The UKs Home Secretary has yet again cranked up the pressure on messaging giants over use of end-to-end encryption to secure communications sent via popular services like WhatsApp implying she would prefer tech companies voluntarily re-engineer their security systems so that decrypted data can be handed over to terror-fighting intelligence agencies on demand.
Writing in a paywalled opinion article, published in theTelegraphyesterday, Rudd wheels out the now familiar political refrain that use of e2e encryption is hampering intelligence and law enforcement agencies, before going on to apply such twisted logic its hard not to conclude shes deploying some kind of proprietary crypto of her own, i.e. which scrambles words into incomprehensible nonsense enabling her to claim to support and value strong encryption whilst simultaneously calling for tech giants to work with her to undermine encrypted communications.
To be very clear the government supports strong encryption and has no intention of banning end-to-end encryption. But the inability to gain access to encrypted data in specific and targeted instances even with a warrant signed by a Secretary of State and a senior judge is right now severely limiting our agencies ability to stop terrorist attacks and bring criminals to justice, she writes, before going on to suggest that:
1) real people (whoever they are) arent interested in ensuring the privacy of their communications;
2) e2e encryption can be compromised without the need for a backdoor;
Quoth Rudd:
I know some will argue that its impossible to have both that if a system is end-to-end encrypted then its impossible ever to access the communication. That might be true in theory. But the reality is different. Real people often prefer ease of use and a multitude of features to perfect, unbreakable security. So this is not about asking the companies to break encryption or create so called back doors.
Who uses WhatsApp because it is end-to-end encrypted, rather than because it is an incredibly user-friendly and cheap way of staying in touch with friends and family? Companies are constantly making trade-offs between security and usability, and it is here where our experts believe opportunities may lie.
So, there are options. But they rely on mature conversations between the tech companies and the government and they must be confidential. The key point is that this is not about compromising wider security. It is about working together so we can find a way for our intelligence services, in very specific circumstances, to get more information on what serious criminals and terrorists are doing online.
It really is not clear what reality Rudd occupies when she writes that e2e encryption is only e2e encryption in theory. Unless she intends to imply that a security system could, in fact, contain a backdoor which enables access to decrypted data in which case it would not be e2e encryption (yet she also specifically claims shes not asking companies to break encryption or create so called back doors so theres plenty to scratch your head about here).
Asked for thoughts on Rudds comments on encryption, WhatsApp parent Facebook declined to comment. And, frankly, who can blame it? When a message is so knotted with bizarre claims, contradictions and logical fallacies the only sensible response is to stay silent.
On the one hand Rudd is saying that billions of people use WhatsApp because its incredibly user-friendly, while at the same time claiming that robust security is too difficult for real people to use. (Historically she may have had a point yet, today, billions of real WhatsApp users are sending billions of e2e encrypted messages, each and every day, and apparently not finding this task overly arduous.)
It appears that the Home Secretarys greatest fear is software that is both secure AND usable. How sad, said security research Alec Muffett, a former Facebook employee who worked on deploying e2e crypto for its Secret Conversations feature, when asked for his thoughts on Rudds comments.
If you aim for a really cynical interpretation, you could say that Rudd is only saying shes not askingcompanies to stop using e2e encryption; i.e. shes implying they voluntarily dont need to use e2e because real people arent bothered about the privacy of their comms anyway ergo, tech giants are free to ditch those pesky e2e crypto systems that so annoy governments without suffering any backlash from users (and crucially from her PoV without the government being accused of literally banning encryption).
The phrase trade-offs between security and usability is an interesting one for her to choose, though. It brings to mind a specific security controversy pertaining to WhatsApps platform earlier this year, afterThe Guardianreported claims by a security researcher that hed identified a backdoor in WhatsApps crypto a claim WhatsAppvigorously denied. (The claim was also junked bya very long list of security researchers, and The Guardian went on to amend its story to remove the word backdoor before ultimately publishing a review of the original, in its words, flawed reporting.)
The retransmission vulnerability the Guardians report had couched as a backdoor was in fact a design decision, said WhatsApp, which explained that it prioritizes message reliability for its very large user-base, meaning it will still deliver a message when a key has changed offering the option for users to turn on a specific security notification to alert them to a potential risk of their communications having been compromised.
The design decision referenced in The Guardian story prevents millions of messages from being lost, and WhatsApp offers people security notifications to alert them to potential security risks, it said in a statement at the time.
