net4people / bbs

Forum for discussing Internet censorship circumvention
3.19k stars 75 forks source link

Lox: Protecting the Social Graph in Bridge Distribution (PETS 2023) #320

Open wkrp opened 6 months ago

wkrp commented 6 months ago

Lox: Protecting the Social Graph in Bridge Distribution Lindsey Tulloch, Ian Goldberg https://censorbib.nymity.ch/#Tulloch2023a Presentation video Source code

Lox is a bridge distribution system, a way of allocating scarce bridge resources (such as IP addresses) to users of a circumvention system. The challenge in bridge distribution is making bridges available to honest users, without revealing them all to a censor that wants to block them. To resist infiltration by censors, Lox uses a system of escalating trust levels and invitations by established users. It uses cryptography to keep the social graph of inviters and invitees private. Users that don't have an invitation can still bootstrap trust through an open-entry system, without a central identity arbiter.

Lox takes ideas from earlier bridge distribution systems. rBridge (2013) and Hyphae (2017) used invitations and anonymous credentials, but did not have a way for users to enter the system other than by being invited. Salmon (2016) introduced the idea of users advancing in trust levels over time, and had a way for new users to enter at trust level 0 without an invitation, but it required interfacing with a non-private third-party identity service, such as Facebook. Lox combines the best features of these other systems: invitations, trust levels, open entry for new users, and privacy of the social graph.

The core cryptographic tool in Lox is an unlinkable anonymous credential. It uses specifically the keyed algebraic MAC credentials of Chase et al. 2013, the same scheme used in Hyphae. A Lox credential represents the attributes:

(ID, Time, Trust level, Bridge bucket, Number of invitations, Number of blockages)

A user exchange credentials with a central server called the Lox Authority. On each interaction, the user reveals to the Lox Authority only the attributes that are necessary for that interaction, keeping the others hidden (Table 3). Each credential is used only once: after being redeemed, the Lox Authority re-issues the user a new credential to be used in the next interaction, with attributes modified as appropriate, and a new random ID.

Users are eligible to upgrade to higher trust levels after their bridges have remained unblocked for certain lengths of time (Table 2). This gives users an incentive to keep their bridges secret and not share them widely. At higher trust levels, users gain a limited number of invitations which they may spend to invite trusted friends into the system. The idea of inheritance is built into Lox; this is what prevents a censor from getting leverage by acting as numerous fake "sock puppet" users. When a new user is invited, they enter at trust level 1 and inherit the same bridges as the user that invited them. This way, a censor does not learn new bridges or gain additional privileges by inviting their own accounts. New users without an invitation enter at trust level 0 and are given bridges from a pool that is separate from the invitation pool. If one of a user's bridges gets blocked, there is a way for them to migrate to a new unblocked bridge, but a user with too many blockages is considered suspicious and will not be able to advance in trust levels or learn additional bridges from the trusted pool.

wkrp commented 6 months ago

A more elaborate treatment of Lox is available in Lindsey Tulloch's 2022 thesis.

Lox: Protecting the Social Graph in Bridge Distribution (142 pages)