tag:blogger.com,1999:blog-3993498847203183398.post3851962696819290241..comments2024-03-18T12:28:29.902+00:00Comments on RevK<sup>®</sup>'s ramblings: Amber Rudd - you do not need to understand encryptionRevKhttp://www.blogger.com/profile/12369263214193333422noreply@blogger.comBlogger20125tag:blogger.com,1999:blog-3993498847203183398.post-17501134608656177822017-10-05T10:06:05.878+01:002017-10-05T10:06:05.878+01:00If my cynicism is warranted, then I'm expectin...If my cynicism is warranted, then I'm expecting the whips to either get the Home Secretary to sign off on the warrant, *or* have found a route to get warrantless intercept working.Simon Farnsworthhttps://www.blogger.com/profile/15190608047563530091noreply@blogger.comtag:blogger.com,1999:blog-3993498847203183398.post-90745696683583707912017-10-05T09:44:00.827+01:002017-10-05T09:44:00.827+01:00"There is just no equivalence between a bomb ..."There is just no equivalence between a bomb at a concert full of young people and a nursing home full of nearly-dead-anyway people eventually succumbing to their deadly bath-mats."<br /><br />How about the two biggest killers of young people: road traffic crashes, and suicide.<br /><br />Between 2006 and 2013, there have been about 18,000 road deaths and 44,000 suicides. During that same period there have been 2 terrorism related deaths, one of which was the terrorist themselves (Glasgow Airport), and the other, I would say was not terrorism - it was murder (Lee Rigby).<br /><br />Of course, terrorist plots have been foiled over that time and without the security services doing their job there would likely have been more deaths. But the fact that terrorism causes 0.003% of the deaths compared to the two biggest causes of young people dieing tells me that the security services are doing fine and don't need any more resources (including new legislation).<br /><br />Of course, it isn't politically expedient to say "we're going to fund road safety and mental healthcare instead of pouring more money into anti-terror" because the press *and* the politicians make such a big deal about terrorism.<br /><br />By the dictionary definition of terrorism (trying to achieve political aims by inciting terror), the real terrorists are the politicians - they are the ones who keep saying "if you don't let us take away your civil liberties you are in real danger of terrorists killing you", when in fact that risk is almost immeasurably small.Steve Hillhttps://www.blogger.com/profile/09798286430189689578noreply@blogger.comtag:blogger.com,1999:blog-3993498847203183398.post-81268239804235166582017-10-04T19:19:38.635+01:002017-10-04T19:19:38.635+01:00If you've now conceded that there is, in fact,...If you've now conceded that there is, in fact, a trade-off, and that there *are* some benefits that need to be weighed against some costs, then my previous post has been successful.<br /><br />I'm not going to argue about what the correct outcome of the trade-off would be - we quite probably agree on that anyway. <br /><br />But you will have an uphill struggle to persuade anyone who makes their living by making decisions in the public eye that their world would be a better place if they ignored the terrorists and concentrated on bath-mat safety. There is just no equivalence between a bomb at a concert full of young people and a nursing home full of nearly-dead-anyway people eventually succumbing to their deadly bath-mats. People pretending the two were the same just because the number of corpses was the same would not be taken seriously.Will Deanhttps://www.blogger.com/profile/15515078919433985452noreply@blogger.comtag:blogger.com,1999:blog-3993498847203183398.post-58640429262301566732017-10-04T17:36:33.184+01:002017-10-04T17:36:33.184+01:00There's quite a problem indeed if a whip can g...There's quite a problem indeed if a whip can get an LI warrant signed off and served on a telco.Anonymoushttps://www.blogger.com/profile/18427000118752159232noreply@blogger.comtag:blogger.com,1999:blog-3993498847203183398.post-67930790714409103422017-10-04T17:31:51.589+01:002017-10-04T17:31:51.589+01:00Cynically, I wonder if the whips have been abusing...Cynically, I wonder if the whips have been abusing lawful intercept provisions to spy on MPs' communications, and are now stymied because (for example) Boris Johnson now has his disloyal chats over WhatsApp[1] instead of SMS?<br /><br />It would explain why they're so keen on banning E2E encryption, and why WhatsApp keeps being brought up.<br /><br />[1] http://news.sky.com/story/boris-johnson-urges-mps-to-back-may-in-whatsapp-message-10912405Simon Farnsworthhttps://www.blogger.com/profile/15190608047563530091noreply@blogger.comtag:blogger.com,1999:blog-3993498847203183398.post-10735277941642866202017-10-04T17:25:02.272+01:002017-10-04T17:25:02.272+01:00OK, I'll bite. Yes, I cannot say for sure that...OK, I'll bite. Yes, I cannot say for sure that they will change to using better encryption. Just as you cannot say that their use will be flawed or noticed.