Nicolas Mohnblatt

Privacy-preserving Contact Discovery for Bluesky

Last year, we released Arke [MSGJ24], a protocol for privacy-preserving contact discovery. We also shared an experimental prototype of the system which we used to run geo-distributed benchmarks for our paper. Since then, the paper has been peer-reviewed and published in ACM-CCS'24.

The goal is to allow users of an existing social graph (e.g., 𝕏) to find each other and construct a new graph (e.g., Bluesky) without revealing either of the social graphs nor publicly linking the existing and new accounts. I encourage you to read this article by Moxie Marlinspike for more context on why contact discovery is desirable and hard to do privately.

In this short note, I highlight how to apply our protocol to provide a contact discovery service for 𝕏 users joining Bluesky.

Actors

The protocol requires the following actors:

The number of authorities $n$ and threshold $t$ are parameters we get to choose. The fewer authorities there are, the faster users can get set up; on the flip-side it means we trust each authority a bit more.

Protocol overview

We give a high-level overview of the protocol, specialized for Bluesky’s use-case.

What is “a friend”?
We can choose what a friend means in our context. Could be:

  • users who follow me on 𝕏,
  • users I follow on 𝕏, or
  • an intersection or union of the above.

The great thing is that each user can set this to their preferences. The above assumes that the user client will be able to access the list of 𝕏 followers / following, either by logging in or scraping it.

Experimental performance

In our (very unoptimized) experiments, the user client running on an M1 Mac performed ≈2.5 seconds of computation per committee member it interacted with. Discovery is on the order of milliseconds per friend.

References

[MSGJ24] Nicolas Mohnblatt, Alberto Sonnino, Kobi Gurkan, and Philipp Jovanovic. 2024. Arke: Scalable and Byzantine Fault Tolerant Privacy-Preserving Contact Discovery. In Proceedings of the 2024 ACM SIGSAC Conference on Computer and Communications Security (CCS ’24). Published version: http://doi.org/10.1145/3658644.3670289. full version: https://eprint.iacr.org/2023/1218.

#Privacy #Threshold Cryptography #Identity-Based Encryption #Social Networks