Pond

Pond threat model

The threat model is defined in terms of what each possible attacker can achieve. The list is intended to be exhaustive, i.e. if an entity can do something that is not listed here then that should count as a break of Pond. (For now, this document is very new and I may have missed some things.)

Firstly, assumptions about the user:

  1. The user acts reasonably and in good faith. (Starting off very vaguely! But if the user were to give their private key material to the attacker that would be unreasonable, for example.)
  2. The user obtains an authentic copy of Pond.

Secondly, assumptions about the user's computer:

  1. The computer correctly executes the program and is not compromised by malware.
  2. The computer has a TPM or other form of erasable storage.

Lastly, assumptions about the world:

  1. The security assumptions of curve25519, Ed25519, salsa20, poly1305, HMAC-SHA256, Rijndael (with a 256-bit block) and pairing based group-signatures are valid.

What the user's home server can achieve:

  1. A server can learn when a user is online by observing transactions.
  2. A server can learn how many messages a user receives, and when they receive them. (But not who sent them.)
  3. A server can learn the approximate size of any uploaded detachments, when they are uploaded and when they are downloaded.
  4. A server can drop or corrupt any messages.
  5. A server can spam a user with invalid messages.
  6. A server can duplicate old messages.
  7. A server can drop or corrupt any uploaded detachments.
  8. A server can estimate the number of contacts who send messages to a given account after that account has issued a revocation based on the number of clients who try to send messages using an expired group generation number.
  9. (Future) A server can falsely inform a contact that they have been revoked.

What a global, passive adversary (one who can observe all Internet traffic) can achieve:

  1. A GPA can learn who is using Pond and where their home servers are located.
  2. A GPA can learn when messages are sent to a non-home server and which server that is.
  3. A GPA can observe detachment uploads and downloads, and who is performing each of those actions.
  4. A GPA can observe when a shared-secret key exchange is performed and can limit possible set of other parties to those who were also performing a key exchange at the same time.

What a local network attacker can achieve:

  1. A local network can observe when a user is using Pond.
  2. A local network can block Pond.
  3. A local network can observe the approximate size of any detachment uploads and downloads.
  4. A local network can observe when a shared-secret key exchange is performed.

What a physical seizure of the user's computer can achieve:

  1. After a seizure, an attacker can perform an offline attack against the user's passphrase and obtain undeleted messages if successful.

What a physical compromise of the user's computer can achieve:

  1. A compromise of the user's computer can obtain all messages from the point of compromise, onwards.

What the shared-secret key exchange (PANDA) server can achieve:

  1. The PANDA server can run offline attacks against the shared secret and can MITM any in-progress exchanges that it can break.
  2. The PANDA server can drop or delay any key exchanges that it wishes.

What a contact can achieve:

  1. A contact can spam a user with messages.
  2. A contact can, to some extent, prove to a third-party that a message came from a user (paper)
  3. A contact can retain messages from a user, forever.
  4. A contact can learn that a user has revoked a contact (but not which contact, unless they are the revoked contact) at some time after the time of the previous message that they sent to the user.
  5. A contact can learn if two of their contacts are actually the same user.
  6. Two contacts can confirm if they are communicating with the same user.

What a random person on the Internet can achieve:

  1. A random person can attempt an online attack against running PANDA key exchanges and MITM one of the users if they succeed. The other will receive an error.
  2. A random person can attempt to DoS a Pond server.