back to article Governments can't seem to stop asking for secret backdoors

With Apple pulling the plug on at-rest end-to-end encryption (E2EE) for UK users, and Signal threatening to pull out of Sweden if that government demands E2EE backdoors, it's looking bleak. There's no answer to the objection that you can't protect deliberate flaws in encryption from themselves being abused. The strength of …

  1. Zippy´s Sausage Factory
    FAIL

    The second you install a backdoor, you should really assume that the crims have unfiltered access to everything. Why the British government don't understand that this makes everyone less safe I will never understand.

    1. Like a badger Silver badge

      Because they're almost entirely a bunch of clueless humanities and politics graduates who understand nothing important (plus a sprinkling of clever but hopelessly idealist human rights lawyers).

      1. Dr Dan Holdsworth
        FAIL

        Yes, this can clearly be seen with other legislation over the years. Tony Blair's government was a very good case in point since Blair and his acolytes seemed all to share the delusion that once you legislated against a thing then that problem was instantly completely solved and didn't need revisiting.

        Way back in the 1950s tuberculosis was endemic in UK cattle. A simple immunological test sorted that one out: if a cow was shown to have been exposed to TB it got culled. TB spreads only quite slowly in cattle; culling quickly cleared the cow-to-cow spread. Yet in the south-west of the country, herds stubbornly refused to go clear of TB; there was a wildlife reservoir somewhere. That was identified as badgers; liberal use of cyanide gas sorted that problem.

        Fast forward to Blair's time and there's this persistent problem with badger baiting. This is an insanely brutal bloodsport and obsession of a very tiny minority of people; the laws since Victorian times have forbidden it and no new law was really required, only a slight emphasis that the police needed to get onto the problem a bit more effectively. Blair on the other hand thought legislation to be the be-all and end-all of problem solving, and legislated incredible legal protection for badgers.

        The few individuals still engaged in badger baiting simply carried on; it was illegal before and it was simply a bit more illegal. They didn't much care and carried on, with the same trickle of prosecutions as before. However with massive protection badger populations expanded and expanded until they were at the land carrying capacity and as a TB reservoir host as well, TB in badgers expanded hugely until the present time when huge number of cattle are culled to contain the cow disease, and similar numbers of badgers are shot by night to do the same thing.

        All of this is hugely expensive, entirely self-inflicted and the legislation didn't even solve the initial problem.

        The UK government has a problem with repeatedly doing this sort of thing and it really does need sorting out.

        1. tiggity Silver badge

          Many argue the huge number of cattle movements (& other factors) mean farmers far more to blame than badgers

          e.g. https://www.theguardian.com/uk-news/2018/nov/13/farming-industry-to-blame-for-tb-crisis-not-just-badgers-report#:~:text=The%20new%20report%20is%20highly,they%20are%20bought%20and%20sold.

          Various wildlife trusts have tried badger vaccination programs*, govt not keen to aid them & still encourages culling in vaccination areas

          * You are not allowed to vaccinate cattle against TB. If badger population was effectively vaccinated it would be a game changer as farmers & govt would no longer be able to blame badgers & would have to address farming behaviour properly**

          ** Some farmers behave sensibly, I live in an area with lots of badgers & also several farms with pedigree cattle herds that have had no TB issues (notably the cattle are free to graze all year, not intensively reared which is often implicated in TB spread & with them being pedigree herds only occasionally are new cattle added (& then from farmers that also operate good welfare & biosecurity standards) )

          1. AVR Silver badge

            Culling badgers encourages new badgers from outside to move in to the newly free burrows. This spreads TB nicely; it's counterproductive unless you're going to wipe out all the badgers in a large enough area that they won't move back in any time soon. Which is something that can't be done on the down-low. This has been known for many years, but isn't accepted by those committed to culling for whatever reason.

            1. Dr Dan Holdsworth
              Boffin

              Change the law and introduce a closed season, minimal firearm muzzle energy (same as for deer would do) and permit badger control by landowners.

          2. Dr Dan Holdsworth
            Boffin

            Many argue that cow-to-cow transmission is the main vector of transmission; they are basically wrong.

            TB comes in many minor forms called spoligotypes; think of them as colours if you will. Spoligotypes mutate only very, very slowly generating new ones over hundreds of years; at a day to day level the spoligotype identifies where that cow caught TB.

            Forty years ago the different spoligotypes in different geographical areas of the country were mapped; over time if cow to cow transmission predominated you'd expect this geographical distribution to change radically and for some spoligotypes to go extinct altogether; we are after all actively trying to find and cull infected cows.

            What you actually see is the geographical spoligotype map has stayed static for the last forty years or so. This ties in nicely with what we know of the disease in cows and humans; both species have co-evolved with TB for a very long time and both are highly adept at fighting it. Actually finding TB bacteria in an infected cow is very difficult, and even heavily infected cows are poor TB transmitters.

            Badgers, on the other hand, have a stonking great deletion in the genomic region that deals with immune system responses to TB bacteria, and are pretty crap at resisting the disease. They're tough animals and survive with the disease for quite long periods, but they are the primary reservoir and vector of TB.

        2. Bebu sa Ware
          Coat

          "liberal use of cyanide gas sorted that problem."

          With quite a few "problems" cyanide usually does I suspect.

          But I was tickled by the idea that the UK Liberal party was resorting HCN gas sort out their problems not that there any evidence they were and going by the Thorpe trial they would have been in more danger of exterminating themselves.

          I guess in the case of TB it will have to affect the human population before some sanity in approach and legislation is restored.

          I know first hand how unpleasant and drawn out the antibiotic treatment for non-TB mycobacterial (MAC) lung infections are and wouldn't wish TB on anyone especially with it's greater likelihood of antibiotic resistance.

          1. EricB123 Silver badge

            Re: "liberal use of cyanide gas sorted that problem."

            After 6 months of eating 5 giant antibiotic capsules every morning on an empty stomach to rid myself of TB, maybe the cyanide gas would have been a less painful solution.

        3. Roj Blake Silver badge

          The only good thing to come out of the badger cull was the most "Thick of It" thing ever said by a real politician: https://www.bbc.co.uk/news/uk-england-24459424

        4. Irongut Silver badge

          Blair's government created more new laws, often when an existing, workable law already existed, than any other UK government.

