An Architecture for Privacy-Sensitive Ubiquitous Computing Jason I. Hong Computer Science Division University of California, Berkeley.

Download Report

Transcript An Architecture for Privacy-Sensitive Ubiquitous Computing Jason I. Hong Computer Science Division University of California, Berkeley.

An Architecture for Privacy-Sensitive Ubiquitous Computing

Jason I. Hong

Computer Science Division University of California, Berkeley

Ubicomp Presents New Benefits

Advances in wireless networking, sensors, devices – Greater awareness of and interaction with physical world Ubicomp can help in coordination, efficiency, safety Find Friends E911 Incident Command

Example

Location-enhanced Instant Messenger

Instant messaging used by 250m people, 20% growth / yr Clients are moving to mobile devices (Phones, PDAs) – Will be capable of determining your location Potential risks?

– Stalking – Constant surveillance by boss – Location-based spam

Ubicomp Presents New Privacy Risks

These ubicomp systems could also be used to: – Commit fraud – Draw embarrassing or inaccurate inferences – Discriminate against users Everyday Risks Friends, Family _________________________________ Over-protection Social obligations Embarrassment Employers _________________________________ Over-monitoring Discrimination Reputation Government __________________________ Civil liberties Extreme Risks Stalkers, Muggers _________________________________ Well-being Personal safety

Ubicomp Privacy is a Serious Concern

“[It] could tell when you were in the bathroom, when you left the unit, and how long and where you ate your lunch. EXACTLY what you are afraid of.”

- allnurses.com

What’s Hard about Ubicomp Privacy?

Scope and scale of ubicomp – Past: costly to collect, store, and use info – Future: everywhere, always on, far easier to collect data – New Domains: family, marketplace, workplace, healthcare… Many issues must be addressed simultaneously – Social and Organizational, Interaction Design, Technical

Problem

Hard to Create Privacy-sensitive Ubicomp Apps

Hard to analyze privacy – What concerns do people have?

– How to design effective user interfaces for privacy?

Hard to implement privacy-sensitive systems – What are the basic abstractions?

– What are the privacy mechanisms?

Solution

Confab Privacy Toolkit Informed by End-User Needs

Hard to analyze privacy – Analysis of end-user needs for ubicomp privacy Interviews, surveys, postings on message boards – Analysis of interaction design for ubicomp privacy Pitfalls in designing user interfaces for privacy Hard to implement privacy-sensitive systems – Confab toolkit for privacy-sensitive ubicomp apps Capture, processing, and presentation of personal info – Evaluation thru building three apps and user studies Location-enhanced messenger, location-enhanced web proxy, emergency response app

Outline

 Motivation   End-user Privacy Needs Pitfalls in User Interfaces for Privacy   Confab Toolkit for Privacy-Sensitive Ubicomp Applications Built

An HCI Perspective on Privacy

“The problem, while often couched in terms of privacy, is really one of control. If the computational system is invisible as well as extensive, it becomes hard to know: – what is controlling what

Empower people so they can choose to share:

the right information

• •

with the right people or services at the right time

The Origins of Ubiquitous Computing Research at PARC in the Late 1980s Weiser, Gold, Brown

Analysis of End-User Privacy Needs

Lots of speculation about ubicomp privacy, little data Published Sources – Examined papers describing usage of ubicomp systems – Examined existing and proposed privacy protection laws EU Directive, Location Privacy Act 2001, Wireless Privacy Act 2003 – Theoretical analysis, asymmetric information flows [Ubicomp 2002] Surveys and Interviews – Analyzed survey data of 130 people on ubicomp privacy prefs – Interviewed 20 people on location-based services Existing Systems – Analyzed postings on nurse message board on locator systems

Summary of End-User Privacy Needs

Clear value proposition Simple and appropriate control and feedback Plausible deniability Limited retention of data Decentralized control Special exceptions for emergencies

Alice’s Location Bob’s Location

Outline

 Motivation   End-user Privacy Needs Pitfalls in User Interfaces for Privacy   Confab Toolkit for Privacy-Sensitive Ubicomp Applications Built

Pitfalls in Designing for Privacy

What kinds of user interfaces work? What kinds do not?

