Privacy

Mar. 27th, 2008 10:03 am
jducoeur: (Default)
[personal profile] jducoeur
Note to self: time to start figuring out my privacy policy vis a vis the government.

For the most part, privacy is going to be pretty clearly delineated in CommYou, same as in LJ: you say who can read your conversations, and I do my best to enforce those restrictions. But in the post-Patriot Act world, CommYou's relationship with the US government is potentially complicated, especially if I develop any real amount of international membership. Or, to put it more concretely: I need to figure out how I respond if the FBI shows up and demands access to somebody's private conversations.

With any luck, things will begin to get a little more rational after the election -- in particular, I have some hope that a Democratic president might at least put real teeth back into FISA oversight, so I can demand a clear court order and make that demand stick. But I probably have to assume that things have fundamentally changed enough that, even with the Republicans out of office, some of the climate of fear (and consequent governmental invasions of privacy) will continue.

Gah: really not stuff I want to be thinking about. And I probably have at least six months after launch before CommYou matters enough for the government to even notice its existence. But I need to be pondering this now, before it becomes A Problem, because the panic after getting a call from the FBI is *not* the time to be designing well-thought-out policy...

(no subject)

Date: 2008-03-27 02:12 pm (UTC)
From: [identity profile] zachkessin.livejournal.com
Personally I would have something in there about "I am not going to go to jail to protect your privacy" you may disagree but it is something I would stick by. You should probably talk to some lawyers about this of course as well.

(no subject)

Date: 2008-03-27 02:18 pm (UTC)
From: [identity profile] umbran.livejournal.com
Ouch, yes, that's a difficulty. We have the luck of having a major university's lawyers (and, by extension, much of higher education) backing us up. You're on your lonesome, and that's a bit scary.

(no subject)

Date: 2008-03-27 02:23 pm (UTC)
From: [identity profile] talvinamarich.livejournal.com
Our Privacy Policy

In the world we wish to create, in the world we wish we lived in, everyone would enjoy a right to privacy.

This service exists in and is governed by the laws of this world: the laws of nation-states, the laws of science, the laws of social interaction, the laws of common-sense, the laws that we like and the laws that we hate.

Both you and this service are at the heartless mercy of those laws and those who write and interpret them.

If you post something here, someone will be able to read it. We cannot guarantee that that person will have your best interests at heart. They may work for our government, for another government, for a tabloid, or it may be some bored kid with a computer that is worth more than he has earned up to this point in his short life. It might even be a "friend" who isn't, really.

If you threaten or attempt to hurt someone, you waive all pretense to a right to privacy in our eyes. If you trade in or conduct business that some jurisdiction that is touched by the Internet considers unlawful or within their power to regulate, it is possible, even probable, that they will attempt to compel us to cooperate with them. This may be done according to what you or I consider to be our inalienable rights--or not.

We did not create this service with the intent of depriving you of privacy. Our intentions are totally opposite: we wish to give you the level of privacy you wish to enjoy.

But we're not going to lie to you, so please don't come crying to us when we are pushed aside and rendered irrelevant in matters of privacy. We can't help you: we're in the same boat.

Enjoy your stay with us!

(no subject)

Date: 2008-03-27 02:50 pm (UTC)
From: [identity profile] baron-steffan.livejournal.com
I like that a lot. Speaking as a Clueless Mere User [tm], it's straightforward, honest, and something I can accept given the realities of the current zeitgeist we operate in.

(no subject)

Date: 2008-03-27 02:54 pm (UTC)
From: [identity profile] talvinamarich.livejournal.com
Thank you.

I considered beginning with ,"I thought we would start this Privacy Policy 'by taking some time out of our daily lives to sit down and have a little chat.'"

But that would have been a bit much. :P

(no subject)

Date: 2008-03-27 02:55 pm (UTC)
From: [identity profile] zachkessin.livejournal.com
Personally I assume that anything that is published without a friendslock on LJ can be read by anyone who wants to*, anything with a friends lock I assume will stand up to moderate scrutiny by people I don't want to read it. What do I mean by that, well using a friends lock to plan a surprise party will probably work, a bank heist not as much. I assume if someone shows up at your door with a court order your response is and should be "Ok here is what you asked for".