<br /><br />And yes, a trade off. Such measures may thwart some would-be terrorists that are not smart enough to find someone smart enough to help them. I agree. But the trade off is the damage that such measures do. Again, hard to predict for sure, but the daily impact of scammers and spammers and hackers, and people trying to get in to networks (have you ever looked at a firewall log) shows the scale of the other side - the bad actors that would love to break networks where the encryption is weakened to catch the odd stupid terrorist. IMHO it is far from worth the trade off.<br /><br />As for whether terrorists would change though, clearly they have. They have started using apps that have encryption already, else there would not be the claimed issue with reading messages. They are not just sending letters or making old fashioned phone calls or even sending old fashioned text messages. They are installing apps, and using them. If one of the apps is compromised and another is not, someone, somewhere, in any group that is doing "bad things" is going to say "maybe we should change to using that more secure app".<br /><br />Bear in mind that apps from some company are not the only things going, but they are pretty much the only thing you can control.<br /><br />There are open source apps, especially on less controlled platforms like android, created by lots of separate people and not centrally controlled by some company you can target with a law. The law has nothing to put in its cross hairs apart from the users (i.e. the very terrorists that ignore other laws already).<br /><br />These apps are going to be good, not some iffy "home grown" stuff. You don't need to "home grow" the maths any more, it exists and so does the code. But privacy activists will make good quality apps, and do make good quality apps, that are not flawed (or fixed quickly when they are).<br /><br />Those same apps will be increasingly hiding their tracks because of police states and oppressive governments so you cannot spot them. Bear in mind they are not banning encryption, so encryption will be "seen on the wire" all the time, and you cannot tell what it is (that's the point).<br /><br />Even so, I have read that groups like ISIS already have apps anyway.<br /><br />So, yes, some criminals will remain stupid. Yes, some will be caught if back doors or weakened encryption is implemented.<br /><br />But look at the numbers?<br /><br />How big a threat are terrorists anyway? Is it worth doing *anything* if it has any cost or negative impact at all - almost certainly not if you actually look at the evidence and numbers. We would save more lives and reduce hardship more by simple measures in road safety or better designed bath mats.<br /><br />How big a threat are hackers - again, we can see so many cases of companies being hacked to get data, many per year, and we see the millions of attempts to hack machines and spoof things and defraud people. We can see that this is a big target, and we need the best tools possible to defend against that real threat without hindrance.<br /><br />Just consider the numbers, the evidence, even if some legal measure was 100% guaranteed to stop every terrorist attack ever again, it is not worth it if it weakens security for you and me and everyone else in our every day lives, is it? Surely?RevKhttps://www.blogger.com/profile/12369263214193333422noreply@blogger.comtag:blogger.com,1999:blog-3993498847203183398.post-42629223625441013742017-10-04T17:06:56.845+01:002017-10-04T17:06:56.845+01:00There is a logical fallacy at work here, which is ...There is a logical fallacy at work here, which is to assume that because a measure designed to promote some good (or at least assist the security services) can be circumvented in some way, then there's no point doing it at all.<br /><br />From the article: "... any attempt to control it will not impact that threat..."<br /><br />You've no way of knowing that's true, and it's quite probably false. In just the same way as locking your house is not pointless merely because someone could break a window, making would-be terrorists find it *harder* (note, I agree, NOT impossible) to communicate secretly may have a number of benefits:<br /><br />* Their use of home-brewed encryption is more likely to be flawed<br />* Their use of home-brewed encryption is more likely to be noticed<br />* They may not actually have the knowledge to do any kind of encryption if it's not handed them on a plate.