I don’t see much discussion of protocols here, so here’s my share. This may be a question with a known answer, but I keep thinking about this scenario: you manage a messaging application, encrypted messages, with all the classics of privacy, forward secrecy and so on. You, the entity responsible for reporting, have no knowledge of the messages or secrets of two users A and B. Now you want to respect users, but also do not want to provide grounds for illegal operations. More specifically, you want to adhere to an alleged ‘good’ law enforcement, without granting the option of mass surveillance. So you want to be able to go and retrieve messages or a session key, but with the assurance that you will give a token T to the users in return if you went to retrieve that data from them. At the same time, you create a public list of tokens every month and the users can compare the elements of the list to find out the reasons why they were asked for sensitive information. Of course such a design here is not at all practical or safe and it is just a pile of flaws, that is not my question. But I can’t keep wondering if there is a protocol that runs * something like this *: A requests information from B, B gives information to A in light of other information received. It doesn’t seem trivial at all and downright impossible in a scenario like the messaging application, but I keep wondering.
Cryptoplatforming.com is a news websites which gets news around the globe on investing in Crypto. Our news has no backgroundcheck.