So, this is a stupid project I came up with that might work. It attempts to solve the problem that phone manuf actors can abuse there phone recovery service to track you by offloading the task of activating the tracking daemon on the phone from the service provider to the user and the Etherium network.
This should also work on IOTA. But I'll focus on Etherium for now. (I started designing it for Etherium, but IOTA seems to be a better way to go. Really, just replace Etheriun to IOTA int the later sessions)
This secession describes the basic principle how how it workds. This is only a draft and things are subject to change.
Let's assume an app called EPR (Etherium Phone Recovery) is installed on someones phone. And there exists two PGP keys. Key A and B (Ka and Kb for short). And two Ethetium address. Ea and Eb. Where Ea is the user's Etherium address, Ka is the PGP key that the user used to retrieve data. While Eb is the app's Etherium address, Kb is the PGP key the app used to retrieve message.
-
EPR searches trough the ETherium Blockchain every (let's say) 30 minutes. Trying to find a transaction to Eb with
input data
field filled with encrypted message (with Kb's public key, And thus can be decrypted by Kb's private key) containing a enable phrase. -
If the enable phrase is found, send GPS coordinates every once in a while to Ea; encrypted with Ka's public key.
-
The user can retrive the phone's location by decrypting messages sent to Ea by Eb with Ka's private key.
-
The use of such app can lead to adversary finding out who owns Ea and that Eb belongs to a phone.
-
No way to be a free service (Maybe possible with IOTA?)
-
The PGP keys leaking will result with total information leak. (Not a problem particular for this project...
- Kb's public key leaking will enable adversary to activate the phone's tracker (if enable phrase is also known).
- Ka'y public key leaking will enable adversary to read the user's past record.
- Since data can't be delete/modify from a blockchain. The keys has to stay safe forever.
@cryptowizard88 Yeah, IOTA has its fair share of problems. But I don't think it is a problem in this case. Since I'm not doing payments but using IOTA as a message board.
The raw data EPR sends/received will be visible for everyone on both Eth and IOTA anyway. The thing that matters is that they are encrypted. Unless the adversary can break PGP, no harm can be done.
Maybe I overlooked something, any possible attacks you can think of?