<br /><br />Of course there's a trade-off, and some kind of ban might well do more harm than good, and that needs to be weighed-up. But you won't be taken seriously making arguments if you stick to the trope that the only two levels of anti-criminal effectiveness possible are 0% and 100%. Will Deanhttps://www.blogger.com/profile/15515078919433985452noreply@blogger.comtag:blogger.com,1999:blog-3993498847203183398.post-79375073719310365972017-10-04T17:03:11.161+01:002017-10-04T17:03:11.161+01:00Oh, I don't think politicians have necessarily...Oh, I don't think politicians have necessarily done themselves any favours, and it is difficult for technical experts, or just people with an opinion, to weigh in on something when they do not have the detail of the problem to be solved.Anonymoushttps://www.blogger.com/profile/18427000118752159232noreply@blogger.comtag:blogger.com,1999:blog-3993498847203183398.post-17368064525473672562017-10-04T16:11:38.852+01:002017-10-04T16:11:38.852+01:00Politicians have always insisted that they don'...Politicians have always insisted that they don't want to ban encryption, but their intentions have been extremely unclear because what they say they want often directly contradict the promises they make.<br /><br />For example, "we won't weaken encrypted services" is often put right alongside "but police must be able to read messages that criminals are exchanging through those services". Clearly you can't achieve both of these things at the same time. Politicians are never going to be trusted if they insist on using this kind of unclear double-speak.<br /><br />From the article: "She insisted she does not want "back doors" installed in encryption codes, something the industry has warned will weaken security for all users, nor did she want to ban encryption, just to allow easier access by police and the security services." - admittedly this is the BBC paraphrasing her rather than a direct quote, but I would argue that banning e2e encryption on certain services is no different to "installing backdoors", "weakening security" and "banning [a type of] encryption", and it just isn't possible to "allow easier access by police" without doing exactly that.<br /><br />However, to my mind the most concerning thing is that legislators are comfortable standing up and saying "I am legislating about a thing I don't understand and I don't want to understand the things I'm legislating about. I'm tired of the people who do understand telling me that what I'm trying to do doesn't make sense."<br /><br />It is all far too close to Gove's "I think we've heard enough from the experts" comment - people who aren't experts need to stop telling the experts to shut up and actually listen to them. You wouldn't try to operate on your own cancer because you'd "heard enough from the doctors" would you?Steve Hillhttps://www.blogger.com/profile/09798286430189689578noreply@blogger.comtag:blogger.com,1999:blog-3993498847203183398.post-44915158248279159782017-10-04T09:11:00.261+01:002017-10-04T09:11:00.261+01:00First, it's good to see that this discussion h...First, it's good to see that this discussion has not fallen for the "they want to ban encryption!" strawman, which seems to be doing the rounds yet again.<br /><br />As I understand it, at least, the discussion is on a relatively narrow point, which is whether providers of massively popular over the top messaging applications should be required to design their systems in such a way that they either do not offer end-to-end encryption (but do offer some other approach to encryption, which can be removed centrally), or else having the ability to switch a user from end-to-end encryption to removable encryption, on receipt of an interception warrant. Depending on architecture, there may also be an element of "stopping peer-to-peer routing so that the operator can do interception", but I don't think that that aspect has been raised.<br /><br />There has been, as far as I know, absolutely no talk of "banning encryption", stopping banking websites from using TLS and so on.<br /><br />Some of the points made here stand: someone who wishes to do so can use an encryption scheme entirely unrelated to the underlying application, such a GPG, or a one-time pad. Conversely, buying a pair of gloves is trivial, yet some criminals still leave fingerprints behind: perhaps not everyone "of interest" will adopt different technologies immediately, which, if true, would mean that there was still some benefit to the change in architecture. The outcome may not give government perfect access, but it may give "good enough" access for its needs, or simple "better" access than it has already. This may be sufficient to justify the measure.<br /><br />Similarly, points around user security / safety stand: if the removal of e2e on a holistic basis, or the introduction of a capability to remove e2e on a targeted basis, were introduced, users' communications would be less secure (e.g. against foreign state attacks, on a centralised encryption system) than if e2e were in place.<br /><br />An un-made point too is the impact on the architecture, and the cost/viability, of the operator's model: if the requirement reduces scalability, or increases technical complexity, there is a cost to the operator as well as to each user. Potentially, some of these costs could be quantified, and contributions made by the government, but impact such as slower time to market is much harder to quantify and recover.