16:56:12 RRSAgent has joined #privacy 16:56:12 logging to http://www.w3.org/2016/02/25-privacy-irc 17:01:48 npdoty has joined #privacy 17:02:22 npdoty has changed the topic to: Privacy Interest Group, WebEx: https://mit.webex.com/mit/j.php?MTID=m24b262ddc3fb25b05432eb85bd431a93 17:02:56 present+ keiji 17:03:18 present+ npdoty 17:03:46 Hello all - we're waiting for a few more to join on the phone before starting today. 17:06:51 Any scribe volunteers? 17:07:02 I can scribe, I don't think I'm as actively involved in any of today's agenda 17:07:08 Thanks, Nick! 17:07:16 scribenick: npdoty 17:07:20 present+ gnorcie 17:08:25 Topic: Introductions 17:08:31 tara: introductions from those on the phone 17:09:10 WebRTC chair @@, can answer specific questions about WebRTC under review right now 17:09:23 stefanh has joined #privacy 17:09:40 s/@@/stefanh/ 17:10:06 Topic: WebRTC discussion 17:10:14 HotBlack has joined #privacy 17:10:15 tara: a lot of activity on the mailing list on this topic 17:10:24 ... when is feedback most useful? 17:10:58 present+ fjh 17:11:02 fjh has joined #privacy 17:11:24 stefanh: current status is working quite hard to reach Candidate Recommendation status, but at least a couple of months away 17:11:41 ... still have some issues to sort out related to control of audio/video sent to remote location 17:11:44 Present+ chaals 17:11:57 Present+ Frederick_Hirsch 17:11:58 ... meeting later tonight related to establishing connectivity to @@@ 17:12:31 http://www.w3.org/mid/1447FA0C20ED5147A1AA0EF02890A64B374555EC@ESESSMB209.ericsson.se 17:12:46 s/@@@/a peer/ 17:13:18 q+ 17:13:37 stefanh: have been considering privacy actively over the years, not at all that we have disregarded it 17:13:45 ack np 17:14:41 npdoty: based on earlier privacy feedback or discussion, is there a list of privacy issues and the current status? 17:14:54 stefanh: most concrete thing would be to look at the privacy and security section of the draft 17:15:13 ... there is a lot of discussion, in issues/bugs and in connected working groups (including at IETF) 17:15:19 ... no strict boundaries between those 17:15:45 q+ 17:16:18 npdoty: will look at that section, and previous feedback/ TPAC discussion 17:16:22 ack k 17:16:48 keiji: in reading privacy/security considerations of the spec, group recognized the various issues, but not always clear how issues were solved or mitigated 17:17:20 ... change to the same-origin policy because of p2p communication 17:17:37 gnorcie has joined #privacy 17:17:51 ... or client-side or device id leakage 17:18:19 can i get in queue to speak on WebRTC? 17:18:22 ... document recognizes the issue but doesn't provide justification 17:18:26 q+ gnorcie 17:18:41 thanks nick... i need to read up on w3c etiquitte 17:18:43 :) 17:19:07 ack g 17:19:21 gnorcie: one thing I noticed was the leaking of local IP addresses 17:19:45 q+ to point out that W3C *can* comment on user interfaces. 17:20:06 * cannot 17:20:08 *can't 17:20:24 ... also might be troubling that once a WebRTC connection has been granted, could be very difficult for a non-expert user to discover/revoke 17:20:46 stefanh: hear keiji in saying that we should provide more documentation on countermeasures and why we made the decision 17:21:07 sorry 17:21:30 gnorcie: concerned that local IP address leakage could lead to physical danger to the user 17:22:01 q+ 17:22:12 stefanh: current design is to provide local IP address at the same time as the access to camera/microphone, so as to avoid multiple permission prompts that might confuse users 17:22:37 ... with the idea being that camera/microphone are typically more sensitive than IP address 17:22:38 ack ke 17:22:54 (Will get to you shortly, chaals!) 17:22:56 q? 17:23:02 q? 17:23:48 keiji: the purpose of breaking the same-origin policy is @@ 17:24:21 ... some indications of whether the privacy/security concern is acceptable 17:24:40 ... have live example of ad networks using WebRTC for accessing IP address 17:24:50 ... so should have a countermeasure in response to that, with documentation 17:25:35 stefanh: current design is that private local IP address is no longer accessible (for example to advertiser) unless also granting a camera/microphone permission 17:26:15 ... considering an option where top page would have to explicitly give the iframes permission to ask for camera/microphone 17:26:26 keiji: would be useful to have that documented in privacy/security section 17:26:39 stefanh: would be helpful if someone can consolidate these requests into text after the call 17:27:08 ack chaals 17:27:08 chaals, you wanted to point out that W3C *can* comment on user interfaces. 