Deputy Attorney General Rosen: Companies Like Facebook Are Making Everyone Less Safe By Offering Encryption

from the 'for-the-children'-beats-out-'because-terrorism' dept

The federal government’s anti-encryption push is starting to turn into a really weird movement. Yanking pages from the FOSTA playbook, Attorney General William Barr threw an anti-encryption party featuring him, FBI Director Chris Wray, Deputy AG Jeffrey Rosen, and some overseas critics of secure communications.

It was full of loaded language, beginning with the conference’s name:

Lawless Spaces: Warrant-Proof Encryption and Its Impact On Child Exploitation Cases

This is how the DOJ and FBI are going to play this game: the specter of exploited children vs. secure communications for millions of Facebook users. Facebook is definitely the target. This conference — which featured zero tech experts or encryption advocates — was preceded by the announcement of a data-sharing agreement between the US and UK government that namechecked Facebook’s Messenger and WhatsApp.

It was also preceded by Attorney General William Barr’s letter to Facebook, asking it to drop its plans to add end-to-end encryption to Messenger. The letter, signed by the participants in this one-sided conference, said the addition of encryption — without some form of “lawful access” — would result in massive amounts of undetectable child exploitation.

Now that William Barr has said his piece, the floor has been opened up to DOJ Deputy Attorney General Jeffrey Rosen. Rosen’s pitch isn’t all that different from the one Barr laid out in his open letter to Facebook. But Rosen does add a bit more color to his in the form of questionable analogies.

Outside the digital world, none of us would accept the proposition that grown-ups should be permitted to mingle in closed rooms with children they don’t know in order to groom them for sexual exploitation. Neither would we ever accept the idea that a person should be allowed to keep a hoard of child sexual abuse material from the scrutiny of the justice system when all of society’s traditional procedures for protecting the person’s privacy, like the Fourth Amendment’s warrant requirement, have been satisfied. But in the digital world, that is increasingly the situation in which we find ourselves.

First off, no one finds the propositions Rosen offers acceptable — not the digital variety nor the real-world version. However, both versions still happen, with or without “lawful access.” It’s not that the DOJ and FBI shouldn’t go after child exploiters. It’s that pretending that undermining encryption will cause “lawless spaces” to cease to exist isn’t an honest approach.

To be fair, Rosen isn’t saying exactly that. But what he’s pitching is encryption backdoors that will result in millions of insecure communications for millions of people. The potential for harm is immeasurable. But we — and our service providers — should apparently be willing to take that risk so law enforcement has easier access to these communications. That’s the trade-off being demanded, even if Rosen, Barr, etc. aren’t intellectually honest enough to use those exact words.

The intellectual dishonesty continues with Rosen’s refusal to call backdoors “backdoors.”

I am not for a moment suggesting that we should “weaken” encryption. As we confront the problem of “warrant-proof” encryption, nobody is calling for secret “back doors” to communications systems, even though that is often how the issue is misreported. As FBI Director Wray said this morning, law enforcement seeks a front door — that is, access through a transparent and publicly acknowledged system, and only once we have secured the authorization of a court. And we don’t want the keys to that door. The companies that develop these platforms should keep the keys, maintaining their users’ trust by providing access to content only when a judge has ordered it.

If you put an entrance anywhere, the building is compromised. A hole in a wall, floor, roof, wherever, is still a hole. It doesn’t matter who holds the keys. The keys exist and can be copied or misplaced. Law enforcement may need a warrant, but criminals and state actors only need access to the key. Dressing it up as an escrow system doesn’t magically make this problem go away.

Rosen is calling for more than backdoors. Using another emotional argument, Rosen appears to saying the government should be allowed to eavesdrop on encrypted communications.

Every day, companies like AT&T, Verizon, and Sprint provide law enforcement with targeted lawful access to the content of phone communications in ways that promote public safety — but only after the government has complied with the rigorous requirements of the law, and a judge has authorized access. Why should internet technology companies operate under different rules? For a young girl who is being trafficked for sex, it makes no difference whether her tormenters are communicating via traditional voice calls over a cell phone, or via an encrypted internet app. But it makes a huge difference to the investigators trying to find her, as they can gather the first category of electronic evidence, but not the second. From a policy point of view, it doesn’t make any sense.

The example Rosen uses is wiretaps. The FBI would definitely like to be the unseen party to any number of conversations, especially now that most of them don’t take place over the phone. With this, Rosen is asking for more than unencrypted access to data at rest. He’s asking for a “non-backdoor” that allows investigators to intercept communications. This increases the complexity of the government’s demands and the insecurity of the targeted app’s users.

Rosen says 70% of 16 million child sexual abuse reports Facebook made last year originated from its Messenger service. Once end-to-end encryption is applied, these messages will no longer be visible to Facebook, in addition to being less accessible to law enforcement. He compares the millions of Facebook reports to the very limited number produced by Apple, which has provided end-to-end encryption for a few years now. Apple has forwarded a little over 200 tips over the last three years. As Rosen conjectures, it can’t simply be because no child abusers use iPhones.

Rosen isn’t wrong. Encryption will result in far fewer reports, if Facebook can’t scan messages for child porn. But he’s completely wrong in his portrayal of the trade-offs being made.

Some companies have completely favored the privacy of their users over the safety of their users.

This isn’t about privacy, even though there is definitely a net privacy gain. It’s about security, something even the government realizes is essential for electronic communications. But the government wants less security for everyone, in exchange for an unknown quantity of law enforcement “wins.” Rosen actually says users are “safer” when their communications providers scan communications for illicit content — an argument few outside the FBI and DOJ would make. Rosen is spinning this from the viewpoint of law enforcement riding to the rescue of victimized children. But it won’t just be the FBI making use of backdoors or intercepted communications. It will also be governments who treat criticism and dissent as crimes, which definitely makes things less safe for millions of people around the world.

Rosen closes with this last bit of intellectual dishonesty:

If we are to move to a world where even judge-approved search warrants become useless to the protection of exploited children, and to public safety more broadly, our country needs an open discussion of the costs some such technology platforms will be imposing on all of us. If our efforts to make the virtual world more secure leave us more vulnerable in the physical world, that decision should be an informed one.

But Rosen and the agencies he’s speaking for don’t want an “informed” decision. They’ve spent years blowing off experts who say what they want will result in less security and safety for users, as well as pointing out the impossibility of creating a “secure” backdoor. You only need to look at the speaker list for this event to see the DOJ and FBI aren’t interested in being informed. When the only people being asked for opinions are those who think undermining encryption is a necessity, you’re going to come to the conclusion that undermining encryption is a necessity.

Filed Under: , , , ,
Companies: facebook

Rate this comment as insightful
Rate this comment as funny
You have rated this comment as insightful
You have rated this comment as funny
Flag this comment as abusive/trolling/spam
You have flagged this comment
The first word has already been claimed
The last word has already been claimed
Insightful Lightbulb icon Funny Laughing icon Abusive/trolling/spam Flag icon Insightful badge Lightbulb icon Funny badge Laughing icon Comments icon

Comments on “Deputy Attorney General Rosen: Companies Like Facebook Are Making Everyone Less Safe By Offering Encryption”

Subscribe: RSS Leave a comment
93 Comments
This comment has been deemed insightful by the community.
Anonymous Coward says:

The Entire NSA is violating the law why should we trust more?

The constitution gives us lots of rights and promises that the government can’t or won’t do certain things. The NSA has been violating those since its very beginning and has no obtained enough dirty secrets to start blackmailing the government. Prove me wrong or start over with a new government.

This comment has been deemed funny by the community.
Anonymous Coward says:

Re: Re: The Entire NSA is violating the law why should we trust

— BEGIN ROT13 ENCRYPTED MESSAGE —
Jura cevinpl naq rapelcgvba ner bhgynjrq, bayl bhgynjf jvyy unir cevinpl naq rapelcgvba.
— END ROT13 ENCRYPTED MESSAGE —

For better security you should really use DOUBLE ROT13.

Sincerely,
DOJ

This comment has been deemed insightful by the community.
DannyB (profile) says:

Privacy is part of Safety

The earliest forms of ciphers were to keep messages private . . . for safety of the sender and receiver of the messages. Alex and Bob want to exchange messages privately, keeping Eve from reading them.

From those earliest primitive ciphers, there are various advances in how to encrypt messages to keep them private, and thus safe, between the sender and receiver. As Eve gets more clever and cunning, Alex and Bob must improve their cipher technology to remain safe.

Everything about cipher technology is now published openly in textbooks. Would the US stop someone from exiting or entering the country with a widely published academic technical textbook under their arm? Let’s burn the books!

DannyB (profile) says:

Re: Re: Privacy is part of Safety

Alex and Bob. The original, generic characters. Generally, Alice and Bob want to exchange a message or cryptographic key.

Carlos or Charlie. A generic third participant.

Carol. A third participant, usually of malicious intent.[11]

Cindy. A password cracker, often encountered in situations with stored passwords.

Dan, Dave or David. A generic fourth participant.

Eve. An eavesdropper, who is usually a passive attacker. While they can listen in on messages between Alice and Bob, they cannot modify them. In quantum cryptography, Eve may also represent the environment[clarification needed].

Faythe. A trusted advisor, courier or intermediary. Faythe is used infrequently, and is associated with Faith and Faithfulness. Faythe may be a repository of key service or courier of shared secrets.[citation needed]

Grace. A government representative. For example, Grace may try to force Alice or Bob to implement backdoors in their protocols. May also deliberately weaken standards.[citation needed]

Heidi. A mischievous designer for cryptographic standards, but rarely used.[12]

Judy. A judge who may be called upon to resolve a potential dispute between participants.

Melony. A malicious attacker. Associated with Trudy, an intruder. Unlike the passive Eve, Melony is an active attacker (often used in monkey-in-the-middle attacks), who can modify messages, substitute messages, or replay old messages. The difficulty of securing a system against Melony is much greater than against Eve.

Oscar. An opponent, similar to Mallory, but not necessarily malicious.

Pat. A prover, who interacts with the system to show that the intended transaction has actually taken place. Pat is often found in zero-knowledge proofs. Similar to Victor.

Rupert. A repudiator who appears for interactions that desire Non-repudiation.

Sybil. A pseudonymous attacker, who usually uses a large number of identities. For example, Sybil may attempt to subvert a reputation system. See Sybil attack.

Trent. A trusted arbitrator, who acts as a neutral third party.

Trudy. An intruder.

Victor. A verifier, similar to Peggy or Pat.

This comment has been deemed insightful by the community.
Scary Devil Monastery (profile) says:

"This is how the DOJ and FBI are going to play this game: the specter of exploited children vs. secure communications for millions of Facebook users."

Ah, that repulsive old trick of trying to screw every member of a community and make it look righteous by claiming it’s "for the children".

You’d think the law enforcement arms of government should consider themselves above the cheap rhetoric of a third-rate divorce lawyer or copyright troll litigator. Apparently that just isn’t the case.

Scary Devil Monastery (profile) says:

Re: Re: Re:

"False Dichotomy, amazingly, works on some people."

It’s honestly become so bad that today if I hear about a proposal meant to stop or mitigate child abuse I automatically assume it’s an attempt to push through malicious legislation meant to further the cause of bigots, control freaks with dictatorial aspirations, and/or copyright cultists.

I say anyone in public service found to invoke emotive aerguments as part of deceptive practice needs to be publicly flogged, blacklisted from future government service, and have the bullet point "LIAR" added to their public record.

Anonymous Coward says:

16 million reports? That seems…. bad.
US population is about 329 million. So 16 Million reports would be one report for about every 20 people.

If there are no false positive and duplicates that means probably greater than 1 in every 20 adults is an offender (greater because the population count is note entirely adults, and also it’s likely not all cases are reported).

My gut reaction is: "Get better statistics".

Anonymous Anonymous Coward (profile) says:

Re: Re:

Or, interpret the statistics you have based on reality rather than in support of your position. The article does not say that those 16 million reports were about US based users, so 1 in 20 is probably wrong on that alone. Then I would think there is a high probability that there are repeat offenders, who offend often rather than a greater number of offenders.

So two things. Get better statistics, AND, interpret them better.

This comment has been deemed insightful by the community.
Anonymous Anonymous Coward (profile) says:

Probable Cause and the connection to Parallel Construction

As pointed out n the article, the changes requested will not only impact the US, the only place the 4th Amendment applies (though other countries may have similar rules) those changes will cause impact…everywhere.

In thinking about Rosen’s insistence that they will only use their new power when ‘judge approved’ means that in order to get access to that power they need to provide probable cause. If they have probable cause then they have enough information to investigate. If they have enough information to investigate then why do they need access to digital records, either live or at rest? Go investigate. If the probable cause thingy is actually valid and not made from smoke and mirrors then they would likely be able to build a case without a warrant for communications. It just take something that seems an anathema to them, hard work.

And, about that at rest part, if the alleged perpetrators have illegal stuff on their computers, it will likely be encrypted, and nothing Facebook, or Apple, or any other service provider do will impact that. Which leaves us to predict that OS level encryption is the next target on their list.

Then again, the actual purpose of these demands likely have only a small part based in sex trafficking or child porn which is an artifice to achieve unprecedented access in the furtherance of power and control over the entire populace. There are too many examples of law enforcement ‘creating’ probable cause scenarios that have little to do with any truth to believe that the requirement for ‘judge approval’ has significant reality as a protection. Judges can be snowed, and have been snowed, and will be snowed again.

Do these people really believe that the concept of parallel construction is unknown to those outside of law enforcement? I think they do realize that while parallel construction has not been found illegal (yet), it is certainly immoral, and they don’t care. Listening in on what they consider ‘juicy bits’ will lead them to charging anyone they don’t like with something, whether it has anything to do with the original ‘probable cause’ or not.

This entire discussion is a parallel construction for the eventual total surveillance state, and antithetical to democracy in general. Just because it might be good for law enforcement does not mean it is good for democracy (yes I know we are a democratic republic and not a true democracy which has nothing to do with my statement).

This comment has been deemed insightful by the community.
Sok Puppette says:

Let's not forget...

It’s true that these back doors are very dangerous from a technical security point of view. But they are also bad ideas when they’re working as intended.

If these companies give that kind of access to "the authorities" in the US, they have no leverage to not give it to "the authorities" in $insert_hellhole_dictatorship_here. And even in places like the US, "the authorities" routinely break the rules, overstep their bounds, and create giant unjustifiable oppressive programs. It’s stupidly dangerous, to children and everybody else, to concentrate that kind of power.

They shouldn’t have that power, period, even if it could be secured, which of course it can’t.

Scary Devil Monastery (profile) says:

Re: Let's not forget...

"…they have no leverage to not give it to "the authorities" in $insert_hellhole_dictatorship_here."

They won’t have to give it. A master key will be such a precious commodity the one in the position of holding it will receive a phonecall offering him the choice of handing over the master key and receive a few million in cash, or watch a video of his children being tortured and killed.

And that’s assuming it isn’t just silently lifted by the same team of crackers who released the wcry ransomware.

The master key will quietly leak almost instantly and become the property of anyone willing to pay hard cash for it. This is given.

This comment has been deemed insightful by the community.
Anonymous Coward says:

"As FBI Director Wray said this morning, law enforcement seeks a front door — that is, access through a transparent and publicly acknowledged system."

Deputy Attorney General Rosen,

I’ll tell you what, you show us that you can do government business in a transparent way, and we might consider this. The government has proven again and again that we cannot trust it, and it continues to avoid transparency like the plague, through the use of NSLs, and various bulk collection programs at the NSA.

What exactly is it you don’t want us to see? After all, "if you have nothing to hide, you have nothing to fear", right?

Additionally, the government needs to prove it can be trusted with our data. As a former clearance carrying victim of the OPM hack, I don’t think you’ve earned that trust.

Anonymous Coward says:

like so many other highly important positions in the USA, this one is held by a cunt who has no idea what he’s talking about! before the Internet, were letters and parcels treated as if anyone from any of the security services or elsewhere could access them? no, they weren’t! the only difference between then and now is the speed information can get to anywhere and everywhere! that’s called ‘progress’!

This comment has been deemed insightful by the community.
JdL (profile) says:

I feel SO comforted

Rosen: " The companies that develop these platforms should keep the keys, maintaining their users’ trust by providing access to content only when a judge has ordered it."

That would be a judge who is a member of the largest and most corrupt criminal organization in America, the U.S. government? My trust level is so low it can’t be charted.

The good news: we the people, which is we the good guys, are winning and will will win the encryption war, one way or another. The thugs in government simply can’t stop its use, in secret through steganography if by no other means.

Kitsune106 says:

I just had a thought

If there are back doors, well, front doors. Does that not get around privacy? As the third party has access to the info. And if they claim it’s info traveling , would they not claim it’s same as overhearing a plot? And from there, just easy to search people with the front door as it’s held by third party, and the users know said key exists so no 4th ammendment rights?

Anonymous Coward says:

A Random thought about encryption...

ZCZC
30632
38181 66183 64246 94776 18291 66309 82522 20386 47559
84928 91542 42867 11447 71294 32439 37478 21785 29403
89959 59165 26239 82837 83271 25462 13465 48977 87226
12729 77363 68618 68267 28345 20126 63908 54978 29761
73957 42335 84735 42493 84778 52990 23744 63139 85315
66432 90118 27272 77078 3066 60394 29081 69294 99462
69955 69839 72889 33253 38568 63703 48778 91515 36197
25172 79387 97337 37767 41229 72941 17525 35267 43341
40769 23203 66735 20684 81706 26533 79793 89589 29692
79374 33321 59223 82579 18530 65454 38933 70745 51388
60284 58973 82072 82879 66393 20721 37396 77919 63876
43532 35292 99612 89581 28939 87255 47644 99357 31645
69695 26839 75847 17256 87775 36342 53141 90331 85332
50322 30948 27246 33697 78516 78339 22853 15659 38346
24746
NNNN

Anonymous Coward says:

A Random thought about encryption...

ZCZC
30632
38181 66183 64246 94776 18291 66309 82522 20386 47559
84928 91542 42867 11447 71294 32439 37478 21785 29403
89959 59165 26239 82837 83271 25462 13465 48977 87226
12729 77363 68618 68267 28345 20126 63908 54978 29761
73957 42335 84735 42493 84778 52990 23744 63139 85315
66432 90118 27272 77078 3066 60394 29081 69294 99462
69955 69839 72889 33253 38568 63703 48778 91515 36197
25172 79387 97337 37767 41229 72941 17525 35267 43341
40769 23203 66735 20684 81706 26533 79793 89589 29692
79374 33321 59223 82579 18530 65454 38933 70745 51388
60284 58973 82072 82879 66393 20721 37396 77919 63876
43532 35292 99612 89581 28939 87255 47644 99357 31645
69695 26839 75847 17256 87775 36342 53141 90331 85332
50322 30948 27246 33697 78516 78339 22853 15659 38346
24746
NNNN

This comment has been deemed insightful by the community.
Anonymous Coward says:

Neither would we ever accept the idea that a person should be allowed to keep a hoard of child sexual abuse material from the scrutiny of the justice system when all of society’s traditional procedures for protecting the person’s privacy, like the Fourth Amendment’s warrant requirement, have been satisfied.

But we quite literally do accept this idea. People are allowed to own safes without master keys, people are allowed to encrypt their own hard drives, people are allowed to write coded letters, people are allowed to burn documents or toss them off a bridge in the middle of the night. There is literally no aspect of society in which people are not allowed to "keep a hoard of child sexual abuse material from the scrutiny of the justice system."

A Guy says:

Re: Re:

That’s not quite true, the vast majority of child sexual abuse material is unprotected speech and they aren’t really "allowed" to do those things. There are laws against production, distribution, possession and destruction of those things. People do it like they rob banks or shoot up bars. I do not know exactly what you are supposed to do with stuff you’re not allowed possess or destroy but there are laws regulating that unprotected speech.

This comment has been deemed insightful by the community.
Anonymous Coward says:

Re: Re: Re:2 Re:

Do you throw your mail away once it is no longer relevant to you? That is destruction of evidence.

"Innocent until proven guilty" is irrelevant here. Destroying documents is a protected act and a necessary function of every day life. In fact, for some businesses it is REQUIRED BY LAW that they destroy documents in certain situations.

Now, if you have been served and are under legal investigation and been told to keep all your documents, yet destroy them anyway, then yes, that is a crime. But destroying documents or hitting the delete button is not a crime in and of itself.

This comment has been deemed insightful by the community.
Anonymous Coward says:

Re: Re: Re:3 Re:

“In fact, for some businesses it is REQUIRED BY LAW that they destroy documents in certain situations.”

True dat. Anyone who’s involved in medical records for instance will (hopefully) have HIPPA document destruction requirements drilled into them.

This comment has been deemed insightful by the community.
norahc (profile) says:

Still not seeing how law enforcement backdoors would keep anyone safer, especially children.

For the government to get their judge approved warrant, they would already have to be investigating the person. Investigations don’t start before the criminal act, but after. So the harm to the children or anybody else has already been done.

The only way the government’s encryption backdoors would work to protect anyone is if they started arresting and charging people before the crime was committed.

This comment has been deemed insightful by the community.
Anonymous Coward says:

Lawful Encryption

Even an (awful) idea like lawful encryption were to exist that would give ‘authorities’ a way to view encrypted messages, there’s absolutely no reason to think that someone already breaking the law is going to use ‘lawful encryption’… they’ll simple start using ‘black market encryption’

Anonymous Coward says:

There,s plenty of apps that have encryption built in ,the fbi is afraid because a service that has billion,s of users could provide an messaging app thats easy to use by the public.

End to end encryption means even if facebook hands over data to the fbi
it would be of no use to them.
The messaging systems used by social media service,s now
probably have weak encryption or else are sent like a sms message ,ie the messages might be recorded
by facebook or other social media platforms .
The uk government want to be provided with a third key,
so if 2 people send a message it would also be recieved by the police
or the uk equivalent to the NSA .
this profile would be invisible to the 2 people who are sending message,s
to each other ,
like a phone call is recorded without the public knowing about it.

This comment has been deemed insightful by the community.
Anonymous Coward says:

Lawful access?

They want lawful access. The solution is simple: Get a warrant; Force the device owner to unlock access to the messages. Can’t do that? Then tough shit. Do your jobs as LE has done since forever.

The only reason to want "lawful" (read: "open") access to all messaging is to setup dragnets with watch-words and triggers so the computer can do their jobs for them. This kind of thing isn’t legal in traffic enforcement and it more than likely isn’t legal here.

I’ll take liberty, thanks.

This comment has been deemed insightful by the community.
Wyrm (profile) says:

Outside the digital world, none of us would accept the proposition that grown-ups should be permitted to mingle in closed rooms with children they don’t know in order to groom them for sexual exploitation.

Yes, you do. It’s called a church.

Every day, companies like AT&T, Verizon, and Sprint provide law enforcement with targeted lawful access to the content of phone communications in ways that promote public safety — but only after the government has complied with the rigorous requirements of the law, and a judge has authorized access.

Who is he kidding there? After all the news we got about how the warrant requirements are so low, some judges just rubber-stamp them. Sometimes, it’s not even a judge, not even an attorney general, but some random assistant.
Not to mention "secret warrants" and cases of parallel construction…
His "rigorous requirements" have been a joke for years and are getting worse by the day. Or the direct access some communication providers offer to government agencies.

He shouldn’t be surprised that people and private companies decide to take the matter of securing privacy into their own hands when the government actively fights security and privacy.

Anonymous Coward says:

Re: Re:

For a young girl who is being trafficked for sex, it makes no difference whether her tormenters are communicating via traditional voice calls over a cell phone, or via an encrypted internet app. But it makes a huge difference to the investigators trying to find her, as they can gather the first category of electronic evidence, but not the second.

Are there no cell site simulators?
Are there no cell phone connection records?

For a young girl being trafficked for sex, you’re not trying to find her by listening in to cell phone traffic, you’re trying to make a case against her captors.

Or "captors". Perhaps you are trying to avoid making a false accusation after some meddlesome "see something-say something" reported suspicion. After all, it’s not like the girl is staying with her (insert race here) grandparents, or with a relative in The Big City to get access to (insert big city service/opportunity here).

ECA (profile) says:

Re: Re: Re: Re:

And the best part of TXT communication, is that MOST isnt Scrambled/encoded/anything..
Its not worth the time to do anything complicated. Asking FB to do the deed and allow it to be monitored is abit stupid.
Its a Step into asking all the others to do the same thing.

BUT,
If you were really into this type of thing and wanted to keep it private and hidden, WHAT would a (somewhat) Smart person do?
Make a Private Chat/msg program…THAT DOES ensoding, based on the specific phone. And each person has to share a Code to be in that system, and to decode each msg.
OR..
You goto a System ont he net with TONS of Chat/msg and talk all you want.. It is so Busy, and complicated that Locating the group/person is Impossible…With hidden groups, private servers, Passwords(that work)(you would need 1 system from 1 of those people to get into it) that tracing their locations and soforth is ridiculous trying to get thru the VPN rerouting..

But, if you could get a major corp to say…OK, we will open it… Then you could demand ALL THE REST to follow suit.
AND make laws that demand a backdoor, to monitor Everything.

"Everything" is a big word.
How many of us have seen games that have chat rooms? Easy to find chat rooms? There are games that if you dont know the names, you will NEVER find them. From all the FB games/chats to Major Company Games and chats.. i will bet there are at least 5-10 names we could all say about Chat programs.. not including ones you have never heard of that are REALLY private and hidden.

Said before..
Monitoring the net, is Hard to do…You DONT have the man power to even Sort 1 days worth of Chats, using a computer…Let alone Private chats. Chats with programs that Dont need a central server. OR even to record voice chats. It would take 90% of the USA population to cover the world….IF you even tried.

Anonymous Coward says:

Re: Re:

Either he very clearly does not understand that or he does and is just hoping someone will "nerd harder" and come up with something despite every security professional on Earth telling him he’s wrong.

And nobody coming up with anything in the years since this brain-dead "war on encryption" began is sufficient evidence that it can’t be done. If there’s one thing science likes more than doing the right thing, it’s a challenge; If this were a solvable problem it would be solved by now.

Anonymous Coward says:

Re: Re: Re: Re:

“Make this red truck greener without reducing its redness.”

Okay, someone said "nerd harder" so I have to point this out.

You can make a red truck greener without reducing its redness technically. You need to get its body to emit more photons in the green wavelength without reducing the number of photons emitted in the red wavelength. This means the truck body must be made brighter but it is actually possible to do.

That One Guy (profile) says:

Re: The 'ignorance' excuse was thrown out YEARS ago

They know, it’s been explained to them more than enough times for them not to know and it’s not like they’re blithering idiots, it’s just they refuse to accept what people have told them because it’s contrary to what they want, and they aren’t honest enough to admit that they are willing to have the public pay the price that deliberately weakened encryption would cost.

That One Guy (profile) says:

Re: Re: Re: The 'ignorance' excuse was thrown out YEARS ago

That’s the thing though, they are almost certainly not ignorant, as while they may not have known about the subject before they starting talking by this point so many people have pointed out how and why they are wrong it’s almost literally impossible to believe that they are still ignorant rather than dishonest.

Personanongrata says:

Know-Nothing Nincompoops, Data Encryption and DoJ

Deputy Attorney General Rosen: Companies Like Facebook Are Making Everyone Less Safe By Offering Encryption

Its is clear Deputy Attorney General Rosen and his DoJ ilk are know-nothing nincompoops posing as serious people.

Mayhap Deputy Attorney General Rosen would like to lead by example?

Dear Deputy Attorney General Rosen – lets conduct an experiment where we pretend to remove all forms of data encryption from your stupid phone. Then you get to take your stupid phone out into the great wide expanse of the world and see how long it takes before all the personal information stored in your stupid phone is exploited.

Sound like fun?

Add Your Comment

Your email address will not be published. Required fields are marked *

Have a Techdirt Account? Sign in now. Want one? Register here

Comment Options:

Make this the or (get credits or sign in to see balance) what's this?

What's this?

Techdirt community members with Techdirt Credits can spotlight a comment as either the "First Word" or "Last Word" on a particular comment thread. Credits can be purchased at the Techdirt Insider Shop »

Follow Techdirt

Techdirt Daily Newsletter

Ctrl-Alt-Speech

A weekly news podcast from
Mike Masnick & Ben Whitelaw

Subscribe now to Ctrl-Alt-Speech »
Techdirt Deals
Techdirt Insider Discord
The latest chatter on the Techdirt Insider Discord channel...
Loading...