<br /><br />Even with the debate construed correctly, it is not an easy one to resolve, despite numerous opinions. It requires an assessment of the proportionality of the measure in question and, outside government, no-one is well-placed to do that, because of informational inequality: those outside are unable to carry out any of the steps of a proportionality assessment in a meaningful manner. Whether the benefit outweighs the harms, who knows.<br /><br />But much of the online flapping about the "banning of encryption" seems, in my opinion, to be a missed opportunity to discuss the actual topic at hand.Anonymoushttps://www.blogger.com/profile/18427000118752159232noreply@blogger.comtag:blogger.com,1999:blog-3993498847203183398.post-26823936101220223302017-10-03T22:21:13.269+01:002017-10-03T22:21:13.269+01:00The issue is whether s58 Terrorism Act 2000 covers...The issue is whether s58 Terrorism Act 2000 covers streaming. The wording is "collects or makes a record of information", and at least some feel that it is not clear that this covers the streaming of information, where no file remains of the user's machine at the end of the session.<br /><br />I think there is a degree of ambiguity there, and, with a goal of removing any argument on that point, I can understand why a clarification might be desired.Anonymoushttps://www.blogger.com/profile/18427000118752159232noreply@blogger.comtag:blogger.com,1999:blog-3993498847203183398.post-74064615505519592282017-10-03T20:15:25.583+01:002017-10-03T20:15:25.583+01:00No, I am not saying I am in favour of someone, nor...No, I am not saying I am in favour of someone, nor indeed anyone, looking at child porn. My point is that a senior UK law-maker is today - and yet again - displaying a further total local of understanding of the topics on which she is attempting to legislate. It is not just MPs (junior, senior, otherwise) who mis-understand "downloading" vs. "looking at at a web page". I have this conversation with various people who exclaim "I don't download anything, so why is my download usage so high?" I then explain that every web page looked at *IS* a download. They generally refuse to believe me, "becuase I don't download anything. I only look at web sites from time to time". That's fine for the Man In The Street to mis-understand. He/she can rely on expert consultants to correct him and help him understand. But it's absolutely not OK for a law-maker to legislate based on such catastrophic total lack of understanding of such basic principles.Anonymousnoreply@blogger.comtag:blogger.com,1999:blog-3993498847203183398.post-75738059898812991222017-10-03T18:46:33.907+01:002017-10-03T18:46:33.907+01:00Julian was a good start!Julian was a good start!RevKhttps://www.blogger.com/profile/12369263214193333422noreply@blogger.comtag:blogger.com,1999:blog-3993498847203183398.post-23542993494375514172017-10-03T18:35:40.498+01:002017-10-03T18:35:40.498+01:00I'll sneer at stupid politicians all I want th...I'll sneer at stupid politicians all I want thanks, particularly because even after one has spent time educating them, they still do not listen.<br /><br />They do not want to be educated on say, end-to-end encryption, or their idiotic Internet spying schemes. They only want someone to tell them they're right.<br /><br />And seeing as they don't understand the first thing about the technology they're attempting to regulate, it's not.<br /><br />Maybe I'll run for parliament in a few years, under the campaign of being the first technologically competent MP who understands the Internet and online security.Ferrocene Cloudnoreply@blogger.comtag:blogger.com,1999:blog-3993498847203183398.post-14803457250592367612017-10-03T18:24:40.927+01:002017-10-03T18:24:40.927+01:00Indeed, see also the way that the child pornograph...Indeed, see also the way that the child pornography laws are already abused so that anyone viewing dodgy material on-line can be convicted of the greater offence of "making a copy of an obscene image", an offence intended to be used on the printers and publishers. (But it's only child porn addicts and you're not in favour of THEM are you?)Anonymousnoreply@blogger.comtag:blogger.com,1999:blog-3993498847203183398.post-44746432995654208212017-10-03T17:31:11.840+01:002017-10-03T17:31:11.840+01:00There has been comment today that she wants it to ...There has been comment today that she wants it to be illegal to "even look at bad material on the web whereas at the moment it is only illegal if you actually download that bad stuff". (paraphrased)<br /><br />More total misunderstanding. To view a web page, that page is downloaded so that the browser can display it. Looking at a web page IS downloading that web page.