skip to main content
10.1145/3557992.3565987acmconferencesArticle/Chapter ViewAbstractPublication PagesgisConference Proceedingsconference-collections
research-article

DRIFT: E2EE spatial feature sharing & instant messaging

Published:01 November 2022Publication History

ABSTRACT

Most online communication today is inherently temporal and aspatial. Instant messaging (IM) services are structured around a timeline interface which prioritizes a linear succession of events and guides our attention towards the novel. In this way, the different textures of social life are lost in linear reduction. In this paper, we present DRIFT, a novel and open-source IM application framework, based on a different paradigm of communication that preserves temporality but organizes it around space. Instead of the timeline, our application grounds messaging in the map and its pins, offering users a tool that encourages spatio-temporal communication and the sharing of spatial features. Given increasing concerns about the safety and privacy of online user interaction, we integrate state-of-the art encryption as a core feature of our application. Firstly, to protect user messages and map pins, we implement end-to-end encryption with the Double Ratchet key management algorithm and the open standard Matrix protocol. Secondly, to maintain location privacy, we allow users to batch download map tilesets and machine learning models to perform operations such as search entirely on device, avoiding compromising API calls to cloud services. With these combined features, DRIFT aims to introduce a new model for online interaction that upends the short attention span imposed by the narrow timeline and replace it with a spatio-temporally rich and secure IM tool for both laymen and more vulnerable users such as journalists, human rights activists, and whistleblowers.