(no subject)

Date: 2008-03-28 02:25 pm (UTC)
From: [identity profile] talvinamarich.livejournal.com
Make no mistake: my tongue was in my cheek the whole time.

Bit my tongue, though. Ow.

(no subject)

Date: 2008-03-27 02:24 pm (UTC)
From: [identity profile] dreda.livejournal.com
What's the current state of provider responsibilities? I'm pretty sure that ISPs are no longer being held accountable, but I'm not sure about people like, say, Google for gmail or Yahoo for Hotmail. I would tend to think that you'd fall closer to them from a legal standpoint.

Too bad you inherently can't take the librarian tack, and not ever have any information on hand to surrender...

(no subject)

Date: 2008-03-27 02:24 pm (UTC)
From: [identity profile] metahacker.livejournal.com
...or, after they steal seize your computers and retroactively tell you about it.

My thoughts on this include making the chain of weak links visible. "All administrators to this system can see your posts, but promise by contract not to look. The hosting site can see your stuff; see their policy [here]. The government can order any of us to disclose; details [here]. Finally, assuming the site might one day be compromised, [here]'s what we do about it (encryption, backups, etc.)."

Unfortunately I do not anticipate the Patriot and attending acts to disappear any time soon, not unless we re-elect most of Congress. It's not like the act passed by a small, partisan margin.

(no subject)

Date: 2008-03-28 02:24 pm (UTC)
From: [identity profile] metahacker.livejournal.com
buyer's remorse

Heh. Interesting way to phrase it. :)

(no subject)

Date: 2008-03-27 02:38 pm (UTC)
From: [identity profile] goldsquare.livejournal.com
You would have no choice. Just admit to what you can control, and admit to what you can't. (Besides, unencrypted bits are powned by the US already, if the news stories are true.)

(no subject)

Date: 2008-03-28 02:52 pm (UTC)
From: [identity profile] goldsquare.livejournal.com
I think it would be a positive feature in a product SIMILAR to yours, to allow or permit end to end encryption. I'm not sure how a tool for social communication in Facebook really needs it, though.

It is also worth considering that, if you provide such encryption tools or the embedding of encrypted materials, you'll never know if bad guys are using it too. (Define bad guy for yourself - bad is subjective.)

I suppose you could encrypt logs and other persistent data, and that you could make a good argument for doing so.

If you were building something like the old eRoom tool, or other workplace tools, then I could see how end-to-end confidentiality would be critical. Do you have such a model as your target? Or is this more "Whatya doin'", "Nuthin", "Wanna see a movie?", "Yah" stuff, then your concerns are misplaced.

(no subject)

Date: 2008-03-27 02:52 pm (UTC)
dsrtao: dsr as a LEGO minifig (Default)
From: [personal profile] dsrtao
What people say in public places is going to be recorded. CommYou is largely going to be public places, yes? Will there be any private conversations? Not without end-to-end crypto.

What you can do that would make *me* feel better:
- when the owner of a conversation deletes it, everything should go away except a log entry saying 'owner deleted conversation'.
- logs should be minimal. You can't turn over information you don't have.

(no subject)

Date: 2008-03-27 03:29 pm (UTC)
mindways: (Default)
From: [personal profile] mindways
Brainstorming additional measures that would be reassuring, if you wanted to go there:

- To only accomodate subpoenas and such made via the US legal system. (ie: if a representative of some foreign government calls you up and tries to badger you into getting some conversation's info, the response would be "I'm sorry, no".)

- To explicitly say "while we don't provide tools for it, if you want to encrypt your conversation, feel free"; perhaps providing pointers to some simple tools therefor.

- To provide support for some sort of client-side encryption integration.