How WhatsApp handles keyretransmission was described as a small and unlikely threat, by academic Zeynep Tufekci, who organized anopen letter denouncing the Guardians original report. The letter, addressed to the newspaper, asserted: The behavior you highlight is a measured tradeoff that poses a remote threat in return for real benefits that help keep users secure.
Its possible that Rudd, and/or the intelligence and law enforcement agencies she liaises with, has picked up on these sorts of usability vs security trade-off discussions, and is viewing design decisions that prioritize things like reliability ahead of perfect, unbreakable security, as she puts it, as offering a potential route for enacting some kind of targeted and limited interception, i.e. even when a platform has otherwise deployed strong encryption.
Albeit, Rudd is also saying the options she spies to get more information on what serious criminals and terrorists are doing online nonetheless rely on mature conversations between the tech companies and the government hence repeating her call for both sides to work together.
Confidentiality ensures there will be no public discussion about what exactly tech giants and governments might be agreeing to do, collectively and individually, to harvest the online activity of particular targets although the risk for messaging platforms that sell services as strongly encrypted (and therefore give users an expectation of robust privacy), is every time these companies are seen to meet with government representatives their users might feel moved to wonder about the substance of their behind-closed-doors discussions. Which risks undermining user trust in their claims.
Asked for thoughts on what options Rudd might be trying to articulate here, Eerke Boiten, a cyber security professor at De Montfort University, told TechCrunch:With usabililty vs security trade-offs she has once again picked up a meaningful phrase and applied it out of context. WhatsApp end-to-end encryption is a usability success story, as its users barely notice it while gaining some level of security. Some level only as Sheryl Sandberg of Facebook pointed out to UK government recently, by saying that WhatsApp communications metadata (who talks to whom, and when) can still be shared, and is likely still extremely useful for law enforcement.
[Rudd] is publicly putting pressure on [Internet giants], possibly encouraged by how China managed to get Apple to stop offering VPN apps. Getting them to comply via legal means would be slow and invisible to the public eye, so this works much better, he added.
Meanwhile, Rudd has another agenda that is at least far more explicit: Getting tech giants to speed up takedowns of terrorist propaganda thats being publicly spread via their platforms.
And you could argue that applying political pressure over use of encryption is a way to grease the pipe of compliance for the related online extremism takedowns issue.
The Home Secretary, who has been suggested as a potential successor to the current (embattled) UK Prime Minister, is certainly taking full advantage of the PR opportunities to raise her own profile as she tours tech giants HQs in Silicon Valley this week.
Heres Rudd standing in front of a giant Google logo at the companys Mountain View HQ where she went to discuss what can be done to reduce the availability of online terrorist content
And here she is getting a selfie with Facebooks Sheryl Sandberg who she was meeting to discuss threat from terrorist use of the Internet
And heres a photo of the Home Secretary in talks with a couple of unidentified Twitter staffers to hear progress made to tackle terrorist content online and discuss further action needed. (Presumably Jack was too busy for a photo call.)
Rudd has also vlogged about her intent to get tech companies to take action together to stop terrorists spreading extremist propaganda online.
This Home Office PR blitz is notable in not making explicit mention of e2e encryption. Rudd has apparently left that political push to the pages of a lesser read UK newspaper. Which feeds the idea shes playing a few propaganda games of her own here.
While the bundling of the two political concerns (private terrorist/criminal comms; and public online extremism content) allows the government to obfuscate outcomes, spread blame and spin failures.
On the flip side, tech giants have been spinning up their own PR machines ahead of todays debut workshop of the newly formedGlobal Internet Forum to Counter Terrorism (GIFCT).
The initiative wasannouncedin late June by Facebook, Google, Twitter and Microsoft to as they put it help us continue to make our hosted consumer services hostile to terrorists and violent extremists, specifically by sharing information and best practices with each other, government and NGOs. Other tech companies have since signed up.
GIFCT is of course a way for tech firms to share the burden and if you want to be cynical, spread the blame of responding to growing political pressure over online extremismwhich affects them all, albeit to greater and lesser degrees.
Facebook, Googleand Twitterhave all published the same blog post about the first meeting of the forum, in which they describe their joint mission, set out strategies and list a few near-term aims.
tl;dr no one can accuse Silicon Valley of doing nothing about online extremism now.
