-
Notifications
You must be signed in to change notification settings - Fork 2.4k
Security and privacy model for ad confirmations
- Users running Brave browser
- Advertisers
- Brave operators
- Internet
- User computers, Brave browser installation with stored secrets
- Challenge bypass microservice
- Ads server
- Ledger server (wallet service)
- Eyeshade server (accounting service)
- Given a Brave user observes an advertisement, provide a channel for "confirming" said viewing without revealing to Brave the particular user involved.
- Upon receiving a valid confirmation, grant the user a redeemable payment token that is worth ~70% of the observation price charged to the advertiser.
- Allow a user to redeem their payment tokens, this redemption should be unlinkable to the original confirmation events.
- Pay out for redeemed tokens on-demand after offering a notification to the user to claim their earnings.
- Prevent double spend attacks by ensuring each payment token can be spent at most once.
- Brave/Advertiser cannot learn that a user in Segment X and a user in Segment Y are the same user (AKA, user unlinkability across segments)
- Brave/Advertiser cannot learn that a user who has viewed or interacted with Creative Set X and a user who has viewed or interacted with Creative Set Y are the same user (AKA, user unlinkability across creative sets)
- Brave/Advertiser cannot figure out any personally-identifiable or sensitive information about the user interacting with an ad creative without explicit consent of the user.
"Personally-identifiable or sensitive information" in this context includes but is not limited to: the user's browsing history, their email address and contact info, their real name, their Brave payments history, what ads they have seen, what segments they are in, their payments wallet address and anything considered personal info under GDPR.
- MITM on internet between user and ads server
- Crash / power loss
- Timing based loss of privacy
- Malicious advertisers
- Fraudsters interacting with ads server using the Brave browser or another client
- HTTPS from the world over internet to CDN
- HTTPS from CDN to the ads server
- HTTPS from the ads server to the challenge bypass microservice
- HTTPS from the ads server to the eyeshade server
- HTTPS from the ads server to the ledger server
Out of scope:
- Compromise of a user's device
- Brave collusion with CDN to track users based on IP
The ads confirmation protocol is composed of two separated rounds of the Privacy Pass cryptographic protocol, of which you can find a brief description here.
- The ads server communicates with the challenge bypass microservice to create
an issuer (consisting of a particular
SigningKey
) for confirmations. - The ads server communicates with the challenge bypass microservice to create a small number of issuers for payment. Each key corresponds to a particular payout value, for example there could be keys for 0.1, 0.3, 0.5, 1, 3, and 5 BAT.
- The corresponding
PublicKey
s for the confirmations and payments are published in the ads catalog.
- A user generates a pool of
Token
s, blinds them and submits a HTTP signed request to the ads server to have them signed by the server's confirmationSigningKey
. - The ads server makes a request to the ledger server to retrieve the wallet
public key, checks the signature over the request and finally signs the
tokens. Furthermore a
BatchDLEQProof
is created demonstrating that the tokens were signed by aSigningKey
whosePublicKey
was previously published in the catalog. - The returned
BatchDLEQProof
is verified and theSignedToken
s are unblinded and stored locally in their confirmation token pool.
The HTTP signature over this request restricts confirmation token issuance
to valid rewards wallets. A SigningKey
rotation can be performed to force
clients to create a new pool of tokens.
- A user pops an
UnblindedToken
from the pool, uses it to form aVerificationKey
and uses the key to "sign" confirmation metadata. - The user forms a token redemption request consisting of the
VerificationSignature
, the request metadata, theTokenPreimage
associated with theUnblindedToken
, and thePublicKey
corresponding to the key it was signed by. - The user generates a new
Token
, and blinds it. Together with the token redemption request this forms a confirmation request. - The confirmation request is submitted to the ads server, the client
receives a unique identifier by which it can later retrieve a
SignedToken
. - Using the included
PublicKey
the ads server looks up the issuer - The ads server forwards the token redemption request to corresponding issuer endpoint of
the challenge bypass microservice, which marks the
TokenPreimage
as spent. - The ads server rounds the value of the confirmed event to the nearest value that
has a corresponding payout key, then uses this key to sign the
BlindedToken
. ABatchDLEQProof
is also created showing the payment token is signed by aPublicKey
in the catalog. - The returned
BatchDLEQProof
is verified and the returnedSignedToken
is unblinded and stored locally with the other payment tokens the user has received.
These confirmation token redemption events should not be linkable to the user to whom they were issued provided:
- There is a sufficient anonymity set formed by users who are creating confirmation tokens.
- The time between token issuance and confirmation is not predictable.
- The confirmation metadata does not include information unique to the user (that is not otherwise unique to this event.)
- The user is not made re-identifiable through other side channels such as IP address information. We ensure this by configuring our CDN to neither log nor forward client address information on the anonymous confirmation endpoint.
- The signing keys used to sign both confirmation and payment tokens are widely used, we do not use unique keys for small user cohorts. To this effect we publish all signing keys publicly and instruct the browser to verify DLEQ proofs.
- A user takes all stored payment tokens that they have accumulated and forms a bulk token redemption request, submitting their wallet identifier as the metadata that is "signed".
- Using the included
PublicKey
for each token redemption request the ads server looks up the issuers for each - and thus the corresponding value. - The ads server forwards the token redemption requests to the corresponding issuer endpoints of
the challenge bypass microservice, which marks the
TokenPreimage
of each as spent and ensures that a double spend has not occured. - The ads server makes a request to the eyeshade server, submitting a request for payment for the value of each token.
- The browser client will request payment against all of the collected confirmations
- A Brave operator will pull the balances against the confirmations to be paid - only when the confirmations are received, earnings are earmarked for the client
- Ad earnings are then made available for users to claim