ABSTRACT
Most online communication today is inherently temporal and aspatial. Instant messaging (IM) services are structured around a timeline interface which prioritizes a linear succession of events and guides our attention towards the novel. In this way, the different textures of social life are lost in linear reduction. In this paper, we present DRIFT, a novel and open-source IM application framework, based on a different paradigm of communication that preserves temporality but organizes it around space. Instead of the timeline, our application grounds messaging in the map and its pins, offering users a tool that encourages spatio-temporal communication and the sharing of spatial features. Given increasing concerns about the safety and privacy of online user interaction, we integrate state-of-the art encryption as a core feature of our application. Firstly, to protect user messages and map pins, we implement end-to-end encryption with the Double Ratchet key management algorithm and the open standard Matrix protocol. Secondly, to maintain location privacy, we allow users to batch download map tilesets and machine learning models to perform operations such as search entirely on device, avoiding compromising API calls to cloud services. With these combined features, DRIFT aims to introduce a new model for online interaction that upends the short attention span imposed by the narrow timeline and replace it with a spatio-temporally rich and secure IM tool for both laymen and more vulnerable users such as journalists, human rights activists, and whistleblowers.
- 2021. Matrix Specification version v1.3. https://spec.matrix.org/v1.3/.Google Scholar
- Joël Alwen, Sandro Coretti, and Yevgeniy Dodis. 2019. The Double Ratchet: Security Notions, Proofs, and Modularization for the Signal Protocol. In Advances in Cryptology - EUROCRYPT 2019 (Lecture Notes in Computer Science), Yuval Ishai and Vincent Rijmen (Eds.). Springer International Publishing, Cham, 129--158. Google ScholarDigital Library
- Shahriyar Amini, Janne Lindqvist, Jason Hong, Jialiu Lin, Eran Toch, and Norman Sadeh. 2011. Caché: Caching Location-Enhanced Content to Improve User Privacy. In Proceedings of the 9th International Conference on Mobile Systems, Applications, and Services (MobiSys '11). Association for Computing Machinery, New York, NY, USA, 197--210. Google ScholarDigital Library
- Apple. 2022. Apple Maps & Privacy. https://www.apple.com/legal/privacy/data/en/apple-maps/.Google Scholar
- Differential Privacy Team Apple. 2017. Learning with Privacy at Scale.Google Scholar
- Matt Burgess. 2020. The Best Privacy-Friendly Alternatives to Google Maps. Wired (Sept. 2020).Google Scholar
- YingBin Cao, Zhengde Zhao, Xu Huaiyu, Yan ZhenXing, Jiang Peng, and Duan Wei. 2010. An Instant Messaging System Based on Google Map. In 2010 2nd International Conference on Advanced Computer Control, Vol. 5. 21--24. Google ScholarCross Ref
- Edward Casey. 2001. Between Geography and Philosophy: What Does It Mean to Be in the Place-World? Annals of the Association of American Geographers 91, 4 (Dec. 2001), 683--693. Google ScholarCross Ref
- Manuel Castells. 1996. The Rise of the Network Society. Blackwell Publishers, Malden, Mass.Google ScholarDigital Library
- Kyunghyun Cho, Bart van Merriënboer, Dzmitry Bahdanau, and Yoshua Bengio. 2014. On the Properties of Neural Machine Translation: Encoder-Decoder Approaches. In Proceedings of SSST-8, Eighth Workshop on Syntax, Semantics and Structure in Statistical Translation. Association for Computational Linguistics, Doha, Qatar, 103--111. Google ScholarCross Ref
- Benny Chor, Eyal Kushilevitz, Oded Goldreich, and Madhu Sudan. 1998. Private Information Retrieval. J. ACM 45, 6 (Nov. 1998), 965--981. Google ScholarDigital Library
- Junyoung Chung, Caglar Gulcehre, KyungHyun Cho, and Yoshua Bengio. 2014. Empirical Evaluation of Gated Recurrent Neural Networks on Sequence Modeling. arXiv:1412.3555 [cs] Google ScholarCross Ref
- Katriel Cohn-Gordon, Cas Cremers, Benjamin Dowling, Luke Garratt, and Douglas Stebila. 2020. A Formal Security Analysis of the Signal Messaging Protocol. Journal of Cryptology 33, 4 (Oct. 2020), 1914--1983. Google ScholarDigital Library