          It is purely a coincidence that his wife is a lawyer and her firm made a fortune from these laws.

          1. Felonmarmer Silver badge

            Same as it ever was.

            Well they all do that because it's an easy solution when the press print the "something must be done" headlines. What could be more important for a legislative body than writing more legislation? If the press aren't satisfied then they lose their righteous rhetoric weapon that the use daily to fight lawmakers over the things that they want relaxed (like making their owners pay tax for example).

            A coincidence that his wife is a lawyer? All politicians are one step away from lawyers and lawyers are going to lawyer, regardless of the contents of the quagmire they wade in for a living.

            1. collinsl Silver badge

              Re: Same as it ever was.

              Indeed, the job of a legislature is to write laws. It's all they can do. So if someone says "something must be done!" then all they can do is write a law.

              The Government could have opted to address it in a different way, via budgeting more for police or the courts or the prison system etc, however they chose not to in most cases because there's no money in the system to do that, and the public can be bought off with a nice debate in parliament and a shiny new law for the media to talk about.

        5. Greybearded old scrote
          FAIL

          Recent evidence has it that the badgers aren't to blame, and improved hygiene on the farms makes an enormous difference. Whodathukit?

        6. Anonymous Coward
          Anonymous Coward

          It's because it appeases the small yet extremely vocal placard wavers and makes it look like work has been done. When in actual fact, as you say, nothing changes.

          End to End Encryption is no different. Even if they outlaw it, there is nothing stopping you self hosting it on an overseas VPS that you connect to with a VPN. Nothing. All banning it serves to do is weaken the mass population of the UK that won't be able to access it anymore and put us in a weaker security stance as a country.

        7. rafff

          "Blair and his acolytes seemed all to share the delusion that once you legislated against a thing then that problem was instantly completely solved "

          Not just Blair. All governments seem to think that every problem can be addressed by legislation, and they fail to look at the underlying sources of the problem. In practice, what they largely do is to0 create new crimes and new criminals - or a workaround that evades the intent, but not the letter of the law. The use of encryption on one's own machine is an example of such evasion..

          A classic example was that supermarkets used to change the price labels on their goods. After a campaign in the press this was outlawed. Shops responded by not putting prices on the goods, only on the shelf, and these could be and are changed regularly. The legislation merely hastened the adoption of barcode readers.

      2. JimboSmith

        I had a chat with my mum abot this a few years ago when a politician brought up E2EE and the “dangers” of it. She’d just started using online banking despite her advancing years and found it very useful. I said to her without E2EE her new found way of banking wouldn’t be possible. A slightly dumbed down explanation followed where she then understood a lot of things rely on E2EE. I said the second you put in a back door then you cn assume multiple criminals will be looking for this easy way in. Imagine shopping online and paying only to have your purchase redirected or your card details stolen and used elsewhere. She said why don’t politicians understand this? I said she’d answered her own question there, they’re politicians and whilst not all of them are clueless idiots, there are more than a few around who were.

        1. juice

          > She said why don’t politicians understand this?

          If I was feeling cynical, I'd suggest that they do. But:

          1) It's something that makes for good headlines (E.g. "Won't someone think of the children?")

          2) It's something that's effectively zero-cost to the government; once the laws are changed, it's the private sector which has to cover the cost of implementation

          3) There'll no doubt be a special exemption for politicians

          1. O'Reg Inalsin

            Ironically, politicians will be prime intergenerational targets.

          2. Anonymous Coward
            Anonymous Coward

            Someone online posted (can’t find it now) about the Apple encryption that the UK government objected to. According to them the US intelligence agencies were not ignorant of the then upcoming request. Rather they would like to have access too and another member of the five eyes member can request it. Then they at some later point one of the US three letter agencies requests the same access to an encrypted app/program/messaging system not based in the USA that the five eyes would like into.

            Don’t know if that’s true but it sounds convincing.

            1. SundogUK Silver badge

              Pretty certain the NSA/CIA/FBI would love this and they can blame it on the Brits. What's not to like?

            2. Felonmarmer Silver badge

              Lots of countries have laws that prevent spying on their own citizens without certain levels of oversight. But theirs no laws to prevent spying on other countries citizens, and what if your were in a group of nations who share intelligence, like say five countries? You can generally spy by proxy and get the important stuff sent to you filtered from the chaff that you are prevented from doing yourself.

              It's the same as attaching FBI agents to CIA operations so they can operate within the US borders, there's always a way to get around those pesky laws if you try hard enough.

        2. Greybearded old scrote
          Devil

          They are being briefed by high ranking police and intelligence officers who understand, but consider their concerns more important.

        3. druck Silver badge

          Banking and commerce sites are not E2EE, they use encryption between the user and the server, and the server has access to the decrypted data. E2EE is encryption either encrypted direct user to user communication, or if it does go from user to user via a server, the server cannot access the encrypted data, as only the user have the key.

          1. brainwrong

            Err, in communicating between you and the bank, you are one end, the bank is the other, and the untrustworthy internet in-between is unable to view the message contents. Sounds like end-to-end encryption to me.

            1. druck Silver badge

              Only if you really don't understand what it means. That's just a normal https session.

      3. gkwest

        There are plenty of humanities grads in tech

        I’m one of them. There are plenty of developers who are terrible at security too. If you really want to point fingers, though, point them at the law enforcement and security agencies who don’t want to work hard.

        1. collinsl Silver badge

          Re: There are plenty of humanities grads in tech

          point them at the law enforcement and security agencies who don’t want to work hard. haven't got any budget to keep up with the ever-expanding criminal networks and sophistication of their heinous crimes

          FTFY

    2. Roj Blake Silver badge

      "Something must be done, this is something, therefore we must do it."

      - Sir Humphrey Appleby

    3. wolfetone Silver badge

      "Why the British government don't understand that this makes everyone less safe I will never understand."

      They do understand it. They're not stupid. They know the moment they ask for that they won't get it, but at the same time they could make it difficult for the company to provide such a level of security.

