wordpress blog stats
Connect with us

Hi, what are you looking for?

Is encryption better than anonymization of data for individual privacy? #NAMA

Experts propose alternative methods to balance encryption and anonymization for safeguarding individual privacy.

“Encryption works, but you might just delete the data if you are choosing encryption. At some point of time, you have to de-crypt it in order to look into the data. It can be a matter of safety, so presumably it has to be used at some point,” notes a discussant at MediaNama’s roundtable discussion on ‘Exploring User Verification’ on March 23, 2023. The discussion focused on user verification norms in India, the importance of anonymity and effectiveness of verification in protecting individuals from online harm.

While exchanging ideas about how user anonymity can be preserved, experts weighed in on how anonymization of data is not a fool-proof method to protect people’s privacy given the risks of de-anonymization of publicly available data. We have delved deeper into the harms of de-anonymization, here.

The experts noted that there’s need for better technical alternatives for anonymization. Ekta Jafri, Design Mentor at The TechBridge, inquired whether encryption can be a better solution to protect anonymity of users. The privacy expert (quoted above) stated, “Encryption preserves it (data)..in transit, but it’s not the solution to anonymity.”

Watch the full event here:

Advertisement. Scroll to continue reading.

MediaNama hosted this discussion with support from Meta and Truecaller. The Internet Freedom Foundation, CUTS International, Centre for Internet and Society, and the Centre for Communication Governance at the National Law University, Delhi, were MediaNama’s community partners for this event. 


STAY ON TOP OF TECH POLICY: Our daily newsletter with top stories from MediaNama and around the world, delivered to your inbox before 9 AM. Click here to sign up today!


Encryption and anonymity:

Encryption refers to a process of “converting messages, information or data into a form unreadable by anyone except the intended recipient”, essentially a crypted communication accessible only to the sender and receiver. Encryption tools are primarily used to protect “confidentiality and integrity of content” against unauthorized third-party access or manipulation.

Anonymity is using an “invented or assumed name” to communicate anonymously on the internet. Sometimes individuals present their name or identity in a way that it “protects the determination of one’s name or identity” and is not one’s legal identity. In cases where individuals take up an assumed name it can be referred to as pseudo-anonymity, while anonymity can also refer to “taking no name at all”.

As stated by the United Nations Special Rapporteur on Freedom of Expression, both encryption and anonymity, “separately and together” are critical to individual privacy and freedom of speech and expression as they “create a zone of privacy to protect opinion and belief”. This is true especially for journalists, activists and members of marginalized communities, who are vulnerable to surveillance and harassment by state and non-state members.

Advertisement. Scroll to continue reading.

Is encryption a better method? Jafri pointed out that personal, sensitive data can be encrypted and decrypted when in need by the right parties and it is also easy to share such encrypted data. The above-mentioned speaker, who also emphasized on encryption, was of the view that encryption is different from anonymity, because there is still room for decrypting data by whoever has access to it. Though it adds a layer of protection and all data must be encrypted to some degree, he states that:

“With most of the modern technology it’s quite difficult to stay anonymized, only because of the fact that datasets are available about everywhere you look. There has been no credible method that we have known for successfully anonymizing data, because you’re not the only person who collects it, everyone collects it.”

Techniques for balancing encryption & anonymization:

On the question of alternative techniques for protecting user data in a better way, law and policy consultant Pranesh Prakash mentioned the following:

  1. Aggregate data: Prakash elaborates on one alternative when it comes to “private data” which is to aggregate it. He explains, “Instead of trying to anonymize it, removing certain attributes from a particular row in a database, in a spread sheet, etc, to aggregate it so that there is no one person that the data refers to any more. So that’s one technique.”
  2. Differential privacy: He also talks about “differential privacy”, a data-computation technique, which enables one to poison data. “There are techniques of differential privacy, which allow you to create, to enter wrong data…which then poisons the data to a limited extent, and you have a privacy budget. The more you poison the data, the less useful the data is, but also, the harder it is to actually trace the people back to find out enough about people.”
  3. Holomorphic encryption: This is another technique for computation on encrypted data, mentioned by Prakash. Holomorphic encryption essentially enables safer handling of encrypted data by a third party. It allows “complex mathematical operations to be performed on encrypted data without compromising the encryption”.
  4. Zero-knowledge proofs: These allow proving/verifying certain kind of information without revealing more information than necessary. For example, verifying one’s age without revealing the full details of their ID card and all the details contained within it, including name and so on.

According to Prakash there are various ideas emerging from the computer science and mathematics field, but none of them are a solution. “It’s a solution when you’re able to present something that works for multiple parties who are in conflict, which is what seems like is the case right now that there are different rights, which are genuinely in conflict, and how do we resolve that conflict and rights?,” he adds.


This post is released under a CC-BY-SA 4.0 license. Please feel free to republish on your site, with attribution and a link. Adaptation and rewriting, though allowed, should be true to the original.

Also Read:

Advertisement. Scroll to continue reading.

 

Written By

Curious about privacy, surveillance developments and the intersection of technology with education, caste and welfare rights.

MediaNama’s mission is to help build a digital ecosystem which is open, fair, global and competitive.

Views

News

Is it safe to consider all "publicly available data" as public?

News

PhonePe launched an e-commerce buyer app for ONDC called Pincode. We, however, believe that it should also launch a seller app.

News

Amazon announced that it will integrate its logistics network and SmartCommerce services with the Open Network for Digital Commerce (ONDC).

News

India's smartphone operating system BharOS has received much buzz in the media lately, but does it really merit this attention?

News

After using the Mapples app as his default navigation app for a week, Sarvesh draws a comparison between Google Maps and Mapples

You May Also Like

News

Google has released a Google Travel Trends Report which states that branded budget hotel search queries grew 179% year over year (YOY) in India, in...

Advert

135 job openings in over 60 companies are listed at our free Digital and Mobile Job Board: If you’re looking for a job, or...

News

By Aroon Deep and Aditya Chunduru You’re reading it here first: Twitter has complied with government requests to censor 52 tweets that mostly criticised...

News

Rajesh Kumar* doesn’t have many enemies in life. But, Uber, for which he drives a cab everyday, is starting to look like one, he...

MediaNama is the premier source of information and analysis on Technology Policy in India. More about MediaNama, and contact information, here.

© 2008-2021 Mixed Bag Media Pvt. Ltd. Developed By PixelVJ

Subscribe to our daily newsletter
Name:*
Your email address:*
*
Please enter all required fields Click to hide
Correct invalid entries Click to hide

© 2008-2021 Mixed Bag Media Pvt. Ltd. Developed By PixelVJ