Jump to content

Australian Government Proposing Laws to enable the police to gain access to encrypted mobile phones.

overlord360

Source: http://www.abc.net.au/news/2018-08-14/tech-surveillance-laws-less-of-a-back-door-and-more-a-side-gate/10114534

 

The Australian government is proposing new laws that would enable the australian police force to gain access to encrypted messages, GPS data, etc, if they have a valid search warrant.

The proposed law is not meant to be a "back door" but rather a "side gate". This would mean that rather than breaking the encryption during the transit of the message the police would be able to read, delete and copy messages at the end user's phone.

 

The Law proposes three levels of request that the police can make.

  1. The first level is voluntary, where the police ask if the company is willing to hand over the data from a user.
  2. The second stage is mandatory where the police demand that the company hand's over the data and will face a $10 million (AUD) fine for companies or $50,000 for individuals
  3. "The third stage is not only compulsory for a company or individual to abide by, but also means they may have to work to build their own systems to help monitor activity." ~ Source

In other words the third stage would entail that the company or individual has to make a serious attempt to comply with the request.

 

" if you use an app to send a message to your friend, it's encrypted as it travels between the two phones or devices.

When it arrives, it's decrypted for your friend to read.

Under the proposed changes, if law enforcement agencies have a valid search warrant to monitor your phone, they could read the decrypted message at the same time as your friend does."

~ Source

 

IMO this is a terrible idea due to the inability to create a "back door" without giving access to the wrong people. If a single government demands access to data for legitimate reasons then there would be no issues, however other governments can also demand that same data for nefarious purposes by threatening the company with, increased taxes or other fines. If a backdoor exists then it can also be discovered by hackers and exploited. Both of these events have already happened (see WannaCry). 

 

 

Edited by overlord360
Align post with guidelines
Link to comment
Share on other sites

Link to post
Share on other sites

Seems perfectly fine to me /s

It still seems too much like a back door to me even if it's not.
I dont know enough of cryptography and cyber security to know if there's any way that could make LEAs able to conduct real investigations and not spy and still respect the privacy of everyone.

a Moo Floof connoisseur and curator.

:x@handymanshandle x @pinksnowbirdie || Jake x Brendan :x
Youtube Audio Normalization
 

 

 

Link to comment
Share on other sites

Link to post
Share on other sites

This is like asking a lock company to give master keys for all of the locks that they make to law enforcement, but law enforcement promises to keep those keys safe; except of course this is far worse.

As usual I'll link to Tom Scott's excellent video on the topic:

 

Current LTT F@H Rank: 90    Score: 2,503,680,659    Stats

Yes, I have 9 monitors.

My main PC (Hybrid Windows 10/Arch Linux):

OS: Arch Linux w/ XFCE DE (VFIO-Patched Kernel) as host OS, windows 10 as guest

CPU: Ryzen 9 3900X w/PBO on (6c 12t for host, 6c 12t for guest)

Cooler: Noctua NH-D15

Mobo: Asus X470-F Gaming

RAM: 32GB G-Skill Ripjaws V @ 3200MHz (12GB for host, 20GB for guest)

GPU: Guest: EVGA RTX 3070 FTW3 ULTRA Host: 2x Radeon HD 8470

PSU: EVGA G2 650W

SSDs: Guest: Samsung 850 evo 120 GB, Samsung 860 evo 1TB Host: Samsung 970 evo 500GB NVME

HDD: Guest: WD Caviar Blue 1 TB

Case: Fractal Design Define R5 Black w/ Tempered Glass Side Panel Upgrade

Other: White LED strip to illuminate the interior. Extra fractal intake fan for positive pressure.

 

unRAID server (Plex, Windows 10 VM, NAS, Duplicati, game servers):

OS: unRAID 6.11.2

CPU: Ryzen R7 2700x @ Stock

Cooler: Noctua NH-U9S

Mobo: Asus Prime X470-Pro

RAM: 16GB G-Skill Ripjaws V + 16GB Hyperx Fury Black @ stock

GPU: EVGA GTX 1080 FTW2

PSU: EVGA G3 850W

SSD: Samsung 970 evo NVME 250GB, Samsung 860 evo SATA 1TB 

HDDs: 4x HGST Dekstar NAS 4TB @ 7200RPM (3 data, 1 parity)

Case: Sillverstone GD08B

Other: Added 3x Noctua NF-F12 intake, 2x Noctua NF-A8 exhaust, Inatek 5 port USB 3.0 expansion card with usb 3.0 front panel header

Details: 12GB ram, GTX 1080, USB card passed through to windows 10 VM. VM's OS drive is the SATA SSD. Rest of resources are for Plex, Duplicati, Spaghettidetective, Nextcloud, and game servers.

