Hi all,
I’m currently working on an application that works with sensitive user data. It’s not possible to do all the calculations on user side as the canister needs to make sure it’s internal state is correct. From what I understood it’s currently possible for node providers to currently sniff the internal state of a canister. Meaning that when a canister receives an encrypted value then decrypts it with the canisters key, you can assume the node provider can read this decrypted value. So first of all, is this assumption true? If it’s true I have some follow-up questions regarding the capabilities of a node-provider:
- How easy is it for a node provider to sniff?
- Do node providers take a risk by sniffing, meaning it can be traced/discovered that a node provider sniffed?
- To retrieve sensitive data in my application a node provider needs to sniff for a long duration, can a node-provider stay in a subnet indefinitely in case it wants to?
- Are there already possible guards we can add to a canister to guard against sniffing?
- Are there any longterm initiatives to tackle this problem that I can already have a look at? For example if there is a solution planned for next year, I can already take this into consideration for the design of my application
Thanks a lot for all the help!
Kind regards,
Thomas