– Analyzed ~40 apps for common user interface mistakes – Pitfalls in Designing for Privacy [PUC 2004]

Privacy Pitfalls

Obscuring Actual Flow

Users should understand what is being disclosed to whom – Many ubicomp systems are “invisible” by default – Systems should provide appropriate visibility   Who is querying my location?

How often?

“Bob will see this request” “Alice has requested your location”

Privacy Pitfalls

Configuration over Action

Designs should not require excessive configuration – Configuration a typical “solution”, but hard to predict right settings – Manage privacy in the actual context of use  

Privacy Pitfalls

Lacking Coarse-Grain Control

Fine-grained controls should be secondary, not primary “[T]raveling employees may want their bosses to be able to locate them during the day but not after 5 p.m. Others may want to receive coupons from coffee shops before 9 a.m. on weekdays but not on weekends when they sleep in. Some not 10 miles.”   Protecting the Cellphone User's Right to Hide New York Times, Feb 5 2004

Simple, does exactly what I think it does

Privacy Pitfalls

Inhibiting Established Practices

Designs should not inhibit established social practices

“Smart” Answering Machine

“Lee has been motionless in a dim place with high ambient sound for the last 45 minutes. Continue with call or leave a message.

”  

Outline

 Motivation   End-user Privacy Needs Pitfalls in User Interfaces for Privacy   Confab Toolkit for Privacy-Sensitive Ubicomp Applications Built

Confab Toolkit for Privacy-Sensitive Ubicomp

Confab for privacy-sensitive ubicomp apps – Cover end-user privacy needs – Avoid pitfalls in user interface design wrt privacy – Provide solid technical foundation for privacy-sensitive ubicomp

Presentation Infrastructure Physical / Sensor

I might present choices well to users… …but not have control I might acquire information privately… A toolkit needs to support all three of these layers – Must capture, store, process, & share in privacy-sensitive manner

Past Work Addresses at Most One Layer

Presentation Infrastructure P3P, Privacy Mirrors ParcTab System, Context Toolkit Physical / Sensor Cricket Location Beacons, Active Bats

Today, building privacy-sensitive apps would have to be done in an ad hoc manner

Architectural Requirements

Low barrier to entry – Make it simple for programmers, admin, end-users Easy to add or modify app-specific privacy controls Easy for end-users to control and understand Easy for end-users to share info at a comfortable level

Confab High-Level Architecture

Capture, store, and process personal data on my computer as much as possible (laptops and PDAs) Provide greater control and feedback over sharing

In Operators Name Loc Personal Data Store

My Computer

Out Operators App Logging Check Privacy Tag On Operators Invisible Mode

Example Built-in Confab Operator Flow Control

Goal: Disclose different info to different requestors Conditions – Age of data – Requestor Domain – Requestor ID – Requestor Location – – – Data Format Data Type Current Time Actions – Lower Precision – – Set (fake value) – – Invisible (no out data) – – Interactive – Allow Hide (data is removed) Timeout (fake network load) Deny (forbidden)

Outline

 Motivation   End-user Privacy Needs Pitfalls in User Interfaces for Privacy   Confab Toolkit for Privacy-Sensitive Ubicomp    Physical layer for acquiring location Infrastructure layer Presentation layer Applications Built

Physical / Sensor Layer

Intel’s Place Lab Location Source

Determine location via local database of WiFi Access Points – Unique WiFi MAC Address -> Latitude, Longitude – Periodically update your local copy

–Works indoors and

A

–Works with encrypted nodes –Privacy-sensitive –Rides the WiFi wave

PlaceLab Data at SF Bay Area

SF Bay Area ~60000 Nodes (~4 Megs)

PlaceLab Data at UC Berkeley

Berkeley Campus ~1000 Nodes

Outline

 Motivation   End-user Privacy Needs Pitfalls in User Interfaces for Privacy   Confab Toolkit for Privacy-Sensitive Ubicomp    Physical layer for acquiring location Infrastructure layer Presentation layer Applications Built

Infrastructure Layer

Confab’s Built-in MiniGIS Operator

People and apps need semantically useful names – “Meet me at 37.875, -122.257”

Country Name Region Name City Name = United States = California = Berkeley ZIP Code Place Name = 94709 = Soda Hall Latitude/Longitude = 37.875, -122.257

MiniGIS operator transforms location info locally – Using network-based services would be privacy hole

Preferred MapPoint

Whittled down to 30 megs from public sources – Places hardest to get, 3 ugrads + me scouring Berkeley

Infrastructure Layer

Confab’s InfoSpace Data Store

InfoSpace like a diary that stores your personal info – Static info (ex. name and phone#) – Dynamic info (ex. current location and activity) Runs on your personal device or on a trusted service – Can choose to expose different parts to people & services

Confab Architecture

PlaceLab Source Name Loc InfoSpace Data Store Out Operators

My Computer • •

Flow Control MiniGIS Request Location Messenger Tourguide How to make users aware of and be able to control the flow of personal info?