Link to comment
Share on other sites

Link to post
Share on other sites

I don’t see how this isn’t asking for a back door. Using Apple, the police could ask for all the iMessage data but it will be encrypted if it’s just pulled from the storage and useless I’m assumng. The only way to use it would be to decrypt it which requires access to the Secure Enclave I would assume as that’s the only place the key(s) are stored.

 

How is this any different then what the FBI asked? 

My posts are in a constant state of editing :)

CPU: i7-4790k @ 4.7Ghz MOBO: ASUS ROG Maximums VII Hero  GPU: Asus GTX 780ti Directcu ii SLI RAM: 16GB Corsair Vengeance PSU: Corsair AX860 Case: Corsair 450D Storage: Samsung 840 EVO 250 GB, WD Black 1TB Cooling: Corsair H100i with Noctua fans Monitor: ASUS ROG Swift

laptop

Some ASUS model. Has a GT 550M, i7-2630QM, 4GB or ram and a WD Black SSD/HDD drive. MacBook Pro 13" base model
Apple stuff from over the years
iPhone 5 64GB, iPad air 128GB, iPod Touch 32GB 3rd Gen and an iPod nano 4GB 3rd Gen. Both the touch and nano are working perfectly as far as I can tell :)
Link to comment
Share on other sites

Link to post
Share on other sites

7 minutes ago, Bensemus said:

I don’t see how this isn’t asking for a back door. Using Apple, the police could ask for all the iMessage data but it will be encrypted if it’s just pulled from the storage and useless I’m assumng. The only way to use it would be to decrypt it which requires access to the Secure Enclave I would assume as that’s the only place the key(s) are stored.

 

How is this any different then what the FBI asked? 

"

Think of it this way: if you use an app to send a message to your friend, it's encrypted as it travels between the two phones or devices.

When it arrives, it's decrypted for your friend to read.

Under the proposed changes, if law enforcement agencies have a valid search warrant to monitor your phone, they could read the decrypted message at the same time as your friend does." ~ Source

 

I believe they aren't asking the break the encryption between the two phones but have the ability to gather data from the end user. Whether or not this is possible is something i do not know.

Link to comment
Share on other sites

Link to post
Share on other sites

This is literally just a modernized search warrant.

 

Nothing close to what people think it is.

18 minutes ago, Bensemus said:

How is this any different then what the FBI asked?

The FBI wanted a backdoor that they can access sans warrant.

 

This is Australlia modernizing laws so that encrypted devices are subject to search warrants, the same way that a locked car or shed would be.

Come Bloody Angel

Break off your chains

And look what I've found in the dirt.

 

Pale battered body

Seems she was struggling

Something is wrong with this world.

 

Fierce Bloody Angel

The blood is on your hands

Why did you come to this world?

 

Everybody turns to dust.

 

Everybody turns to dust.

 

The blood is on your hands.

 

The blood is on your hands!

 

Pyo.

Link to comment
Share on other sites

Link to post
Share on other sites

23 minutes ago, Drak3 said:

This is Australlia modernizing laws so that encrypted devices are subject to search warrants, the same way that a locked car or shed would be.

That's exactly the same as what happened with the FBI in the case of the san bernandino shooter's iPhone. The Australian government wants tech companies to be legally obligated to assist in circumvention of the encryption on their devices when presented with a warrant. The problem is that those tech companies are currently literally unable to do this because the encryption keys are (as any sane developer would do) located on the device in question and thus irretrievable without a passcode.

That's where the third stage comes in:

Quote

The third stage is not only compulsory for a company or individual to abide by, but also means they may have to work to build their own systems to help monitor activity.

This literally means building a back door, which in the least consists of the manufacturer (or government) keeping possession of a a key that can at will decrypt the contents of a particular device, if not all devices from that company.