References

  1. 2021. Matrix Specification version v1.3. https://spec.matrix.org/v1.3/.Google ScholarGoogle Scholar
  2. Joël Alwen, Sandro Coretti, and Yevgeniy Dodis. 2019. The Double Ratchet: Security Notions, Proofs, and Modularization for the Signal Protocol. In Advances in Cryptology - EUROCRYPT 2019 (Lecture Notes in Computer Science), Yuval Ishai and Vincent Rijmen (Eds.). Springer International Publishing, Cham, 129--158. Google ScholarGoogle ScholarDigital LibraryDigital Library
  3. Shahriyar Amini, Janne Lindqvist, Jason Hong, Jialiu Lin, Eran Toch, and Norman Sadeh. 2011. Caché: Caching Location-Enhanced Content to Improve User Privacy. In Proceedings of the 9th International Conference on Mobile Systems, Applications, and Services (MobiSys '11). Association for Computing Machinery, New York, NY, USA, 197--210. Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. Apple. 2022. Apple Maps & Privacy. https://www.apple.com/legal/privacy/data/en/apple-maps/.Google ScholarGoogle Scholar
  5. Differential Privacy Team Apple. 2017. Learning with Privacy at Scale.Google ScholarGoogle Scholar
  6. Matt Burgess. 2020. The Best Privacy-Friendly Alternatives to Google Maps. Wired (Sept. 2020).Google ScholarGoogle Scholar
  7. YingBin Cao, Zhengde Zhao, Xu Huaiyu, Yan ZhenXing, Jiang Peng, and Duan Wei. 2010. An Instant Messaging System Based on Google Map. In 2010 2nd International Conference on Advanced Computer Control, Vol. 5. 21--24. Google ScholarGoogle ScholarCross RefCross Ref
  8. Edward Casey. 2001. Between Geography and Philosophy: What Does It Mean to Be in the Place-World? Annals of the Association of American Geographers 91, 4 (Dec. 2001), 683--693. Google ScholarGoogle ScholarCross RefCross Ref
  9. Manuel Castells. 1996. The Rise of the Network Society. Blackwell Publishers, Malden, Mass.Google ScholarGoogle ScholarDigital LibraryDigital Library
  10. Kyunghyun Cho, Bart van Merriënboer, Dzmitry Bahdanau, and Yoshua Bengio. 2014. On the Properties of Neural Machine Translation: Encoder-Decoder Approaches. In Proceedings of SSST-8, Eighth Workshop on Syntax, Semantics and Structure in Statistical Translation. Association for Computational Linguistics, Doha, Qatar, 103--111. Google ScholarGoogle ScholarCross RefCross Ref
  11. Benny Chor, Eyal Kushilevitz, Oded Goldreich, and Madhu Sudan. 1998. Private Information Retrieval. J. ACM 45, 6 (Nov. 1998), 965--981. Google ScholarGoogle ScholarDigital LibraryDigital Library
  12. Junyoung Chung, Caglar Gulcehre, KyungHyun Cho, and Yoshua Bengio. 2014. Empirical Evaluation of Gated Recurrent Neural Networks on Sequence Modeling. arXiv:1412.3555 [cs] Google ScholarGoogle ScholarCross RefCross Ref
  13. Katriel Cohn-Gordon, Cas Cremers, Benjamin Dowling, Luke Garratt, and Douglas Stebila. 2020. A Formal Security Analysis of the Signal Messaging Protocol. Journal of Cryptology 33, 4 (Oct. 2020), 1914--1983. Google ScholarGoogle ScholarDigital LibraryDigital Library
  14. Michel de Certeau. 1988. The Practice of Everyday Life (first paperback edition ed.). University of California Press, Berkeley, CA.Google ScholarGoogle Scholar
  15. Daniel Demmler, Marco Holz, and Thomas Schneider. 2017. OnionPIR: Effective Protection of Sensitive Metadata in Online Communication Networks. In Applied Cryptography and Network Security (Lecture Notes in Computer Science), Dieter Gollmann, Atsuko Miyaji, and Hiroaki Kikuchi (Eds.). Springer International Publishing, Cham, 599--619. Google ScholarGoogle ScholarCross RefCross Ref
  16. Kerry Flynn. 2017. Snapchat Releases 'Snap Maps,' Aka a Way to Stalk Strangers and Events Nearby. https://mashable.com/article/snapchat-snap-maps-ghost-mode-update.Google ScholarGoogle Scholar
  17. OpenStreetMap Foundation. 2021. Privacy Policy. https://wiki.osmfoundation.org/wiki/Privacy_Policy.Google ScholarGoogle Scholar
  18. Gabriel Ghinita, Panos Kalnis, Ali Khoshgozaran, Cyrus Shahabi, and Kian-Lee Tan. 2008. Private Queries in Location Based Services: Anonymizers Are Not Necessary. In Proceedings of the 2008 ACM SIGMOD International Conference on Management of Data (SIGMOD '08). Association for Computing Machinery, New York, NY, USA, 121--132. Google ScholarGoogle ScholarDigital LibraryDigital Library
  19. Lauren Goode. 2020. The Biggest Apple Maps Change Is One You Can't See. Wired (Jan. 2020).Google ScholarGoogle Scholar
  20. Google. 2022. Privacy Policy - Privacy & Terms - Google. https://policies.google.com/privacy.Google ScholarGoogle Scholar
  21. Trinabh Gupta, Natacha Crooks, Whitney Mulhern, Srinath Setty, Lorenzo Alvisi, and Michael Walfish. 2016. Scalable and Private Media Consumption with Popcorn: 13th USENIX Symposium on Networked Systems Design and Implementation, NSDI 2016. Proceedings of the 13th USENIX Symposium on Networked Systems Design and Implementation, NSDI 2016 (Jan. 2016), 91--107.Google ScholarGoogle Scholar
  22. N Katherine Hayles. 1998. How We Became Posthuman: Virtual Bodies in Cybernetics, Literature, and Informatics. University of Chicago Press.Google ScholarGoogle ScholarDigital LibraryDigital Library
  23. Hongbo Jiang, Jie Li, Ping Zhao, Fanzi Zeng, Zhu Xiao, and Arun Iyengar. 2021. Location Privacy-preserving Mechanisms in Location-based Services: A Comprehensive Survey. Comput. Surveys 54, 1 (Jan. 2021), 4:1--4:36. Google ScholarGoogle ScholarDigital LibraryDigital Library
  24. Vaibhav Ankush Kachore, J. Lakshmi, and S.K. Nandy. 2015. Location Obfuscation for Location Data Privacy. In 2015 IEEE World Congress on Services. 213--220. Google ScholarGoogle ScholarDigital LibraryDigital Library
  25. Carsten Keßler and Grant McKenzie. 2018. A Geoprivacy Manifesto. Transactions in GIS 22, 1 (2018), 3--19. Google ScholarGoogle ScholarCross RefCross Ref
  26. Ali Khoshgozaran and Cyrus Shahabi. 2007. Blind Evaluation of Nearest Neighbor Queries Using Space Transformation to Preserve Location Privacy. In Advances in Spatial and Temporal Databases (Lecture Notes in Computer Science), Dimitris Papadias, Donghui Zhang, and George Kollios (Eds.). Springer, Berlin, Heidelberg, 239--257. Google ScholarGoogle ScholarCross RefCross Ref
  27. Ali Khoshgozaran, Cyrus Shahabi, and Houtan Shirani-Mehr. 2011. Location Privacy: Going beyond K-anonymity, Cloaking and Anonymizers. Knowledge and Information Systems 26, 3 (March 2011), 435--465. Google ScholarGoogle ScholarDigital LibraryDigital Library
  28. Ali Khoshgozaran, Houtan Shirani-Mehr, and Cyrus Shahabi. 2013. Blind Evaluation of Location Based Queries Using Space Transformation to Preserve Location Privacy. GeoInformatica 17, 4 (Oct. 2013), 599--634. Google ScholarGoogle ScholarDigital LibraryDigital Library
  29. Henri Lefebvre. 1991. The Production of Space. Oxford Blackwell, Oxford, UK.Google ScholarGoogle Scholar
  30. Henri Lefebvre. 2004. Rhythmanalysis: Space, Time and Everyday Life. Continuum, London; New York.Google ScholarGoogle Scholar
  31. Douglas J. Leith. 2021. Mobile Handset Privacy: Measuring the Data iOS and Android Send to Apple and Google. In Security and Privacy in Communication Networks (Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering), Joaquin Garcia-Alfaro, Shujun Li, Radha Poovendran, Hervé Debar, and Moti Yung (Eds.). Springer International Publishing, Cham, 231--251. Google ScholarGoogle ScholarCross RefCross Ref
  32. Sasha Lekach. 2021. Signal Hits No. 1 in Apple's App Store after Elon Musk Boost. https://mashable.com/article/signal-app-downloads-elon-musk-tweet.Google ScholarGoogle Scholar
  33. Agnieszka Leszczynski. 2017. Geoprivacy. SAGE Publications Ltd, 1 Oliver's Yard, 55 City Road London EC1Y 1SP, 235--244. Google ScholarGoogle ScholarCross RefCross Ref
  34. Yi-Bing Lin, Min-Zheng Shieh, Yun-Wei Lin, and Hsin-Ya Chen. 2018. MapTalk: Mosaicking Physical Objects into the Cyber World. Cyber-Physical Systems 4, 3 (July 2018), 156--174. Google ScholarGoogle ScholarCross RefCross Ref
  35. Organic Maps. 2021. Organic Maps: Privacy Policy. https://organicmaps.app/privacy/.Google ScholarGoogle Scholar
  36. Maps.me. 2021. Maps - White Paper. https://maps.me/token/MAPS.pdf.Google ScholarGoogle Scholar
  37. Maps.me. 2021. Maps.Me Privacy Notice. https://maps.me.Google ScholarGoogle Scholar
  38. Matrix.Org. 2022. Matrix Javascript SDK. matrix.org.Google ScholarGoogle Scholar
