Open Book: A Socially-inspired Cloaking Technique that Uses Lexical Abstraction to Transform Messages

Both governments and corporations routinely surveil computer-mediated communication (CMC). Technologists often suggest widespread encryption as a defense mechanism, but CMC encryption schemes have historically faced significant usability and adoption problems. Here, we introduce a novel technique called Open Book designed to address these two problems. Inspired by how people deal with eavesdroppers offline, Open Book uses data mining and natural language processing to transform CMC messages into ones that are vaguer than the original. Specifically, we present: 1) a greedy Open Book algorithm that cloaks messages by transforming them to resemble the average Internet message; 2) an open-source, browser-based instantiation of it called Read Me, designed for Gmail; and, 3) a set of experiments showing that intended recipients can decode Open Book messages, but that unintended human- and machine-recipients cannot. Finally, we reflect on some open questions raised by this approach, such as recognizability and future side-channel attacks.

[1]  Jeffrey Nichols,et al.  Social media participation and performance at work: a longitudinal study , 2014, CHI.

[2]  Whitfield Diffie,et al.  New Directions in Cryptography , 1976, IEEE Trans. Inf. Theory.

[3]  Philip R. Zimmermann,et al.  The official PGP user's guide , 1996 .

[4]  Alice E. Marwick,et al.  Social Privacy in Networked Publics: Teens’ Attitudes, Practices, and Strategies , 2011 .

[5]  S. Hart,et al.  Development of NASA-TLX (Task Load Index): Results of Empirical and Theoretical Research , 1988 .

[6]  Jeffrey T. Hancock,et al.  Language Use in Computer-Mediated Communication: The Role of Coordination Devices , 2001 .

[7]  Michael I. Jordan,et al.  Latent Dirichlet Allocation , 2001, J. Mach. Learn. Res..

[8]  Shuang-Hong Yang,et al.  Large-scale high-precision topic modeling on twitter , 2014, KDD.

[9]  Adi Shamir,et al.  A method for obtaining digital signatures and public-key cryptosystems , 1978, CACM.

[10]  John B. Lowe,et al.  The Berkeley FrameNet Project , 1998, ACL.

[11]  Pamela J. Hinds,et al.  Out of Sight, Out of Sync: Understanding Conflict in Distributed Teams , 2003, Organ. Sci..

[12]  Robert E. Kraut,et al.  The impact of delayed visual feedback on collaborative performance , 2006, CHI.

[13]  H. H. Clark,et al.  Speaking while monitoring addressees for understanding , 2004 .

[14]  E. Ziegel,et al.  Bootstrapping: A Nonparametric Approach to Statistical Inference , 1993 .

[15]  Herbert H. Clark,et al.  Grounding in communication , 1991, Perspectives on socially shared cognition.

[16]  Janice Y. Tsai,et al.  Soups 2006 , 2006, IEEE Security & Privacy Magazine.

[17]  Sri Subramaniam Frontiers in E-commerce personalization , 2014, KDD.

[18]  Naren Ramakrishnan,et al.  Modeling mass protest adoption in social network communities using geometric brownian motion , 2014, KDD.

[19]  P. Biernacki,et al.  Snowball Sampling: Problems and Techniques of Chain Referral Sampling , 1981 .

[20]  David D. Clark,et al.  Rethinking the design of the Internet , 2001, ACM Trans. Internet Techn..

[21]  J. Doug Tygar,et al.  Why Johnny Can't Encrypt: A Usability Evaluation of PGP 5.0 , 1999, USENIX Security Symposium.

[22]  付伶俐 打磨Using Language,倡导新理念 , 2014 .

[23]  Hanna M. Wallach,et al.  Topic modeling: beyond bag-of-words , 2006, ICML.

[24]  Jinyun Yan,et al.  LASTA: large scale topic assignment on multiple social networks , 2014, KDD.

[25]  Jon M. Kleinberg,et al.  Romantic partnerships and the dispersion of social ties: a network analysis of relationship status on facebook , 2013, CSCW.

[26]  Susan E. Brennan,et al.  The Grounding Problem in Conversations With and Through Computers , 2000 .

[27]  Cindy K. Chung,et al.  The Psychological Functions of Function Words , 2007 .

[28]  George A. Miller,et al.  WordNet: A Lexical Database for English , 1995, HLT.

[29]  J. Pennebaker,et al.  The Secret Life of Pronouns , 2003, Psychological science.

[30]  Dan Boneh,et al.  TWENTY YEARS OF ATTACKS ON THE RSA CRYPTOSYSTEM , 1999 .

[31]  D. Saunders The brave new world , 1999 .

[32]  Yiming Yang,et al.  Introducing the Enron Corpus , 2004, CEAS.

[33]  Jeffrey Nichols,et al.  Understanding individuals' personal values from social media word use , 2014, CSCW.