all InfoSec news
Robust, privacy-preserving, transparent, and auditable on-device blocklisting. (arXiv:2304.02810v1 [cs.CR])
cs.CR updates on arXiv.org arxiv.org
With the accelerated adoption of end-to-end encryption, there is an
opportunity to re-architect security and anti-abuse primitives in a manner that
preserves new privacy expectations. In this paper, we consider two novel
protocols for on-device blocklisting that allow a client to determine whether
an object (e.g., URL, document, image, etc.) is harmful based on threat
information possessed by a so-called remote enforcer in a way that is both
privacy-preserving and trustworthy. Our protocols leverage a unique combination
of private set …
abuse adoption architect blocklisting called client device document encryption end end-to-end etc hashes information novel object opportunity privacy private set intersection protocols resilience security threat threat information url