They write:
At Tuesdays meeting we will be formalizing our goals for collaboration and identifying with smaller companies specific areas of support needed as part of the GIFCTs workplan. Our mission is to substantially disrupt terrorists ability to use the Internet in furthering their causes, while also respecting human rights. This disruption includes addressing the promotion of terrorism, dissemination of propaganda, and the exploitation of real-world terrorist events through online platforms. To achieve this, we will join forces around three strategies:
In the next several months, we also aim to achieve the following:
We believe that the best approach to tackling online terrorism is to collaborate with each other and with others outside the private sector, including civil society and government. We look forward to further cooperation as we develop a joint strategic plan over time.
Also today, Google has a separateupdate on measures its applying on YouTube to fight against online terrorism having faced a backlash from advertisers earlier this year the company arguably has even more reason to be seen to be taking action, and for those actions to be effective at stemming the loss of ad dollars.
Read the original post:
More political headbanging on encryption threatens privacy - TechCrunch
- Report: NSA building comp to crack encryption types [Last Updated On: January 5th, 2014] [Originally Added On: January 5th, 2014]
- Report: NSA looking to crack all encryption with quantum computer [Last Updated On: January 5th, 2014] [Originally Added On: January 5th, 2014]
- Sound Advice: Explaining Comcast cable encryption [Last Updated On: January 5th, 2014] [Originally Added On: January 5th, 2014]
- NSA Building Encryption-Busting Super Computer [Last Updated On: January 5th, 2014] [Originally Added On: January 5th, 2014]
- NSA researches quantum computing to crack most encryption [Last Updated On: January 5th, 2014] [Originally Added On: January 5th, 2014]
- Advanced Encryption Standard - Wikipedia, the free encyclopedia [Last Updated On: January 5th, 2014] [Originally Added On: January 5th, 2014]
- How Encryption Works - HowStuffWorks "Computer" [Last Updated On: January 5th, 2014] [Originally Added On: January 5th, 2014]
- [Last Updated On: January 5th, 2014] [Originally Added On: January 5th, 2014]
- Email Encryption - MB Technology Solutions - Video [Last Updated On: January 5th, 2014] [Originally Added On: January 5th, 2014]
- Email Encryption - Video [Last Updated On: January 5th, 2014] [Originally Added On: January 5th, 2014]
- Reversible Data Hiding in Encrypted Images by Reserving Room Before Encryption - Video [Last Updated On: January 5th, 2014] [Originally Added On: January 5th, 2014]
- Toshiba WT8 Full Disk Encryption, Miracast, Easy Stand - Video [Last Updated On: January 5th, 2014] [Originally Added On: January 5th, 2014]
- Australian Encryption | Text encryption software for the protection of your privacy - Video [Last Updated On: January 5th, 2014] [Originally Added On: January 5th, 2014]
- njRAT v0 6 4 server Clean Encryption - Video [Last Updated On: January 5th, 2014] [Originally Added On: January 5th, 2014]
- AlertBoot New Encryption Compliance Reports Prepare Covered Entities For HIPAA Audits [Last Updated On: January 23rd, 2014] [Originally Added On: January 23rd, 2014]
- BlackBerry denies using backdoor-enabled encryption code [Last Updated On: January 23rd, 2014] [Originally Added On: January 23rd, 2014]
- What Is Encryption? (with pictures) - wiseGEEK [Last Updated On: January 23rd, 2014] [Originally Added On: January 23rd, 2014]
- HowStuffWorks "How Encryption Works" [Last Updated On: January 23rd, 2014] [Originally Added On: January 23rd, 2014]
- Gambling with Secrets Part 5 8 Encryption Machines - Video [Last Updated On: January 23rd, 2014] [Originally Added On: January 23rd, 2014]
- The Benefits of Hosted Disk Encryption - Video [Last Updated On: January 23rd, 2014] [Originally Added On: January 23rd, 2014]
- Quill Encryption - what's that? - Video [Last Updated On: January 23rd, 2014] [Originally Added On: January 23rd, 2014]
