Skip to content
Menu
Open World News Open World News
  • Privacy Policy
Open World News Open World News
Community-controlled Backup Ceremony

Community-controlled Backup Ceremony

Posted on July 25, 2023 by Michael G

Author: F-Droid
Source

Seven core contributors and one board member met in Scotland, the birthplace
of F-Droid, for the first in-person F-Droid team meeting. One of the most
pressing tasks we needed to take care of was setting up a
contributor-controlled backup of all of our signing keys. The requirements
made it necessary to have a lengthy, in-person, consensus-driven planning
session. We found no good documentation of such a procedure, so we’re going
out on a limb here and publishing the general outline of our process. This
process was informally audited by multiple people with varying expertise
before the public key was used to encrypt anything.

Community-controlled Backup Ceremony

F-Droid manages secret signing keys for thousands of apps. Someone who has
control over those keys could create malicious app releases that could be
transparently installed as updates. On top of that,
Android
does
not
make it
easy
to rotate to new signing keys, unlike TLS or Signal. So these keys are very important to protect. They are also very
important to backup, since the Android OS uses the signing key combined with
the Application ID as the unique identifier to represent each installed
app. This meeting gave us the perfect opportunity to create a new backup
process that ensures that at least 4 trusted community members must be
physically present in order to decrypt the backup of all the keys. First,
we started with the requirements:

  • Regular backups as new keys get added.
  • Strong, proven encryption for all backups.
  • Minimum of four participants to decrypt.
  • Specific technical experience should not be required to be a participant.
  • The components should be physically spread out across jurisdictions.
  • Access should minimized as much as possible (e.g. the signing server
    maintainer does not need access to the backups).
  • As low a stress level as possible for each participant.
  • Each participant should be free to hand over their component if they are
    forced to, without jeopardizing the encryption.

Then we mapped out who was present:

  • Seven core contributors.
  • One board member.
  • One trusted external witness.
  • No one else.

From that, we built the process:

  • Three roles for physical control: operator of the signing server,
    encrypted backup holder, passphrase shard holder.
  • Each person only takes on a single role, for example, shard holders do not
    have access to the signing keys or the encrypted backup.
  • The encryption key used for the data is public key cryptography.
  • The private key was generated on a one-time-use, in-memory, disposable
    TAILS session.
  • The private key was sharded using Shamir’s Secret
    Sharing
    .
  • We used an implementation of Shamir’s Secret Sharing that has been
    maintained for over 15 years. The installation that was used was
    confirmed via reproducible builds.
  • Each shard was written to a removeable storage device bought in a store
    with cash without pre-order or registration.
  • Each removeable storage device with a shard was physically handed each
    shard holder to pack in a tamper-evident envelope as the others observed.
  • Backups must not be transmitted over the internet, only exchanged via
    in-person meetings between people who know each other.
  • All involved sat around a table for the duration of the ceremony. The
    security profile of in-person discussions is drastically easier to manage
    than secure online discussions.
  • All present were observers of each step of the process, and verbally
    confirmed their agreement.
  • The operators of the signing server and the holders of the backup data
    verified each others’ identities via F-Droid networks, PGP Web of Trust,
    and checks of government issued IDs.
  • Pieces from a minimum of two jurisdictions are required to decrypt: EU,
    Europe non-EU, US.

One important factor in reliable backups is regular updates. New apps are
constantly being added, and those usually get a new signing key assigned.
So we needed a system where it was easy to update the backup data while
involving as few people as possible. An operator of the signing server
receives the public key to encrypt the backups via in-person exchange with a
holder of the backups. The holders of the backup data receives the
encrypted backups from an operator of the signing server via in-person
exchange.

Holding such important secrets also brings some unavoidable stresses to the
people holding them. One key design goal was to create a protocol that did
not add to the stress of any existing operators. Furthermore, we aimed to
keep the individual stress as low as possible for all roles in this
protocol. That makes it possible to empower volunteer contributors without
overburdening them.

