“A Cryptographic Approach To Detect Serial Predators Of Sexual Misconduct” https://www.projectcallisto.org/callisto-cryptographic-approach.pdf … Yes, it looks like a poster child for “attempting a technological solution for a social problem”. And if you read the fine print, the crypto doesn’t do what it’s billed to.
(Because it’s impossible.) And there’s a serious risk of gaming. And yet… The basic idea to wait for two reports of misbehavior from the same person, and then connect the reporters with each other, is interesting. So is the proposal to split trust between tech and a human.
-
-
In particular, I can definitely imagine being willing to trust their lawyer not to take active measures to subvert the process, yet not wanting them - or any other human - to actually see the name. Hence, obfuscation can work even if it’s not exactly cryptographically sound.
Show this thread -
The other risk is data breaches. The paper describes some fancy cryptographic scheme that’s supposed to guard against them, but they acknowledge that at the end of the day, if you pwn the key server, you can effectively get all names. Maybe use hardware-enforced rate limiting?
Show this thread
End of conversation
New conversation -
-
-
The impossible part / gaming risk is: Someone sends an anonymous report naming themselves, and waits to see if they get put in contact with a “second” accuser. Crypto can’t stop this, because connecting accusers is the system working as designed. But maybe human judgement can.
Show this threadThanks. Twitter will use this to make your timeline better. UndoUndo
-
Loading seems to be taking a while.
Twitter may be over capacity or experiencing a momentary hiccup. Try again or visit Twitter Status for more information.