![]() Conversely, the service provider also does not receive any information about the address book entries of the users. There, the address book entries are encrypted with the service provider's secret key, but without the users being able to see the secret key. The service provider's encrypted database is sent to the user in a resource-saving manner-thanks to a compression technique specially developed by the researchers-and stored on the mobile phone. The shared contacts between the service provider and those people who use the messaging service are determined using intersection calculations. ![]() ![]() The ContactGuard application is based on new encryption protocols that are many times more efficient and secure than all previously existing approaches. This is a new method of contact discovery that significantly limits or completely avoids privacy threats and critical scenarios such as spying on contacts or reselling data and exploiting sensitive relationships. Rechberger has developed 'ContactGuard' together with his Institute colleague Daniel Kales and with the two researchers Christian Weinert and Thomas Schneider from TU Darmstadt. The cyber security expert is professor at the Institute of Applied Information Processing and Communications at Graz University of Technology and area manager for Data Security at the Know Center. All previous options are either completely insecure or at least do not offer any significant protection," says Christian Rechberger, summarizing the problem. "There are currently no satisfactory solutions for a contact discovery process by mobile messaging services. Service providers thus not only obtain the data of those individuals who have consented to the data processing themselves, they also obtain the data of those affected who have not installed the respective messaging service at all and thus have not given their consent to the processing and storage of their data. This so-called 'mobile contact discovery' process constitutes a massive invasion of privacy.
0 Comments
Leave a Reply. |