- For those "by word-of-mouth invite only" conversations, support encryption of whatever conversation data is stored in the DB. I.e.: the actual passphrase for the conversation is never stored on your servers [just a one-way hash of it for "you can view this" authentication], and is used as a key for some form of encryption pre-storage and decryption post-retrieve. This is, admittedly, of limited benefit - it wouldn't help if you became legally required to capture the information on an encrypted conversation, since it would be trivial to change your code such that you stored that incoming key the next time someone used it. But it would mean that no-longer-active conversations of that sort couldn't be accessed (since nobody would be sending the key over anymore). It would also provide a little bit of extra protection vs. hackers (regular or state-sponsored); someone simply grabbing a copy of your database wouldn't be able to access those conversations without also doing the above sort of monitoring.

(no subject)

Date: 2008-03-27 05:15 pm (UTC)
laurion: (Default)
From: [personal profile] laurion
Hmm. For some reason, Ghandi comes to mind. "Be the change you want to see in the world". Your policy should reflect your own values and stance on privacy, and while the Feds may have the ability to abrogate that, you should make it as easy as possible for them to follow along with your philosophy, and as difficult as possible for them to do otherwise.

(no subject)

Date: 2008-03-27 05:17 pm (UTC)
From: [identity profile] fairdice.livejournal.com
Who's hosting your data and your backups? If you don't have physical control, then it's unlikely that whatever policy you develop will be the limiting factor. Even if you do have physical control, you don't have a legal department. So you should assume -- and certainly all of your users should assume -- that anything that you (=the admin) can read, the FBI can read too, if they want to.

If you want to encrypt private conversations such that only legitimate readers have decryption keys, more power to you, and you should advertise as such (eg "if you lose the key, the data is gone, and we have no way to recover it").

(no subject)

Date: 2008-03-28 12:04 am (UTC)
From: [identity profile] herooftheage.livejournal.com
If it were me, what I'd do is this (with handwaving because I don't actually know how the details work): encrypt everything and hand keys to whatever groups get to read the lists. Make it in such a way that you simply cannot grab a key yourself - for example, have some off-shore key company hold onto them for your users. You also can't write code to allow you into his group willy-nilly. Perhaps the same off-shore company does the group-assignment with verification function. This is going to cause you some amount of merry hell when it comes to bug fixing, since you only get to see the encrypted version of other people's data streams, but your stuck there. You also need a way for your customers to verify that its the off-shore company doing the security checks.

Now if I understand things correctly, once the government comes calling, you aren't allowed to go telling your customers to run for cover. However, if they care, they can see it for themselves, once you are forced over into switching into some other way to do the key checks, and then they can make what inferences they would.

Possible...

Date: 2008-03-28 12:59 pm (UTC)
From: [identity profile] metageek.livejournal.com
This would be possible, though you'd need a Java applet to do the crypto, which leaves out users who don't have Java for one reason or another. (In theory, you could use JavaScript, but the performance is likely to be lousy.) With the local-storage APIs, you could store the keys locally, so that you don't have to hold on to them yourself. You could even provide a way for the users to distribute them out of band, so you never see them at all.

Of course, the problem then is that you're exporting crypto software, which is still regulated.

Re: Possible...

Date: 2008-03-28 02:26 pm (UTC)
From: [identity profile] herooftheage.livejournal.com
Also, you have to prove to the end user you don't have a secret back door into his security, or that a later update of the software doesn't add one. I suspect that means supplying source code and the path for turning source code into the compiled version, so the user can check to see that the executables are a direct result of the source.


Re: Possible...

Date: 2008-03-28 02:58 pm (UTC)
From: [identity profile] metageek.livejournal.com
That would be good, but you could go a long way without that.

Of course, all the browsers include public-key crypto, to implement SSL; in theory, they could expose that to JavaScript. Um...<dig, dig>...Mozilla does that, but it looks like it might not let JavaScript encrypt anything; it might be just for signing.

There are various all-JavaScript implementations of cryto code, including at least one public-key implementation.

Re: Possible...

Date: 2008-03-30 01:23 am (UTC)
From: [identity profile] metageek.livejournal.com
Yeah, I've seen that there are client-side storage APIs in Firefox and IE, but I haven't looked into them, so I don't know their limitations.

Profile

jducoeur: (Default)
jducoeur

July 2025

S M T W T F S
  12345
6789101112
13141516171819
20212223242526
27 28293031  

Most Popular Tags

Style Credit

Expand Cut Tags

No cut tags