Internet Security

Privacy researchers devise a noise-exploitation attack that defeats dynamic anonymity

Privacy researchers in Europe believe they have the first proof that a long-theorised vulnerability in systems designed to protect privacy by aggregating and adding noise to data to mask individual identities is no longer just a theory. The research has implications for the immediate field of differential privacy and beyond — raising wide-ranging questions about…


Privacy researchers in Europe believe they have the first proof that a long-theorised vulnerability in systems designed to protect privacy by aggregating and adding noise to data to mask individual identities is no longer just a theory.

The research has implications for the immediate field of differential privacy and beyond — raising wide-ranging questions about how privacy is regulated if anonymization only works until a determined attacker figures out how to reverse the method that’s being used to dynamically fuzz the data.

Current EU law doesn’t recognise anonymous data as personal data. Although it does treat pseudoanonymized data as personal data because of the risk of re-identification.

Yet a growing body of research suggests the risk of de-anonymization on high dimension data sets is persistent. Even — per this latest research — when a database system has been very carefully designed with privacy protection in mind.

It suggests the entire business of protecting privacy needs to get a whole lot more dynamic to respond to the risk of perpetually evolving attacks.

Academics from Imperial College London and Université Catholique de Louvain are behind the new research.

This week, at the 28th USENIX Security Symposium, they presented a paper detailing a new class of noise-exploitation attacks on a query-based database that uses aggregation and noise injection to dynamically mask personal data.

The product they were looking at is a database querying framework, called Diffix — jointly developed by a German startup called Aircloak andtheMax Planck Institute for Software Systems.

On its website Aircloak bills the technology as “the first GDPR-grade anonymization” — aka Europe’s General Data Protection Regulation, which began being applied last year, raising the bar for privacy compliance by introducing a data protection regime that includes fines that can scale up to 4% of a data processor’s global annual turnover.

What Aircloak is essentially offering is to manage GDPR risk by providing anonymity as a commercial service — allowing queries to be run on a data-set that let analysts gain valuable insights without accessing the data itself.The promise being it’s privacy (and GDPR) ‘safe’ because it’s designed to mask individual identities by returning anonymized results.

The problem is personal data that’s re-identifiable isn’t anonymous data. And the researchers were able to craft attacks that undo Diffix’s dynamic anonymity — although Aircloak is confident it has already prevented this attack.

“What we did here is we studied the system and we showed that actually there is a vulnerability that exists in their system that allows us to use their system and to send carefully created queries that allow us to extract — to exfiltrate — information from the data-set that the system is supposed to protect,” explains Imperial College’s Yves-Alexandre de Montjoye, one of five co-authors of the research paper.

“Differential privacy really shows that every time you answer one of my questions you’re giving me information and at some point — to the extreme — if you keep answering every single one of my questions I will ask you so many questions that at some point I will have figured out every single thing that exists in the database because every time you give me a bit more information,” he says of the pre

Read More

Be the first to write a comment.

Leave a Reply

Internet Security

Massive Crypto Breach Unveiled: Latest Insights Emerge

In what appears to be the most significant crypto breach of the year, fresh revelations have emerged shedding light on the extensive infiltration into the digital realm. PeckShield, a reputable blockchain security firm, has disclosed a substantial breach impacting FixedFloat, a prominent platform facilitating cryptocurrency and fiat exchanges…

In what appears to be the most significant crypto breach of the year, fresh revelations have emerged shedding light on the extensive infiltration into the digital realm. PeckShield, a reputable blockchain security firm, has disclosed a substantial breach impacting FixedFloat, a prominent platform facilitating cryptocurrency and fiat exchanges…
Read More

Continue Reading
Internet Security

Protests in Delhi a security challenge

Sit-ins and protests in and around the national capital are emerging as a big security challenge for the establishment. According to Delhi Police’s 2022 report, cops handled 6,277 law and order situations relating to protests, demonstrations, meetings and processions, with latest curbs being enforced due to the ongoing farmers’ protest around Delhi-NCR.A former Delhi police

Sit-ins and protests in and around the national capital are emerging as a big security challenge for the establishment. According to Delhi Police’s 2022 report, cops handled 6,277 law and order situations relating to protests, demonstrations, meetings and processions, with latest curbs being enforced due to the ongoing farmers’ protest around Delhi-NCR.A former Delhi police commissioner told ET: “Crowd management has become complex these days mainly due to social media…
Read More

Continue Reading
Internet Security

3 Protocols Expanding Bitcoin Network Into NFT, DeFi, and Tooling

Binance’s report identifies three protocols, bitSmiley, Liquidium, and Portal, that could expand Bitcoin’s reach into DeFi, NFTs and tooling sectors, potentially enhancing scalability and security. The post 3 Protocols Expanding Bitcoin Network Into NFT, DeFi, and Tooling appeared first on BeInCrypto…

