UK Government ‘Concession’ On Breaking End-to-End Encryption In The Online Safety Act (Just Passed) Turns Out Not To Be One

from the Schrödinger's-encryption-backdoor dept

Last week Techdirt wrote about an important development in the long-running saga of the UK’s Online Safety Act, which has just become law. The UK government said at that time it would not use controversial powers in the new law to break end-to-end encryption until it was “technically feasible” to do so while preserving users’ privacy. That seemed to be a recognition that it was impossible to carry out scanning that safeguarded privacy with any existing technology, despite previous claims to the contrary. Since it is extremely unlikely such technology will ever exist, the hope was that the UK government was effectively dropping the idea with this concession. But in the days that followed, this optimistic interpretation has seemed less certain. When the “technically feasible” caveat was first mentioned, the Guardian pointed out:

the government has not changed the wording of the bill, which still gives [the UK regulatory body] Ofcom the power to issue an accredited technology notice. A government spokesperson said: “Our position on this matter has not changed”.

Further evidence that the underlying intent hasn’t changed is found in an article in the Independent:

[UK] Technology Secretary Michelle Donelan insisted that nothing had changed in the long-awaited legislation, after privacy campaigners earlier this month claimed a victory following widespread reports of a shift in the Government stance on encryption.

Donelan gave more details of how the new Online Safety Act would work in practice:

In terms of end-to-end encryption, when a platform about to encrypt or already has encrypted – if there were concerns then raised with the regulator that there was paedophilia or child abuse on there, then the regulator would have a conversation with that platform, see what mitigations they could put in place to adhere to the legislation.

If none of that worked, we need a safety net built into this piece of legislation – and the safety net works by the regulator saying you now need to invest in technology that will allow you to maintain the privacy element of encryption, protect encryption, but also enable us to have access and find these criminals, these heinous individuals, these paedophiles, these stains on society.

It may never have to be used. But we think it is important that we put that safety net in legislation.

So it seems the UK government’s idea is that Internet companies will be ordered to come up with ways to break end-to-end encryption while maintaining privacy. But don’t worry, because that magic encryption backdoor will only be there as a “safety net”, not as something that will ever be used routinely. Of course.

Once again, the UK government is attempting an impossible balancing act. On the one hand, it needs to keep the extreme wing of its party happy by bringing in surveillance of encrypted communications. On the other, it doesn’t want the UK to lose key messaging services like Signal, WhatsApp and iMessage, which have all said they won’t implement back doors. Its solution seems to be the usual demand that tech companies “nerd harder”, plus a promise that the new surveillance powers would only be used if the “mitigations” don’t work.

The hardliners who don’t understand the technology might be happy with that approach, but the tech companies won’t be. As soon as the latter are ordered to begin that harder nerding, they will probably pull out of the UK. In other words, despite the “technically feasible” fig leaf, nothing has changed. The UK government’s desperate attempt to come up with Schrödinger’s encryption backdoor – there for the police, but not there for the tech companies – has failed. It had to choose between mass surveillance and messaging services; by passing the Online Safety Act with the text unchanged, it seems to have chosen surveillance.

Follow me @glynmoody on Mastodon.

Filed Under: , , , , , , , , , ,

Rate this comment as insightful
Rate this comment as funny
You have rated this comment as insightful
You have rated this comment as funny
Flag this comment as abusive/trolling/spam
You have flagged this comment
The first word has already been claimed
The last word has already been claimed
Insightful Lightbulb icon Funny Laughing icon Abusive/trolling/spam Flag icon Insightful badge Lightbulb icon Funny badge Laughing icon Comments icon

Comments on “UK Government ‘Concession’ On Breaking End-to-End Encryption In The Online Safety Act (Just Passed) Turns Out Not To Be One”

Subscribe: RSS Leave a comment
36 Comments
This comment has been deemed insightful by the community.
Anonymous Coward says:

and the safety net works by the regulator saying you now need to invest in technology that will allow you to maintain the privacy element of encryption, protect encryption, but also enable us to have access and find these criminals,

That statement is a contradiction in itself, as privacy means others excluded, and letting the government have access means others included. How can privacy be preserved if strangers, which include government agents, are granted access to contents of messages and images etc.

Anonymous Coward says:

Note:

····”Perhaps the biggest failing has been the lack of detail in how these extraordinary powers will be implemented. It’s down to Ofcom to sort this mess and we call on them to work with cyber experts, tech companies and civil society to minimise the harms to our fundamental rights.

Figured I put this here.

Anonymous Coward says:

Re: Re: Re:2

Which intermediary can they ask to decrypt the messages between you and the corporations with which you do business? Ditto corporate run VPNs?

This legislation is aimed at Apple, Telegram and other systems where the owners of the servers cannot deliver up the plain text. It is not aimed at SSL, and would be very problematic if it was, as who would they demand the plain text from?

That One Guy (profile) says:

If they only mathed harder they could make 2+2 equal 5

They were never going to drop their anti-encryption stance since doing so would require them to admit that they’re trying to put everyone in danger including kids, so they just foisted all the blame on the tech companies again and made it so if only companies would Nerd Harder they’d be able to come up with encryption that is safe and secure and can be broken on demand.

That One Guy (profile) says:

Re: Re: 'Make a totally secure door. Now add a lock and give me a copy of the key.'

I know that, and you know that, but the people pushing and passing laws like this refuse to admit that since it would gut their entire argument if they had to admit that ‘encryption that is both secure and can be cracked on demand’ isn’t possible.

Draph91 (profile) says:

If I could point something out

Michelle Donelan did say that ministers never made any concessions on end-to-end encryption

She said that nothing had changed in the Bill and that ministers were not watering down plans, with the Online Safety Bill containing a “safety net” that “may never have to be used”.

This is kinda old news to me

Add Your Comment

Your email address will not be published. Required fields are marked *

Have a Techdirt Account? Sign in now. Want one? Register here

Comment Options:

Make this the or (get credits or sign in to see balance) what's this?

What's this?

Techdirt community members with Techdirt Credits can spotlight a comment as either the "First Word" or "Last Word" on a particular comment thread. Credits can be purchased at the Techdirt Insider Shop »

Follow Techdirt

Techdirt Daily Newsletter

Subscribe to Our Newsletter

Get all our posts in your inbox with the Techdirt Daily Newsletter!

We don’t spam. Read our privacy policy for more info.

Ctrl-Alt-Speech

A weekly news podcast from
Mike Masnick & Ben Whitelaw

Subscribe now to Ctrl-Alt-Speech »
Techdirt Deals
Techdirt Insider Discord
The latest chatter on the Techdirt Insider Discord channel...
Loading...