KDE Privacy GoalPolicy
ActivePublic

Details

Description

Description

"In 5 years, KDE software enables and promotes privacy"

Privacy is the new challenge for Free Software. KDE is in a unique position to offer users a complete software environment that helps them to protect their privacy. KDE, being community-driven and user-focused, has the opportunity to put privacy on top of the agenda, arguably, being in this position, KDE has the obligation to do this, in the interest of the users.

The effect is expected to be two-fold:

  • Offer users the tools to protect privacy and to lead a private and safe digital life without compromising their identity, exposing their habits and communications
  • Setting a high standard and example for others to follow, define the state of the art of privacy protection in the age of big data and force others to follow suit, thereby increasing pressure on the whole industry and eco-system to protect users privacy better

Leaking user data, allowing users to be tracked, collecting their most private information in databases across the world means that users lose control of their identity and what parts they want others to know, and what they want to keep for themselves. Worse, collecting data in so many places, often commercially, but also by governments means that the user has little way of knowing what is known about him or her, let alone being able to determine who should be able to control what. Data being persistently collected means that not only today's security measures and policies are relevant, but also the future's. This poses a great multiple great risks.

KDE adds a 5th Freedom to the 5 principal software Freedoms:

The freedom to decide which data is sent to which service”.

Personal Risks for Users

Risks that individual users run are, among others:

  • The more data that is collected, the bigger the risk of Identity Theft becomes
  • Profiling
  • Blackmail
  • Users' private data may end up in the wrong hands
  • Targeting of users (e.g. marginalized users are more at risk)

Threat Models

Public Wifi

Assume anyone can see your Wifi network traffic (e.g. you are connected to the same WPA2 network). Using your device in such an environment should be safe and not compromise your privacy any more compared to using a wired network at home.

Possible counter-measures: Only connect to encrypted services, Connect through an encrypted tunnel to a computer on your home network (e.g. wireguard on a raspberry pi for example)

Stolen Device

Assume your device gets stolen in a switched off or locked screen state. This should not result in a disclosure of personal data.

Possible counter-measures: Full Disk Encryption (e.g. LUKS, ZFS), secure-delete tools (sswap, sdmem)

Mega Corporations ("Google")

It should be possible to enjoy the benefits of state-of-the-art consumer electronics, communication and content without individual companies creating detailed user profiles.

Possible counter-measures: Free, accessible, end-to-end encrypted alternatives to proprietary services. (e.g. Signal, Briar)

Global Surveillance ("NSA")

A global passive adversary is the most commonly assumed threat when analyzing theoretical anonymity designs. But all practical low-latency systems, like Tor, do not protect against such a strong adversary. Instead, they assume an adversary who can observe some fraction of network traffic; who can generate, modify, delete, or delay traffic; who can operate onion routers; and who can compromise some fraction of the onion routers. More detail in the Tor design document.

Possible counter-measures: Only use end-to-end encrypted services (Tor onion services, Signal, Briar), use the Tor network when possible, Minimize network traffic

Targeted Surveillance ("Snowden")

Could be politically motivated or industrial espionage, by an actor with significant skill and resources.

Possible counter-measures: Reproducible builds, Clear separation of trust boundaries and documentation thereof (e.g. 'can installing a theme make my system more insecure?', 'what does this plasmoid have access to?), Apply the principle of least authority (it should be clear what a particular component has access to and able to revoke it, for example a plasmoid needs to request access to the network or the home directory), Regular security audits (not just of KDE software but also of popular third party plasmoids for example)

Rogue local software

Assume you run any kind of software not coming from a trusted source or trusted software parses data that is not trusted. E.g. you install a plasmoid from the KDE store. It should be easy to protect your personal data, kwallets, browser history, etc. and local network from that code.

Possible counter-measures: Easy and configurable sandboxing of untrusted binaries (including plasmoids and themes) and binaries that parse untrusted data (such as video/media players), Application firewall to catch and stop network egress (e.g. Subgraph Firewall, Easy rollback of destructive changes using atomic changes/snapshotting (e.g. btrfs, ZFS, ostree)

The adversary enter at your place

You have few seconds to try to secure your data by pressing a "panic button" (locally or remotely, by e.g. kdeconnect).