      So what happened here wasn't the UK.Gov being stupid asking for the moon on a stick. It was UK.Gov forcing a company to remove that level of security for everyone. This way the company blames the government for asking for something impossible, instead of the Government going to the country "you aren't allowed to go past a certain level of privacy". That was mooted before and it did not go well for them.

      It's easier for them to bring everyone down by making it impossible for a company to do business in the UK, rather than suffer the bullshido of forcing companies in to a public tit for tat about what is required and what is possible.

      1. IamAProton

        I agree with Apple on this one. Providing backdoor is not really news material. Removing E2EE for everybody is probably the only way to get more people to notice and to get pissed.

        1. DancesWithPoultry
          Headmaster

          > get pissed.

          I wouldn't say its cause to open a bottle and celebrate old boy. Rather the opposite in fact.

          1. IamAProton

            Sometimes a few drinks can help putting aside anger, at least for a while

    4. vulture65537

      Every other government from North Korea, Iran, and France will be able to obtain everything MPs put in the platform.

    5. TReko Silver badge
      FAIL

      Case in point

      The US government requested and got backdoors in the US phone system. Last year the Chinese hacked this to evesdrop on anyone's voice and SMS.

      1. wolfetone Silver badge

        Re: Case in point

        "But we will learn from the lessons there and make sure that this is secure" - A.N.Other Politico

      2. Anonymous Coward
        Anonymous Coward

        Re: Case in point

        No doubt the solution is to create an open source peer-to-peer messaging app for Android & iOS. Add voice to it as well. Sure, the telcos will know two numbers are communicating, but at least the traffic would still be secure.

    6. Groo The Wanderer - A Canuck

      They don't "get it" because we haven't made a habit of beheading the ignoranuses who make such proposals after explaining for the umpteenth time that it is mathematically and socially impossible to have a "secure" back door.

      If we were to do so, it would warn the remaining population of ignoranuses in the world, and after a mere dozen beheadings I'm sure they'd finally shut up.

      1. ecofeco Silver badge

        Will there be cake? Please let there be cake!

      2. collinsl Silver badge

        ignoranuses

        What about the ones that can't spell ignoramuses? Can we pelt them with rotten tomatoes in the stocks?

        1. bernmeister
          Facepalm

          ignoranuses

          The spelling may well have been deliberate. Think about it.

    7. CountCadaver Silver badge

      They do

      They just don't care and think that Britannia still rules the waves (or at least large sections of the old boys and girls network in the senior echelons of the civil service do, judging by how hot n bothered they got at the idea of 'empire 2.0' post Brexit when they were CONVINCED that the 'colonies' would ALL come sprinting back to Britannia's embrace and then shocked when they all went 'nah but could you have a word with the EU' )

  2. Fred Flintstone Gold badge

    There's a simple, practical demonstration of how safe backdoor keys are

    Go to Amazon, look up 'TSA keys'.

    Done.

    1. TimMaher Silver badge
      Coat

      Re: Amazon

      Not AWS then?

      1. Anonymous Coward
        Anonymous Coward

        Re: Amazon

        The TSA lock thing is somewhat easier to demonstrate.

    2. MachDiamond Silver badge

      Re: There's a simple, practical demonstration of how safe backdoor keys are

      The TSA keys were compromised from the very beginning as they were just a sampling of keys already in use for very low security applications. I think that Deviant Ollam covered this or maybe the Lock Picking lawyer.

      The TSA would just cut the "TSA" locks off of my luggage and toss them in my bags with a notice telling me how much safer I was for their mangling of my stuff.

      1. collinsl Silver badge

        Re: There's a simple, practical demonstration of how safe backdoor keys are

        Same with firefighter's lift keys or building skeleton keys. Deviant Ollam talking about how easy it is to break into a building is quite a fun lecture, and so is this one on physical pentesting

        1. MachDiamond Silver badge

          Re: There's a simple, practical demonstration of how safe backdoor keys are

          "Same with firefighter's lift keys or building skeleton keys. "

          Yes, the "Knox Box" key safes that cities require retail shops to install so the fire brigade can get the keys to open a shop if it isn't burned through already. I have the key for my city. I know what they are and what they look like so when I came across one, I kept it. Deviant's lectures are awesome. I have a set of keys that can open so many things now and it comes in handy from time to time as I work in real estate as one of my jobs. It's often that when somebody moves, they leave side gates, sheds and alarm boxes locked up and the agent needs to have locks they can open. It's worth a few bucks to them for me to remove the old locks or leave open an annoying alarm control box so it can be bypassed until reprogrammed for a new owner.

          All of this is likely why some locales want to ban anybody from learning about locks unless they are licensed and have every wrinkle on their body rolled in ink and applied to a card. It's something of a disservice as too many people buy crap locks not knowing how easy they are to bypass. The criminal know. Learning some basic locksmithing taught me how to not have the easiest to bypass locks on my stuff. I've also learned that it can be taken too far since if somebody really wants into my house and can't bump the lock on the front door, they can go through a window or even cut a hole in the wall since doors and windows are often alarmed.

  3. Brewster's Angle Grinder Silver badge

    These arguments always begin "Assume a perfect criminal..." and normally continue "...with technological know-how as good as the best of us here and ample time to do things perfectly..." (Pay attention to the ransomware that has been cracked because the authors made a mistake. And they are scummy "pros" making money from crypto.)

    But I have no doubt there are a bunch of clueless criminals who will keep on using Apple - seduced by Apple's promises; I imagine few read El Reg. And I have no doubt this will impose a cost on criminals who aren't quite so clueless. After all, we could protect ourselves as described and we're complaining about the cost!

    The question is whether the cost to the rest of us exceeds the benefit to society by making some criminals easier to catch.

    1. GeekyOldFart

      "The question is whether the cost to the rest of us exceeds the benefit to society by making some criminals easier to catch."

      If that were the only cost to consider, it would be a no-brainer. Those of us that know what we're doing can always implement E2EE when communicating with somebody else who knows what they are doing. Losing the consumer-level services doesn't impact that comms channel at all, beyond a little mild swearing at having to set it up ourselves.

