←back to thread

170 points flanked-evergl | 1 comments | | HN request time: 0s | source
Show context
amiga386 ◴[] No.43619870[source]
Users want their secrets to be secret.

Apple wants its users' secrets to be secret.

The UK wants the fact it wants Apple to reveal anyone's secrets to be secret.

replies(1): >>43619903 #
HPsquared ◴[] No.43619903[source]
There must be a healthy middle ground between mass untouchable criminal communication networks on the one hand, and full panopticon 24x7 for every civilian on the other. Or I don't know, maybe there isn't. But at least the debate should be public.
replies(16): >>43619926 #>>43619938 #>>43619961 #>>43619967 #>>43619979 #>>43619999 #>>43620044 #>>43620059 #>>43620067 #>>43620078 #>>43620143 #>>43620238 #>>43620371 #>>43620780 #>>43620940 #>>43623532 #
gigatexal ◴[] No.43619938[source]
The math doesn’t math when it comes to encryption. It’s Pandora’s box. Once backdoors are created encryption may as well not even be enabled.
replies(1): >>43619962 #
gambiting ◴[] No.43619962[source]
Well - maybe. But take for example how Microsoft is doing bitlocker encryption on every Win11 system - by default, without prompting the user, your system drive gets encrypted automatically and the encryption key gets saved to your microsoft account.

Yes I hate that they do that without prompting, but in theory that solution offers that balance that OP talks about - if there are no backdoors in Bitlocker(let's assume that there aren't), then your encrypted data is perfectly secure. But if a judge issues a warrant for your data, then Microsoft can provide them with a key to unlock your device.

To me, that's an acceptable compromise - it means that someone stealing my laptop won't get my data, but if a warrant is produced then bitlocker drives can be unlocked for a criminal investigation.

Couldn't Apple create a solution where all your communication is end to end encrypted with a key that they just have a copy of? No backdoors necessary.

replies(1): >>43619983 #
pjc50 ◴[] No.43619983[source]
> Couldn't Apple create a solution where all your communication is end to end encrypted with a key that they just have a copy of? No backdoors necessary.

But that is a backdoor!

Especially, it's a backdoor that's inside a foreign country and subject to their intelligence services! It might be valid for a hypothetical autochthonous UKphone, but having a system where the US can secretly crack all UK comms is .. not ideal.

Given the tendency of UK ministers to use Whatsapp for private government communications, should we allow the US to have a backdoor into all of that via Meta? (in practice, they tend to leak to newspapers themselves, but it's the principle)

replies(2): >>43620014 #>>43620021 #
johnisgood ◴[] No.43620014[source]
It really is.

> then Microsoft can provide them with a key to unlock your device.

This is a quote from parent. That renders the key and encryption itself pretty useless if it has been given to someone other than you.

replies(1): >>43620073 #
gambiting ◴[] No.43620073[source]
Well, I disagree that it's useless - my front door still keeps my home secure even though my sister has a copy of the key.

I want my devices to be secure from thieves who might steal them, and I want my communications to be secure from someone intercepting internet traffic at various locations I might visit - that is still achieved in that scenario, even if MS/Apple hold the copy of the key. That doesn't make the encryption useless - just ineffective if your attack vector is defending yourself against state-level actors.

replies(4): >>43620100 #>>43620104 #>>43620641 #>>43621137 #
brookst ◴[] No.43620641{3}[source]
No, it makes the encryption useless. Because whatever technical method the government has to break encryption will leak. Once those 4096 bits or whatever leak, nobody has encryption at all.

It’s like high schools that mandate use of a particular model of lock for students’ lockers because there’s a master key staff can use to open lockers. Do you know how many students have copies of that master key? Essentially anyone who wants one.

The myth here is that a magic key that invalidates encryption can ever be controlled. It cannot.

replies(1): >>43621623 #
gambiting ◴[] No.43621623{4}[source]
I am very explicitly arguing that master keys shouldn't exist, for the exact reasons you mentioned.

>> Because whatever technical method the government has to break encryption will leak.

The government cannot break encryption(at least I hope they can't!)

>>The myth here is that a magic key that invalidates encryption can ever be controlled.

It's the same key you have.

replies(1): >>43628880 #
1. brookst ◴[] No.43628880{5}[source]
Sure the government can break encryption. By, for instance, mandating multi-key schemes with escrow.

You may be thinking in terms of math “break”. I’m talking in terms of functionality break.