Possible counter-measures: pushing the "panic button" locks the screen, unmounts all Vaults/Veracrypt disks and clear the password/keyfile cache, writes zeros to RAM and swap using sdmem and sswap, securely removes (srm) critical files, call sweeper, run sfill, propagates the panic signal to all other nodes in the network, forces an ACPI shutdown, etc. Inspired by https://github.com/0xPoly/Centry

What it will take?

TLDR;:

  • Security
  • Privacy-respecting defaults
  • Offering the right tools in the first place

Security

We can only guarantee privacy if we also value security.
Possible approaches:

  • Functioning code-review
  • Regular security audits
  • Quick turn-around times for software updates, especially security fixes
  • Prefer to use encrypted communication where possible, offer Tor onion services for KDE services, prefer HTTPS over HTTP where possible, avoid unencrypted connections
  • Encryption at rest of sensitive information
  • Moving away from inherently insecure technologies and using more secure technologies, i.e. default to Wayland instead of X11, Keep supporting privileged user namespaces for sandboxing, Strong defaults for seccomp filtering, AppArmor and cgroups
  • Avoiding single points of failure and centralized control

Privacy-Respecting Defaults

KDE software supporting this goal should:

  • Only collect and send data when necessary and clear and sensible from within the context and using a vetted privacy-preserving methods (e.g. rappor which is used by Chrome and Firefox). No hidden telemetry sending user stats, not HTTP connections downloading content, no search queries to online services without the users explicit consent (or where it's entirely clear from the context, e.g. web browsers, software updater, etc.).
  • Use anonymity where it is possible, for example by using Tor connections for things like telemetry and weather updates which don't require third party user identification (because we cannot control third party services and if they will behave)
  • No collection of privacy-relevant data without clear purpose and without doing the best we can to preserve your privacy (for example by using differential privacy)
  • Privacy-preserving defaults: a user should not have to make changes to the software configuration to avoid leaking data. Secure and private by default. (Software may be configured to be more leaky if that benefits the user, but the risk to that should be clear, either from context or explicitely stated.)
  • Use clear and consistent UI and design language around network-related options

Offering the Right Tools

KDE needs to make an effort to provide a comprehensive set of tools for most users' needs, for example:

  • An email client allowing encrypted communication
  • Chat and instant messenging with state-of-the art protocol security (Signal Protocol and derivatives like Briar and Matrix)
  • A webbrowser that has private default settings
  • Allow users to easily scrub metadata from files (e.g. dolphin integration of MAT)
  • Other tools that allow offline operation and independence from popular cloud services (e.g. File storage and groupware solutions)
  • Support for online services that can be operated as private instances, not depending on a 3rd party providers
  • State-of-the-art support and integration for projects like Tor, MAT, secure-delete tools, etc.

How we know we succeeded

Static and runtime analysis tools, such as:

  • Wireshark
  • gdb
  • [...]

KDE software can be audited for security vulnerabilities by security experts, organizations, and firms, such as:

KDE software can be audited for compliance with common, security related standards, such as:

  • NIST Cybersecurity Framework (NIST CSF)
  • ISO 15408
  • RFC2196
  • Cyber Essentials (UK Government Standard)

"Soft" criteria include:

  • Press and 3rd party refer to KDE as carrying the gold-standard for such software
  • Journalists prefer KDE software for their work
  • The NSA hates KDE
  • The CCC loves KDE ♥

Relevant links

I am willing to put work into this

I am interested

see also T7050 for discussion about the sprint goal

Recent Activity

Sep 5 2023

davidedmundson closed T16880: Need clarity on truly benevolent parties in KDE docs as Invalid.
Sep 5 2023, 11:50 AM · Websites, Documentation, KDE Privacy Goal
canoeingpanorama triaged T16880: Need clarity on truly benevolent parties in KDE docs as High priority.
Sep 5 2023, 11:48 AM · Websites, Documentation, KDE Privacy Goal

Jul 22 2023

davidedmundson closed T16753: You refuse to explain, so of course I don't understand as Sealed.

