Encryption: What The FBI Wants It Can Only Have By Destroying Computing And Censoring The Internet

from the and-it-doesn't-seem-to-understand-this dept

The FBI — and by extension, every law enforcement agency it partners with — wants holes carved in cellphone encryption. The problem is that it doesn’t even know what specifically it wants.

When asked directly if the FBI wants a backdoor, [Amy] Hess [Asst. Director of FBI’s Science & Technology branch] dodged the question and did not describe in detail what actual solution the FBI is seeking.

“We are simply asking for information that we seek in response to a lawful order in a readable format,” Hess responded, while also repeating that the Bureau supports strong encryption. “But how that actually happens should be the decision of the provider.”

When pressed again, Hess said that it would be okay for the FBI not to have a key to decrypt data, if the provider “can get us that information by maintaining the key themselves.”

That’s asking the impossible — for a great many reasons. First and foremost, compromised encryption is compromised encryption. It can be exploited by criminals and other unwanted entities just as certainly as it can assist law enforcement agencies in obtaining the information they’re seeking. There’s no way around this fact. You cannot have “good guys only” encryption.

But beyond that, even if the FBI manages to get what it wants, it will do so at the expense of general computing. Requiring built-in backdoors or key escrow will dismantle the very systems it’s meant to access. Computer scientist Jonathan Mayer delivers a long, detailed hypothetical involving the Android platform and how the FBI’s desired access would fail — and do severe collateral damage — every step of the way. (via Boing Boing)

First off, if Google gives the FBI the backdoors it wants, that only nails down Google. But Google also distributes thousands of third-party apps through its Play store. And these apps may not contain the subverted encryption the FBI is looking for. Now, Google has to be in the business of regulating third-party apps to ensure they meet the government’s standard for compromised encryption.

The obvious answer is that Google can’t stop with just backdooring disk encryption. It has to backdoor the entire Android cryptography library. Whenever a third-party app generates an encrypted blob of data, for any purpose, that blob has to include a backdoor.

This move may work, but it only affects apps using Google’s encryption. Other offerings may rely on other encryption methods. Then what? It has a few options, all of them carrying horrendous implications.

One option: require Google to police its app store for strong cryptography. Another option: mandate a notice-and-takedown system, where the government is responsible for spotting secure apps, and Google has a grace period to remove them. Either alternative would, of course, be entirely unacceptable to the technology sector—the DMCA’s notice-and-takedown system is widely reviled, and present federal law (CDA 230) disfavors intermediary liability.

At this point, Mayer suggests the “solution” is already outside the realm of political feasibility. Would the FBI really push this far to obtain encryption backdoors? The FBI itself seems unsure of how far it’s willing to go, and many officials quoted (like the one above) seem to think all the FBI really needs to do is be very insistent on this point, and techies will come up with some magical computing solution that maintains the protective qualities of encryption while simultaneously allowing the government to open the door and have a look around any time it wants to.

So, if the FBI is willing to travel this very dark road littered with an untold amount of collateral damage, it still hasn’t managed to ensure the phones it encounters will open at its command. Considering phone users could still acquire apps from other sources, the government’s reach would only extend as far as the heavily-policed official app store (and other large competitors’ app stores). Now what? More government power and less operational stability.

The only solution is an app kill switch. (Google’s euphemism is “Remote Application Removal.”) Whenever the government discovers a strong encryption app, it would compel Google to nuke the app from Android phones worldwide. That level of government intrusion—reaching into personal devices to remove security software—certainly would not be well received. It raises serious Fourth Amendment issues, since it could be construed as a search of the device or a seizure of device functionality and app data. What’s more, the collateral damage would be extensive; innocent users of the app would lose their data.

Even if the government were willing to take it this far, it still doesn’t eradicate apps that it can’t crack. (But it may be sufficient to only backdoor the most used apps, which may be all it’s looking to achieve…) App creators could decide to avoid Google’s government-walled garden and mandated kill switch by assigning random identifiers and handling a majority of the app’s services (like a messaging service, etc.) via a website, out of reach of app removal tools and government intervention. To stop this, the US government would need to do the previously unimaginable:

In order to prevent secure data storage and end-to-end secure messaging, the government would have to block these web apps. The United States would have to engage in Internet censorship.