- Michel de Certeau. 1988. The Practice of Everyday Life (first paperback edition ed.). University of California Press, Berkeley, CA.Google Scholar
- Daniel Demmler, Marco Holz, and Thomas Schneider. 2017. OnionPIR: Effective Protection of Sensitive Metadata in Online Communication Networks. In Applied Cryptography and Network Security (Lecture Notes in Computer Science), Dieter Gollmann, Atsuko Miyaji, and Hiroaki Kikuchi (Eds.). Springer International Publishing, Cham, 599--619. Google ScholarCross Ref
- Kerry Flynn. 2017. Snapchat Releases 'Snap Maps,' Aka a Way to Stalk Strangers and Events Nearby. https://mashable.com/article/snapchat-snap-maps-ghost-mode-update.Google Scholar
- OpenStreetMap Foundation. 2021. Privacy Policy. https://wiki.osmfoundation.org/wiki/Privacy_Policy.Google Scholar
- Gabriel Ghinita, Panos Kalnis, Ali Khoshgozaran, Cyrus Shahabi, and Kian-Lee Tan. 2008. Private Queries in Location Based Services: Anonymizers Are Not Necessary. In Proceedings of the 2008 ACM SIGMOD International Conference on Management of Data (SIGMOD '08). Association for Computing Machinery, New York, NY, USA, 121--132. Google ScholarDigital Library
- Lauren Goode. 2020. The Biggest Apple Maps Change Is One You Can't See. Wired (Jan. 2020).Google Scholar
- Google. 2022. Privacy Policy - Privacy & Terms - Google. https://policies.google.com/privacy.Google Scholar
- Trinabh Gupta, Natacha Crooks, Whitney Mulhern, Srinath Setty, Lorenzo Alvisi, and Michael Walfish. 2016. Scalable and Private Media Consumption with Popcorn: 13th USENIX Symposium on Networked Systems Design and Implementation, NSDI 2016. Proceedings of the 13th USENIX Symposium on Networked Systems Design and Implementation, NSDI 2016 (Jan. 2016), 91--107.Google Scholar
- N Katherine Hayles. 1998. How We Became Posthuman: Virtual Bodies in Cybernetics, Literature, and Informatics. University of Chicago Press.Google ScholarDigital Library
- Hongbo Jiang, Jie Li, Ping Zhao, Fanzi Zeng, Zhu Xiao, and Arun Iyengar. 2021. Location Privacy-preserving Mechanisms in Location-based Services: A Comprehensive Survey. Comput. Surveys 54, 1 (Jan. 2021), 4:1--4:36. Google ScholarDigital Library
- Vaibhav Ankush Kachore, J. Lakshmi, and S.K. Nandy. 2015. Location Obfuscation for Location Data Privacy. In 2015 IEEE World Congress on Services. 213--220. Google ScholarDigital Library
- Carsten Keßler and Grant McKenzie. 2018. A Geoprivacy Manifesto. Transactions in GIS 22, 1 (2018), 3--19. Google ScholarCross Ref
- Ali Khoshgozaran and Cyrus Shahabi. 2007. Blind Evaluation of Nearest Neighbor Queries Using Space Transformation to Preserve Location Privacy. In Advances in Spatial and Temporal Databases (Lecture Notes in Computer Science), Dimitris Papadias, Donghui Zhang, and George Kollios (Eds.). Springer, Berlin, Heidelberg, 239--257. Google ScholarCross Ref
- Ali Khoshgozaran, Cyrus Shahabi, and Houtan Shirani-Mehr. 2011. Location Privacy: Going beyond K-anonymity, Cloaking and Anonymizers. Knowledge and Information Systems 26, 3 (March 2011), 435--465. Google ScholarDigital Library
- Ali Khoshgozaran, Houtan Shirani-Mehr, and Cyrus Shahabi. 2013. Blind Evaluation of Location Based Queries Using Space Transformation to Preserve Location Privacy. GeoInformatica 17, 4 (Oct. 2013), 599--634. Google ScholarDigital Library
- Henri Lefebvre. 1991. The Production of Space. Oxford Blackwell, Oxford, UK.Google Scholar
- Henri Lefebvre. 2004. Rhythmanalysis: Space, Time and Everyday Life. Continuum, London; New York.Google Scholar
- Douglas J. Leith. 2021. Mobile Handset Privacy: Measuring the Data iOS and Android Send to Apple and Google. In Security and Privacy in Communication Networks (Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering), Joaquin Garcia-Alfaro, Shujun Li, Radha Poovendran, Hervé Debar, and Moti Yung (Eds.). Springer International Publishing, Cham, 231--251. Google ScholarCross Ref
- Sasha Lekach. 2021. Signal Hits No. 1 in Apple's App Store after Elon Musk Boost. https://mashable.com/article/signal-app-downloads-elon-musk-tweet.Google Scholar
