%global _empty_manifest_terminate_build 0 Name: python-privugger Version: 0.0.10 Release: 1 Summary: Privacy risk analysis library for Python programs. License: Apache license URL: https://github.com/itu-square/privugger Source0: https://mirrors.aliyun.com/pypi/web/packages/08/59/d922753ec0e028aa47d45d8f6ec06d1defee632778ad9bb237175e99c3b4/privugger-0.0.10.tar.gz BuildArch: noarch %description # Privugger: Data Privacy Debugger Docs and tutorials: https://itu-square.github.io/privugger/ Privugger (/prɪvʌɡə(r)/) is a privacy risk analysis library for python programs. Privugger, takes as input a python program and a specification of the adversary's knowledge about the input of the program (the _prior knowledge_), and it returns a wide variety of privacy risk analyses, including the following leakage measures: * Knowledge-based probability queries * Entropy * Mutual Information * KL-divergence * min-entropy * Bayes risk * ... Furthermore, Privugger is equipped with a module to perform _automatic attacker synthesis_. That is, given a program and a leakage measure, it finds the adversary's prior knowledge that maximizes the leakage. In other words, it tells us what is the minimum amount of information that the adversary must know in order for the program to exhibit privacy risks. If this knowledge is publicly available, then the program does not effectively protect users' privacy. ## Installation Privugger is a tool written entirely in Python and can be installed using the pip packet manager. To install write following in command line: `pip install privugger` Usage: `import privugger as pv` `x = pv.Normal(...)` `ds = pv.Dataset(...)` `program = pv.Program(...)` `trace = pv.infer(...)` %package -n python3-privugger Summary: Privacy risk analysis library for Python programs. Provides: python-privugger BuildRequires: python3-devel BuildRequires: python3-setuptools BuildRequires: python3-pip %description -n python3-privugger # Privugger: Data Privacy Debugger Docs and tutorials: https://itu-square.github.io/privugger/ Privugger (/prɪvʌɡə(r)/) is a privacy risk analysis library for python programs. Privugger, takes as input a python program and a specification of the adversary's knowledge about the input of the program (the _prior knowledge_), and it returns a wide variety of privacy risk analyses, including the following leakage measures: * Knowledge-based probability queries * Entropy * Mutual Information * KL-divergence * min-entropy * Bayes risk * ... Furthermore, Privugger is equipped with a module to perform _automatic attacker synthesis_. That is, given a program and a leakage measure, it finds the adversary's prior knowledge that maximizes the leakage. In other words, it tells us what is the minimum amount of information that the adversary must know in order for the program to exhibit privacy risks. If this knowledge is publicly available, then the program does not effectively protect users' privacy. ## Installation Privugger is a tool written entirely in Python and can be installed using the pip packet manager. To install write following in command line: `pip install privugger` Usage: `import privugger as pv` `x = pv.Normal(...)` `ds = pv.Dataset(...)` `program = pv.Program(...)` `trace = pv.infer(...)` %package help Summary: Development documents and examples for privugger Provides: python3-privugger-doc %description help # Privugger: Data Privacy Debugger Docs and tutorials: https://itu-square.github.io/privugger/ Privugger (/prɪvʌɡə(r)/) is a privacy risk analysis library for python programs. Privugger, takes as input a python program and a specification of the adversary's knowledge about the input of the program (the _prior knowledge_), and it returns a wide variety of privacy risk analyses, including the following leakage measures: * Knowledge-based probability queries * Entropy * Mutual Information * KL-divergence * min-entropy * Bayes risk * ... Furthermore, Privugger is equipped with a module to perform _automatic attacker synthesis_. That is, given a program and a leakage measure, it finds the adversary's prior knowledge that maximizes the leakage. In other words, it tells us what is the minimum amount of information that the adversary must know in order for the program to exhibit privacy risks. If this knowledge is publicly available, then the program does not effectively protect users' privacy. ## Installation Privugger is a tool written entirely in Python and can be installed using the pip packet manager. To install write following in command line: `pip install privugger` Usage: `import privugger as pv` `x = pv.Normal(...)` `ds = pv.Dataset(...)` `program = pv.Program(...)` `trace = pv.infer(...)` %prep %autosetup -n privugger-0.0.10 %build %py3_build %install %py3_install install -d -m755 %{buildroot}/%{_pkgdocdir} if [ -d doc ]; then cp -arf doc %{buildroot}/%{_pkgdocdir}; fi if [ -d docs ]; then cp -arf docs %{buildroot}/%{_pkgdocdir}; fi if [ -d example ]; then cp -arf example %{buildroot}/%{_pkgdocdir}; fi if [ -d examples ]; then cp -arf examples %{buildroot}/%{_pkgdocdir}; fi pushd %{buildroot} if [ -d usr/lib ]; then find usr/lib -type f -printf "\"/%h/%f\"\n" >> filelist.lst fi if [ -d usr/lib64 ]; then find usr/lib64 -type f -printf "\"/%h/%f\"\n" >> filelist.lst fi if [ -d usr/bin ]; then find usr/bin -type f -printf "\"/%h/%f\"\n" >> filelist.lst fi if [ -d usr/sbin ]; then find usr/sbin -type f -printf "\"/%h/%f\"\n" >> filelist.lst fi touch doclist.lst if [ -d usr/share/man ]; then find usr/share/man -type f -printf "\"/%h/%f.gz\"\n" >> doclist.lst fi popd mv %{buildroot}/filelist.lst . mv %{buildroot}/doclist.lst . %files -n python3-privugger -f filelist.lst %dir %{python3_sitelib}/* %files help -f doclist.lst %{_docdir}/* %changelog * Tue Jun 20 2023 Python_Bot - 0.0.10-1 - Package Spec generated