      Except if "the cost to the rest of us" includes - as it does - the cost to everybody else, who have to rely on the consumer level services because they don't have the tech chops to set it up themselves, then that cost balloons massively as soon as one backdoor is compromised. It doesn't even require all the crims to be that tech-savvy either. The tech-savvy criminal will code up a one-click tool to open the compromised backdoor and then make their cash at once-removed by selling that tool to the folks that actually use it to extract private data for their schemes.

      "If it can be compromised, sooner or later it will be" is a statement that is as fundamentally true as rule 34 of internet pr0n.

      And so when we compare that risk to society at large vs the risk that "some criminals" will perhaps escape because they weren't made "easier to catch" it's pretty obvious which way the scales will tip.

    2. jospanner Silver badge

      I don’t actually want to live in a world of total law enforcement

      1. Neil Barnes Silver badge
        Stop

        You have something to fear, citizen?

        And like you, I don't want to either. It doesn't matter what I say - though to whom I say it might be relevant in a criminal investigation - but to both companies and governments: mind your own fuckin' business/

        1. Anonymous Coward
          Anonymous Coward

          Something to fear

          Yes, I damn well do. The UK government is only a few decades away from demanding war heroes got chemically castrated for consensual sex. It's got a history of giving away secrets to the Americans and pretending to be surprised. It's got a history of leaking to other countries too- our last Postmaster General was passing secrets to the Soviets. They've engaged with the US on networks of black sites and illegal mass-surveillance. And when that fails- say, with the death of a Brazilian electrician instead of the intended target despite being under the watchful eyes of a team of police and a dense camera network- they just shrug it off.

          Don't even get me started on the Met.

          All that is to say, the people that this is intended to give greater access to have shown that they treat this power with no respect, and are willing to torture people they don't like. And when all this fails their solution is to raise taxes to fund more power.

          And if you think they're not interested in you, what about next election? Or the one after that? These powers aren't just for the current crop but the ones afterwards.

          This is a situation where we all have a lot to fear.

          1. Neil Barnes Silver badge

            Re: Something to fear

            Exactly. Though what I might say/write/post now may be legal and innocuous, it may not always remain so. That's the risk; that's why the UK requirement to hand over passwords or face jail is an issue, and it's why making end-to-end encryption illegal is also an issue.

          2. Anonymous Coward
            Anonymous Coward

            Re: Something to fear

            Allow me to add something to that list that has been there for about a decade now:

            mcnx@rffi14 ~ % dig +short mx digital.hmrc.gov.uk

            20 alt2.aspmx.l.google.com.

            30 alt3.aspmx.l.google.com.

            30 alt4.aspmx.l.google.com.

            10 aspmx.l.google.com.

            20 alt1.aspmx.l.google.com.

            They've allegedly been "helping".. Themselves first, I suspect.

            1. SCP

              Re: Something to fear

              Err, sorry I'm just not understanding banter at all well today. Give us it again, slower, Squadron Leader.

              (I'm guessing it is about some Google things linked into HMRC websites that lead to some tracking/privacy concerns.)

              1. Anonymous Coward
                Anonymous Coward

                Re: Something to fear

                'dig' is a command line program you'll find available on any Unix and Unix-alike OS like MacOS that allows you to interrogate DNS records which contain all sorts of fun information for those who know what to do with it.

                An MX record stands for Mail eXchange - it indicates where email should go for a particular domain (the bit after the @ sign in an email address).

                What this command shows is dat there is a domain right inside HMRC where email (to (someone)@digital.hrms.gov.uk) is shipped straight to Google instead to some safe place not replete with US spying facilities and laws to compel access.

                1. The Bam

                  Re: Something to fear

                  Seems to me that all it shows is that HMRC uses Google mail services, presumably Google Workplace. So what?

                  1. Anonymous Coward
                    Anonymous Coward

                    Re: Something to fear

                    It may help to think about what kind of data swirls around in that department to understand why that is worrying.

  4. Julz
    Black Helicopters

    This

    Statement is at the heart of a great deal of peoples faith:

    "You can't hide a back door in open source because it would be immediately visible and removable"

    But it isn't true. You also need control, and trust, the rest of the compile time and runtime environment.

    Only a very naive infiltrator would put a piece of malicious code in plain sight.

    1. R Soul Silver badge

      You also need control, and trust, the rest of the compile time and runtime environment.

      Even all of that isn't enough. You can't trust anything you didn't build from scratch yourself. Starting with the sand needed for the silicon.

      Read Ken Thomson's "Reflections on trusting trust": https://dl.acm.org/doi/pdf/10.1145/358198.358210

      1. Neil Barnes Silver badge

        Re: You also need control, and trust, the rest of the compile time and runtime environment.

        There's something to be said for building your own CPU from discrete logic...

        1. NXM Silver badge

          Re: You also need control, and trust, the rest of the compile time and runtime environment.

          Discrete logic? Pshaw. Real engineers use cogs powered by a steam engine.

          1. Neil Barnes Silver badge

            Re: You also need control, and trust, the rest of the compile time and runtime environment.

            You jest, sir! _Real_ engineers merely adjust the starting conditions of the universe so that when they need a computer, there it is.

            1. John Miles

              Re: You also need control, and trust, the rest of the compile time and runtime environment.

              XKCD - Real Programmers - the alt-text being "Real programmers set the universal constants at the start such that the universe evolves to contain the disk with the data they want."

              1. Neil Barnes Silver badge

                Re: You also need control, and trust, the rest of the compile time and runtime environment.

                Thanks! I had forgotten where I first met the concept.

                Hmm... I wonder how much silicon you'd have to add to _every_ 8-bit latch to allow it to recognise it was being built into a discrete computer, and automatically make it less discreet?

      2. Julz

        Re: You also need control, and trust, the rest of the compile time and runtime environment.

        Arguably part of the runtime environment but yes, the logic that is used to process your code is itself a security concern. Ken Thomson's essay is a good start down the trapdoor of paranoia into the land of the queen of hearts.

        I was just trying to point out that having visible source code isn't any real form of security guarantee and that saying so is at best disingenuous but most likely downright dangerous as people might actually believe that it is.

      3. MachDiamond Silver badge

        Re: You also need control, and trust, the rest of the compile time and runtime environment.

        "You can't trust anything you didn't build from scratch yourself. "

        That can often be the worst approach since it's only as good as you can create it with no outside review. It's far better to use something that's been exposed to the elements and stood up to many others trying to tear it down.

