{"id":32067,"date":"2017-06-07T17:45:50","date_gmt":"2017-06-07T21:45:50","guid":{"rendered":"http:\/\/www.opensource.im\/uncategorized\/theresa-may-wants-to-ban-crypto-heres-what-that-would-cost-and-boing-boing.php"},"modified":"2017-06-07T17:45:50","modified_gmt":"2017-06-07T21:45:50","slug":"theresa-may-wants-to-ban-crypto-heres-what-that-would-cost-and-boing-boing","status":"publish","type":"post","link":"https:\/\/euvolution.com\/open-source-convergence\/cryptography\/theresa-may-wants-to-ban-crypto-heres-what-that-would-cost-and-boing-boing.php","title":{"rendered":"Theresa May wants to ban crypto: here&#8217;s what that would cost, and &#8230; &#8211; Boing Boing"},"content":{"rendered":"<p><p>\/  Cory  Doctorow \/ 8 am Sun, Jun 4  2017   <\/p>\n<p>    Aaron Swartz once said, \"It's no longer OK not to understand    how the Internet works.\"       <\/p>\n<p>    report this ad  <\/p>\n<p>    He was talking to law-makers, policy-makers and power-brokers,    people who were, at best, half-smart about technology -- just    smart enough to understand that in a connected world, every    problem society has involves computers, and just stupid enough    to demand that computers be altered to solve those problems.  <\/p>\n<p>    Paging Theresa May.  <\/p>\n<p>    Theresa May says that last    night's London terror attacks mean that the internet        cannot be allowed to provide a \"safe space\" for terrorists    and therefore working cryptography must be banned in the UK.  <\/p>\n<p>    This is a golden oldie, a classic piece of foolish political    grandstanding. May's predecessor, David Cameron, repeatedly    campaigned on this one, and every time he did, I wrote a long    piece rebutting him. Rather than writing a new one for May, I    thought I'd just dust off a pair of my Cameron-era pieces    (1,        2), since every single word still applies.  <\/p>\n<p>    Theresa May says there should be no \"means of communication\"    which \"we cannot read\" -- and no doubt many in her party will    agree with her, politically. But if they understood the    technology, they would be shocked to their boots.  <\/p>\n<p>    Its impossible to overstate how bonkers the idea of sabotaging    cryptography is to people who understand information security.    If you want to secure your sensitive data either at rest  on    your hard drive, in the cloud, on that phone you left on the    train last week and never saw again  or on the wire, when    youre sending it to your doctor or your bank or to your work    colleagues, you have to use good cryptography. Use deliberately    compromised cryptography, that has a back door that only the    good guys are supposed to have the keys to, and you have    effectively no security. You might as well skywrite it as    encrypt it with pre-broken, sabotaged encryption.  <\/p>\n<p>    There are two reasons why this is so. First, there is the    question of whether encryption can be made secure while still    maintaining a master key for the authorities use. As    lawyer\/computer scientist Jonathan Mayer     explained, adding the complexity of master keys to our    technology will introduce unquantifiable security risks. Its    hard enough getting the security systems that protect our    homes, finances, health and privacy to be airtight  making    them airtight except when the authorities dont want them to be    is impossible.  <\/p>\n<p>    What Theresa May thinks she's saying is, \"We will command all    the software creators we can reach to introduce back-doors into    their tools for us.\" There are enormous problems with this:    there's no back door that only lets good guys go through it. If    your Whatsapp or Google Hangouts has a deliberately introduced    flaw in it, then foreign spies, criminals, crooked police (like    those who fed sensitive information to the tabloids who were    implicated in the hacking scandal -- and like the high-level    police who secretly worked for organised crime for years), and    criminals will eventually discover this vulnerability. They --    and not just the security services -- will be able to use it to    intercept all of our communications. That includes things like    the pictures of your kids in your bath that you send to your    parents to the trade secrets you send to your co-workers.  <\/p>\n<p>    But this is just for starters. Theresa May doesn't understand    technology very well, so she doesn't actually know what she's    asking for.  <\/p>\n<p>    For Theresa May's proposal to work, she will need to stop    Britons from installing software that comes from software    creators who are out of her jurisdiction. The very best in    secure communications are already free\/open source projects,    maintained by thousands of independent programmers around the    world. They are widely available, and thanks to things like    cryptographic signing, it is possible to download these    packages from any server in the world (not just big ones like    Github) and verify, with a very high degree of confidence, that    the software you've downloaded hasn't been tampered with.  <\/p>\n<p>    May is not alone here. The regime she proposes is already in    place in countries like Syria, Russia, and Iran (for the    record, none of these countries have had much luck with it).    There are two means by which authoritarian governments have    attempted to restrict the use of secure technology: by network    filtering and by technology mandates.  <\/p>\n<p>    Theresa May has already shown that she believes she can order    the nation's ISPs to block access to certain websites (again,    for the record, this hasn't worked very well). The next step is    to order Chinese-style filtering using deep packet inspection,    to try and distinguish traffic and block forbidden programs.    