  39. Grant McKenzie and Krzysztof Janowicz. 2015. Where Is Also about Time: A Location-Distortion Model to Improve Reverse Geocoding Using Behavior-Driven Temporal Semantic Signatures. Computers, Environment and Urban Systems 54 (Nov. 2015), 1--13. Google ScholarGoogle ScholarCross RefCross Ref
  40. Grant McKenzie, Krzysztof Janowicz, and Dara Seidl. 2016. Geo-Privacy Beyond Coordinates. In Geospatial Data in a Changing World (Lecture Notes in Geoinformation and Cartography), Tapani Sarjakoski, Maribel Yasmina Santos, and L. Tiina Sarjakoski (Eds.). Springer International Publishing, Cham, 157--175. Google ScholarGoogle ScholarCross RefCross Ref
  41. Grant McKenzie, Daniel Romm, Hongyu Zhang, and Mikael Brunila. 2022. PrivyTo: A Privacy-Preserving Location-Sharing Platform. Transactions in GIS (2022). Google ScholarGoogle ScholarCross RefCross Ref
  42. Imran Memon, Qasim Ali, Asma Zubedi, and Farman Ali Mangi. 2017. DPMM: Dynamic Pseudonym-Based Multiple Mix-Zones Generation for Mobile Traveler. Multimedia Tools and Applications 76, 22 (Nov. 2017), 24359--24388. Google ScholarGoogle ScholarDigital LibraryDigital Library
  43. Rani Molla. 2021. What Is Signal, and Why Is Everybody Downloading It Right Now? https://www.vox.com/recode/22226618/what-is-signal-whatsapp-telegram-download-encrypted-messaging.Google ScholarGoogle Scholar
  44. Tien T. Nguyen, Pik-Mai Hui, F. Maxwell Harper, Loren Terveen, and Joseph A. Konstan. 2014. Exploring the Filter Bubble: The Effect of Using Recommender Systems on Content Diversity. In Proceedings of the 23rd International Conference on World Wide Web (WWW '14). Association for Computing Machinery, New York, NY, USA, 677--686. Google ScholarGoogle ScholarDigital LibraryDigital Library
  45. Ben Niu, Qinghua Li, Xiaoyan Zhu, Guohong Cao, and Hui Li. 2014. Achieving K-Anonymity in Privacy-Aware Location-Based Services. In IEEE INFOCOM 2014 - IEEE Conference on Computer Communications. 754--762. Google ScholarGoogle ScholarCross RefCross Ref
  46. Ben Niu, Qinghua Li, Xiaoyan Zhu, Guohong Cao, and Hui Li. 2015. Enhancing Privacy through Caching in Location-Based Services. In 2015 IEEE Conference on Computer Communications (INFOCOM). 1017--1025. Google ScholarGoogle ScholarCross RefCross Ref
  47. OpenStreetMap contributors. 2022. Planet Dump Retrieved from https://planet.osm.org.Google ScholarGoogle Scholar
  48. OpenStreetMap contributors. 2022. Regional Dumps Retrieved from https://www.geofabrik.de/data/download.html.Google ScholarGoogle Scholar
  49. OsmAnd. 2022. Privacy Policy. https://osmand.net/help-online/privacy-policy/.Google ScholarGoogle Scholar
  50. Trevor Perrin and Moxie Marlinspike. 2016. The Double Ratchet Algorithm. (2016).Google ScholarGoogle Scholar
  51. Jinmeng Rao, Song Gao, Mingxiao Li, and Qunying Huang. 2021. A Privacy-Preserving Framework for Location Recommendation Using Decentralized Collaborative Machine Learning. Transactions in GIS 25, 3 (2021), 1153--1175. Google ScholarGoogle ScholarCross RefCross Ref
  52. Mark Haines Richard van der Hoff and Matthew Hodgson. 2019. Olm: A cryptographic ratchet. https://gitlab.matrix.org/matrixorg/olm/blob/master/docs/olm.md.Google ScholarGoogle Scholar
  53. Minho Shin, Cory Cornelius, Apu Kapadia, Nikos Triandopoulos, and David Kotz. 2015. Location Privacy for Mobile Crowd Sensing through Population Mapping. Sensors 15, 7 (July 2015), 15285--15310. Google ScholarGoogle ScholarCross RefCross Ref
  54. Daniel Smilkov, Nikhil Thorat, YannickAssogba, Charles Nicholson, Nick Kreeger, Ping Yu, Shanqing Cai, Eric Nielsen, David Soegel, Stan Bileschi, Michael Terry, Ann Yuan, Kangyi Zhang, Sandeep Gupta, Sarah Sirajuddin, D. Sculley, Rajat Monga, Greg Corrado, Fernanda Viegas, and Martin M. Wattenberg. 2019. TensorFlow.Js: Machine Learning For The Web and Beyond. Proceedings of Machine Learning and Systems 1 (April 2019), 309--321.Google ScholarGoogle Scholar
  55. Statista. 2022. Leading Mapping Apps in the United States in 2021, by Downloads.Google ScholarGoogle Scholar
  56. Statista. 2022. Most Popular Global Mobile Messenger Apps as of January 2022, Based on Number of Monthly Active Users.Google ScholarGoogle Scholar
  57. Andreas Straub, Daniel Gultsch, Tim Henkes, Klaus Herberth, Paul Schaub, and M WiBfeld. 2009. XEP-0384: OMEMO Encryption. XMP PExtension Protocol, XEP 384 (2009).Google ScholarGoogle Scholar
  58. Gang Sun, Shuai Cai, Hongfang Yu, Sabita Maharjan, Victor Chang, Xiaojiang Du, and Mohsen Guizani. 2019. Location Privacy Preservation for Mobile Users in Location-Based Services. IEEE Access 7 (2019), 87425--87438. Google ScholarGoogle ScholarCross RefCross Ref
  59. David Swanlund and Nadine Schuurman. 2019. Resisting Geosurveillance: A Survey of Tactics and Strategies for Spatial Privacy. Progress in Human Geography 43, 4 (Aug. 2019), 596--610. Google ScholarGoogle ScholarCross RefCross Ref
  60. Richard van der Hoff and Matthew Hodgson. 2019. Megolm group ratchet. https://gitlab.matrix.org/matrix-org/olm/-/blob/master/docs/megolm.md.Google ScholarGoogle Scholar
  61. Matthew W. Wilson. 2012. Location-Based Services, Conspicuous Mobility, and the Location-Aware Future. Geoforum 43, 6 (Nov. 2012), 1266--1275. Google ScholarGoogle ScholarCross RefCross Ref
  62. Man Lung Yiu, Christian S. Jensen, Xuegang Huang, and Hua Lu. 2008. SpaceTwist: Managing the Trade-Offs Among Location Privacy, Query Performance, and Query Accuracy in Mobile Services. In 2008 IEEE 24th International Conference on Data Engineering. 366--375. Google ScholarGoogle ScholarDigital LibraryDigital Library
  63. Tun-Hao You, Wen-Chih Peng, and Wang-Chien Lee. 2007. Protecting Moving Trajectories with Dummies. In 2007 International Conference on Mobile Data Management. 278--282. Google ScholarGoogle ScholarDigital LibraryDigital Library
  64. Andrea Zeffiro, Julia M. Hildebrand, Jordan Frith, Larissa Hjorth, Caitlin McGrane, Amy Schmitz Weiss, and Gerard Goggin. 2020. Locative-Media Ethics: A Call for Protocols to Guide Interactions of People, Place, and Technologies. Journalism & Mass Communication Quarterly 97, 1 (March 2020), 13--29. Google ScholarGoogle ScholarCross RefCross Ref
  65. Hongyu Zhang and Grant McKenzie. 2022. Rehumanize Geoprivacy: From Disclosure Control to Human Perception. GeoJournal (Feb. 2022). Google ScholarGoogle ScholarCross RefCross Ref
  66. Rui Zhu, Yingjie Hu, Krzysztof Janowicz, and Grant McKenzie. 2016. Spatial Signatures for Geographic Feature Types: Examining Gazetteer Ontologies Using Spatial Statistics. Transactions in GIS 20, 3 (2016), 333--355. Google ScholarGoogle ScholarCross RefCross Ref
  67. Xiaoyan Zhu, Haotian Chi, Ben Niu, Weidong Zhang, Zan Li, and Hui Li. 2013. MobiCache: When k-Anonymity Meets Cache. In 2013 IEEE Global Communications Conference (GLOBECOM). 820--825. Google ScholarGoogle ScholarCross RefCross Ref
  68. Matthew A Zook and Mark Graham. 2007. Mapping DigiPlace: Geocoded Internet Data and the Representation of Place. Environment and Planning B: Planning and Design 34, 3 (June 2007), 466--482. Google ScholarGoogle ScholarCross RefCross Ref
  69. Shoshana Zuboff. 2015. Big Other: Surveillance Capitalism and the Prospects of an Information Civilization. Journal of Information Technology 30, 1 (March 2015), 75--89. Google ScholarGoogle ScholarCross RefCross Ref

Index Terms

  1. DRIFT: E2EE spatial feature sharing & instant messaging

    Recommendations

    Comments

    Login options

    Check if you have access through your login credentials or your institution to get full access on this article.

    Sign in
    • Published in

      cover image ACM Conferences
      LocalRec '22: Proceedings of the 6th ACM SIGSPATIAL International Workshop on Location-based Recommendations, Geosocial Networks and Geoadvertising
      November 2022
      47 pages
      ISBN:9781450395403
      DOI:10.1145/3557992

      Copyright © 2022 ACM

      Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than the author(s) must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected].

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      • Published: 1 November 2022

      Permissions

      Request permissions about this article.

      Request Permissions

      Check for updates

      Qualifiers

      • research-article

      Acceptance Rates

      Overall Acceptance Rate17of26submissions,65%
    • Article Metrics

      • Downloads (Last 12 months)32
      • Downloads (Last 6 weeks)1

      Other Metrics

    PDF Format

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader