When PETs misbehave: A Contextual Integrity analysis

Ero Balsa,Yan Shvartzshnaider
2023-12-05
Abstract:Privacy enhancing technologies, or PETs, have been hailed as a promising means to protect privacy without compromising on the functionality of digital services. At the same time, and partly because they may encode a narrow conceptualization of privacy as confidentiality that is popular among policymakers, engineers and the public, PETs risk being co-opted to promote privacy-invasive practices. In this paper, we resort to the theory of Contextual Integrity to explain how privacy technologies may be misused to erode privacy. To illustrate, we consider three PETs and scenarios: anonymous credentials for age verification, client-side scanning for illegal content detection, and homomorphic encryption for machine learning model training. Using the theory of Contextual Integrity, we reason about the notion of privacy that these PETs encode, and show that CI enables us to identify and reason about the limitations of PETs and their misuse, and which may ultimately lead to privacy violations.
Cryptography and Security,Computers and Society,Information Theory
What problem does this paper attempt to address?
The paper aims to explore the potential privacy infringement issues that Privacy-Enhancing Technologies (PETs) may bring in practical applications. Although PETs are generally believed to protect privacy without sacrificing functionality, these technologies can sometimes be misused or abused, leading to privacy violations. The author analyzes this phenomenon through the theory of Contextual Integrity (CI). The paper focuses on analyzing three types of PETs and their application scenarios: 1. **Anonymous credentials for age verification**: While this technology can reduce the exposure of personal information, it may be misused in certain situations. For example, forcing the use of anonymous credentials in services where identity verification is not required can actually weaken user privacy protection. 2. **Client-side scanning**: Although end-to-end encryption reduces the ability of law enforcement agencies to monitor illegal activities, client-side scanning technology can scan the content on user devices before encryption. This seemingly protects privacy but actually still violates the norms of information flow for users. 3. **Homomorphic encryption for machine learning model training**: While homomorphic encryption can protect the confidentiality of training data, if the model is used for commercial purposes after training rather than for the original context of healthcare improvement, it may violate the original intent of the data generation, thus infringing on privacy. Through these cases, the paper emphasizes that relying solely on technical means cannot completely solve privacy issues. It is necessary to consider the specific context of technology deployment and the social and technical background of information flow. Finally, the paper calls for more attention to the specific application contexts when designing and deploying PETs to ensure that these technologies truly protect privacy.