 

 

To relate this to your analogy, this would be like forcing the company to keep copies of keys to all the sheds that they sell so that law enforcement can look inside when they want.

Current LTT F@H Rank: 90    Score: 2,503,680,659    Stats

Yes, I have 9 monitors.

My main PC (Hybrid Windows 10/Arch Linux):

OS: Arch Linux w/ XFCE DE (VFIO-Patched Kernel) as host OS, windows 10 as guest

CPU: Ryzen 9 3900X w/PBO on (6c 12t for host, 6c 12t for guest)

Cooler: Noctua NH-D15

Mobo: Asus X470-F Gaming

RAM: 32GB G-Skill Ripjaws V @ 3200MHz (12GB for host, 20GB for guest)

GPU: Guest: EVGA RTX 3070 FTW3 ULTRA Host: 2x Radeon HD 8470

PSU: EVGA G2 650W

SSDs: Guest: Samsung 850 evo 120 GB, Samsung 860 evo 1TB Host: Samsung 970 evo 500GB NVME

HDD: Guest: WD Caviar Blue 1 TB

Case: Fractal Design Define R5 Black w/ Tempered Glass Side Panel Upgrade

Other: White LED strip to illuminate the interior. Extra fractal intake fan for positive pressure.

 

unRAID server (Plex, Windows 10 VM, NAS, Duplicati, game servers):

OS: unRAID 6.11.2

CPU: Ryzen R7 2700x @ Stock

Cooler: Noctua NH-U9S

Mobo: Asus Prime X470-Pro

RAM: 16GB G-Skill Ripjaws V + 16GB Hyperx Fury Black @ stock

GPU: EVGA GTX 1080 FTW2

PSU: EVGA G3 850W

SSD: Samsung 970 evo NVME 250GB, Samsung 860 evo SATA 1TB 

HDDs: 4x HGST Dekstar NAS 4TB @ 7200RPM (3 data, 1 parity)

Case: Sillverstone GD08B

Other: Added 3x Noctua NF-F12 intake, 2x Noctua NF-A8 exhaust, Inatek 5 port USB 3.0 expansion card with usb 3.0 front panel header

Details: 12GB ram, GTX 1080, USB card passed through to windows 10 VM. VM's OS drive is the SATA SSD. Rest of resources are for Plex, Duplicati, Spaghettidetective, Nextcloud, and game servers.

Link to comment
Share on other sites

Link to post
Share on other sites

This is the same government that said that the laws of mathematics don't apply to them, and only the laws they make apply, right?  When I read that headline I legitimately thought they were just mandating that it would now be breakable as if it was a magical incantation

Solve your own audio issues  |  First Steps with RPi 3  |  Humidity & Condensation  |  Sleep & Hibernation  |  Overclocking RAM  |  Making Backups  |  Displays  |  4K / 8K / 16K / etc.  |  Do I need 80+ Platinum?

If you can read this you're using the wrong theme.  You can change it at the bottom.

Link to comment
Share on other sites

Link to post
Share on other sites

34 minutes ago, sazrocks said:

That's exactly the same as what happened with the FBI in the case of the san bernandino shooter's iPhone. The Australian government wants tech companies to be legally obligated to assist in circumvention of the encryption on their devices when presented with a warrant. The problem is that those tech companies are currently literally unable to do this because the encryption keys are (as any sane developer would do) located on the device in question and thus irretrievable without a passcode.

That's where the third stage comes in:

This literally means building a back door, which in the least consists of the manufacturer (or government) keeping possession of a a key that can at will decrypt the contents of a particular device, if not all devices from that company.

 

 

To relate this to your analogy, this would be like forcing the company to keep copies of keys to all the sheds that they sell so that law enforcement can look inside when they want.

Read the actual article. The australian govt. isn't being unreasonable with it atm.

Come Bloody Angel

Break off your chains

And look what I've found in the dirt.

 

Pale battered body

Seems she was struggling

Something is wrong with this world.

 

Fierce Bloody Angel

The blood is on your hands

Why did you come to this world?

 

Everybody turns to dust.

 

Everybody turns to dust.

 

The blood is on your hands.

 

The blood is on your hands!

 

Pyo.