<br /><br />Otherwise there would be no impact on an ISP's download allowance even if a user looks at 10 million web pages per day.Anonymousnoreply@blogger.comtag:blogger.com,1999:blog-3993498847203183398.post-20680888396668855222017-10-03T16:52:18.907+01:002017-10-03T16:52:18.907+01:00If we want a real discussion about this, let's...If we want a real discussion about this, let's try starting with real issues that apply to all services, and not with the fundamentals of the mathematics:<br /><br />1. E2E encryption means that my use of E2E encrypted services is not suspicious in and of itself; in turn, this means that if my employer, wife, or ISP intercepts E2E encrypted traffic, they have no grounds to suspect me of wrongdoing. If E2E is not the default, then merely using E2E encryption is itself suspicious - even if all I'm doing is trying to set up an amazing 20th wedding anniversary holiday...<br /><br />2. Would it be acceptable to tell targeted suspects that they no longer have E2E encryption on their chats? IOW, have WhatsApp tell them "you're no longer protected" whenever E2E is disabled for that user. If not, what prevents a criminal hacker from triggering the "no E2E" for a user without warning them that's also used by Law Enforcement?Simon Farnsworthhttps://www.blogger.com/profile/15190608047563530091noreply@blogger.comtag:blogger.com,1999:blog-3993498847203183398.post-19533380229781099592017-10-03T16:33:29.314+01:002017-10-03T16:33:29.314+01:00At the moment though, the industry is constantly w...At the moment though, the industry is constantly working to try and plug holes and improve security. The very use of end to end encryption is an example of that. It means that criminals mostly have to hack the end devices, and they are getting better all the time (well, there will always be new bugs as well), but it is a battle and it is being fought and does not need fighting with one hand tied behind its back!RevKhttps://www.blogger.com/profile/12369263214193333422noreply@blogger.comtag:blogger.com,1999:blog-3993498847203183398.post-54065110240663454432017-10-03T16:31:07.740+01:002017-10-03T16:31:07.740+01:00Quite so.
However, there is another side to this....Quite so.<br /><br />However, there is another side to this. If you introduce backdoors, criminals will exploit them -- but if you don't, the state of software security is so bad that criminals will just exploit something else instead!<br /><br />This actually proves that you don't need holes in the encryption: the state of software security is so bad that *our own security services* can and do exploit it in just the same way as the criminals do (except they don't tend to spread self-replicating software that sends spam because they don't want to be obvious).<br /><br />So this is all of a piece with the question of whether, when the security services find a vulnerability, they should get it fixed or hoard it. There's a difficult tradeoff here. If they both get everything they find fixed *and* don't have backdoors in encryption, then we end up with a worst of all worlds where the bad guys can use holes they found but our security services can't get in because they got them all fixed, *and* we still have huge numbers of holes and crappy software.<br /><br />The question is whether having *even more* holes is worth the security services being able to tap into stuff (assuming *this* to be harmless, a very big if).<br /><br />Certainly right now they have so many ways in that there is no point adding backdoors to anything, even if they worked, which as you note they don't. Backdoors in encryption will only catch the stupid terrorists and criminals, and you frankly don't need any extra powers to catch those. It's the smart ones that don't get caught that are the problem.Nick Alcockhttps://www.blogger.com/profile/06590610308528769844noreply@blogger.comtag:blogger.com,1999:blog-3993498847203183398.post-50558915884615943392017-10-03T16:24:56.748+01:002017-10-03T16:24:56.748+01:00"This is no different to seeing that terroris..."This is no different to seeing that terrorists use white vans, so banning them!"<br /><br />There was actually a suggestion after one of the recent vehicle-based attacks that van rentals should be more restricted, because apparently it's impossible to run people down using your own vehicle.<br /><br />I have also heard that after the Las Vegas attack some of the news agencies were questioning whether security checks should be introduced at hotels, as if the gunman would just have given up and gone home if he couldn't find a hotel to shoot from.<br /><br />The obsession with superstitiously restricting some random aspect of the latest terrorist's methodology, in the hope that it will magically prevent future attacks, is reaching ridiculous levels. Perhaps after the next one they'll demand a ban on whatever brand of cereal the terrorist had for breakfast.InfiniteDissenthttps://www.blogger.com/profile/00463076301051295104noreply@blogger.com