17:27:25 chaals: re gnorcie, W3C does make requirements of user interfaces in various places 17:27:44 ... the general plan is to be minimally constraining on UI, because heavy constraints tends to limit good UI ideas 17:28:14 s/the purpose/the reason/ 17:28:16 ... in areas like security/privacy, it may well be very important to describe certain requirements on UI 17:28:38 stefanh: WebRTC implementations vary, between Chrome and Firefox for example, on stored permissions 17:29:14 stefanh: getUserMedia specification which describes user interface, recommends that that only be allowed over secure (HTTPS) connections 17:29:18 q+ 17:29:22 s/policy is @@/policy is acceptable is not clear. It is just saying that should be O.K. because Web Socket is doing which does not make sense./ 17:29:24 q- 17:29:25 ... and implementations have followed 17:29:36 q+ 17:29:47 ack k 17:29:52 q+ on timing 17:30:07 keiji: as a user, want to know where I'm connecting to with a particular device input 17:30:21 ... or is there still not consent on what kind of information is being sent to whom? 17:30:40 stefanh: the user is not able to specifically consent on that. 17:31:19 ... once the application has access to the microphone/camera, it could record and send it to a server, which could then send it elsewhere (via websocket, or server-to-server communication) 17:31:36 ... and so WebRTC allows the application to set up a connection to a peer 17:31:55 keiji: would like to give users control over that, where their information goes 17:32:17 stefanh: didn't seem to make sense to control where it goes, given that the API provides recording access and there isn't a way to control what is done with the recording 17:32:55 keiji: a natural interest in wanting to know, when using WebEx for example, to know when I'm speaking or who it's going to 17:32:56 q+ 17:33:10 may i please be added to the queue 17:33:15 q+ gnorcie 17:33:16 RE: webrtc 17:35:01 npdoty: Keiji is asking about the issue of the user being uncomfortable about where their data is/may be going. 17:35:32 npdoty: Which items (indicators) are going to left up to the application, and which in the user agent? 17:36:17 for example, camera light should be on when the camera is active, that shouldn't be left up to the application 17:36:18 q+ 17:36:24 q- 17:36:37 q? 17:36:48 ack gn 17:37:15 stefan: yes, and it would be hard for the user agent to provide all the relevant information, depending on the user model in the application 17:37:30 gnorcie: what information is available prior to a permission prompt? 17:38:46 ... and for a user of Tor, what is an activist who is using this software to do when they might have to choose between communicating and revealing sensitive local information? 17:39:04 stefanh: a widely discussed topic, if we take this to email, can provide more specific questions and answers 17:39:06 ack ke 17:39:18 tara: can summarize our questions after the call 17:39:45 keiji: giving control to user agent or to application is a design decision 17:40:05 ... don't currently see the reasoning on choice of where those controls rely 17:40:18 ... if that is documented, we could understand better 17:40:26 q? 17:40:59 npdoty: some groups don't want to provide that detail in the spec, but might be in another document to consult. 17:41:15 npdoty: but it would help reviewers to be able to find it and read it somewhere 17:41:37 tara: thanks so much for that 17:41:46 ... I'll summarize after the call 17:42:03 ... understand the issues 17:42:50 stefan: regarding scheduling, have a little more time, into March certainly 17:42:51 +q 17:43:10 Topic: Device APIs 17:43:39 fjh: have a Vibration Rec, and are considering updating it 17:43:49 Thanks, Stefan! 