- WhatsApp Encryption - Shmoocon 2014 by @segofensiva @psaneme - Video [Last Updated On: January 23rd, 2014] [Originally Added On: January 23rd, 2014]
- encryption demo2 - Video [Last Updated On: January 23rd, 2014] [Originally Added On: January 23rd, 2014]
- encryption demo - Video [Last Updated On: January 23rd, 2014] [Originally Added On: January 23rd, 2014]
- Seven - Encryption Official Lyric Visual - Video [Last Updated On: January 23rd, 2014] [Originally Added On: January 23rd, 2014]
- Quantum Computers - The Ultimate Encryption Backdoor? - Video [Last Updated On: January 23rd, 2014] [Originally Added On: January 23rd, 2014]
- Eric Schmidt: Encryption will break through the Great Firewall of China [Last Updated On: January 24th, 2014] [Originally Added On: January 24th, 2014]
- From NSA to Gmail: Ex-spy launches free email encryption service [Last Updated On: January 24th, 2014] [Originally Added On: January 24th, 2014]
- Tennessee bill takes on NSA encryption-breaking facility at Oak Ridge/SHUT. IT. DOWN. - Video [Last Updated On: January 24th, 2014] [Originally Added On: January 24th, 2014]
- Substitute for:Measurements. 1 Episode. Strength of the encryption algorithm - Video [Last Updated On: January 24th, 2014] [Originally Added On: January 24th, 2014]
- RSA Encryption Checkpoint - Video [Last Updated On: January 24th, 2014] [Originally Added On: January 24th, 2014]
- Gambling with Secrets 8 8 RSA Encryption 1 - Video [Last Updated On: January 24th, 2014] [Originally Added On: January 24th, 2014]
- Google chairman says 'encrypting everything' could end China's censorship, stop NSA snooping [Last Updated On: January 26th, 2014] [Originally Added On: January 26th, 2014]
- Ex-spy launches free email encryption service [Last Updated On: January 26th, 2014] [Originally Added On: January 26th, 2014]
- 3 2 The Data Encryption Standard 22 min - Video [Last Updated On: January 26th, 2014] [Originally Added On: January 26th, 2014]
- RSA Encryption step 3 - Video [Last Updated On: January 26th, 2014] [Originally Added On: January 26th, 2014]
- RSA Encryption step 2 - Video [Last Updated On: January 26th, 2014] [Originally Added On: January 26th, 2014]
- aes tutorial, cryptography Advanced Encryption Standard AES Tutorial,fips 197 - Video [Last Updated On: January 26th, 2014] [Originally Added On: January 26th, 2014]
- Townsend Security Release First Encryption Key Management Module for Drupal [Last Updated On: January 27th, 2014] [Originally Added On: January 27th, 2014]
- RSA Encryption step 5 - Video [Last Updated On: January 27th, 2014] [Originally Added On: January 27th, 2014]
- Lavabit case highlights legal fuzziness around encryption rules [Last Updated On: January 28th, 2014] [Originally Added On: January 28th, 2014]
- A Beginner's Guide To Encryption: What It Is And How To Set It Up [Last Updated On: January 28th, 2014] [Originally Added On: January 28th, 2014]
- How App Developers Leave the Door Open to NSA Surveillance [Last Updated On: January 28th, 2014] [Originally Added On: January 28th, 2014]
- Intro to RSA Encryption step 1 - Video [Last Updated On: January 28th, 2014] [Originally Added On: January 28th, 2014]
- “Honey Encryption” Will Bamboozle Attackers with Fake Secrets [Last Updated On: January 30th, 2014] [Originally Added On: January 30th, 2014]
- Encryption - A Life Unlived (DEMO) - Video [Last Updated On: January 30th, 2014] [Originally Added On: January 30th, 2014]
- Baffle thy enemy: The case for Honey Encryption [Last Updated On: January 31st, 2014] [Originally Added On: January 31st, 2014]
- New AlertBoot Encryption Reports Make Dental HIPAA Compliance Easier [Last Updated On: January 31st, 2014] [Originally Added On: January 31st, 2014]
- Encryption - The Protest - Video [Last Updated On: January 31st, 2014] [Originally Added On: January 31st, 2014]
- Encryption - New Life - Video [Last Updated On: February 1st, 2014] [Originally Added On: February 1st, 2014]
- Encryption - Intro - Video [Last Updated On: February 1st, 2014] [Originally Added On: February 1st, 2014]
- Encryption - Blank Canvas - Video [Last Updated On: February 1st, 2014] [Originally Added On: February 1st, 2014]