This is a formidable technical challenge. Intrinsic to core    Internet protocols like IPv4\/6, TCP and UDP is the potential to    \"tunnel\" one protocol inside another. This makes the project of    figuring out whether a given packet is on the white-list or the    black-list transcendentally hard, especially if you want to    minimise the number of \"good\" sessions you accidentally    blackhole.  <\/p>\n<p>    More ambitious is a mandate over which code operating systems    in the UK are allowed to execute. This is very hard. We do    have, in Apple's Ios platform and various games consoles, a    regime where a single company uses countermeasures to ensure    that only software it has blessed can run on the devices it    sells to us. These companies could, indeed, be compelled (by an    act of Parliament) to block secure software. Even there, you'd    have to contend with the fact that other EU states and    countries like the USA are unlikely to follow suit, and that    means that anyone who bought her Iphone in Paris or New York    could come to the UK with all their secure software intact and    send messages \"we cannot read.\"  <\/p>\n<p>    But there is the problem of more open platforms, like GNU\/Linux    variants, BSD and other unixes, Mac OS X, and all the    non-mobile versions of Windows. All of these operating systems    are already designed to allow users to execute any code they    want to run. The commercial operators -- Apple and Microsoft --    might conceivably be compelled by Parliament to change their    operating systems to block secure software in the future, but    that doesn't do anything to stop people from using all the PCs    now in existence to run code that the PM wants to ban.  <\/p>\n<p>    More difficult is the world of free\/open operating systems like    GNU\/Linux and BSD. These operating systems are the gold    standard for servers, and widely used on desktop computers    (especially by the engineers and administrators who run the    nation's IT). There is no legal or technical mechanism by which    code that is designed to be modified by its users can co-exist    with a rule that says that code must treat its users as    adversaries and seek to prevent them from running prohibited    code.  <\/p>\n<p>    This, then, is what Theresa May is proposing:  <\/p>\n<p>    * All Britons' communications must be easy for criminals,    voyeurs and foreign spies to intercept  <\/p>\n<p>    * Any firms within reach of the UK government must be banned    from producing secure software  <\/p>\n<p>    * All major code repositories, such as Github and Sourceforge,    must be blocked  <\/p>\n<p>    * Search engines must not answer queries about web-pages that    carry secure software  <\/p>\n<p>    * Virtually all academic security work in the UK must cease --    security research must only take place in proprietary research    environments where there is no onus to publish one's findings,    such as industry R&D and the security services  <\/p>\n<p>    * All packets in and out of the country, and within the    country, must be subject to Chinese-style deep-packet    inspection and any packets that appear to originate from secure    software must be dropped  <\/p>\n<p>    * Existing walled gardens (like Ios and games consoles) must be    ordered to ban their users from installing secure software  <\/p>\n<p>    * Anyone visiting the country from abroad must have their    smartphones held at the border until they leave  <\/p>\n<p>    * Proprietary operating system vendors (Microsoft and Apple)    must be ordered to redesign their operating systems as walled    gardens that only allow users to run software from an app    store, which will not sell or give secure software to Britons  <\/p>\n<p>    * Free\/open source operating systems -- that power the energy,    banking, ecommerce, and infrastructure sectors -- must be    banned outright  <\/p>\n<p>    Theresa May will say that she doesn't want to do any of this.    She'll say that she can implement weaker versions of it -- say,    only blocking some \"notorious\" sites that carry secure    software. But anything less than the programme above will have    no material effect on the ability of criminals to carry on    perfectly secret conversations that \"we cannot read\". If any    commodity PC or jailbroken phone can run any of the world's    most popular communications applications, then \"bad guys\" will    just use them. Jailbreaking an OS isn't hard. Downloading an    app isn't hard. Stopping people from running code they want to    run is -- and what's more, it puts the whole nation --    individuals and industry -- in terrible jeopardy.  <\/p>\n<p>    Thats a technical argument, and its a good one, but you dont    have to be a cryptographer to understand the second problem    with back doors: the security services are really bad at    overseeing their own behaviour.  <\/p>\n<p>    Once these same people have a back door that gives them access    to everything that encryption protects, from the digital locks    on your home or office to the information needed to clean out    your bank account or read all your email, there will be lots    more people wholl want to subvert the vast cohort that is    authorised to use the back door, and the incentives for    betraying our trust will be much more lavish than anything a    tabloid reporter could afford.  <\/p>\n<p>    If you want a preview of what a back door looks like, just look    at the US Transportation Security Administrations master    keys for the locks on our luggage. Since 2003, the TSA has    required all locked baggage travelling within, or transiting    through, the USA to be equipped with Travelsentry locks, which    have been designed to allow anyone with a widely held master    key to open them.  <\/p>\n<p>    What happened after Travelsentry went into effect? Stuff    started going missing from bags. Lots and lots of stuff. A CNN    investigation into thefts from bags checked in US airports    found thousands of incidents of theft committed by TSA workers    and baggage handlers. And though aggressive investigation    work has cut back on theft at some airports, insider thieves    are still operating with impunity throughout the country, even    managing to smuggle stolen goods off the airfield in airports    where all employees are searched on their way in and out of    their work areas.  <\/p>\n<p>    The US system is rigged to create a halo of buck-passing    unaccountability. When my family picked up our bags from our    Easter holiday in the US, we discovered that the TSA had    smashed the locks off my nearly new, unlocked,    Travelsentry-approved bag, taping it shut after confirming it    had nothing dangerous in it, and leaving it completely    destroyed in the words of the official BA damage report.    British Airways has sensibly declared the damage to be not    their problem, as they had nothing to do with destroying the    bag. The TSA directed me to a form that generated     an illiterate reply from a government subcontractor, sent    from a do-not-reply email address, advising that TSA is not    liable for any damage to locks or bags that are required to be    opened by force for security purposes (the same note had an    appendix warning me that I should treat this communication as    confidential). Ive yet to have any other communications from    the TSA.  <\/p>\n<p>    Making it possible for the state to open your locks in secret    means that anyone who works for the state, or anyone who can    bribe or coerce anyone who works for the state, can have the    run of your life. Cryptographic locks dont just protect our    mundane communications: cryptography is the reason why thieves    cant impersonate your fob to your cars keyless ignition    system; its the reason you can bank online; and its the basis    for all trust and security in the 21st century.  <\/p>\n<p>    In her Dimbleby lecture, Martha Lane Fox recalled Aaron    Swartzs words: Its not OK not to understand the internet    anymore. That goes double for cryptography: any politician    caught spouting off about back doors is unfit for office    anywhere but Hogwarts, which is also the only educational    institution whose computer science department believes in    golden keys that only let the right sort of people break your    encryption.  <\/p>\n<p>    (Image: Facepalm,    Brandon Grasley, CC-BY))  <\/p>\n<p>    report this ad  <\/p>\n<p>    report this ad  <\/p>\n<p>        When Eric Trump raises money for kids cancer charities at        his annual Eric Trump Foundation golf invitational, he        boasts that his events are super-efficient because he holds        them at his dads Trump National Golf Club in Westchester        County, New York, where We get to use our assets 100% free        of charge. He lied.      <\/p>\n<p>        Palmer Luckey, the guy who founded Oculus, sold it to        Facebook, and then used the money to fund racist, far-right        meme creation in the 2016 election cycle is now running a        Peter-Thiel-backed startup to build surveillance technology        that could be part of Donald Trumps border wall.      <\/p>\n<p>        Greg Gianforte is a short-tempered, hyper-conservative        Montana political hopeful who is standing for the GOP in a        special election for a Congressional seat; he is also        invested in Russian firms that are under US sanction.      <\/p>\n<p>        Apple makes it hard to not use iCloud, at least for a few        things. Since their cloud storage is baked so deeply into        iOS, using iTunes on the desktop to manually move files and        backup your device can sometimes feel like an awkward step        backwards. To give your iPhone more flexibility to manage        large files []      <\/p>\n<p>        Few things are as relaxing than an afternoon laying around        in the sun. But no matter how careful you are, wet towels        always seem to track some sand back home with you. The        Quicksand Mat eliminates this beach-going annoyance by        letting sand easily pass through.Whether you use it as a        blanket or a buffer to []      <\/p>\n<p>        Drones are the perfect way to cheaply shoot aerial video,        but it can be difficult to accurately point its camera when        your view is limited to a tiny smartphone screen. This        quadcopter offers a first-person view of the action in        immersive 3D, so you can frame your shots as if you were        flying.The Micro Drone []      <\/p>\n<p><!-- Auto Generated --><\/p>\n<p>Originally posted here:<br \/>\n<a target=\"_blank\" href=\"http:\/\/boingboing.net\/2017\/06\/04\/theresa-may-king-canute.html\" title=\"Theresa May wants to ban crypto: here's what that would cost, and ... - Boing Boing\">Theresa May wants to ban crypto: here's what that would cost, and ... - Boing Boing<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p> \/ Cory Doctorow \/ 8 am Sun, Jun 4 2017 Aaron Swartz once said, \"It's no longer OK not to understand how the Internet works.\" report this ad He was talking to law-makers, policy-makers and power-brokers, people who were, at best, half-smart about technology -- just smart enough to understand that in a connected world, every problem society has involves computers, and just stupid enough to demand that computers be altered to solve those problems. Paging Theresa May. <\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1600],"tags":[],"class_list":["post-32067","post","type-post","status-publish","format-standard","hentry","category-cryptography"],"_links":{"self":[{"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/posts\/32067"}],"collection":[{"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/comments?post=32067"}],"version-history":[{"count":0,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/posts\/32067\/revisions"}],"wp:attachment":[{"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/media?parent=32067"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/categories?post=32067"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/tags?post=32067"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}