17:44:02 ... updating it with errata, and also could add a privacy/security section that was missing 17:44:13 ... and hearing now about a lot of novel attacks that use vibration 17:44:33 chaals: combining vibration apis with motion sensing apis that will let you uniquely fingerprint a device 17:44:51 ... if you can make a device vibrate, you can physically observe which device/user that is 17:45:33 https://lists.w3.org/Archives/Public/public-privacy/2016JanMar/0016.html 17:45:38 ... motion sensing can be used to detect things like entering pins or passwords 17:45:44 https://github.com/anssiko/vibration/commit/48489c54e0b7ed80900e0906fa79803c8fa77069 17:45:52 q+ on cross-device communication 17:46:03 fjh: group will craft language to highlight the possible threats 17:46:14 ... but applications will need to be aware of these things as well 17:46:23 ack gn 17:46:46 gnorcie: arbitrary length patterns of vibrations is possible 17:46:56 ... that pattern could be picked up by a second device 17:47:34 ... could have short or long options 17:47:52 q+ 17:48:06 ... but then could imagine static source code review to identify when that's happening 17:48:33 ack np 17:48:33 npdoty, you wanted to comment on cross-device communication 17:49:00 We had this issue with the Ambient Light spec - cross-device tracking. 17:49:07 (that was npdoty) 17:49:29 npdoty: can we at least detect if this is happening and alert user? 17:49:42 fjh: no problem with materially adding security considerations and make it as useful and clear to the implementers 17:49:51 ... more concerned about changing the API 17:50:10 ... as a risk management strategy 17:50:11 q+ 17:50:31 +q 17:50:40 ... how does cross-device communication rank among other attacks related to fingerprinting? 17:51:06 ... seems to me that you could do a source-code examination with the current status of the API right now 17:51:10 ack fjh 17:51:24 ack gnorcie 17:51:51 gnorcie: people have gotten better at examining permissions, at understanding the different scopes of permissions that might be excessive 17:52:20 ... people are thinking creatively about exploiting when their application has some mental model for using a microphone permission, but then using it for other purposes 17:52:32 ... a feasible and prominent attack 17:52:46 q+ on cross-device vs. fingerprinting 17:52:58 ack ch 17:53:51 chaals: re: managing the cross-device risk, could do better at limiting *when* access is possible 17:54:31 ... vibration API use case is also important for a blind or visually-impaired user to explore an image 17:54:54 ... randomization effects would cause blurring for a user, effectively 17:55:11 ack no 17:55:14 ack np 17:55:14 npdoty, you wanted to comment on cross-device vs. fingerprinting 17:55:53 Right, we should consider Cross device tracking as a risk 17:56:00 q+ 17:56:09 [+1 that fingerprinting and cross-device cases are different… A device might be "building surveillance system"…] 17:56:28 agreed, fingerprinting and cross-device cases are different 17:56:38 as an aside i have a blind friend I can consult with on the accessibility issue 17:56:42 if desired 17:57:16 npdoty: difference between fingerprinting and cross-device 17:57:21 ... and detectability as a level of mitigation 17:57:54 ack f 17:58:41 Privacy questionnaire 17:58:49 fjh: thanks for including the cross-device use case, group will talk about that 17:58:57 Topic: Privacy questionnaire 17:59:01 Thanks for moving to GitHub! 17:59:11 gnorcie: questionnaire on github which might be easier for contribution 17:59:25 ... would like to try out the questionnaire on some of the more difficult questions 17:59:39 ... user interface, notice, consent, issues like that 18:00:11 Topic: Wrap-up 18:00:33 looking at March 24 or March 31, if people know of conflicts, please let us know 18:00:36 I lied 18:00:39 having trouble finding 18:00:43 [24 March: W3C Advisory Committee meeting] 18:00:44 I will send to ping list 18:00:50 see ya'al 18:00:54 Okay, Greg! 18:01:53 yes, I will 18:02:19 RRSagent, make minutes 18:02:19 I have made the request to generate http://www.w3.org/2016/02/25-privacy-minutes.html keiji 18:02:57 RRSAgent, make logs public