place in the UK, and possibly in other countries too.

    • I worry about that. In my threat model, I assume the attacker wants to keep the backdoor secret, and is unwilling to push a secret mass surveillance backdoor to all phones. Even if no one noticed the backdoor, someone is likely to notice all that encrypted surveillance traffic. So, there may be occasionally used back doors in our phones already, but secret mass surveillance is done server-side. That's the main threat I'm worried about.

  • ...just using client-side encryption with post-quantum encryption algorithms?

    • Nothing. That should always be used when possible. Read about Advanced Data Protection. It is designed to pass the Mud Puddle Test, where your old device is not available to encrypt anything, while the user has not yet bought their new device.

  • by Arrogant-Bastard ( 141720 ) on Saturday May 31, 2025 @04:32PM (#65419333)
    1. Not everyone uses Android or iOS.

    2. But lots of people do, so an app might make sense. What's the plan when the app stores refuse to carry it?

    3. This scheme is highly susceptible to DoS attacks at every point. E.g. "[...] where users will need say 9 of 15 nodes to be available [...]" means that if someone can DoS or cut off access to 7 of 15 then nobody can do anything. (This is a general problem with T of N algorithms.) E.g. "Users should register and login before they can use any of their limited guesses to their phone-unlock secret." means if someone can login, then can exhaust the limited guesses, leaving none for the actual user.

    4. This won't work without end-to-end connectivity, and likely won't work without sufficiently robust/fast connectivity - i.e., no queueing/batching.

    5. What's the plan when something awful happens, it turns out that it was in part facilitated by this service, and multiple governments decide that it's time to legislate it out of existence? They don't need a $5 hammer if they have the weight of the criminal justice system.

    6. Speaking of $5 hammers: suppose this service is built. Suppose it's wonderful. Suppose it works beautifully. Suppose it's adopted by huge numbers of people because it's wonderful and works beautifully. That means that an ever-increasing amount of valuable data will stored by its users. Eventually, someone is going to notice that, decide that they'd like to get their hands on it, and go after the node operators.

    7. "I helped build [thing at Google]" is not nearly the qualification that $GoogleGuy thinks it is. Google built one good product: search. Everything else has been mediocre at best. (And now, of course, they're doing everything possible to make search absolute garbage.)
    • If someone can log in, they have your password, which is a concern in and if itself. But I agree about 9 of 15. 90 of 150 distributed globally would be a more practical number from a data loss perspective, because it is awfully easy to take down 7 servers, but much harder to take down 61. I assume that makes the crypto harder (but I hope not less robust), but if you are just decrypting a key that you then use for the real decryption work, that might not be a big deal.
  • by WaywardGeek ( 1480513 ) on Saturday May 31, 2025 @04:33PM (#65419335) Journal

    Anyone interested can ask to join my Github project [github.com].

  • Note that Europe is drafting the new orwellian laws as well. They are planning all kind of requirements to identify with some real ID documents. Laws that will finally be removed as unconstitutional (at least that happened with the last few attempts) but may be in effect for quite some time. I've read this may even affect explicit privacy providers like VPN services, which would need to do the logging they are paid for not to do. So good technical solutions are currently requried for all countries, UK, US,

    • The pedant in me thinks you were going to say steganography ... but the SS agent in me wants to know why you want to use steganography, comrade?

      My impression of the proposed
        European legislation was that larger companies had new reporting requirements... 50m active monthly users comes to mind.

      The chilling thing is that LEO's always want a key to your encrypted data... I suggest a private vpn server is required.
  • by GrahamJ ( 241784 ) on Saturday May 31, 2025 @06:33PM (#65419535)

    So I encrypt my data with a strong key, distribute the key to a number of locations, and use a login credential to access the pieces of key.

    Presumably I would do this rather than encrypting the data with my login credentials because there's more entropy in the key than in my credential (and things like being able to change my password without reencrypting the data)

    ok. But the effective entropy is still that of the credential because if someone has it then they have my data, so I still need a strong credential. How do I store a strong credential? Probably a password manager. So why not just store the key in my password manager and encrypt my data with it? I don't see how distributing the key helps.

  • The Solid project [solidproject.org] is a related initiative with similar goals. Turns out to really get away from centralised systems you need a bit more than just a server and a few mobile phone clients. The Solid community has been working on protocol specs and implementations for quite some time, probably worth aligning with them.
  • (AI haters alert) A bit of discussion with ChatGPT crystallized some ideas and questions I had, supplementing my miniscule knowledge of cryptographic principles:

    Threshold cryptography offers powerful protection - but only if distribution is engineered with the same care as the cryptographic math itself. Random distribution isn't just insufficient - it’s often actively dangerous in adversarial settings.

    The key issue is the concept of threat pools vs distribution of the necessary T shares in a T of N se

A fanatic is a person who can't change his mind and won't change the subject. - Winston Churchill

Working...