Wed, 16 May 2018
15:00

Challenges of End-to-End Encryption in Facebook Messenger

Jon Millican
(Facebook)
Abstract

In 2016, Facebook added an optional end-to-end (E2E) encryption feature called Secret Conversations to Messenger. This was challenging to design, as many of Messenger's key properties and features don't fit the typical model of E2E apps. Additionally, Messenger is already one of the world's most popular messaging apps, supporting nearly a billion people across a variety of technical and cultural environments. Because of this, Messenger's deployment of E2E encryption provides attendees with a valuable case study on how to build usable, secure products. 

We will discuss the core properties of a typical E2E app, the core features of Messenger, the distance between the two, and the approach we took to close the gap. We'll examine how minimizing the distance shaped the current E2E experience within Messenger. Through discussion of the key decisions in this process, we'll address the implications for alternative designs with real world comparisons where they exist. 

Although Secret Conversations in Messenger use off-the-shelf Signal Protocol for message encryption, Facebook also wanted to ensure a safe communication channel for community members who may be victims of online abuse. To this end, we created a way for people to report secret conversations that violate our Community Standards, without breaking any E2E guarantees for other messages.

Developing a reporting protocol created an interesting challenge: the potential of fake reports with no intermediary to invalidate them. To pre-empt the possibility of Bob forging a report to incriminate Alice, we added a method that uses two HMACs - one added by the sender and one by Facebook - to “cryptographically frank” messages as we forward them from one party to the other (physical mail uses a similar franking). This technique ensures similar confidence that a report is genuine as we have for messages stored in plaintext on our servers. Additionally, the frank is only verifiable by Facebook after receiving a report from the recipient, thus preventing a third party from using it as evidence against the sender.

We hope that this talk will provide an insight into the intricacies of deploying security features at scale, and the additional considerations necessary when developing an existing product.

Tue, 15 May 2018

12:45 - 13:30
C5

Complex singularities near the intersection of a free-surface and a rigid wall

Thomas Chandler
Abstract

It is known that in steady-state potential flows, the separation of a gravity-driven free-surface from a solid exhibits a number of peculiar characteristics. For example, it can be shown that the fluid must separate from the body so as to form one of three possible in-fluid angles: (i) 180°, (ii) 120°, or (iii) an angle such that the surface is locally perpendicular to the direction of gravity. These necessary separation conditions were notably remarked by Dagan & Tulin (1972) in the context of ship hydrodynamics [J. Fluid Mech., 51(3) pp. 520-543], but they are of crucial importance in many potential flow applications. It is not particularly well understood why there is such a drastic change in the local separation behaviours when the global flow is altered. The question that motivates this work is the following: outside a formal balance-of-terms arguments, why must (i) through (iii) occur and furthermore, what is the connections between them?

              In this work, we seek to explain the transitions between the three cases in terms of the singularity structure of the associated solutions once they are extended into the complex plane. A numerical scheme is presented for the analytic continuation of a vertical jet (or alternatively a rising bubble). It will be shown that the transition between the three cases can be predicted by observing the coalescence of singularities as the speed of the jet is modified. A scaling law is derived for the coalescence rate of singularities.

The northern site of the Pierre Auger Observatory
Blümer, J New Journal of Physics volume 12 issue 3 035001 (01 Mar 2010)
Fri, 08 Jun 2018

17:00 - 17:30

Comparing models with data using computational algebra

Dr Heather Harrington
(Mathematical Institute Oxford)
Abstract

In this talk I will discuss how computational algebraic geometry and topology can be useful for studying questions arising in systems biology. In particular I will focus on the problem of comparing models and data through the lens of computational algebraic geometry and statistics. I will provide concrete examples of biological signalling systems that are better understood with the developed methods.

Please note that this will be held at Tsuzuki Lecture Theatre, St Annes College, Oxford.

Please note that you will need to register for this event via https://www.eventbrite.co.uk/e/qbiox-colloquium-trinity-term-2018-ticke…

Thu, 24 May 2018

16:00 - 17:00
L6

Voronoi summation and applications to subconvexity

Edgar Assing
(University of Bristol)
Abstract

We will briefly revisit Voronoi summation in its classical form and mention some of its many applications in number theory. We will then show how to use the global Whittaker model to create Voronoi type formulae. This new approach allows for a wide range of weights and twists. In the end we give some applications to the subconvexity problem of degree two $L$-functions. 

Subscribe to