- Security First SPxBitFiler-IPA encryption pattern for the IBM PureApplication System - Video [Last Updated On: February 3rd, 2014] [Originally Added On: February 3rd, 2014]
- Revolutionary new cryptography tool could make software unhackable [Last Updated On: February 4th, 2014] [Originally Added On: February 4th, 2014]
- viaForensics webinar: Mobile encryption - the good, bad, and broken - Aug 2013 - Video [Last Updated On: February 4th, 2014] [Originally Added On: February 4th, 2014]
- K.OStream 0.2 File Encryption Test - Video [Last Updated On: February 4th, 2014] [Originally Added On: February 4th, 2014]
- Tumblr adds SSL encryption option, but not as the default [Last Updated On: February 5th, 2014] [Originally Added On: February 5th, 2014]
- Latest Java Project Source Code on Chaotic Image Encryption Techniques - Video [Last Updated On: February 5th, 2014] [Originally Added On: February 5th, 2014]
- Encryption - University of Illinois at Urbana–Champaign [Last Updated On: February 6th, 2014] [Originally Added On: February 6th, 2014]
- A Beginner's Guide to Encryption: What It Is and How to ... [Last Updated On: February 6th, 2014] [Originally Added On: February 6th, 2014]
- Real Data Encryption Software is More Important than Ever ... [Last Updated On: February 8th, 2014] [Originally Added On: February 8th, 2014]
- Caesar Cipher Encryption method With example in C Language - Video [Last Updated On: February 8th, 2014] [Originally Added On: February 8th, 2014]
- Hytera DMR 256 bit encryption - Video [Last Updated On: February 9th, 2014] [Originally Added On: February 9th, 2014]
- Townsend Security Releases Encryption Key Management Virtual Machine for Windows Azure [Last Updated On: February 10th, 2014] [Originally Added On: February 10th, 2014]
- Unitrends Data Backup Webinar: Utilizing The Cloud, Deduplication, and Encryption - Video [Last Updated On: February 10th, 2014] [Originally Added On: February 10th, 2014]
- Main menu [Last Updated On: February 12th, 2014] [Originally Added On: February 12th, 2014]
- Use of encryption growing but businesses struggle with it – study [Last Updated On: February 12th, 2014] [Originally Added On: February 12th, 2014]
- SlingSecure Mobile Voice Encryption Installation Video for Android - Video [Last Updated On: February 12th, 2014] [Originally Added On: February 12th, 2014]
- Data breaches drive growth in use of encryption, global study finds [Last Updated On: February 14th, 2014] [Originally Added On: February 14th, 2014]
- Darren Moffat: ZFS Encryption - Part 2 - Video [Last Updated On: February 14th, 2014] [Originally Added On: February 14th, 2014]
- Darren Moffat: ZFS Encryption - Part 1 - Video [Last Updated On: February 14th, 2014] [Originally Added On: February 14th, 2014]
- How do I configure User Local Recovery in Endpoint Encryption Manager 276 - Video [Last Updated On: February 14th, 2014] [Originally Added On: February 14th, 2014]
- Symmetric Cipher (Private-key) Encryption - Video [Last Updated On: February 14th, 2014] [Originally Added On: February 14th, 2014]
- SafeGuard File Encryption for Mac - Installation and Configuration - Video [Last Updated On: February 14th, 2014] [Originally Added On: February 14th, 2014]
- Fundamentals of Next Generation Encryption - Video [Last Updated On: February 14th, 2014] [Originally Added On: February 14th, 2014]
- Tutorial: Einrichten der EgoSecure Endpoint Removable Device Encryption - Video [Last Updated On: February 14th, 2014] [Originally Added On: February 14th, 2014]
- 'PGP' encryption has had stay-powering but does it meet today's enterprise demands? [Last Updated On: February 15th, 2014] [Originally Added On: February 15th, 2014]
- Fact or Fiction: Encryption Prevents Digital Eavesdropping [Last Updated On: February 15th, 2014] [Originally Added On: February 15th, 2014]
- RHCSA PREP:answer to question 20 (Central Authentication Using LDAP with TLS/SSL Encryption) - Video [Last Updated On: February 15th, 2014] [Originally Added On: February 15th, 2014]
- Protect+ Voice Recorder with Encryption - Video [Last Updated On: February 15th, 2014] [Originally Added On: February 15th, 2014]