Robert Graham at Errata Security makes similar points in his post on the subject, but raises a couple of other interesting (in the horrific train wreck meaning of the word) points. While the government may try to regulate the internet, it can’t (theoretically) touch services hosted in foreign countries. (Although it may soon be able to hack away at them with zero legal repercussions…)

Such services could be located in another country, because there are no real national borders in cyberspace. In any event, such services aren’t “phone” services, but instead just “contact” services. They let people find each other, but they don’t control the phone call. It’s possible to bypass such services anyway, by either using a peer-to-peer contact system, or overloading something completely different, like DNS.

Like crypto, the entire Internet is based on the concept of end-to-end, where there is nothing special inside the network that provides a service you can regulate.

The FBI likely has no desire to take its fight against encryption this far. The problem is that it thinks its “solution” to encryption is “reasonable.” But it isn’t.

The point is this. Forcing Apple to insert a “Golden Key” into the iPhone looks reasonable, but the truth is the problem explodes to something far outside of any sort of reasonableness. It would mean outlawing certain kinds of code — which is probably not possible in our legal system.

The biggest problem here is that no one arguing for “golden keys,” key escrow, “good guy” backdoors, etc. seems to have any idea what implementing this could actually result in. They think it’s just tech companies sticking it to The Man, possibly because a former NSA sysadmin went halfway around the world with a pile of documents and a suitcase of whistles with “BLOW ME” printed on the side.

But it isn’t. And their continual shrugged assertion that the “smart guys” at tech companies will figure this all out for them is not only lazy, it’s colossally ignorant. There isn’t a solution. The government can’t demand that companies not provide encryption. It’s not willing to ban encryption, nor is it in any position to make that ban stick. It doesn’t know what it needs. It only knows what it wants. And it can’t have what it wants — not because no one wants to give it to them — but because no one can give it to them.

Yes, many tech companies are far more wary of collaborating with the government in this post-Snowden era, but in this case, the tech world cannot give the FBI what it wants without destroying nearly everything surrounding the “back door.” And continually trotting out kidnappers, child porn enthusiasts and upskirt photographers as reasons for breaking cell phone platforms doesn’t change the fact that it cannot be done without potentially harming every non-criminal phone owner and the services they use.

Filed Under: , , , , , ,

Rate this comment as insightful
Rate this comment as funny
You have rated this comment as insightful
You have rated this comment as funny
Flag this comment as abusive/trolling/spam
You have flagged this comment
The first word has already been claimed
The last word has already been claimed
Insightful Lightbulb icon Funny Laughing icon Abusive/trolling/spam Flag icon Insightful badge Lightbulb icon Funny badge Laughing icon Comments icon

Comments on “Encryption: What The FBI Wants It Can Only Have By Destroying Computing And Censoring The Internet”

Subscribe: RSS Leave a comment
81 Comments
Anonymous Coward says:

Playing the Game

This is why government likes big business…
People are dumb enough to allow government call them non-citizens then turn around and bitch about them collecting your data.

Business should have every right and protection a citizen has against the government, because at the end of the day, you a citizen has been regulated too. IF you are to ignorant to understand how… just go for a drive without your license, in a black smoke billowing car, blaring 120 decibel music, with glass-packs. Be sure to piss on the cops shoe when he pulls you over.

Law = Regulation… because if you don’t follow regulations you are breaking the law.

I am sure you will figure it out, hell who am I kidding you wont figure shit out.

James Burkhardt (profile) says:

Re: Playing the Game

Your anti government rant, while interesting, seems to lack direction or point.

This is why government likes big business…
People are dumb enough to allow government call them non-citizens then turn around and bitch about them collecting your data.

In contrast to big business that is fighting them? That’s why they like big business? Additionally, I don’t remember being called a non-citizen recently, could you elaborate?

Business should have every right and protection a citizen has against the government, because at the end of the day, you a citizen has been regulated too. IF you are to ignorant to understand how… just go for a drive without your license, in a black smoke billowing car, blaring 120 decibel music, with glass-packs. Be sure to piss on the cops shoe when he pulls you over.