Link to comment
Share on other sites

Link to post
Share on other sites

1 hour ago, sazrocks said:

This is like asking a lock company to give master keys for all of the locks that they make to law enforcement, but law enforcement promises to keep those keys safe

well, i mean, technically law enforcement does have a master key,

 

Ram30.jpg

 

 

🌲🌲🌲

 

 

 

◒ ◒ 

Link to comment
Share on other sites

Link to post
Share on other sites

1 minute ago, Arika S said:

well, i mean, technically law enforcement does have a master key,

 

Ram30.jpg

 

 

Alternative masterkey.

MS50427_1-1.png.8f95849b3a207ae8c2959ab66098bf9b.png

 

Fun fact, I can retro fit my $500 pump with that same style of barrel for $200, and have my own master key as well.

Come Bloody Angel

Break off your chains

And look what I've found in the dirt.

 

Pale battered body

Seems she was struggling

Something is wrong with this world.

 

Fierce Bloody Angel

The blood is on your hands

Why did you come to this world?

 

Everybody turns to dust.

 

Everybody turns to dust.

 

The blood is on your hands.

 

The blood is on your hands!

 

Pyo.

Link to comment
Share on other sites

Link to post
Share on other sites

1 minute ago, Drak3 said:

Alternative masterkey.

 

Fun fact, I can retro fit my $500 pump with that same style of barrel for $200, and have my own master key as well.

and for when law enforcement comes up against door enforcement

 

latest?cb=20151209184701

🌲🌲🌲

 

 

 

◒ ◒ 

Link to comment
Share on other sites

Link to post
Share on other sites

2 hours ago, overlord360 said:
  1. The first level is voluntary, where the police ask if the company is willing to hand over the data from a user.
  2. The second stage is mandatory where the police demand that the company hand's over the data and will face a $10 million (AUD) fine for companies or $50,000 for individuals
  3. "The third stage is not only compulsory for a company or individual to abide by, but also means they may have to work to build their own systems to help monitor activity." ~ Source
  1. Voluntary - companies decline to hand over the data.
  2. Fine for non-compliance - companies provide fully encrypted data.
  3. Backdoors - Society overthrows the government for attempting to create a Brave New World.

I can't possibly see how this could go wrong. Oh well. ¯\_(ツ)_/¯

 

it-crowd-popcorn-go.gif

Desktop: KiRaShi-Intel-2022 (i5-12600K, RTX2060) Mobile: OnePlus 5T | Koodo - 75GB Data + Data Rollover for $45/month
Laptop: Dell XPS 15 9560 (the real 15" MacBook Pro that Apple didn't make) Tablet: iPad Mini 5 | Lenovo IdeaPad Duet 10.1
Camera: Canon M6 Mark II | Canon Rebel T1i (500D) | Canon SX280 | Panasonic TS20D Music: Spotify Premium (CIRCA '08)

Link to comment
Share on other sites

Link to post
Share on other sites

Don't let them fool you with "alternative terms". This is by definition a backdoor. There is no such thing in cryptography as a "side-door". It's just them trying to avoid using the word backdoor because it is very stigmatized (for good reasons).

 

It's like how thieves can say "I didn't steal from him, I just borrowed without asking".

It's just playing around with words to make their actions sound less bad than they are.

 

 

59 minutes ago, Ryan_Vickers said:

This is the same government that said that the laws of mathematics don't apply to them, and only the laws they make apply, right?  When I read that headline I legitimately thought they were just mandating that it would now be breakable as if it was a magical incantation

Haha I had forgotten about that.

Direct quote from the prime minister:

Quote

Well the laws of Australia prevail in Australia, I can assure you of that. The laws of mathematics are very commendable, but the only law that applies in Australia is the law of Australia.

 

 

 

40 minutes ago, Drak3 said:

Read the actual article. The australian govt. isn't being unreasonable with it atm.

They are most certainly being unreasonable. They are asking companies to make huge compromises in their security, which will puts people at risk.

Remember that government tools have been leaked before, quite often in fact.

Remember that stolen government tools has been weaponized before, such as WannaCry.

 

If you think WannaCry was bad, this is basically a law which says companies must agree to help the development of vulnerabilities, and they aren't allowed to patch them.

Link to comment
Share on other sites

Link to post
Share on other sites

29 minutes ago, Drak3 said:

Read the actual article.