- Agnieszka Leszczynski. 2017. Geoprivacy. SAGE Publications Ltd, 1 Oliver's Yard, 55 City Road London EC1Y 1SP, 235--244. Google ScholarCross Ref
- Yi-Bing Lin, Min-Zheng Shieh, Yun-Wei Lin, and Hsin-Ya Chen. 2018. MapTalk: Mosaicking Physical Objects into the Cyber World. Cyber-Physical Systems 4, 3 (July 2018), 156--174. Google ScholarCross Ref
- Organic Maps. 2021. Organic Maps: Privacy Policy. https://organicmaps.app/privacy/.Google Scholar
- Maps.me. 2021. Maps - White Paper. https://maps.me/token/MAPS.pdf.Google Scholar
- Maps.me. 2021. Maps.Me Privacy Notice. https://maps.me.Google Scholar
- Matrix.Org. 2022. Matrix Javascript SDK. matrix.org.Google Scholar
- Grant McKenzie and Krzysztof Janowicz. 2015. Where Is Also about Time: A Location-Distortion Model to Improve Reverse Geocoding Using Behavior-Driven Temporal Semantic Signatures. Computers, Environment and Urban Systems 54 (Nov. 2015), 1--13. Google ScholarCross Ref
- Grant McKenzie, Krzysztof Janowicz, and Dara Seidl. 2016. Geo-Privacy Beyond Coordinates. In Geospatial Data in a Changing World (Lecture Notes in Geoinformation and Cartography), Tapani Sarjakoski, Maribel Yasmina Santos, and L. Tiina Sarjakoski (Eds.). Springer International Publishing, Cham, 157--175. Google ScholarCross Ref
- Grant McKenzie, Daniel Romm, Hongyu Zhang, and Mikael Brunila. 2022. PrivyTo: A Privacy-Preserving Location-Sharing Platform. Transactions in GIS (2022). Google ScholarCross Ref
- Imran Memon, Qasim Ali, Asma Zubedi, and Farman Ali Mangi. 2017. DPMM: Dynamic Pseudonym-Based Multiple Mix-Zones Generation for Mobile Traveler. Multimedia Tools and Applications 76, 22 (Nov. 2017), 24359--24388. Google ScholarDigital Library
- Rani Molla. 2021. What Is Signal, and Why Is Everybody Downloading It Right Now? https://www.vox.com/recode/22226618/what-is-signal-whatsapp-telegram-download-encrypted-messaging.Google Scholar
- Tien T. Nguyen, Pik-Mai Hui, F. Maxwell Harper, Loren Terveen, and Joseph A. Konstan. 2014. Exploring the Filter Bubble: The Effect of Using Recommender Systems on Content Diversity. In Proceedings of the 23rd International Conference on World Wide Web (WWW '14). Association for Computing Machinery, New York, NY, USA, 677--686. Google ScholarDigital Library
- Ben Niu, Qinghua Li, Xiaoyan Zhu, Guohong Cao, and Hui Li. 2014. Achieving K-Anonymity in Privacy-Aware Location-Based Services. In IEEE INFOCOM 2014 - IEEE Conference on Computer Communications. 754--762. Google ScholarCross Ref
- Ben Niu, Qinghua Li, Xiaoyan Zhu, Guohong Cao, and Hui Li. 2015. Enhancing Privacy through Caching in Location-Based Services. In 2015 IEEE Conference on Computer Communications (INFOCOM). 1017--1025. Google ScholarCross Ref
- OpenStreetMap contributors. 2022. Planet Dump Retrieved from https://planet.osm.org.Google Scholar
- OpenStreetMap contributors. 2022. Regional Dumps Retrieved from https://www.geofabrik.de/data/download.html.Google Scholar
- OsmAnd. 2022. Privacy Policy. https://osmand.net/help-online/privacy-policy/.Google Scholar
- Trevor Perrin and Moxie Marlinspike. 2016. The Double Ratchet Algorithm. (2016).Google Scholar
- Jinmeng Rao, Song Gao, Mingxiao Li, and Qunying Huang. 2021. A Privacy-Preserving Framework for Location Recommendation Using Decentralized Collaborative Machine Learning. Transactions in GIS 25, 3 (2021), 1153--1175. Google ScholarCross Ref
- Mark Haines Richard van der Hoff and Matthew Hodgson. 2019. Olm: A cryptographic ratchet. https://gitlab.matrix.org/matrixorg/olm/blob/master/docs/olm.md.Google Scholar
- Minho Shin, Cory Cornelius, Apu Kapadia, Nikos Triandopoulos, and David Kotz. 2015. Location Privacy for Mobile Crowd Sensing through Population Mapping. Sensors 15, 7 (July 2015), 15285--15310. Google ScholarCross Ref
- Daniel Smilkov, Nikhil Thorat, YannickAssogba, Charles Nicholson, Nick Kreeger, Ping Yu, Shanqing Cai, Eric Nielsen, David Soegel, Stan Bileschi, Michael Terry, Ann Yuan, Kangyi Zhang, Sandeep Gupta, Sarah Sirajuddin, D. Sculley, Rajat Monga, Greg Corrado, Fernanda Viegas, and Martin M. Wattenberg. 2019. TensorFlow.Js: Machine Learning For The Web and Beyond. Proceedings of Machine Learning and Systems 1 (April 2019), 309--321.Google Scholar
