Domain Registration

The encryption wars are back, but this time it’s different

  • June 02, 2019

One year of GDPR: The impact of digital privacy
One year on from the EU introducing its data protection laws, the impact is spreading around the world.
Read more: https://zd.net/2XcbAdG

Police and intelligence agencies have long worried about warned of the risk of communications ‘going dark’ with encryption making it impossible for police to eavesdrop on criminal or terrorist plots.

The argument was that police needed a way to break through the encryption – a backdoor — in order to read these messages and potentially save lives.

Critics warned that because most digital services use encryption for one reason or another, deliberately creating backdoors into it would cause more damage to society long-term (by letting in crooks and hackers) than the inability of the police to read a few messages.

This was the basis of the so-called crypto wars a couple of decades ago which ended with the general acceptance that widespread access to strong cryptography is generally a good idea.

Every so often since then governments have attempted to re-run the debate, with limited success. But as the use of encryption has grown from widespread to ubiquitous governments are having another go. Australia and the UK have introduced laws that could require tech companies to strip encryption from communications – how effective this legislation will be remains to be seen.

UK surveillance agency GCHQ has come up with one potential solution to the apparently intractable problem, of what to do about encryption. They’ve described it as a modern version of the crocodile-clips on the telephone wire of a few decades ago. Their answer is not to break the encryption that surrounds a conversation, but to insert the police or intelligence agencies into the conversation itself – a silent addition to your chat with your friend, a hidden eavesdropper on your group chat.

“We’re not talking about weakening encryption or defeating the end-to-end nature of the service. In a solution like this, we’re normally talking about suppressing a notification on a target’s device, and only on the device of the target and possibly those they communicate with. That’s a very different proposition to discuss and you don’t even have to touch the encryption,” said GCHQ in the paper which outlined the concept late last year.

Some outraged responses arrived quickly: NSA contractor-turned-whistleblower Edward Snowden described the idea at the time as “Absolute madness: the British government wants companies to poison their customers’ private conversations by secretly adding the government,” he said.

This week companies, including Microsoft, Apple, Google and WhatsApp, plus civil liberties organisations and security experts made a somewhat more delayed, longer but equally negative response. In an open letter to GCHQ they warned that the idea would break systems and damage trust.

“The GCHQ’s ghost proposal creates serious threats to digital security: if implemented, it will undermine the authentication process that enables users to verify that they are communicating with the right people, introduce potential unintentional vulnerabilities, and increase risks that communications systems could be abused or misused,” they wrote.

GCHQ’s ghost protocol or crocodile clips concept does have the benefit of being an elegant solution to the deadlock over encryption. It effectively means that we can use strong encryption to protect our messages from everyone – except the government. Many would see that as compromise they are willing to make to be a little safer, but not everyone will agree.

And fundamental real world problems remain to the idea of the ghost protocol. The most obvious of these is that many tech companies will simply refuse to do it.

For some of the biggest tech firms, ensuring the privacy of their customers data has become a defining characteristic of their business – and a distinct competitive advantage. For them to cheerfully agree to add a spy into every chat would seem deeply unlikely.

Also, these tech companies have customers living around the world, which complicates the issue further. Even in the unlikely event that tech companies might be willing to allow the NSA or GCHQ a ghostly ring-side seat on every conversation they want to snoop, many firms would still want to refuse that capacity to other regimes around the world.

But while tech companies might not want to offer Russia or China the same capabilities, but once that ability is built into their code it is much harder to resist that pressure. Once created these tools are inevitably misused. For tech companies it’s much easier to say no to everyone.

The big tech companies will resist then, and there will also be other messaging apps which will simply be able to ignore the pleas of GCHQ because they aren’t based in the UK. Beyond this; strong encryption is effectively a commodity now, which is easy enough to implement, so it’s very hard for any government to clamp down on all encrypted apps. And this ghost protocol is only of limited use; the idea won’t work for encrypted hard drives or encrypted email, which would require different tools.

In reality, of course, the debate has never really been about encryption itself; the bigger issue is how much privacy we should be allowed in the digital age.

Until recently there was, for most people in most countries, an effective right to privacy.

The state just couldn’t spy on every conversation or listen in to what was happening in every home in real time, and nor did they (in most cases) especially want to.

Now the technology exists to do exactly that (and in many cases we cheerfully carry that technology around in our pockets and install it in our homes). We are creating vast amounts of data every day and law enforcement inevitably and understandably wants access to that data when necessary to fight crime. Many people, just as understandably, want to keep that private.

The rise of encrypted services came in part as a response to this tension, to try and recreate that private world of the past. Encryption is one of the best ways that we can keep that information private, which is why the crypto debate matters so much.

Police and intelligence agencies will always want greater access to data, in order to reduce the risk of crime or terrorism. But those are not the only risks we face. It’s already clear that allowing governments too much information quickly leads to the creation of a surveillance state from which it is impossible to escape. Few in the West would want to travel very far down that road.

GCHQ’s suggestions, even though many would see them as reasonably modest, are unlikely to get far with the tech community unless they are backed up with legislation and may well struggle even then. But the battle over digital privacy is far from over. 

ZDNET’S MONDAY MORNING OPENER

The Monday Morning Opener is our opening salvo for the week in tech. Since we run a global site, this editorial publishes on Monday at 8:00am AEST in Sydney, Australia, which is 6:00pm Eastern Time on Sunday in the US. It is written by a member of ZDNet’s global editorial board, which is comprised of our lead editors across Asia, Australia, Europe, and North America.

PREVIOUSLY ON MONDAY MORNING OPENER:

Article source: https://www.zdnet.com/article/the-encryption-wars-are-back-but-this-time-its-different/#ftag=RSSbaffb68

Related News

Search

Get best offer

Booking.com
%d bloggers like this: