{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,4]],"date-time":"2024-09-04T08:49:11Z","timestamp":1725439751244},"reference-count":52,"publisher":"Privacy Enhancing Technologies Symposium Advisory Board","issue":"2","license":[{"start":{"date-parts":[[2022,3,3]],"date-time":"2022-03-03T00:00:00Z","timestamp":1646265600000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/creativecommons.org\/licenses\/by-nc-nd\/3.0"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2022,4,1]]},"abstract":"<jats:title>Abstract<\/jats:title>\n               <jats:p>Whistleblowing is hazardous in a world of pervasive surveillance, yet many leading newspapers expect sources to contact them with methods that are either insecure or barely usable. In an attempt to do better, we conducted two workshops with British news organisations and surveyed whistleblowing options and guidelines at major media outlets. We concluded that the soft spot is a system for initial contact and trust establishment between sources and reporters. <jats:italic>CoverDrop<\/jats:italic> is a two-way, secure system to do this. We support secure messaging within a news app, so that all its other users provide cover traffic, which we channel through a threshold mix instantiated in a Trusted Execution Environment within the news organisation. CoverDrop is designed to resist a powerful global adversary with the ability to issue warrants against infrastructure providers, yet it can easily be integrated into existing infrastructure. We present the results from our workshops, describe CoverDrop\u2019s design and demonstrate its security and performance.<\/jats:p>","DOI":"10.2478\/popets-2022-0035","type":"journal-article","created":{"date-parts":[[2022,3,5]],"date-time":"2022-03-05T04:33:11Z","timestamp":1646454791000},"page":"47-67","source":"Crossref","is-referenced-by-count":2,"title":["CoverDrop: Blowing the Whistle Through A News App"],"prefix":"10.56553","volume":"2022","author":[{"given":"Mansoor","family":"Ahmed-Rengers","sequence":"first","affiliation":[{"name":"OpenOrigins Limited and University of Cambridge"}]},{"given":"Diana A.","family":"Vasile","sequence":"additional","affiliation":[{"name":"Department of Computer Science and Technology , University of Cambridge"}]},{"given":"Daniel","family":"Hugenroth","sequence":"additional","affiliation":[{"name":"Department of Computer Science and Technology , University of Cambridge"}]},{"given":"Alastair R.","family":"Beresford","sequence":"additional","affiliation":[{"name":"Department of Computer Science and Technology , University of Cambridge"}]},{"given":"Ross","family":"Anderson","sequence":"additional","affiliation":[{"name":"Department of Computer Science and Technology , University of Cambridge"}]}],"member":"35752","published-online":{"date-parts":[[2022,3,3]]},"reference":[{"key":"2022060207202226392_j_popets-2022-0035_ref_001","unstructured":"[1] Signal Private Messenger - Apps on Google Play, 2019. https:\/\/play.google.com\/store\/apps\/details?id=org.thoughtcrime.securesms."},{"key":"2022060207202226392_j_popets-2022-0035_ref_002","unstructured":"[2] WhatsApp Messenger - Apps on Google Play, 2019. https:\/\/play.google.com\/store\/apps\/details?id=com.whatsapp&hl=en_GB."},{"key":"2022060207202226392_j_popets-2022-0035_ref_003","doi-asserted-by":"crossref","unstructured":"[3] Mansoor Ahmed-Rengers, Ilia Shumailov, and Ross Anderson. Snitches Get Stitches: On The Difficulty Of Whistleblowing. In Proceedings of the 27th International Workshop on Security Protocols, 2019.10.1007\/978-3-030-57043-9_27","DOI":"10.1007\/978-3-030-57043-9_27"},{"key":"2022060207202226392_j_popets-2022-0035_ref_004","unstructured":"[4] ArsTechnica. Have a confidential news tip for Ars Technica?, 2019. https:\/\/arstechnica.com\/news-tips\/."