It has been explaine, don't reply instead reread those messages. This is completely unacceptable behaviour. You're sabotaging your own cause.

Jul 22 2023, 6:57 AM · Websites, KDE Promo, KDE Privacy Goal
lordhelpus created T16753: You refuse to explain, so of course I don't understand.
Jul 22 2023, 6:43 AM · Websites, KDE Promo, KDE Privacy Goal
lordhelpus triaged T16750: EFF calls for a week of action against #BadInternetBills as Unbreak Now! priority.
Jul 22 2023, 6:42 AM · Websites, KDE Promo, KDE Privacy Goal
davidedmundson closed T16750: EFF calls for a week of action against #BadInternetBills as Sealed.

We spoke in a previous task about this. You cannot just reopen the same ticket again and again.

Jul 22 2023, 6:42 AM · Websites, KDE Promo, KDE Privacy Goal

Jul 13 2023

lordhelpus added a comment to T16730: KDE Vision needs an exception for benevolent Western democracies.

Wording like this does not help convince people to join your mission but instead close this whole issue off hand.

Jul 13 2023, 7:58 AM · KDE Promo, Websites, KDE Privacy Goal
davidedmundson closed T16730: KDE Vision needs an exception for benevolent Western democracies as Sealed.

If so, KDE should add a clear exception to the KDE Vision for benevolent Western

Jul 13 2023, 6:20 AM · KDE Promo, Websites, KDE Privacy Goal
lordhelpus triaged T16730: KDE Vision needs an exception for benevolent Western democracies as High priority.
Jul 13 2023, 5:44 AM · KDE Promo, Websites, KDE Privacy Goal

May 3 2023

jriddell closed T16383: Please help me understand. I sincerely do not. Help me. as Sealed.
May 3 2023, 1:25 PM · Websites, KDE Promo, KDE Privacy Goal

Apr 29 2023

lordhelpus created T16383: Please help me understand. I sincerely do not. Help me..
Apr 29 2023, 10:27 PM · Websites, KDE Promo, KDE Privacy Goal

Nov 16 2022

lydia closed T15980: EU still wants to ban secure communications as Invalid.

We've been through this.

Nov 16 2022, 8:17 AM · KDE Privacy Goal, KDE Promo, Websites

Nov 15 2022

lordhelpus triaged T15980: EU still wants to ban secure communications as High priority.
Nov 15 2022, 11:34 PM · KDE Privacy Goal, KDE Promo, Websites

Oct 24 2022

markrosenbaum added a member for KDE Privacy Goal: markrosenbaum.
Oct 24 2022, 2:22 AM

Jul 10 2022

lydia closed T15667: UK is also proposing a law against encryption... as Invalid.
Jul 10 2022, 4:08 PM · Websites, KDE Privacy Goal

Jul 8 2022

lordhelpus added projects to T15667: UK is also proposing a law against encryption...: KDE Privacy Goal, Websites.
Jul 8 2022, 10:59 PM · Websites, KDE Privacy Goal

May 19 2022

ngraham added a comment to T15527: EU has drafted an anti-encryption law, please speak up!.

Not taking the bait, sorry.

May 19 2022, 8:49 PM · KDE Privacy Goal
lordhelpus added a comment to T15527: EU has drafted an anti-encryption law, please speak up!.

learning some communication skills so that you become capable of convincing people of your position

May 19 2022, 7:21 PM · KDE Privacy Goal
ngraham closed T15527: EU has drafted an anti-encryption law, please speak up! as Invalid.

Spamming these kinds of messages isn't helpful. Please stop it. If you really care about this cause, your time would be 100x better spent learning some communication skills so that you become capable of convincing people of your position rather than annoying them.