    2. doublelayer Silver badge

      Re: This

      This is valid, the typical trusting trust problem. However, I think the more concerning one is the Underhanded C problem. There is a lot of code that nobody is reading, and there's code that people aren't successfully reading. Not all vulnerabilities are obvious, whether that hidden-ness is deliberate or accidental. If you have the ability to read code, you almost certainly know this from experience, because we've all written bugs that should be simple to fix but you can't see the problem for the life of you.

  5. The Central Scrutinizer Silver badge

    This is beyond tiresome and childish.

    Black is white, 2 plus 2 equals 5, or whatever I say it does bla bla. It's so 1984 it's now just a sick joke.

    The idiot politicians who keep insisting that you can have "lawful access" are either seriously delusional or outright fucking lying.

    There are no other possibilities.

    1. Anonymous Coward
      Anonymous Coward

      The idiot politicians who keep insisting that you can have "lawful access" are either seriously delusional or outright fucking lying.

      Sadly, they may well be both of these things: a mandatory requirement for high office these days.

      1. The Central Scrutinizer Silver badge

        haha, sadly, yes.

    2. TReko Silver badge

      2 + 2 = 5?

      “The laws of mathematics are very commendable but the only law that applies in Australia is the law of Australia.”

      Malcolm Turnbull (14 July 2017) Australian Prime Minister.

      1. Benegesserict Cumbersomberbatch Silver badge

        Re: 2 + 2 = 5?

        Ironic, considering how he lost the numbers

      2. MachDiamond Silver badge

        Re: 2 + 2 = 5?

        Not even for really large values of 2.

      3. Winkypop Silver badge
        Facepalm

        Re: 2 + 2 = 5?

        And he is often lauded as a “tech guru”

  6. Mr Sceptical
    Big Brother

    Gibson already predicted the outcome: Columbian Data Havens

    I can't find the passage now but in one of the Neuromancer era novels was mention that the logical end game of the competition between criminals and gonverments was the Columbian cartles got VERY good at cyber security - to the point they just opened up for business storing other's data.

    I mean, if your criminal enterprise relies on good InfoSec and you have Beeelion$ in profit to throw at it, why wouldn't you spend a bit on ensuring you keep it?

    And once you've done that, spin it off as a profit making service: Cartel Web Services anyone?

    1. Anonymous Coward
      Anonymous Coward

      Re: Gibson already predicted the outcome: Columbian Data Havens

      [North-of-the-]Amazon Web Services

      Or maybe one for an online encyclopedia that's free from Government censorship- Encarta-gena!

    2. GeekyOldFart

      Re: Gibson already predicted the outcome: Columbian Data Havens

      Well, if the mafia can deliver pizza...

      1. BBRush
        Pint

        Re: Gibson already predicted the outcome: Columbian Data Havens

        Upvote (and a beer) for the Snowcrash reference

  7. Blazde Silver badge

    "the underlying mathematical proof"

    While cryptologists do sometimes talk in terms of 'proofs' these are all(*) conditional on underlying mathematical theories which lack proofs. Can we please not forget this, particularly as the US makes the move to hold a strategic crypto-currency reserve.

    Impagliazzo's "A Personal View of Average-Case Complexity" (Five computational worlds) essential reading

    (*) For completeness: excepting the mostly impractical one-time pad

    1. Anonymous Coward
      Anonymous Coward

      Re: "the underlying mathematical proof"

      > these are all(*) conditional on underlying mathematical theories which lack proofs.

      They are also theories which experts in the field have factual reasons to believe to be true.

      They are also theories that have undergone intense study. They are also theories for which no one, despite intense study, has shown a counter-example.

      They may not have absolute proofs, but it is suspected that they have proofs* which we simply do not yet know.

      * proofs, here, generally means "cannot be reversed in any polynomial-time fashion" and for reversing hashes or encryption typically means, "Cannot be used to recover the plain-text, or impersonate a text, with computation time less than the expected life of the universe" (and, when given a set of GPUs, life-of-the-universe divided by N).

      Lets not be overly pedantic.

      1. Blazde Silver badge

        Re: "the underlying mathematical proof"

        If you study the history of cryptography you'll see every crypto scheme of it's day was considered unbreakable until it was broken. Including lots of the more modern mid-to-late 20th century primitives. There are no proofs, and no factual reasons, just a lack of breakthrough which happens all the time in maths and can mean anything. This absolutely isn't pedantic in a world where so much is being built on these schemes and academics, journalists, and crypto proponents keep misleading people by using words like 'proof', 'provable', etc.

        1. MachDiamond Silver badge

          Re: "the underlying mathematical proof"

          "If you study the history of cryptography you'll see every crypto scheme of it's day was considered unbreakable until it was broken. "

          As time has progressed, the really good encryption has taken longer and longer to break. Once you have something that going to take lifetimes using a really big and expensive to operate computer, you've essentially got to "unbreakable". The value of data has a tendency to decline with time. If you only need to keep something secret for a week, encryption that might take 1,000 years to break might be overkill. If the value is small, throwing massively more valuable resources at is doesn't have a return. Even if the value of the contained data is high, it might be one message in 100 with the other 99 being a load of spanners to gum up the works.

          1. Blazde Silver badge

            Re: "the underlying mathematical proof"

            As time has progressed, the really good encryption has taken longer and longer to break

            The opposite, no? (Or can you explain better what you mean?). The Vigenere cipher lasted 3 centuries before being broken. RSA is barely 50 years old, it's been broken partially by Shor's algorithm for 30 years already and is probably on a trajectory toward full breakage. Meanwhile the "not really good" encryption has been broken in greater quantity in the last 50 years than at any other point in history.

            I'm not talking about individual schemes though, I'm talking about the timeless human tendency for hubris: that because the currently-used one hasn't been broken it's therefore unbreakable. This has been wrong over and over throughout history, and there's nothing different about today. I'm not advising against using encryption, use the best we have, but use it while aware of the risks and don't spread misinformation about it.

