Brave says it has a way of collecting your data without undermining your privacy

Brave
(Image credit: Brave)

Software company Brave has published details of a new method of data collection said to be capable of guaranteeing user privacy by default.

Developed by a team of its researchers, the STAR system is designed to eliminate trust from the equation, by offering a technical guarantee of user privacy based on cryptographic techniques.

The technology will be deployed on an opt-in basis inside a range of Brave products (including its popular web browser) and considered for standardization by the Internet Engineering Task Force (IETF).

Data collection, but private

In an ideal world, users would be required to share none of their personal or usage data with software developers. But the reality is that data collection is an important part of ensuring software runs smoothly and does not contain dangerous cybersecurity vulnerabilities.

The challenge facing developers in a market in which consumers are increasingly suspicious of data collection is how to gather telemetry data without compromising the needs of either set of stakeholders.

“Existing systems are extremely expensive to deploy (making them unusable for all but the largest companies), require trusted third-parties or special hardware, and/or require millions of users to achieve useful results,” explained Brave, in a blog post.

“STAR, by contrast, provides privacy guarantees similar to, or better than, existing systems, while being practical and affordable for projects and organizations serving anywhere from dozens to millions of users.”

Specifically, the STAR system is based around a premise known as k-anonymity, whereby the data points available to the collector are never unique to a specific individual. In practice, this means the collector can never use data values to build a picture of the original provider.

Although other data collection systems have deployed k-anonymity in the past, Brave claims STAR is able to do so at a much lower performance cost, which means no specialist hardware is required. According to the company’s tests, its own system is “24 times cheaper than the existing state-of-the-art approach”.

To encourage the adoption of STAR, Brave has open sourced the model (in both Rust and WASM versions) under the Mozilla Public Licence v2, which gives any organization the right to adopt or modify the system as they please.

  • Shield your browsing activity from prying eyes with the best VPN services around
Joel Khalili
News and Features Editor

Joel Khalili is the News and Features Editor at TechRadar Pro, covering cybersecurity, data privacy, cloud, AI, blockchain, internet infrastructure, 5G, data storage and computing. He's responsible for curating our news content, as well as commissioning and producing features on the technologies that are transforming the way the world does business.

Read more
Fingerprint
Profit over privacy? Google gives advertisers more personal info in major ‘fingerprinting’ U-turn
Abstract illustration of a young woman looking at a smartphone, as large eyes peek through from her hair
Want to hit restart on your online presence? Here's 5 tools you need to stay truly private online
Young woman holds a smartphone with a beam of light obscuring her eyes
Privacy powerhouses: 5 apps to take your online security to the next level
A digital representation of a lock
In the age of AI, everybody could lose the right to anonymity
Biometric identification of a woman face on a pink background
I spent 7 days on a data detox – here's what I learned
Conceptual image with a bunch of floating eyeballs in different sizes overlooking a red computer, could symbolize ideas around malware and computer viruses
Accept all or bust: how cookie walls are creating a two-tier internet
Latest in Security
Lock on Laptop Screen
Data breach at Pennsylvania education union potentially exposes 500,000 victims
Spyware
Stalkerware data breach potentially hits over 2 million users, including thousands of Apple devices
An American flag flying outside the US Capitol building against a blue sky
Five Eyes "cannot replace US intel in Ukraine", claims former US Cyber Command Chief
Pirate skull cyber attack digital technology flag cyber on on computer CPU in background. Darknet and cybercrime banner cyberattack and espionage concept illustration.
Criminals are using a virtual hard disk image file to host and distribute dangerous malware
WordPress on a laptop
Over 20,000 WordPress sites hit by damaging malware campaign
Trojan
WhatsApp patches security flaw which let hackers install spyware
Latest in News
Quordle on a smartphone held in a hand
Quordle hints and answers for Friday, March 21 (game #1152)
NYT Strands homescreen on a mobile phone screen, on a light blue background
NYT Strands hints and answers for Friday, March 21 (game #383)
NYT Connections homescreen on a phone, on a purple background
NYT Connections hints and answers for Friday, March 21 (game #649)
The ASSC Assassin's Creed collection.
The Assassin's Creed x Anti Social Social Club drop includes gaming merch that I wouldn't be embarrassed to wear
Lock on Laptop Screen
Data breach at Pennsylvania education union potentially exposes 500,000 victims
Spyware
Stalkerware data breach potentially hits over 2 million users, including thousands of Apple devices