May 19 2022, 1:49 PM · KDE Privacy Goal

May 18 2022

lordhelpus updated subscribers of T15527: EU has drafted an anti-encryption law, please speak up!.

The last law you wanted us to oppose didn't became law either.

May 18 2022, 3:49 PM · KDE Privacy Goal
felixernst added a comment to T15527: EU has drafted an anti-encryption law, please speak up!.

@felixernst, remember how you told me that the EU's privacy situation isn't as bad as I thought? Look at how quickly things can change...

May 18 2022, 12:47 PM · KDE Privacy Goal
lordhelpus triaged T15527: EU has drafted an anti-encryption law, please speak up! as High priority.
May 18 2022, 1:10 AM · KDE Privacy Goal

Feb 19 2022

knauss added a comment to T14768: Workflow of encrypted Mails .

It's just unclear what you need design help with. The videos show the current state, and it seems like it's not ideal since I can't understand any of it, but I don't know what to say or think beyond that. From my perspective as an inexperienced user, the ideal experience is that I don't even have to think about keys. It would only be something programmers and sysadmins would be concerned about. Emails would simply be encrypted when I want them to be. Maybe even by default without me being aware of it, similar to how https is everywhere by default on most important websites. I understand it's not as simple as that, otherwise encrypted email would already be far more common.

Feb 19 2022, 12:44 PM · VDG, KDE Privacy Goal, KDE PIM

Feb 18 2022

ndavis added a comment to T14768: Workflow of encrypted Mails .

@ndavis: What infomation do you need to help? Have you watched the videos? And looked into the subtasks? Sorry I'm a little bit lost, what you need for information to go on. As I have deep understanding in the encrypted messages I'm somehow blind about the questions from newbies.

As a first step I want to get improve the situation when sending an encrypted message. I want to remove/replace/improve all the dialogs that pop up AFTER pressing "send". I think a user should in best case not click "OK" at any other dialog after pressing "send". The user should have information BEFORE pressing "Send", if they wants to send it under specific circumstances.

Feb 18 2022, 6:28 PM · VDG, KDE Privacy Goal, KDE PIM
knauss added a comment to T14768: Workflow of encrypted Mails .

@ndavis: What infomation do you need to help? Have you watched the videos? And looked into the subtasks? Sorry I'm a little bit lost, what you need for information to go on. As I have deep understanding in the encrypted messages I'm somehow blind about the questions from newbies.

Feb 18 2022, 3:59 PM · VDG, KDE Privacy Goal, KDE PIM

Feb 17 2022

lordhelpus triaged T15290: Prepare for possible weakening of HTTPS security by Europe's new proposed law as High priority.
Feb 17 2022, 5:40 PM · Neon, KDE Applications, KDE Privacy Goal
lordhelpus added a comment to T14768: Workflow of encrypted Mails .

@knauss: be aware that if the EARN IT anti-encryption bill passes, your efforts will all be for naught, as mail providers will begin refusing encrypted mail outright. Please spread the word!

Feb 17 2022, 5:31 PM · VDG, KDE Privacy Goal, KDE PIM

Feb 16 2022

ndavis added a comment to T14768: Workflow of encrypted Mails .

It's currently not clear from the task descriptions what your goals are. I have next to no experience with encrypted email, but I know that PGP has a lot of built-in complexity that can be difficult to abstract away (part of why it isn't used by most people). Maybe someone else in the KDE VDG has more experience with encrypted email, but I don't know anyone in particular who does.

Feb 16 2022, 4:01 PM · VDG, KDE Privacy Goal, KDE PIM

Feb 15 2022

knauss added a comment to T14768: Workflow of encrypted Mails .

Hey VDG team, As the title tells you: I want to improve the current workflow of encrypted mails in KMail. At the moment focusing on the sending part of it. I need input from VDG about how to improve the current situation.

Feb 15 2022, 1:11 PM · VDG, KDE Privacy Goal, KDE PIM
knauss added a project to T14768: Workflow of encrypted Mails : VDG.
Feb 15 2022, 1:08 PM · VDG, KDE Privacy Goal, KDE PIM

Jan 17 2022

richardz added a comment to T8408: Autocrypt support for kmail.