            1. MachDiamond Silver badge

              Re: "the underlying mathematical proof"

              "The opposite, no? "

              For a given amount of resources thrown at it. Those resources have been getting more powerful as time goes by, but power comes at a cost. Both in terms of electricity and the hardware.

              It's like saying a nation-state's army is unbeatable. We have the means to defeat any army, but the cost goes up exponentially in all sorts of manners.

              My other main point is that many secrets are only needed to be kept for a short period of time. Once the operation is over, decrypting the "go" message is far less valuable unless it points at unknown players. If a drug cartel sends a route for its mules to smuggle a load of drugs at a particular date and time, once that's passed, the info isn't very useful anymore. I won't say it's entirely worthless, but the value of it has dropped significantly.

            2. Dizzy Dwarf

              Re: "the underlying mathematical proof"

              The Caesar cipher basically worked because most of Caesar's enemies couldn't read to begin with.

          2. JoeCool Silver badge

            Re: "the underlying mathematical proof"

            In a similair vein, back in the 90's (if i remember the details correctly) there was an engineer at Nortel that created a custom hardware device that could crack an n-bit secret in time x at a cost of $1M, and it could be deployed in parallel.

            His point was that this hardware made key cracking practically an economic function. You could in theory choose the level of encryption needed to make your data "too expensive" to be decrypted.

  8. heyrick Silver badge

    Gee, now if only there was a lesson... something they could have learned at school... something involving numbers... that might help to explain why it simply isn't possible to put "backdoors" into encryption.

    1. Anonymous Coward
      Anonymous Coward

      Aaarrr, those “numbers classes”.

      I always thought that was the “day dream club”.

  9. Bebu sa Ware
    Coat

    "Decapitation may not be the way to go"

    I don't know? Seemed to work well enough for the French. The monarchy, church and aristocracy never really got back into the saddle after that.

    I guess you just have to choose the right heads.

    The poisonous Hydra of the contemporary body politic would overwhelm even the most enthusiastic headsman but I am certain he would be delighted give it his best shot (chop?)

  10. richardnpaul

    Can someone explain it to the politicians like this. Let's install microphones into all temporary occupancy rooms in the UK. Let's restrict the keys to decrypt those recordings to just the people who occupy those rooms. That's E2E encryption. Now, let's add the ability for the room owner to also hold a master key, that's what you have if you don't have E2E encryption. So if the hotel isn't any good at securing their master key or gets hacked or has someone working for them that's willing to sell the data that's the downside.

    So, how many ministers or MPs or members of MI5 are going to be willing to stay in any room with a microphone in it with such a system (a lá 1984)?

  11. Anonymous Coward
    Anonymous Coward

    "except for the keys" -- NOT!!

    Quote: "...The entire point of modern encryption is that, except for the keys, there are no secrets and nowhere to hide..."

    OK....in schemes like PGP there are persistent keys.

    But in schemes which use Diffie/Hellman the keys:

    - change with every transaction

    - exist only for tiny fractions of a second and are then destroyed

    So notions like "Please disclose your encryption keys" become not only illogical.....but also impossible!!

    ....yet another reason for those who do not trust either service providers or governments.......to go ahead and implement their own encryption.

  12. Barrie Shepherd

    I was under the impression that it was Australia that came up with the 'cunning plan' to make it illegal to disclose the back door order in their equivalent legislation.

    Similarly Australia has a similar law in place on disclosing the list of banned/block websites that ISPs have to restrict access to - I'm not aware that the UK has copied that particular bit of censorship - yet!

    1. MachDiamond Silver badge

      "Similarly Australia has a similar law in place on disclosing the list of banned/block websites that ISPs have to restrict access to - I'm not aware that the UK has copied that particular bit of censorship - yet!"

      The US was talking about a "kill switch" to be installed in cars so police could remotely disable a fleeing vehicle. I expect a black box with a directional antenna would be for sale on Amazon/Temu/Aliexpress/eBay in a week if that were put in place. It would be listed as a "solvent trap" or something. There are things listed on Amazon that are illegal in the US that exist for years. If you want an exhaust bypass for your Dodge muscle car, no problem. You can get a kit that bolts right in with basic tools. In the US, it's not legal for cars to show blue lights as that's reserved for police. Red lights are only allowed at the rear of a car yet you can buy emergency-like lighting for your car on many of the online market places. There are laws and then there is the implementation/enforcement of those laws.

  13. CorwinX Bronze badge

    Most of my comms I don't give monkey's

    ... who's listening/reading.

    When I'm bothered about anyone listening in I use a burner, unregistered, text files, with PGP encryption.

    And use a mix of Scouse & Cockney slang - that always bewilders anyone annoying me in person.

    Frankly, if any state agency can read/translare anything that I send that actually matters to me, I'll buy the techs a crate of beer.

    1. Anonymous Coward
      Anonymous Coward

      Re: Most of my comms I don't give monkey's

      A good friend of mine is from Lapland.

      When he is chatting to his friends in Helsinki in Finnish it sounds like it's already encrypted :).

      1. Primus Secundus Tertius

        Re: Most of my comms I don't give monkey's

        Everyone knows the Romans actually spoke English. The Latin language was simply a code to stop the English-speaking barbarians from knowing what the Roman army was up to. The Caesar cypher, they called it.

        1. MachDiamond Silver badge

          Re: Most of my comms I don't give monkey's

          "Everyone knows the Romans actually spoke English. The Latin language was simply a code to stop the English-speaking barbarians from knowing what the Roman army was up to. "

          It's like the US using Navajo to send messages in their own language due to how obscure it was. Even if you could break encryption wrapped around that, they spoke the messages, you be left with a tough puzzle. It's like in Spook Country where the family sends texts in a Roman alphabet that approximates Cyrillic. Mire that in some good encryption and cipher and you wind up having to put humans in the loop that can recognize what's going on.

  14. Anonymous Coward
    Anonymous Coward

    The innocent people are the real target

    "[Innocent people] are the most at risk of abuse from snoops,"

    I am convinced the targets of these backdoor laws are not the terrorists or criminals. The real enemies of the political order have always been the common people. They are the ones that have to be kept under control.

    The organised environmental organizations, climate action, unions, are the real enemies. From the suffragettes of the 19th century, to the student and civil rights protests, to the climate activists of the 21st, it is the organised common people that are feared most and must be brought under control.