I think the music and glasspack is a bit of overkill, and im not sure why those needed to be indicated, because driving in a car billowing smoke, id expect to get pulled over. And then if you are breaking the law and piss on the cops shoe you are supposed to be surprised when the cops react negatively? Not entirely sure where you are going there. And how is this supposed to prove businesses deserve rights and protections against the government?

Law = Regulation… because if you don’t follow regulations you are breaking the law.

I am sure you will figure it out, hell who am I kidding you wont figure shit out.

Yeah, regulations are laws…thats kid of the definition. Not sure what mind blowing theory you’ve explored here.

John Fenderson (profile) says:

In addition

Jonathan Mayer’s analysis is excellent, but I want to add an additional point about subverted encryption of the sort that the feds are looking for:

Criminals who hide their activities through encryption will just continue to do so, using crypto that is readily available and installable (on Android, anyway) without involving any app store at all. There is no need to use an app store to install apps on an Android device, after all, so no provider would have the chance to vet the software.

So we’d just end up with a world of decreased security, computers that people can’t trust (even more so than right now), but with the ability of criminals to hide their activities just as strong as ever.

In other words, what the feds are asking for is a world where the criminals are in an even stronger position (relative to law-abiding users) than they are now.

Anonymous Coward says:

Re: In addition

This is something that helps to highlight how incredibly ignorant these people are when it comes to encryption and how it actually works.

What exactly will the FBI do when I put an open source encryption method on all of my devices? Are they going to criminalize and shut down GPG? PGP? OTR? Will it become a felony to use Jabber, VPN’s, proxy services? SSL? HTTPS? How far are they going to actually go with this nonsense?

And while we’re on the subject: are the FBI, CIA, NSA and other law enforcement organizations going to provide “golden keys” to their encryption for the ACLU and other government watch groups to check for corrupt and immoral practices? I mean, its only fair that they do. How else are citizens supposed to be 100% positive that our tax dollars are being spent wisely and our rights aren’t being violated?

I’m sure there has to be someone in the Justice Department smart enough to be asking these questions, and probably getting confused looks back as an answer.

Anonymous Coward says:

Re: Re: In addition

An even better question: Even if the FBI gets what it wants, how are they or Google going to stop me from purchasing an international smart phone, compiling my own version of Android with encryption, encrypted texts, emails and web browsing apps, and simply using the phone?

An even better question than that: If I already had the ability to to intercept every type of communication I wanted whenever I wanted with little to no oversight, no need to answer to anyone or even divulge the methods that I used to intercept those communications, why would I continue to make such a fuss about encryption?

They have supercomputers that do nothing all day but crack encryption. Why such a push for backdoors, when with enough money and computing power, you could crack the best encryption on the planet in matter of days and we know that they have the budget to do this and they know that we know?

It’s like begging in front of a gas station when you just got away clean with robbing the safe in the back. It makes zero sense.

JP Jones (profile) says:

Re: Re: Re: In addition

No encryption is unbreakable. Given enough resources, any hash will eventually be cracked, and often much faster than you would think.

That being said, breaking encryption does require some targeting, and is not instantaneous. While it’s reasonably safe to assume that if the government really wants into someone’s computer, they’re going to get in, common encryption means they won’t have the general data available to identify that guy in the first place. Many of these systems are likely using mass data analysis, and you can’t analyze data on a massive scale if you have to crack it all first.

That’s what they really want. They want to use the NSA version of Google Adwords to find the bad guys with an algorithm. That style of thing doesn’t work with mass encryption because by the time you break all the locks the data is meaningless.

Considering I don’t want them running my email through their terrorist filter in the first place I don’t see this as much of a loss. But that’s exactly what they want to do, and why they keep saying “we’re not really reading your stuff.” Yeah, neither is Google, but I still get targeted ads. The ads I don’t mind so much, although Adwords does not always present stuff I’m actually interested in. Being targeted as a terrorist because some computer system thinks I need to be watched, whether I hit their criteria or not?

No thanks.

Anonymous Coward says:

Re: Re: Re:5 In addition

Yes, so long as the desired cleartext has the same message length as the received cypher text, allowing misspellings and padding. That is what makes it unbreakable, because although am attacker can find a key that gives a meaningful message, that is not necessarily the message sent, and someone else can give a key that gives a different meaningful message. This property arises because the key is as long as the message, and each symbol in the message is encrypted independently of any other symbol.

nasch (profile) says:

Re: Re: Re:6 In addition

That is what makes it unbreakable, because although am attacker can find a key that gives a meaningful message, that is not necessarily the message sent, and someone else can give a key that gives a different meaningful message.

Right, but that doesn’t necessarily imply that a key can be derived from a cleartext and a ciphertext. I wasn’t sure if that was possible or not.

On the other hand, there are much more serious problems with OTP, which is why nobody uses it so this is an interesting but academic discussion. 🙂

Anonymous Coward says:

Re: Re: Re:7 In addition

Right, but that doesn’t necessarily imply that a key can be derived from a cleartext and a ciphertext. I wasn’t sure if that was possible or not.

It does imply that, given some clear text of the correct length to match the cypher text, it is trivially easy to generate a key that maps one to the other. Each element of the the key encrypts/decrypts one element of the message, and can be chosen independently of any other element of the key.Formally, the property of a one time pad system is that for any string of symbols of a given length a key exists that transforms it to any other string of symbols of the same length.
With all other cyphers the key is short, and encryption algorithms has the property that is is extremely unlikely that more than one key will produce a meaningful message, where the message is written in a human language. The chance of that happening are so astronomical that it can be ignored.

On the other hand, there are much more serious problems with OTP, which is why nobody uses it so this is an interesting but academic discussion.

These days with micro SD card, and an occasional meeting in person, the key management problem largely disappears. Further a very secure off-line encryption/decryption system for text messages can be built using an 8 bit micro-controller, like an Arduino. Collecting random noise for the keys can be carried out using the same processor. The actual encryption/decryption is simply modulo arithmetic on a character by character basis.

nasch (profile) says:

Re: Re: Re:6 In addition

Yes, but with one-time pads, if you have the cleartext already, generating the key gets you nothing.

In this context, there’s an important distinction between the cleartext and a cleartext.

“It does have a flaw when dealing with corrupt law enforcement, they can write the message they want you to say, in the same message length, and then generate the key to ‘decrypt it’ from the cipher text.”

John Fenderson (profile) says:

Re: Re: Re:7 In addition

I’m not sure what you’re getting at, then. Having the ciphertext and some unrelated cleartext doesn’t give you anything. And with a one time pad, the key is 100% random and is never reused, so you can’t ever get two ciphertexts generated from the same key.

I’m not seeing the weakness here. The only way to retrieve the key would be to have both the original cleartext and the ciphertext that it came from. If you are missing either of those, obtaining the key is impossible.And if you have both, obtaining the key is pointless.

nasch (profile) says:

Re: Re: Re:8 In addition

I’m not sure what you’re getting at, then. Having the ciphertext and some unrelated cleartext doesn’t give you anything.

The FBI intercepts the ciphertext. They then invent an incriminating cleartext and use it to generate a key. They make up a story about how they got hold of the key. By itself would this be enough for a conviction? I doubt it, but it could certainly get a warrant for something more intrusive, or be used with other evidence to build a case.

As I said, it doesn’t really matter since OTP is too hard to use anyway.

Anonymous Coward says:

Re: Re: Re:9 In addition

For limited use as a person to person system, such as between senior leaders of a movement, it is no longer that difficult to use as an SD card will a huge amount of key. Either a personal meeting, or a trusted courier can manage the key exchange, and the amount of computing power needed is minimal, like an Arduino could be used to implement a secure off-line system for plain text messages, with an SD card to transfer the encrypted text. A good random noise source to generate the key is also trivial, and can use the Arduino.
I Suggest an Arduino or the Like so that the Encryption system and key generation as it is almost impossible to compromise, and the key is never on a machine that is easy to compromise, like a PC.

Anonymous Coward says:

Re: Re: Re:11 In addition

So long as parts of the key are not re-used, security depends totally on keeping the keys safe. Key management is only slightly more difficult than PGP keys, due to the security requirements of key exchange. A few Gigs of key is a lot of text, and new keys can be exchanged long before it is all used.
Key generation is not a problem, as true random sources, radio noise, noise diodes etc can be used to generate the keys.
Interestingly, the main line of external attack, PC security, can be avoided by using simple micro-controllers, they have plenty of power to implement what can be done with pencil and paper, and all the software on them can be validated, indeed the really paranoid could use a pencil and paper assembler, and create the code file using a simple hex editor, and avoid negligible risk of a compromised cross compiler. (There are no standard routine names and interfaces to be used by a compromised compiler.)

Uriel-238 (profile) says:

Re: Re: Re:4 Corrupt law enforcement

As things are they don’t have to work nearly so hard to incriminate you.

They use the old mob trick of getting their fellow mugs to testify on their behalf.

When six cops are all saying they saw you commit a crime, the jury is inclined to convict. And this is even with video evidence that contradicts their testimony.

JP Jones (profile) says:

Re: Re: Re:3 In addition

I meant in practicality. One time pad encryption is only as secure as the measures used to protect the key…which are not, as a general rule, unbreakable. You can’t memorize the key unless you’re using a ridiculously short message to encrypt (which then becomes mathematically easier to plain guess anyway) and the key needs to be truly random.

It’s sort of like having an “uncrackable” lock. Maybe nobody can crack the lock, but if they blow a hole in the safe, the lock was meaningless. That’s what I meant by “no encryption is unbreakable”; it’s not the encryption that’s the problem, it’s that the keys to the encryption, whether passwords or even physical keys, are always less secure than the resulting encrypted data. Ultimately, if someone is determined to get into your encryption, they’re going to find a way to do it, and it’s probably going to be by targeting a vulnerability other than the encryption algorithm itself.

So yes, if you have some super-secret data that’s relatively short, made of 100% random characters, and you can successfully protect the key from anything and then completely destroy it after use, then you have unbreakable encryption.

But after all that you might as well just keep the original information in your head and tell someone in a soundproof faraday cage =).

John Fenderson (profile) says:

Re: Re: Re: In addition

“They have supercomputers that do nothing all day but crack encryption. Why such a push for backdoors…”

For a couple of reasons. First, there’ no monolithic “they”. There is a large number of different law enforcement/spy agencies with very different resources and capabilities. Your local police department, for example, doesn’t have the ability to break any crypto they want.

Second, even with the big name agencies that have crypto-busting supercomputers, they don’t have enough computing power to decrypt everything that they want to. It takes a large effort, so they have to be very, very interested in you specifically to do it. This is unworkable if what you want to do is have a widespread surveillance capability.

tqk (profile) says:

Re: Re: Re:2 In addition

Second, even with the big name agencies that have crypto-busting supercomputers, they don’t have enough computing power to decrypt everything that they want to.

Which is where the specialists in private industry come in. Both the oil and financial industries have lots of resources they love to place at the command of lucrative gov’t. contracts. The gov’t buys secret space planes with the black budget.

JP Jones (profile) says:

Re: Re: Re:2 In addition

Second, even with the big name agencies that have crypto-busting supercomputers, they don’t have enough computing power to decrypt everything that they want to. It takes a large effort, so they have to be very, very interested in you specifically to do it. This is unworkable if what you want to do is have a widespread surveillance capability.

This needs to be repeated more often. Intelligence agencies aren’t afraid of encryption per se. They’re afraid of losing access to massive amounts of private plaintext data for their “find an imaginary terrorist” algorithms.

Also, it can help prevent your friendly neighborhood police from sending your personal photos to other officers. After all, encryption can only lead to abuse, not prevent it, right?

Anonymous Coward says:

I’m worried about the US government front-dooring / side-dooring / back-dooring / open-windowing the random number generators that 3rd party apps use. Such as /dev/random.

I hear it’s hard to tell if a random number generator has been compromised. There’s really no reliable tests that can be run to verify the output of RNGs.

The US government has already attacked RNGs when it backdoored RSA’s RNG by using a pre-selected seed value that allowed US Intelligence to decrypt any cypher text encrypted using that pre-selected seed.

I think Mike’s analogy summed it up best. “There are things that are difficult (getting to the moon) and things that are impossible (arguing we only let “good people” go to the moon.)”

John Fenderson (profile) says:

Re: Re:

“I’m worried about the US government front-dooring / side-dooring / back-dooring / open-windowing the random number generators that 3rd party apps use. Such as /dev/random”

Attacking the RNG is one of the standard ways of weakening encryption (since crypto relies VERY heavily on statistically excellent random number generation), so your worry is well-founded. This is why serious crypto libraries provide their own RNG rather than trusting the one that the OS provides.

If crypto is using /dev/random (or the equivalent in other OSes) as its source of random numbers, that crypto cannot be trusted in the first place. Even if the feds don’t get what they want.

tqk (profile) says:

Re: Re:

I’m worried about the US government front-dooring / side-dooring / back-dooring / open-windowing the random number generators that 3rd party apps use. Such as /dev/random.

I’m worried about all those botnets “taken down” from criminals. I’d not put it past them (NSA, Interpol, …) to just re-purpose that botnet to running their own version of Distributed.net’s dnetc on any crypto fed to it. It’s what I’d do with them. Allocate a few hundred million for a gov’t contract, and Microsoft will do it for them.

Adam (profile) says:

Still misses the point..but just barely this time.

When encryption requires a back door, criminals will use tools that don’t comply with the law. Period. Encryption isn’t encryption when someone else can easily get into it without your key. PERIOD. So force google to create a backdoor, force them to remove secured apps… but what happens when the bad guys write their own and side-load it? Who controls that?!? No one. And guess what: Data is strongly encrypted and the law can do nothing about it except give them yet another item in a long list of charges to bring against a target.

Lord Binky says:

How about instead of having tech companies figure out how to get the information they want for them they figure out how to get the information from other non-constitution breaking legal methods?

What’s that?

Oh… That’s hard and it’s easier to make the job someone else’s responsibility? I think that’s what got us here in the first place…

Anonymous Coward says:

By extension, what we need is a master key special button that will unlock any lock on any door that law enforcement might want to enter. Similarly every combination lock should be able to be opened with a special back door combination that law enforcement would have. After all people might do something illegal behind locked doors and hide their nefarious plans from the authorities.

RR (profile) says:

None of that other stuff

They’ll be happy to defeat the phone encryption, which is much easier than the side story you’re spinning about policing apps.

There’s a message here – “Fix this, or we’ll make congress write some laws. Think long and hard about how that worked out for you last time.” It’s an effective message that has solved many more difficult issues in the past.

nasch (profile) says:

Re: None of that other stuff

It’s an effective message that has solved many more difficult issues in the past.

I’m not sure you understood the article. This is not a matter of someone being unwilling to fix it. This is a problem that has no solution. Congress and the FBI can do a pretty good job of destroying the internet as we know it, but they still will not have accomplished the goal of having a back door in everyone’s encryption. Maybe, at most, they will succeed in compromising the encryption of law-abiding US citizens. Everyone else will still have uncompromised strong encryption.

Uriel-238 (profile) says:

Did the FBI make such a ruckus when they discovered that people could talk to each other in private

…and not be recorded?

Oh, by the way, aren’t there a bunch of businesses that want to maintain data communications that cannot be snooped through by the public? I’m pretty sure they had those long before we used cellphones, even if that meant wacky scramblers and messengers on bicycles.

This reeks of the ignorant moral panic that people have whenever it is discovered we can do a thing on a computer.

And to be fair, I have no trust that law enforcement exists for my best interests anyway.

Anonymous Coward says:

Importance of F-Droid

It’s important to note that Google can not only remove apps, but install apps as well. Since they have root access, this can happen silently and imperceptibly. The malware could then circumvent any encryption done by any app since the endpoint is compromised. This is the true danger of Google Play Services and why options like F-Droid are worth supporting even if you don’t use them.

nasch (profile) says:

Re: Importance of F-Droid

It’s important to note that Google can not only remove apps, but install apps as well. Since they have root access, this can happen silently and imperceptibly.

Do you have any reading material on that? I’m not sure what search terms to use to get this subject and not pages and pages of “how to uninstall android apps”.

Anonymous Coward says:

Re: Re: Importance of F-Droid

Do you have any reading material on that?
Have you ever installed an app from the Google Play store website (desktop)? It installs without confirmation from the endpoint device. There is a notification, but it’s trivial to design a system not to show those, especially if Google has root (which is all devices with the Play Store installed).

nasch (profile) says:

Re: Re: Re: Importance of F-Droid

Have you ever installed an app from the Google Play store website (desktop)? It installs without confirmation from the endpoint device.

Good point!

if Google has root (which is all devices with the Play Store installed).

By “has root” do you mean literally Google has root-level access and can remotely run any commands they want on a device?

That One Guy (profile) says:

Don't kid yourself

‘But beyond that, even if the FBI manages to get what it wants, it will do so at the expense of general computing.’

‘So, if the FBI is willing to travel this very dark road littered with an untold amount of collateral damage, it still hasn’t managed to ensure the phones it encounters will open at its command.’

‘Even if the government were willing to take it this far, it still doesn’t eradicate apps that it can’t crack.

There is no ‘if’ about it, if they thought they could get away with it, they would absolutely order such back-doors to be included in every piece of tech they could get their hands on, security be damned. The only hesitation they have regarding the matter is admitting to what they truly want.

Anonymous Coward says:

losing the battle to win the war.

It’s in the their interest for you to believe they’re stupid; just as it’s in their interest for you to believe you’re encryption is trustworthy. They will “lose” this battle. One thick layer of obscurification is all that’s required to fool most people, and apparently 99% of journalists (maybe save for infowars- who will surround the facts in so much BS they become tainted by association.). In the end, only you will have your encryption keys- “No backdoors” will be declared… and you’ll be confident this means you can trust your device. You’ll be wrong- they’ll (still) have the same access to your ram (where you’re encryption keys are kept) as they’ve always had. Don’t trust me- spend a couple hours researching cellphone baseband.

Uriel-238 (profile) says:

Incidentally, there's also...

Encryption with plausible deniability.

That is, encrypted data that, to an observer without the correct reader and a proper password resembles random bits of unused hard-drive space.

Steganography for the 21st century.

So that even if they require all legal crypto to have backdoors, you can stash all your business secrets (terrorist plots, child porn and biographical leverage) on this, and they can’t prove it’s even there.

shāh māt

Pronounce (profile) says:

I Smell Fear

Since Snowden there has been so much clamor, hand wringing, and FUD exuding from the pores of various government spook agencies that I believe they are scared. And what they are scared about has very little to do with whether or not our women and children are protected from internal or external threats.

This is pure and simple fear of the loss of power. The upper echelons of power brokers need information to retain their power and they can see it fading in the light of the public backlash to their machinations.

Mark Wing (user link) says:

I’m not normally a big fan of open source, but open source, cross platform, peer reviewed crypto code is going to be our best bet. But mass surveillance is so insidious that we are going to need open source, peer reviewed compilers to compile our open source encryption code.

We are still a couple steps up from the mid 90’s when crypto was a munition and you could theoretically go to jail for reading (or writing) the wrong book.

Dominic Connor (profile) says:

It's worse than that Jim...

It’s not just about encryption. As a developer I sometimes create a new file format, a good (bad) % of my professional life has being trying to work out how to read/write data formats that were *supposed* be be read/writable, but often took sweat to access.

How many different formats are there to store still images ?
1,000, 2000 ?
“different” here means if my code tries to render it do I get the image, junk or a crash ?

Ditto text, every game saves in a different format, there are 15 different incompatible versions of Excel files, not encrypted but harsh to figure out.

This can be figured out, but it’s a chunk of work per application and there are a *lot* of apps these days.

Also, what is a .XLS file ?
Yeah I think it’s Excel too, but you can’t rely on that, I can choose to save my data with any filename extension I like.

How do you search Excel files for “interesting” content ?
Or my own .xls format that I use for sharing IMs ?

By hand, really ?

This can only be done by hiring a *lot* of programmers and they will never fully catch up.

Add Your Comment

Your email address will not be published. Required fields are marked *

Have a Techdirt Account? Sign in now. Want one? Register here

Comment Options:

Make this the or (get credits or sign in to see balance) what's this?

What's this?

Techdirt community members with Techdirt Credits can spotlight a comment as either the "First Word" or "Last Word" on a particular comment thread. Credits can be purchased at the Techdirt Insider Shop »

Follow Techdirt

Techdirt Daily Newsletter

Ctrl-Alt-Speech

A weekly news podcast from
Mike Masnick & Ben Whitelaw

Subscribe now to Ctrl-Alt-Speech »
Techdirt Deals
Techdirt Insider Discord
The latest chatter on the Techdirt Insider Discord channel...
Loading...