Meanwhile the Thunderbird Addon is no longer maintained and usable.

Jan 17 2022, 1:08 AM · KDE PIM, KDE Privacy Goal, KDE PIM: Junior Jobs

Nov 30 2021

concerned added projects to T15056: Please reconsider KDE's stance on privacy: KDE Privacy Goal, KDE Promo, Websites.

All I need right now is a tiny bit of hope...

Nov 30 2021, 10:25 PM
aronkvh closed T15056: Please reconsider KDE's stance on privacy as Invalid.
Nov 30 2021, 8:31 PM
aronkvh added a comment to T15056: Please reconsider KDE's stance on privacy.

you've already requested this and got an answer

Nov 30 2021, 8:31 PM
concerned created T15056: Please reconsider KDE's stance on privacy.
Nov 30 2021, 8:10 PM

Oct 9 2021

brute4s99 removed a member for KDE Privacy Goal: brute4s99.
Oct 9 2021, 9:42 PM
brute4s99 removed a watcher for KDE Privacy Goal: brute4s99.
Oct 9 2021, 9:42 PM
tfella closed T14930: Disband KDE as a gesture of hopelesness (mandatory backdoors are on the horizon) as Invalid.

No.

Oct 9 2021, 6:28 PM · KDE Privacy Goal, KDE's 25th anniversary celebration
concerned triaged T14930: Disband KDE as a gesture of hopelesness (mandatory backdoors are on the horizon) as Unbreak Now! priority.
Oct 9 2021, 3:14 PM · KDE Privacy Goal, KDE's 25th anniversary celebration

Aug 5 2021

knauss triaged T14772: libkleo keyselection and approval dialog for KMail as Normal priority.
Aug 5 2021, 5:56 PM · KDE Privacy Goal, KDE PIM
knauss triaged T14771: KeySelection Dialog only shows technical informations as Normal priority.
Aug 5 2021, 5:45 PM · KDE Privacy Goal, KDE PIM
knauss triaged T14770: KeySelection dialog takes ages to load all keys as Normal priority.
Aug 5 2021, 5:41 PM · KDE Privacy Goal, KDE PIM
knauss updated the task description for T14769: Dialogs after sending mails.
Aug 5 2021, 5:35 PM · KDE Privacy Goal, KDE PIM
knauss triaged T14769: Dialogs after sending mails as Normal priority.
Aug 5 2021, 5:10 PM · KDE Privacy Goal, KDE PIM
knauss triaged T14768: Workflow of encrypted Mails as Normal priority.
Aug 5 2021, 5:08 PM · VDG, KDE Privacy Goal, KDE PIM
knauss closed T742: Add Protected Header support as Resolved.
Aug 5 2021, 5:01 PM · KDE PIM (Applications 20.12 (master)), KDE Privacy Goal
knauss edited projects for T8408: Autocrypt support for kmail, added: KDE PIM; removed KDE PIM (Applications 20.12 (master)).
Aug 5 2021, 5:01 PM · KDE PIM, KDE Privacy Goal, KDE PIM: Junior Jobs
knauss edited projects for T8408: Autocrypt support for kmail, added: KDE PIM (Applications 20.12 (master)); removed KDE PIM.
Aug 5 2021, 5:00 PM · KDE PIM, KDE Privacy Goal, KDE PIM: Junior Jobs
knauss edited projects for T742: Add Protected Header support, added: KDE PIM (Applications 20.12 (master)); removed KDE PIM.
Aug 5 2021, 5:00 PM · KDE PIM (Applications 20.12 (master)), KDE Privacy Goal

Oct 28 2020

knauss moved T8408: Autocrypt support for kmail from Technical to In Progress on the KDE Privacy Goal board.
Oct 28 2020, 10:03 PM · KDE PIM, KDE Privacy Goal, KDE PIM: Junior Jobs