I did. And here's a quote from the Actual article:

Quote

The third stage is not only compulsory for a company or individual to abide by, but also means they may have to work to build their own systems to help monitor activity.

Let's look at this part:

Quote

they may have to work to build their own systems to help monitor activity.

This essentially means that companies must compulsorily make their systems easier for the government to access. Now, unless the companies decide to just make it easier for everyone in the world to access those devices out of fairness, this is literally a backdoor.

Current LTT F@H Rank: 90    Score: 2,503,680,659    Stats

Yes, I have 9 monitors.

My main PC (Hybrid Windows 10/Arch Linux):

OS: Arch Linux w/ XFCE DE (VFIO-Patched Kernel) as host OS, windows 10 as guest

CPU: Ryzen 9 3900X w/PBO on (6c 12t for host, 6c 12t for guest)

Cooler: Noctua NH-D15

Mobo: Asus X470-F Gaming

RAM: 32GB G-Skill Ripjaws V @ 3200MHz (12GB for host, 20GB for guest)

GPU: Guest: EVGA RTX 3070 FTW3 ULTRA Host: 2x Radeon HD 8470

PSU: EVGA G2 650W

SSDs: Guest: Samsung 850 evo 120 GB, Samsung 860 evo 1TB Host: Samsung 970 evo 500GB NVME

HDD: Guest: WD Caviar Blue 1 TB

Case: Fractal Design Define R5 Black w/ Tempered Glass Side Panel Upgrade

Other: White LED strip to illuminate the interior. Extra fractal intake fan for positive pressure.

 

unRAID server (Plex, Windows 10 VM, NAS, Duplicati, game servers):

OS: unRAID 6.11.2

CPU: Ryzen R7 2700x @ Stock

Cooler: Noctua NH-U9S

Mobo: Asus Prime X470-Pro

RAM: 16GB G-Skill Ripjaws V + 16GB Hyperx Fury Black @ stock

GPU: EVGA GTX 1080 FTW2

PSU: EVGA G3 850W

SSD: Samsung 970 evo NVME 250GB, Samsung 860 evo SATA 1TB 

HDDs: 4x HGST Dekstar NAS 4TB @ 7200RPM (3 data, 1 parity)

Case: Sillverstone GD08B

Other: Added 3x Noctua NF-F12 intake, 2x Noctua NF-A8 exhaust, Inatek 5 port USB 3.0 expansion card with usb 3.0 front panel header

Details: 12GB ram, GTX 1080, USB card passed through to windows 10 VM. VM's OS drive is the SATA SSD. Rest of resources are for Plex, Duplicati, Spaghettidetective, Nextcloud, and game servers.

Link to comment
Share on other sites

Link to post
Share on other sites

seems perfectly reasonable to me that a country can enforce a company to comply with a search warrant in prevention or fight against crime.

.

Link to comment
Share on other sites

Link to post
Share on other sites

Just now, asus killer said:

seems perfectly reasonable to me that a country can enforce a company to comply with a search warrant in prevention or fight against crime.

No, this is horrible. Please see these two posts:

 

Current LTT F@H Rank: 90    Score: 2,503,680,659    Stats

Yes, I have 9 monitors.

My main PC (Hybrid Windows 10/Arch Linux):

OS: Arch Linux w/ XFCE DE (VFIO-Patched Kernel) as host OS, windows 10 as guest

CPU: Ryzen 9 3900X w/PBO on (6c 12t for host, 6c 12t for guest)

Cooler: Noctua NH-D15

Mobo: Asus X470-F Gaming

RAM: 32GB G-Skill Ripjaws V @ 3200MHz (12GB for host, 20GB for guest)

GPU: Guest: EVGA RTX 3070 FTW3 ULTRA Host: 2x Radeon HD 8470

PSU: EVGA G2 650W

SSDs: Guest: Samsung 850 evo 120 GB, Samsung 860 evo 1TB Host: Samsung 970 evo 500GB NVME

HDD: Guest: WD Caviar Blue 1 TB

Case: Fractal Design Define R5 Black w/ Tempered Glass Side Panel Upgrade

Other: White LED strip to illuminate the interior. Extra fractal intake fan for positive pressure.