    Because, if you look back, it is the abolitionists, suffragettes, civil rights, student protests, and flower power that have changed the political and social order more than terrorists and criminals.

    That's why they need these backdoors, to prevent the common people to organize unobserved.

    1. Anonymous Coward
      Anonymous Coward

      Re: The innocent people are the real target

      I rarely upvote ACs on principle, even when I agree with them, but I’ve made an exception for you because I think you are spot-on. It isn’t either/or though, in the UK the Government and the Police are interested in both criminals and activists.

      Personally I rarely post AC because I stand by my opinions and want other people to hear them. OTOH I am always willing to change my opinions (and have done) if I find that I have been misinformed or have misunderstood through lack of information.

      Unfortunately mostly I find that it is other people who are ill-informed yet nevertheless hold strong opinions.

      1. Roopee Silver badge
        Thumb Up

        Re: The innocent people are the real target

        True, but I never post AC, my word is my bond and I don’t lie >=99.9% of the time. Sometimes you have to trust at least some people, some of the time, even quite frequently literally with your life.

        1. Anonymous Coward
          Anonymous Coward

          Re: The innocent people are the real target

          I nearly always post AC.

          On the other hand I am for the principle that you have the right to be anonymous, but you should remain accountable. El Reg has it right in that respect.

      2. Anonymous Coward
        Anonymous Coward

        Re: The innocent people are the real target

        "I find that it is other people who are ill-informed yet nevertheless hold strong opinions."

        As Charles Darwin already wrote in "The descent of man":

        Ignorence more frequently begets confidence than does knowledge.

  15. Gibots. Idgas Gibots.
    Windows

    HM Gov doth protest too much...

    Sometimes I think that the government makes a big show of requiring access to encrypted communications just to hide that they have already cracked breaking E2EE.

    If "they" have already built a quantum computer that can break and read encrypted data then the last thing would be to even hint that that had done it.

    So double down on seeming to not have that capability by noisily and publicly asking for back doors into encryption systems.

    Are you paranoid enough??? :-)

    1. Anonymous Coward
      Anonymous Coward

      Re: HM Gov doth protest too much...

      "just to hide that they have already cracked breaking E2EE."

      "They" did not break the algorithms. Breaking the part between the end points requires breaking math that is too well studied. That was possible in the old days when the NSA and GCHQ together employed more than half of all cryptographers. The time when they were able to backdoor the GSM encryption.

      But "they" can break the end points, the soft and hardware of the mobile phones. If you install a key logger, you don't have to break the password. If a pseudo random number generator produces easy to guess numbers, you don't need a backdoor.

      That is how the police cracks crypt phones of criminals time and again, by invading the software distribution and (physical) server infrastructure.

      The crux is, breaking end points is expensive. You need to invade and break every potential end point for mass surveillance. That works for small setups, but not for mass market brands. Zero days for, eg, iPhones are sold for millions of €/$. Messing with hardware requires physically touching every target gadget, either in the factory or on the ground. And it is difficult to hide messing with millions of mobile phones from many brands.

      Therefore, "they" need a way to be able to survey any and every person from behind their desk if they want to snoop on everyone. To just have to fill in a form to get all the data they want.

      1. Julz

        There

        are millions of phones and other computers but not so many networks...

        1. Anonymous Coward
          Anonymous Coward

          Re: There

          "are millions of phones and other computers but not so many networks..."

          But I have yet to see the mathematics that show E2EE can be broken in transit even in theory. * Cracking a million endpoint phones looks positively cheap and easy in comparison.

          * Nor have I seen the basic science needed to build the quantum computers that could theoretically crack the existing encryption. Such quantum computers too would be extremely expensive.

  16. Another DPF

    The car majority of criminals are naive users

    Just like most other population groups.

    Totally agree with the overall point, of course. Backdooring is not a valid regulatory strategy

  17. DS999 Silver badge

    What does it mean for Signal to "pull out of" a country?

    Do they have any business presence in Sweden? It doesn't charge for the app and AFAIK doesn't run ads but is fully funded by donations. So I'm not really sure what leverage Sweden would have over Signal other than blocking IPs associated with them (which doesn't do anything about VPNs) and maybe pressing Apple/Google to drop them from their app stores in Sweden (which doesn't do anything about their web interface)

    I don't think Sweden is going to be able to do much beyond making it more of a hassle to use Signal.

    1. MachDiamond Silver badge

      Re: What does it mean for Signal to "pull out of" a country?

      I don't think Sweden is going to be able to do much beyond making it more of a hassle to use Signal.

      Not even much of a hassle at that for somebody that is determined to use Signal. It's just that tiny little challenge that might be too much work for somebody only casually interested.

    2. Number 39

      Re: What does it mean for Signal to "pull out of" a country?

      Given they require a phone number, deactivate that country code, or stop taking new registrations.

      1. conscience

        Re: What does it mean for Signal to "pull out of" a country?

        A mobile number is not required to use Signal. A unique username can be chosen and that used instead.

    3. Richard 12 Silver badge

      Re: What does it mean for Signal to "pull out of" a country?

      Maybe add a notice to the download/store page saying "Please don't download this in Sweden"

  18. Anonymous Coward
    Anonymous Coward

    Backdoor may exist already on SAMSUNG phones!

    I came across and nasty bit of Malware that is installed by samsung on its A & M model phones called AppCloud it was developed by an Israeli company IronSource and allows the background download and installation of apps without the phone owner knowing. So this could install endpoint intercept software, it could install software to access the phone contact list. The options are endless.

    You cannot uninstall this malware, you can only disable it. This is by all intents and purposes a backdoor. So if you have a SAMSUNG phone disable it and if you are thinking of getting a phone DO NOT get a SAMSUNG phone!

    1. Anonymous Coward
      Anonymous Coward

      Re: Backdoor may exist already on SAMSUNG phones!

      Perhaps you're thinking of Googoyle Play.

      Play Store works by push -- you send a request to the Play Store that you want an app, and it sends a push request to your phone, and installs the app. Basically remotely. Anything can be installed on your phone at any time, exactly as you described. Samsung also comes with the Galaxy Store, which doesn't seem to function in the same way, but there are Samsung Services in the background - that you can't disable.