Outline

 Motivation   End-user Privacy Needs Pitfalls in User Interfaces for Privacy   Confab Toolkit for Privacy-Sensitive Ubicomp    Physical layer for acquiring location Infrastructure layer Presentation layer Applications Built

Presentation Layer

Observations on Disclosure Prefs

Want visibility and control without overwhelming users – IP Address, domain name, current location?

Services – Judged mainly by perceived value and risk People – Judged mainly by who is making request “Either I trust someone with my information or I don't.” – Common secondary criteria is time “Work people can know my information during work hours. Home/SO people can know my information always.” Prefs should be set during or after a request

Presentation Layer

Notification for IM Request from

Person

Four iterations with seven people – Location-enhanced messenger, location-enhanced tourguide • • • • Avoiding the Pitfalls Actual flow of information Minimal configuration Coarse-grain control Plausible deniability

Presentation Layer

Notification from Tourguide

Service

Presentation Layer

PlaceBar for Tourguide

Service

People thought of tourguide as discrete push of info – Ex. Information only sent when link is clicked on PlaceBar for sharing location on per-transaction basis

Confab Architecture

PlaceLab Source Name Loc InfoSpace Data Store

My Computer

Pull Location Messenger Push Tourguide How to control what happens to your info once it leaves your InfoSpace?

Privacy Tags

Digital Rights Management for Privacy – Like adding note to email, “Please don’t forward” – Notify address – Time to live - [email protected]

- 5 days – Max number of sightings - last 5 sightings of my location Provide libraries for making it easy for app developers Requires non-technical solutions for deployment – Market support thru TrustE, Consumer Reports – Legal support thru data retention laws

Implementation

Confab Shared Libs PlaceLab MiniGIS

Total

#Classes 330 230 10 15

575

Lines of Comments 20000 16000 900 2300

39200

Lines of code (SLOC Count) 32000 23000 1700 3300

59500

I wrote ~95% of this over ~2.5 years – Uses Java 1.5, Tomcat Web Server, MySql, Jaxen XPath Distributed querying system (3 grads) [Ubicomp 2003] – Ex. Update “location.occupant.age” as people move in and out Two course projects outside Berkeley

Outline

 Motivation   Analysis of End-user Privacy Needs Analysis of Interaction Design for Privacy   Confab Toolkit for Privacy-Sensitive Ubicomp Applications Built

Putting it Together #1

Location-Enhanced Messenger

Putting it Together #1

Location-Enhanced Messenger

Putting it Together #2

Location-Enhanced Web Proxy

Auto-fills location information on existing web sites

Starbucks PageModification URL =http://www.starbucks.com/ txtCity =CityName txtState =RegionCode txtZip =ZIPCode MapQuest

Putting it Together #2

Location-Enhanced Web Proxy

Location-aware web sites – Different content based on your current location

Putting it Together #3 Emergency Response Service

Field studies and interviews with firefighters [CHI2004] Finding victims in a building – “You bet we’d definitely want that.” – “It would help to know what floor they are on.” But emergencies are rare – How to balance privacy constraints with utility when needed?

Putting it Together #3 Emergency Response Service

Trusted third party (MedicAlert++ or home server)

“ABC” Loc Medic Alert++ “ABC”

On Emergency

Application Details

Location-enhanced Instant Messenger – Uses Hamsam library for cross-platform IM – ~2500 LOCs across 23 classes, about 5 weeks (mostly GUI) – Acquiring location, InfoSpace store (and prefs), location queries, automatic updates, access notifications, MiniGIS + dataset Location-enhanced web proxy – Added ~800 LOCs to existing 800 LOCs, about 1 week – Location queries, automatic updates, MiniGIS + dataset, PlaceBar Emergency Response – ~200 LOC in 2 days (no GUI, just raw client) – Location queries, update both servers, access notifications Confab reduces what would be a lot of duplicated work

User Evaluations

Ongoing task-based eval with 9 people – Proficient with web and IM, but not computer experts – Location-enhanced messenger, location-enhanced tourguide Can they accomplish basic tasks correctly?

