How to Compute With Data You Can’t See

Discussion in 'privacy technology' started by lotuseclat79, Aug 3, 2015.

  1. lotuseclat79

    lotuseclat79 Registered Member

    Joined:
    Jun 16, 2005
    Posts:
    5,390
  2. mirimir

    mirimir Registered Member

    Joined:
    Oct 1, 2011
    Posts:
    9,252
    Cool!

    It's great that this has progressed so far, so quickly.
     
  3. deBoetie

    deBoetie Registered Member

    Joined:
    Aug 7, 2013
    Posts:
    1,832
    Location:
    UK
    Fantastic stuff, and extremely important. As a developer, I'd absolutely love to have this in a mainstream database, supported by the tools.

    What violates my Tos is simply how little money goes into this stuff, and how much into weaponisation. If even a fraction of the money they spent on that went into making this mainstream (and correspondingly making it mandatory for large classes of data storage), then we might be somewhat safer online.

    But then, they hate encryption, especially the stuff they can't read(!):)
     
  4. Keatah

    Keatah Registered Member

    Joined:
    Jan 13, 2011
    Posts:
    1,029
    Ehh.. You have this, and then you have OS'es that leak and **possibly offensive word removed** your data all over the place. So what's the point?
     
    Last edited by a moderator: Aug 4, 2015
  5. deBoetie

    deBoetie Registered Member

    Joined:
    Aug 7, 2013
    Posts:
    1,832
    Location:
    UK
    I think - although it would be more complicated - that these techniques outlined for back-end databases could also be extended to the untrustworthy client OS. If the data the OS sees is always encrypted, then you might get some more protection. For example, this could work with external hardware (e.g. dongles, keyboards), that performed crypto operations outside the address space and control of the main client, in which case the OS doesn't see the real data, but can perform operations on it. For example, this could securely protect against KSL, even if the OS had been owned.

    "All" that's then needed is an encrypting windowing system(!)
     
    Last edited by a moderator: Aug 4, 2015
  1. This site uses cookies to help personalise content, tailor your experience and to keep you logged in if you register.
    By continuing to use this site, you are consenting to our use of cookies.