      Play Services requires access to your contacts, phone, location, and a myriad of other things. If you disable play services, half your apps stop working - such as anything that uses GPS.

      Googoyle creates spyware, nothing more. Android is spyware. iPhone may be similar, but imo the user interface just sucks. So, don't do anything questionable on your phone. You can get flip-phones cheaply, if you need to keep in touch with someone. Unsure if they support other IM apps.

      1. Anonymous Coward
        Anonymous Coward

        Re: Backdoor may exist already on SAMSUNG phones!

        Quote: "...don't do anything questionable on your phone..."

        Assumption Alert: Do ANYTHING YOU LIKE on your phone........

        ....as long as:

        (1) You bought the SIM for cash in a convenience store

        (2) You bought your (pay-as-you-go) minutes for cash in a convenience store

        .....and you are all set.

        Warning: The snoops don't know who YOU are......but they may know all the people you call or message!!

        Advice: Make sure all your contacts have already performed steps #1 and #2!!!

        1. Dizzy Dwarf

          Re: Backdoor may exist already on SAMSUNG phones!

          3. You use it only one time. They are to be burnt, after all.

          3.5 Whichever number you called should now be considered comprised.

          4. Either remove the sim, the battery and stamp on it, or accidentally leave it one the bus.

          1. DS999 Silver badge

            Re: Backdoor may exist already on SAMSUNG phones!

            Yep. I remember reading a post somewhere from a guy who said he'd done the above and had been happily using his "untraceable" phone for the past year. So many people replied asking him if he had a home, because if he did it has already been triangulated to that location by cell towers so he's eminently traceable. He tried to defend himself for a bit then disappeared from the thread lol

      2. Anonymous Coward
        Anonymous Coward

        Re: Backdoor may exist already on SAMSUNG phones!

        Perhaps you're thinking of Googoyle Play.

        Play Store works by push -- you send a request to the Play Store that you want an app

        No! AppCloud sends a request to Play Store or Galaxy Store in the background to request the install of the app. You have no control. The new app will just appear on your phone.

  19. Tubz Silver badge

    What we need is a new open E2EE distributed client that companies can dress up any which way they like with features and addon, so long as the encryption code itself remains constant, so anything with the same plugins/features can read it and those without just ignore it and decrypt a vanilla version.

    1. Anonymous Coward
      Anonymous Coward

      You Asked For An Application -- Surely A Design Is A Good Start??

      @tubz

      Design Of Open E2EE Client

      STATIC

      (1) Feature to create a Diffie/Helman token pair

      (2) Feature to publish your PUBLIC token to your friends

      OUTGOING

      (3) Feature to create a TRANSIENT token for each outgoing message

      (4) Feature encrypt your message (using the TRANSIENT token and your friend's PUBLIC token to create a transient encryption key, then encryption - then the transient key is destroyed)

      (5) Feature to create a wrapper for each outgoing message (wrapping your name, the TRANSIENT token and your encrypted message)

      INCOMING

      (6) Feature to decrypt incoming messages (using the sender's name, the sent TRANSIENT token, the recipient's PRIVATE token to create the transient encryption key, then decryption - then the transient key is destroyed)

      Is quite easy to do as a Linux command line application. Bit more work to use GTK3 and Glade.

      Most of the detail in C can be found by searching for the work of the amazing Daniel Bernstein (you know....chacha20, curve25519........)

      PROBLEMS

      (7) Distribution of PUBLIC D/H tokens

      (8) Transport. Might be a nice idea to use Signal as transport!!

  20. CuberHubs
    Devil

    "I guess in the case of TB it will have to affect the human population before some sanity in approach and legislation is restored."

    USAmerican is startled at the thought that widespread human misery would be a reason to 'restore sanity' in government.

  21. AdmFubar

    "Cut off one head and 100 grow back? Decapitation may not be the way to go"

    Will have to nuke them from orbit, it is the only way to be sure...

    Hilarious that they ask for a back door, when every os maker has a big honkin' front door to your computer.

    shhhhhh! it's called software update.. dont tell anybody!

  22. Winkypop Silver badge
    Big Brother

    Relax

    Big Brother loves you.

    Embrace the surveillance, take some more Victory Gin and enjoy.

  23. Alex 72
    Coat

    If security clearance was a little less opaque and hiring in general achieved a more skilled workforce like Tommy Flowers, Alan Turing, Mary Coombs nee Blood, Steve Shirley, Tim Berners Lee... it's not like the UK has not produced talented computer scientists and coders. Perhaps the the records that can be accessed with a warrant when End to End Encryption (E2EE) is enabled i.e. who is messaging whom were combined with actually responding to sound intelligence like those refereed to the prevent program by their school for example perhaps we could without breaking E2EE still respond adequately. One possibility may be, something akin to the postmasters of old using special kettles to open mail in transit, like aurthorised attacks e.g. find a contact with lax security whose device can be compromised or one who can be trusted and then use the avenue to send targeted spyware. This approach has two advantages over asking companies to do magic. First it is possible in the real world and second it may be possible to complete without alerting the target as large firms in the UK have no problems complying with legal warrants that are reasonable, and will not disclose doing so if instructed not to. It would also allow law abiding citizens to retain some semblance of privacy as there is a barrier to reading private messages that costs time and effort although governments of today clearly have no interest in that.

  24. JulieM Silver badge

    Uncomfortable truth

    The uncomfortable truth bears repeating, that not only could a group of school-age children exchange encrypted messages among themselves, which are demonstrably impossible (not just supremely difficult, but actually impossible; as in, given a ciphertext, every possible plaintext is equally likely. Even quantum computing won't help) for anyone other than the intended recipient to decrypt, over an insecure channel such as SMS; but they could do all this using entirely manual methods and commonly-available materials.

  25. FuzzyTheBear Silver badge
    Megaphone

    Bit of honesty here ..

    One time pads and pigeons give better message security than the internet. If you need communications to be secure don't rely on the open internet period.

POST COMMENT House rules

Not a member of The Register? Create a new account here.

  • Enter your comment

  • Add an icon

Anonymous cowards cannot choose their icon

Other stories you might like