},{"key":"2022060207202226392_j_popets-2022-0035_ref_005","unstructured":"[5] Ferdinand Brasser, Urs M\u00fcller, Alexandra Dmitrienko, Kari Kostiainen, Srdjan Capkun, and Ahmad-Reza Sadeghi. Software Grand Exposure: SGX Cache Attacks Are Practical. arXiv e-prints, page arXiv:1702.07521, February 2017."},{"key":"2022060207202226392_j_popets-2022-0035_ref_006","doi-asserted-by":"crossref","unstructured":"[6] Peng Cheng, Ibrahim Ethem Bagci, Utz Roedig, and Jeff Yan. SonarSnoop: Active Acoustic Side-Channel Attacks, 2018.10.1007\/s10207-019-00449-8","DOI":"10.1007\/s10207-019-00449-8"},{"key":"2022060207202226392_j_popets-2022-0035_ref_007","unstructured":"[7] CNN. Tips, 2018. http:\/\/edition.cnn.com\/feedback\/tips\/."},{"key":"2022060207202226392_j_popets-2022-0035_ref_008","unstructured":"[8] China Daily. Contact us, 2019. http:\/\/www.chinadaily.com.cn\/e\/static_e\/contact."},{"key":"2022060207202226392_j_popets-2022-0035_ref_009","unstructured":"[9] Dawn. Contact us, 2019. https:\/\/www.dawn.com\/contact\/."},{"key":"2022060207202226392_j_popets-2022-0035_ref_010","unstructured":"[10] Private Eye. Contact, 2019. https:\/\/www.private-eye.co.uk\/about\/contact."},{"key":"2022060207202226392_j_popets-2022-0035_ref_011","unstructured":"[11] The Globe and Mail. PGP directory and SecureDrop links, 2018. PGP directory (https:\/\/sec.theglobeandmail.com\/pgp\/) and SecureDrop (https:\/\/sec.theglobeandmail.com\/securedrop\/)."},{"key":"2022060207202226392_j_popets-2022-0035_ref_012","unstructured":"[12] O Globo. Contact us (Portuguese), 2019. https:\/\/oglobo.globo.com\/fale-conosco\/."},{"key":"2022060207202226392_j_popets-2022-0035_ref_013","unstructured":"[13] Google Issue Tracker. Android o prevents access to \/proc\/stat, 2017. https:\/\/issuetracker.google.com\/issues\/37140047."},{"key":"2022060207202226392_j_popets-2022-0035_ref_014","doi-asserted-by":"crossref","unstructured":"[14] Johannes G\u00f6tzfried, Moritz Eckert, Sebastian Schinzel, and Tilo M\u00fcller. Cache attacks on intel sgx. In Proceedings of the 10th European Workshop on Systems Security, EuroSec\u2019 17, New York, NY, USA, 2017. Association for Computing Machinery.10.1145\/3065913.3065915","DOI":"10.1145\/3065913.3065915"},{"key":"2022060207202226392_j_popets-2022-0035_ref_015","unstructured":"[15] The Guardian. The NSA Files, 2013. https:\/\/www.theguardian.com\/us-news\/the-nsa-files."},{"key":"2022060207202226392_j_popets-2022-0035_ref_016","unstructured":"[16] The Guardian. How to contact the Guardian securely, 2017. https:\/\/www.theguardian.com\/help\/ng-interactive\/2017\/mar\/17\/contact-the-guardian-securely."},{"key":"2022060207202226392_j_popets-2022-0035_ref_017","unstructured":"[17] The Sydney Morning Herald. Contact us, 2019. https:\/\/www.smh.com.au\/contact-us."},{"key":"2022060207202226392_j_popets-2022-0035_ref_018","unstructured":"[18] Chatham House. Chatham house rule. https:\/\/www.chathamhouse.org\/about-us\/chatham-house-rule."},{"key":"2022060207202226392_j_popets-2022-0035_ref_019","unstructured":"[19] The Intercept. The Intercept welcomes whistleblowers, 2020. https:\/\/theintercept.com\/source\/."},{"key":"2022060207202226392_j_popets-2022-0035_ref_020","doi-asserted-by":"crossref","unstructured":"[20] H. Jayakrishnan and R. Murali. A simple and robust end-to-end encryption architecture for anonymous and secure whistleblowing. In 2019 Twelfth International Conference on Contemporary Computing (IC3), pages 1\u20136, 2019.10.1109\/IC3.2019.8844917","DOI":"10.1109\/IC3.2019.8844917"},{"key":"2022060207202226392_j_popets-2022-0035_ref_021","unstructured":"[21] Joseph Johnson. Daily active users (DAU) of leading iPhone news apps in the United Kingdom (UK) during October 2020, 2020. https:\/\/www.statista.com\/statistics\/878573\/leading-iphone-news-apps-dau-united-kingdom\/."},{"key":"2022060207202226392_j_popets-2022-0035_ref_022","unstructured":"[22] Wall Street Journal. Contact us, 2019. https:\/\/customercenter.wsj.com\/contact."},{"key":"2022060207202226392_j_popets-2022-0035_ref_023","unstructured":"[23] The Mainichi. Contact form, 2019. https:\/\/form.mainichi.jp\/mdn\/common\/content.html."