- Statista. 2022. Leading Mapping Apps in the United States in 2021, by Downloads.Google Scholar
- Statista. 2022. Most Popular Global Mobile Messenger Apps as of January 2022, Based on Number of Monthly Active Users.Google Scholar
- Andreas Straub, Daniel Gultsch, Tim Henkes, Klaus Herberth, Paul Schaub, and M WiBfeld. 2009. XEP-0384: OMEMO Encryption. XMP PExtension Protocol, XEP 384 (2009).Google Scholar
- Gang Sun, Shuai Cai, Hongfang Yu, Sabita Maharjan, Victor Chang, Xiaojiang Du, and Mohsen Guizani. 2019. Location Privacy Preservation for Mobile Users in Location-Based Services. IEEE Access 7 (2019), 87425--87438. Google ScholarCross Ref
- David Swanlund and Nadine Schuurman. 2019. Resisting Geosurveillance: A Survey of Tactics and Strategies for Spatial Privacy. Progress in Human Geography 43, 4 (Aug. 2019), 596--610. Google ScholarCross Ref
- Richard van der Hoff and Matthew Hodgson. 2019. Megolm group ratchet. https://gitlab.matrix.org/matrix-org/olm/-/blob/master/docs/megolm.md.Google Scholar
- Matthew W. Wilson. 2012. Location-Based Services, Conspicuous Mobility, and the Location-Aware Future. Geoforum 43, 6 (Nov. 2012), 1266--1275. Google ScholarCross Ref
- Man Lung Yiu, Christian S. Jensen, Xuegang Huang, and Hua Lu. 2008. SpaceTwist: Managing the Trade-Offs Among Location Privacy, Query Performance, and Query Accuracy in Mobile Services. In 2008 IEEE 24th International Conference on Data Engineering. 366--375. Google ScholarDigital Library
- Tun-Hao You, Wen-Chih Peng, and Wang-Chien Lee. 2007. Protecting Moving Trajectories with Dummies. In 2007 International Conference on Mobile Data Management. 278--282. Google ScholarDigital Library
- Andrea Zeffiro, Julia M. Hildebrand, Jordan Frith, Larissa Hjorth, Caitlin McGrane, Amy Schmitz Weiss, and Gerard Goggin. 2020. Locative-Media Ethics: A Call for Protocols to Guide Interactions of People, Place, and Technologies. Journalism & Mass Communication Quarterly 97, 1 (March 2020), 13--29. Google ScholarCross Ref
- Hongyu Zhang and Grant McKenzie. 2022. Rehumanize Geoprivacy: From Disclosure Control to Human Perception. GeoJournal (Feb. 2022). Google ScholarCross Ref
- Rui Zhu, Yingjie Hu, Krzysztof Janowicz, and Grant McKenzie. 2016. Spatial Signatures for Geographic Feature Types: Examining Gazetteer Ontologies Using Spatial Statistics. Transactions in GIS 20, 3 (2016), 333--355. Google ScholarCross Ref
- Xiaoyan Zhu, Haotian Chi, Ben Niu, Weidong Zhang, Zan Li, and Hui Li. 2013. MobiCache: When k-Anonymity Meets Cache. In 2013 IEEE Global Communications Conference (GLOBECOM). 820--825. Google ScholarCross Ref
- Matthew A Zook and Mark Graham. 2007. Mapping DigiPlace: Geocoded Internet Data and the Representation of Place. Environment and Planning B: Planning and Design 34, 3 (June 2007), 466--482. Google ScholarCross Ref
- Shoshana Zuboff. 2015. Big Other: Surveillance Capitalism and the Prospects of an Information Civilization. Journal of Information Technology 30, 1 (March 2015), 75--89. Google ScholarCross Ref
Index Terms
- DRIFT: E2EE spatial feature sharing & instant messaging
Recommendations
The Existence Of Cryptography: A Study On Instant Messaging
AbstractThe use of smartphone for communication through the Instant Messaging (IM) application has become a dependency and trend model in society. Thus, choosing the right cryptography application to secure data in communicating becomes important. This ...
Design of an Instant Messaging System Using Identity Based Cryptosystems
EIDWT '13: Proceedings of the 2013 Fourth International Conference on Emerging Intelligent Data and Web TechnologiesThe rapid development of instant messaging changes the people's communication, collaboration and entertainment manner radically. Unfortunately, the existing instant messaging technology does not provide built-in support for security features. The ...
Awareness of presence, instant messaging and WebWho
We report from a study of how awareness of presence can affect instant messaging behavior. WebWho is a web based awareness system that visualizes where people are located in a large university computer lab. It allows students to virtually locate one ...
Comments