Binance’s report identifies three protocols, bitSmiley, Liquidium, and Portal, that could expand Bitcoin’s reach into DeFi, NFTs and tooling sectors, potentially enhancing scalability and security.
The post 3 Protocols Expanding Bitcoin Network Into NFT, DeFi, and Tooling appeared first on BeInCrypto…
Read More

Continue Reading
Internet Security

Congress seeks clarification from Yellen on crypto oversight plans, criticizes Howey Test

Share this article URL Copied Members of the US Congress have posed a list of questions in a recent letter to Treasury Secretary Janet Yellen in response to her call for enhanced oversight of crypto. Notably, they highlighted the limitations of the Howey Test in protecting consumers in the crypto market. The letter, signed by

Share this article

Members of the US Congress have posed a list of questions in a recent letter to Treasury Secretary Janet Yellen in response to her call for enhanced oversight of crypto. Notably, they highlighted the limitations of the Howey Test in protecting consumers in the crypto market.

The letter, signed by House Financial Services Committee Chair Patrick McHenry, House Agriculture Committee Chair Glenn Thompson, Rep. French Hill, and Rep. Dusty Johnson, seeks Yellen’s detailed explanation of how the regulatory framework should be shaped concerning digital assets, following her call earlier today.

Congress has requested clarification on the Securities and Exchange Commission’s (SEC) role. Notably, they have raised concerns about the effectiveness of the Howey Test, which is used to determine the classification of a transaction as an investment contract and, thus, a security. Congress is questioning whether the Howey Test is sufficient for providing adequate consumer protection.

The legislators have argued that the SEC’s retrospective application of the test does little to protect investors, stating:

“Chair Gensler has declared that “the vast majority of crypto tokens likely meet the investment contract test.” However, the final investment contract analysis is backwards looking, made by a court after the transaction in question has been completed. How does this reactive legal authority provide adequate protection for customers, in the absence of comprehensive legislation?”

Congress has also highlighted that the current regulatory framework does not cover a significant portion of the crypto-asset ecosystem, including Bitcoin and Ether. They have asked the Financial Stability Oversight Council (FSOC) whether these cryptocurrencies are considered securities. Led by Yellen, the FSOC brings together key financial regulators to monitor potential risks and safeguard the financial system.

Furthermore, Congressmen have expressed concern about regulatory gaps in spot markets for digital assets that are not considered securities. They are questioning if the Commodity Futures Trading Commission should expand its jurisdiction to include these spot markets, given its existing authority over certain aspects of non-security digital asset transactions. Congress expects to receive answers from Yellen by February 20.

Yellen has been actively advocating for stricter regulations after FTX’s collapse. In a testimony before the House Financial Services Committee on Tuesday, she warned of the risks associated with crypto platforms and stablecoins, urging Congress to enact stricter regulations for the crypto industry.

Share this article

Share this article

Members of the US Congress have posed a list of questions in a recent letter to Treasury Secretary Janet Yellen in response to her call for enhanced oversight of crypto. Notably, they highlighted the limitations of the Howey Test in protecting consumers in the crypto market.

The letter, signed by House Financial Services Committee Chair Patrick McHenry, House Agriculture Committee Chair Glenn Thompson, Rep. French Hill, and Rep. Dusty Johnson, seeks Yellen’s detailed explanation of how the regulatory framework should be shaped concerning digital assets, following her call earlier today.

Congress has requested clarification on the Securities and Exchange Commission’s (SEC) role. Notably, they have raised concerns about the effectiveness of the Howey Test, which is used to determine the classification of a transaction as an investment contract and, thus, a security. Congress is questioning whether the Howey Test is sufficient for providing adequate consumer protection.

The legislators have argued that the SEC’s retrospective application of the test does little to protect investors, stating:

“Chair Gensler has declared that “the vast majority of crypto tokens likely meet the investment contract test.” However, the final investment contract analysis is backwards looking, made by a court after the transaction in question has been completed. How does this reactive legal authority provide adequate protection for customers, in the absence of comprehensive legislation?”

Congress has also highlighted that the current regulatory framework does not cover a significant portion of the crypto-asset ecosystem, including Bitcoin and Ether. They have asked the Financial Stability Oversight Council (FSOC) whether these cryptocurrencies are considered securities. Led by Yellen, the FSOC brings together key financial regulators to monitor potential risks and safeguard the financial system.

Furthermore, Congressmen have expressed concern about regulatory gaps in spot markets for digital assets that are not considered securities. They are questioning if the Commodity Futures Trading Commission should expand its jurisdiction to include these spot markets, given its existing authority over certain aspects of non-security digital asset transactions. Congress expects to receive answers from Yellen by February 20.

Yellen has been actively advocating for stricter regulations after FTX’s collapse. In a testimony before the House Financial Services Committee on Tuesday, she warned of the risks associated with crypto platforms and stablecoins, urging Congress to enact stricter regulations for the crypto industry.

Share this article

Read More

Continue Reading