},{"key":"2022060207202226392_j_popets-2022-0035_ref_024","unstructured":"[24] Sinisa Matetic, Mansoor Ahmed, Kari Kostiainen, Aritra Dhar, David Sommer, Arthur Gervais, Ari Juels, and Srdjan Capkun. ROTE: Rollback protection for trusted execution. In 26th USENIX Security Symposium (USENIX Security 17), pages 1289\u20131306, Vancouver, BC, August 2017. USENIX Association."},{"key":"2022060207202226392_j_popets-2022-0035_ref_025","unstructured":"[25] Susan E McGregor, Polina Charters, Tobin Holliday, and Franziska Roesner. Investigating the computer security practices and needs of journalists. In 24th {USENIX} Security Symposium ({USENIX} Security 15), pages 399\u2013414, 2015."},{"key":"2022060207202226392_j_popets-2022-0035_ref_026","unstructured":"[26] Le Monde. Contact the editor (French), 2019. https:\/\/www.lemonde.fr\/faq\/?question=28465-contacter-redaction-28465."},{"key":"2022060207202226392_j_popets-2022-0035_ref_027","unstructured":"[27] BBC News. How to share your questions, stories, pictures and videos with BBC News, 2018. https:\/\/www.bbc.co.uk\/news\/10725415."},{"key":"2022060207202226392_j_popets-2022-0035_ref_028","unstructured":"[28] BBC News. \u2019whistleblower\u2019 taped to chair and gagged, 2018. https:\/\/www.bbc.co.uk\/news\/uk-scotland-44222575."},{"key":"2022060207202226392_j_popets-2022-0035_ref_029","unstructured":"[29] BuzzFeed News. Share tips securely & anonymously, 2018. https:\/\/contact.buzzfeed.com\/?country=en-uk."},{"key":"2022060207202226392_j_popets-2022-0035_ref_030","unstructured":"[30] Alexander Nilsson, Pegah Nikbakht Bideh, and Joakim Brorsson. A survey of published attacks on intel sgx, 2020."},{"key":"2022060207202226392_j_popets-2022-0035_ref_031","unstructured":"[31] The Times of India. Main page, 2019. https:\/\/timesofindia.indiatimes.com."},{"key":"2022060207202226392_j_popets-2022-0035_ref_032","unstructured":"[32] Spiegel Online. How to contact the Spiegel (German), 2019. https:\/\/www.spiegel.de\/extra\/so-nehmen-informanten-sicheren-kontakt-zum-spiegel-auf-a-1030502.html."},{"key":"2022060207202226392_j_popets-2022-0035_ref_033","unstructured":"[33] El Pais. Contact us (Spanish), 2019. https:\/\/elpais.com\/estaticos\/contacte\/."},{"key":"2022060207202226392_j_popets-2022-0035_ref_034","unstructured":"[34] The Washington Post. Send a letter to the editor, 2019. https:\/\/helpcenter.washingtonpost.com\/hc\/en-us\/articles\/236004788-Send-a-letter-to-the-editor."},{"key":"2022060207202226392_j_popets-2022-0035_ref_035","unstructured":"[35] ProPublica. NY Fed Fired Examiner Who Took on Goldman, 2013. https:\/\/www.propublica.org\/article\/ny-fed-fired-examiner-who-took-on-goldman."},{"key":"2022060207202226392_j_popets-2022-0035_ref_036","unstructured":"[36] Seth Rosenblatt. NSA likely targets anybody who\u2019s \u2019Torcurious\u2019, July 2014. https:\/\/www.cnet.com\/news\/nsa-likely-targets-anybody-whos-tor-curious\/."},{"key":"2022060207202226392_j_popets-2022-0035_ref_037","doi-asserted-by":"crossref","unstructured":"[37] Volker Roth, Benjamin G\u00fcldenring, Eleanor Rieffel, Sven Dietrich, and Lars Ries. A secure submission system for online whistleblowing platforms. In International Conference on Financial Cryptography and Data Security, pages 354\u2013361. Springer, 2013.10.1007\/978-3-642-39884-1_30","DOI":"10.1007\/978-3-642-39884-1_30"},{"key":"2022060207202226392_j_popets-2022-0035_ref_038","unstructured":"[38] Scott Ruoti, Jeff Andersen, Daniel Zappala, and Kent E. Seamons. Why Johnny Still, Still Can\u2019t Encrypt: Evaluating the Usability of a Modern PGP Client. CoRR, abs\/1510.08555, 2015."