– Do they understand the choices?

– Can they use the interfaces to make the decisions they want?

Is their conceptual model correct?

– Does the system work roughly the way they think it does?

Do they still have privacy concerns?

– Would they want to use it?

User Evaluations (The Good)

All assumed location information started with them, no third parties involved (even with IM) – Correct for Confab, not always for other systems Options understandable and could make desired choice – Pretty much everyone chose “Just for now” – Only real issue was what others saw on “Ignore for now” These apps fit well in users’ existing comfort zone Request for disclosure options of “work” and “home” Enthusiastic about new possibilities – Checking length of movie lines, restaurant lines, bus lines – Making sure children are safe

User Evaluations (The Not So Good)

PlaceBar merged too many ideas together – Understandable, but collapses too many features in one place – “Home” and “work” location rather than current place too Some terminology and displays confusing

Confab Recap

 Clear value proposition  Simple and appropriate control and feedback – Access notifications and PlaceBar  Plausible deniability – Default is “unknown”, can’t tell why  Limited retention of data – Privacy tags, automatic deletion of data  Decentralized control – PlaceLab source for capturing location info – MiniGis service for processing location info  Special exceptions for emergencies

Contributions

Set of end-user needs for ubicomp privacy Pitfalls in user interfaces for ubicomp privacy [PUC 2004] Confab toolkit for facilitating construction of privacy sensitive ubicomp applications [Mobisys 2004] – Introduces idea of privacy protection at physical, infrastructure, and presentation layers – Introduces alternative architecture for ubicomp, doing as much work as possible on end-user’s computer – Greater choice, control, and feedback Evaluation thru building three apps + user tests [DIS2004]

Future Work in Ubicomp

Design

Book on web design patterns – Shopping Carts, Action Buttons – Over 13,000 copies in use – Used in several classes Design patterns for ubicomp?

– Faster design cycles?

– Higher-quality apps?

– Privacy-sensitive systems?

DIS 2004

Future Work in Ubicomp

Prototyping

Developed SATIN toolkit – Ink, interpretation, & zooming – Downloaded 1600+ times Helped develop DENIM – Sketch and “run” web designs – Downloaded 47000+ times Prototyping for ubicomp?

– What techniques?

– Tools for aiding deployment?

CHI 2000

Future Work in Ubicomp

Evaluation

Started WebQuilt Project – Remote Web site usability testing & analysis tool – Downloaded 800+ times Evaluating ubicomp apps?

– New methods & tools?

Ubicomp apps often mobile, remote evaluation tools may work well!

WWW10

Conclusions

Confab toolkit for privacy-sensitive apps Privacy just one aspect of my work in ubicomp – Tools / methods for designing, prototyping, and evaluating high-quality ubicomp apps “Use technology correctly to enhance life. It is important that people have a choice in how much information can be disclosed. Then the technology is useful.”

Acknowledgements

Thanks to: DARPA Expeditions NSF ITR Intel Fellowship Siebel Systems Fellowship PARC Intel Research John Canny Anind Dey James Landay Scott Lederer Jennifer Ng Bill Schilit Many, many others… http://placelab.org

Jason I. Hong [email protected]

http://guir.berkeley.edu/confab

Backup Slides

Hypothesis: The Privacy Hump

Pessimistic

Many legitimate concerns Many alarmist rants “Right” way to deploy?

Value proposition?

Rules on fair use?

time

Optimistic

Things have settled down Few fears materialized Market, Social, Legal, Tech We get tangible value

Evidence: The Privacy Hump

“[T]he right to be let alone” “[T]he telephone permitted intrusion… by solicitors, purveyors of inferior music, eavesdropping operators, and even wire transmitted germs.” Initial ecommerce scares – SSL, and credit card liabilities limited to $50 – Pew Internet study, more experience => trust Stakes higher with ubicomp, let’s do it right – Mistakes could raise the hump for future work – Easy to reduce privacy, hard to add it back in

Privacy Metrics?

User-perceived privacy metrics – Do they feel in control?

– Do they understand who can see what about them?