For restoring, we agreed that it should happen in an in-person meeting. The
process requires three shard holders meet with one encrypted backup holder,
then the results need be given to a signing server operator. Requiring an
in-person meeting could delay the restore process, but the added trust
seemed worth it. So this is the default process. We could still switch to
partially online process if the need arises. That would require the
agreement of five participants.

We believe this is a secure and reliable backup procedure for very sensitive
data. We welcome further scrutiny and plan to update the procedure as
needed in a future meeting.

(This meeting was paid for by the FFDW-DVD grant.)

Read more

Related Posts:

  • Federated services made easier
    Federated services made easier
  • Gentle updates postponed
    Gentle updates postponed
  • Unattended updates for everyone, 1.19 is here
    Unattended updates for everyone, 1.19 is here
  • Vulnerability Patching for F-Droid apps
    Vulnerability Patching for F-Droid apps
  • Let us compete on trustworthiness and an Arcticons special release
    Let us compete on trustworthiness and an Arcticons…
  • Favor your repository
    Favor your repository

Recent Posts

  • [TUT] LoRa & LoRaWAN – MikroTik wAP LR8 kit mit The Things Network verbinden [4K | DE]
  • Mercado aguarda Powell e olha Trump, dados e Haddad | MINUTO TOURO DE OURO – 11/02/25
  • Dan Levy Gets Candid About Learning How To Act Differently After Schitt’s Creek: ‘It’s Physically…
  • Building a Rock Shelter & Overnight Stay in Heavy Snow 🏕️⛰️
  • Les milliardaires Elon Musk et Xavier Niel s’insultent copieusement

Categories

  • Android
  • Linux
  • News
  • Open Source
©2025 Open World News | Powered by Superb Themes
We use cookies on our website to give you the most relevant experience by remembering your preferences and repeat visits. By clicking “Accept All”, you consent to the use of ALL the cookies. However, you may visit "Cookie Settings" to provide a controlled consent.
Cookie SettingsAccept All
Manage consent

Privacy Overview

This website uses cookies to improve your experience while you navigate through the website. Out of these, the cookies that are categorized as necessary are stored on your browser as they are essential for the working of basic functionalities of the website. We also use third-party cookies that help us analyze and understand how you use this website. These cookies will be stored in your browser only with your consent. You also have the option to opt-out of these cookies. But opting out of some of these cookies may affect your browsing experience.
Necessary
Always Enabled
Necessary cookies are absolutely essential for the website to function properly. These cookies ensure basic functionalities and security features of the website, anonymously.
CookieDurationDescription
cookielawinfo-checkbox-analytics11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Analytics".
cookielawinfo-checkbox-functional11 monthsThe cookie is set by GDPR cookie consent to record the user consent for the cookies in the category "Functional".
cookielawinfo-checkbox-necessary11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookies is used to store the user consent for the cookies in the category "Necessary".
cookielawinfo-checkbox-others11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Other.
cookielawinfo-checkbox-performance11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Performance".
viewed_cookie_policy11 monthsThe cookie is set by the GDPR Cookie Consent plugin and is used to store whether or not user has consented to the use of cookies. It does not store any personal data.
Functional
Functional cookies help to perform certain functionalities like sharing the content of the website on social media platforms, collect feedbacks, and other third-party features.
Performance
Performance cookies are used to understand and analyze the key performance indexes of the website which helps in delivering a better user experience for the visitors.
Analytics
Analytical cookies are used to understand how visitors interact with the website. These cookies help provide information on metrics the number of visitors, bounce rate, traffic source, etc.
Advertisement
Advertisement cookies are used to provide visitors with relevant ads and marketing campaigns. These cookies track visitors across websites and collect information to provide customized ads.
Others
Other uncategorized cookies are those that are being analyzed and have not been classified into a category as yet.
SAVE & ACCEPT