},{"key":"2022060207202226392_j_popets-2022-0035_ref_039","doi-asserted-by":"crossref","unstructured":"[39] Andrei Serjantov, Roger Dingledine, and Paul Syverson. From a trickle to a flood: Active attacks on several mix types. In International Workshop on Information Hiding, pages 36\u201352. Springer, 2002.10.1007\/3-540-36415-3_3","DOI":"10.1007\/3-540-36415-3_3"},{"key":"2022060207202226392_j_popets-2022-0035_ref_040","unstructured":"[40] Steve Sheng, Levi Broderick, Jeremy J Hyland, and Colleen Alison Koranda. Why johnny still can\u2019t encrypt: evaluating the usability of email encryption software, 02 2019."},{"key":"2022060207202226392_j_popets-2022-0035_ref_041","unstructured":"[41] Der Spiegel. Former US Official Reveals Risks Faced by Internal Critics, 2016. http:\/\/www.spiegel.de\/international\/world\/ex-us-official-reveals-risks-faced-by-internal-govt-critics-a-1093360-2.html."},{"key":"2022060207202226392_j_popets-2022-0035_ref_042","unstructured":"[42] The Sun. The sun launches whistleblowers\u2019 charter, 2015. https:\/\/www.thesun.co.uk\/archives\/news\/142181\/the-sun-launches-whistleblowers-charter\/."},{"key":"2022060207202226392_j_popets-2022-0035_ref_043","unstructured":"[43] S\u00fcddeutsche Zeitung. So erreichen Sie das Investigativ-Team der S\u00fcddeutschen Zeitung, 2020. https:\/\/www.sueddeutsche.de\/projekte\/kontakt\/."},{"key":"2022060207202226392_j_popets-2022-0035_ref_044","unstructured":"[44] The NYT Open Team. To serve better ads, we built our own data program, 2020. https:\/\/open.nytimes.com\/to-serve-better-ads-we-built-our-own-data-program-c5e039bf247b."},{"key":"2022060207202226392_j_popets-2022-0035_ref_045","unstructured":"[45] New York Times. Russian Bank Reformer Dies After Shooting, 2006. https:\/\/www.nytimes.com\/2006\/09\/15\/world\/europe\/15russia.html?_r=1&oref=slogin."},{"key":"2022060207202226392_j_popets-2022-0035_ref_046","unstructured":"[46] New York Times. Manning Sentenced to 35 Years for a Pivotal Leak of U.S. Files, 2013. https:\/\/www.nytimes.com\/2013\/08\/22\/us\/manning-sentenced-for-leaking-government-secrets.html."},{"key":"2022060207202226392_j_popets-2022-0035_ref_047","unstructured":"[47] New York Times. Got a confidential news tip?, 2018. https:\/\/www.nytimes.com\/tips."},{"key":"2022060207202226392_j_popets-2022-0035_ref_048","unstructured":"[48] Stephan van Schaik, Andrew Kwong, Daniel Genkin, and Yuval Yarom. SGAxe: How SGX fails in practice. https:\/\/sgaxeattack.com\/, 2020."},{"key":"2022060207202226392_j_popets-2022-0035_ref_049","unstructured":"[49] Alma Whitten and J. D. Tygar. Why Johnny Can\u2019T Encrypt: A Usability Evaluation of PGP 5.0. In Proceedings of the 8th Conference on USENIX Security Symposium - Volume 8, SSYM\u201999, Berkeley, CA, USA, 1999. USENIX Association."},{"key":"2022060207202226392_j_popets-2022-0035_ref_050","unstructured":"[50] Wikileaks. Submit documents to WikiLeaks, 2016. https:\/\/wikileaks.org\/Press.html#submit_help_contact."},{"key":"2022060207202226392_j_popets-2022-0035_ref_051","unstructured":"[51] Wikipedia. Indictment and arrest of Julian Assange, 2019. https:\/\/en.wikipedia.org\/wiki\/Indictment_and_arrest_of_Julian_Assange."},{"key":"2022060207202226392_j_popets-2022-0035_ref_052","unstructured":"[52] WIRED. How to tip WIRED anonymously, 2019. https:\/\/www.wired.com\/securedrop\/."}],"container-title":["Proceedings on Privacy Enhancing Technologies"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.sciendo.com\/pdf\/10.2478\/popets-2022-0035","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,7,20]],"date-time":"2022-07-20T16:32:00Z","timestamp":1658334720000},"score":1,"resource":{"primary":{"URL":"https:\/\/petsymposium.org\/popets\/2022\/popets-2022-0035.php"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,3,3]]},"references-count":52,"journal-issue":{"issue":"2","published-online":{"date-parts":[[2022,3,3]]},"published-print":{"date-parts":[[2022,4,1]]}},"alternative-id":["10.2478\/popets-2022-0035"],"URL":"https:\/\/doi.org\/10.2478\/popets-2022-0035","relation":{},"ISSN":["2299-0984"],"issn-type":[{"value":"2299-0984","type":"electronic"}],"subject":[],"published":{"date-parts":[[2022,3,3]]}}}