– Can they make choices they want? Without being overwhelmed?

Location privacy metrics – Minimal inferences from machine learning algorithms?

– Information theoretic, ie sends the minimal amount of data required for a service to work?

However, serious limits to these approaches – Can we really measure a civil right?

Presentation Layer

Access Notifications

Evaluations over four iterations with seven people – Location-enhanced messenger, location-enhanced tourguide For most part, worked well – Understood all choices correctly, but “too much text!” Some distinctions in how often information is shared “Giving a GPS location once or twice does not provide enough information for an invasion of privacy… [but] if GPS location is shared every 2 seconds, there is a potential for an invasion of privacy.”

Go to Privacy Tags here Teaching slide Why iterations?

Why paper prototype?

Iteration 1

Users’ Conceptual Model

Push Pull Continuous Access Emergency Response ok here Discrete Tourguide E911 Find Friend Worked here  

Access Notifications (revised)

Reduced text Added info for 1-time vs continuous disclosure

PlaceBar for Discrete-Push case

Push Pull Continuous Discrete Tourguide E911 PlaceBar for sharing location on per-transaction basis

Handling the After Case

Who is seeing what about me?

Who has seen what about me?

Turn it all off

Putting it Together #2

Location-Enhanced Web Proxy

Service Description Web Site default index.html

rect tower.html 37,-12 36,-13 rect soda.html 38,-11 39,-12 … Web Proxy Browser InfoSpac e Diary For location+ sites Page Mods For existing sites

Gathering MiniGis Data

USGS State Gazetteer – Names in USA – 2m records ~650 megs – States, Cities, Places GEOnet Names Server – Names outside USA – 5.5m records ~700megs – Regions, Cities, Places Whittled down to ~30 megs “Places” hardest to get – Airports & schools useful, lava and quicksand less so – 3 ugrads & I are scouring Berkeley for places (and WiFi too) Cafes, buildings, landmarks

Requirements Check

   Value proposition Simple and appropriate control and feedback Plausible deniability  Limited retention of data  Decentralized architectures  Special exceptions for emergencies Addresses majority of issues with previous systems – Greatly informed by end-user needs – Better interaction design, avoids common problems Stronger technical foundation than previous systems – Protection at physical, infrastructure, and presentation layers – Greater choice, control, and feedback

Putting it Together #2

Location-Enhanced Web Proxy

Kinkos Google Fedex

High-Level Architecture

Sources Operators

In Operators Name Loc Out Operators InfoSpace Diary App

InfoSpace Diary

On Operators

– Runs on a trusted computer – Stores tuples of personal info – Can expose different parts to others

Architectural Analysis

Prevent – Capture and process personal information locally – PlaceLab, MiniGis – Minimizes risk of mission creep (ex. SSNs) Avoid – Interfaces for feedback and control over personal information – Access Notifications / PlaceBar Detect – Finding problems – Access Notifications – Privacy Tags (processed on requestor’s side)

Application Developer Support

Want to make it easy for app developers too Extensibility through chainable operators

In Operators Out Operators

Low barrier to entry Make it simple for programmers, admin, end Easy to add or modify app Easy for end Easy to share info at level users comfortable with

InfoSpace Diary Check Privacy Tag On Operators Invisible Coalesce Periodic Reports

Application Developer Support

ConfabClient – Java client-side API for accessing InfoSpaces – add, remove, query Active Properties – Stores and can automatically update values

Berkeley, CA localuser.location

OnDemandQuery localuser.activity

localuser.name

PeriodicQuery Static Busy Jason

Requirements Check

Value proposition Simple and appropriate control and feedback – Access Notifications (pull) and PlaceBar (push) Plausible deniability – No action, “Ignore for now”, and “Never Allow” appear same Limited retention of data – Privacy Tags, Automatic deletion of old data Decentralized architectures – PlaceLab and MiniGis Special exceptions for emergencies

Related Work

Consumer Privacy Preferences

Privacy surveys since 1990s show three groups [Westin] Risk / benefit sweet spot?

