ROBERT-proximity-tracing/documents

EBID contain user/phone ID

pfif opened this issue · 0 comments

pfif commented

Problem : All EBID (ID sent by bluetooth) contain an encrypted
version of the phone's ID. The key1 used to encrypt the EBID is
stored on the server.

Here is an attack vector: a malicious actor sets up a computer that
records all the EBID broadcasted from the phone. It then manage to
obtain the key/keys used by the server to encrypt the EBID2, and
decrypt them all. The malicious user will then have a record of all
the user ID that came near that hub.

Possible solution?: Have EBID be random strings, and store these in a
map EBID -> ID. A trie data structure might also be used in order to make
the retrival of an ID for an EBID among 86 400 000 0003 fast?

1 Maybe that key is rotated, maybe not, it's not specified.

2 Not that far fetch an idea when you consider the amount of hacks and password leaks in recent years. It could also be a malicious state actor getting to power.

3 (one key for every quarters over two week, for 30 000 000 users)