– Privacy for Safety – Privacy for Convenience Pragmatists 63% Fundamentalists 25% Unconcerned 12%

Fair Information Practices

Notice - Notice of data collection Choice - Consent over collection Onward Transfer - Consent over secondary use Access Security Data Integrity Enforcement - See data about self - Reasonable safeguards - Data is accurate - Enforcing policies and redress

OECD Fair Information Practices

Collection Limitation Data Quality Purpose Specification - Limited collection with consent - Relevant and up-to-date - Purpose at time of collection Use Limitation Security Safeguards Openness Principle - Existence of data known Individual Participation - Obtain and correct the data Accountability - Restrict use to said purposes - Reasonable security - Someone accountable

Fair Information Practices Comments

FIPs meant for governments and corporations – Family, friends, co-workers?

Spectrum of apps require different kinds of practices – Commercial apps vs. Firefighter apps vs. National Security apps – App running at home vs. App running at work Notification and Consent impractical in some cases – Cannot always readily notify (ex. traffic monitoring) – Possibly no alternatives (cannot opt out of building security cameras) – Pervasive sensors significantly increases scale Need a framework that considers: – Risks / Benefits, Identifiability, Quality, Quantity, and Scope of data

Categorizing Privacy Techniques

Location Support Garbage Collection

Strategies for Protecting Data

Prevent Avoid Wearables Anonymization Pseudonymization Access Control P3P Lowering Precision User Interfaces for Feedback, Notification, and Consent Privacy Tags Privacy Mirrors Detect Logging and Periodic Reports Audits Collection Access

Data Lifecycle

Second Use

Privacy Perspectives

Quotes on Privacy

“You know it when you lose it” “My own hunch is that Big Brother, if he comes to the United States, will turn out to be not a greedy power seeker but a relentless bureaucrat obsessed with efficiency” [Vance Packard] Privacy is relatively new concept in society, “ultimately a psychological construct, with malleable ties to specific objective conditions” [Grudin 2001]

Why Privacy?

Idealistic Reasons

UN Universal Declaration of Human Rights Article 12 – "No one shall be subjected to arbitrary interference with his privacy, family, home or correspondence, nor to attacks upon his honour and reputation. Everyone has the right to the protection of the law against such interference or attacks." Hippocratic Oath – "What I may see or hear in the course of the treatment or even outside of the treatment in regard to the life of men, which on no account one must spread abroad, I will keep to myself, holding such things shameful to be spoken about."

Why Privacy?

Pragmatic Reasons

Natural form of protection from others – Identity theft, stalkers, abusive husbands – Government intrusion – Wrong interpretations by others Taylorism – Too easy to start treating others as a cog in a machine Data for one purpose tends to be used for others – Ex. SSNs – Ex. Could place GPS in all cars to eliminate speeding – Is this what we really want?

Why Privacy?

Cannot Always Reject Technology

Oakland nurses successfully rejected active badges – Admin wanted it for efficiency and accountability – People at desk liked it to find people – Nurses hated it because no immediate benefit to them However, nurses could reject only because they had economic upper hand, ie a shortage of nurses As researchers in a democratic society, we should ensure our work promotes democratic ideals

Why Privacy?

Privacy and Technology, Gary Marx

Anonymity important for honesty and risk-taking Confidentiality can improve communication flows – Doctors, lawyers, AIDS American ideal of “starting over” Some information can be used unfairly – Ex. Religious discrimination Mental health and creativity Totalitarian systems lack respect for individuals

Why Privacy?

Medical Record Risks

Insiders who make innocent mistakes and cause accidental disclosure of confidential information Insiders who abuse their record access privileges Insiders who knowingly access information for spite or for profit An unauthorized physical intruder who gains access to information Vengeful employees and outsiders

Arguments Against Privacy

“I have nothing to hide”

Overlooks that there are degrees of privacy – So why close the door when changing clothes?

Overlooks civil rights and human dignity – Surveillance gives the impression that an activity is not proper – Surveillance can be a “velvet glove” of repression – Privacy protects us from excessive societal norms [Goffman]

Arguments Against Privacy

The Transparent Society, by David Brin

Openness and accountability are key to a democratic society – The technology is coming… – So let’s opt for complete transparency Problems: – Ignores social power imbalances – Ignores spheres of private and public – Ignores degrees of transparency – Goes completely against human nature

Arguments Against Privacy

Communitarian Argument

Ex. Public safety – HIV testing for newborns – Megan’s laws for sexual predators Communities and Ubicomp?

– We do not enough experience with ubicomp to make these decisions yet – Ubicomp can be easily abused if underlying tech not built right