 

unRAID server (Plex, Windows 10 VM, NAS, Duplicati, game servers):

OS: unRAID 6.11.2

CPU: Ryzen R7 2700x @ Stock

Cooler: Noctua NH-U9S

Mobo: Asus Prime X470-Pro

RAM: 16GB G-Skill Ripjaws V + 16GB Hyperx Fury Black @ stock

GPU: EVGA GTX 1080 FTW2

PSU: EVGA G3 850W

SSD: Samsung 970 evo NVME 250GB, Samsung 860 evo SATA 1TB 

HDDs: 4x HGST Dekstar NAS 4TB @ 7200RPM (3 data, 1 parity)

Case: Sillverstone GD08B

Other: Added 3x Noctua NF-F12 intake, 2x Noctua NF-A8 exhaust, Inatek 5 port USB 3.0 expansion card with usb 3.0 front panel header

Details: 12GB ram, GTX 1080, USB card passed through to windows 10 VM. VM's OS drive is the SATA SSD. Rest of resources are for Plex, Duplicati, Spaghettidetective, Nextcloud, and game servers.

Link to comment
Share on other sites

Link to post
Share on other sites

1 minute ago, asus killer said:

seems perfectly reasonable to me that a country can enforce a company to comply with a search warrant in prevention or fight against crime.

The problem is that it's kind of like saying "it's perfectly reasonable that a country demands that knives me manufactured in a way where they can only stab bad people, not good ones".

Sounds good in theory, but it can't be done in practice.

 

If you allow the police to enter your devices, then you simultaneously allow everyone else too, including Russia, China, ISIS, North Korea etc.

Remember, WannaCry was a tool developed by the NSA which leaked. The same thing will inevitably happen with these mandatory backdoors. Except these backdoors will most likely have far more privileges than WannaCry.

Link to comment
Share on other sites

Link to post
Share on other sites

1 minute ago, sazrocks said:

No, this is horrible. Please see these two posts:

 

i like my privacy like anyone else, but i don't put privacy above anything else, police should have access to someones phone as long as there is a legal process involved and a search warrant issued by a judge. That's like saying we shouldn't have license plates as it defeats our privacy on the road. Besides before smart phones police could listen to someones calls with a search warrant and this privacy at all cost nonsense was never an issue.

.

Link to comment
Share on other sites

Link to post
Share on other sites

1 minute ago, asus killer said:

Besides before smart phones police could listen to someones calls with a search warrant and this privacy at all cost nonsense was never an issue.

The issue with a "back door" is that it's not listening to the current conversation but listening to every conversation you've ever had on this particular platform.

Link to comment
Share on other sites

Link to post
Share on other sites

1 minute ago, LAwLz said:

The problem is that it's kind of like saying "it's perfectly reasonable that a country demands that knives me manufactured in a way where they can only stab bad people, not good ones".

Sounds good in theory, but it can't be done in practice.

 

If you allow the police to enter your devices, then you simultaneously allow everyone else too, including Russia, China, ISIS, North Korea etc.

Remember, WannaCry was a tool developed by the NSA which leaked. The same thing will inevitably happen with these mandatory backdoors. Except these backdoors will most likely have far more privileges than WannaCry.

don't you have to make hard choices in life every day?

You are basically saying crime get's a "all you can eat" pass just because the system can abuse it, bad guys can use it. Seems fair and unreasonable at the same time. You just have to measure the consequences of both. I'm going with not giving crime this tool unchecked even if it cost a bit of my privacy. You have always the option to not use a phone or use it with extra care to not reveal what you want to be private.

.

Link to comment
Share on other sites

Link to post
Share on other sites

6 minutes ago, asus killer said:

i like my privacy like anyone else, but i don't put privacy above anything else, police should have access to someones phone as long as there is a legal process involved and a search warrant issued by a judge. That's like saying we shouldn't have license plates as it defeats our privacy on the road. Besides before smart phones police could listen to someones calls with a search warrant and this privacy at all cost nonsense was never an issue.

No, it's not like saying we shouldn't have license plates.

It's like saying we shouldn't have mandatory remote controlled bombs in every car because the police want to remotely be able to neutralize a potential threat.

 

Even if you don't give a damn about privacy it's still extremely bad from a security standpoint.

Again, look at WannaCry. That would be a small attack compared to the attack that would happen using these mandatory backdoors.

 

Then there is also the issue of what the backdoors would be used for. The Australian government might say they only want to use it for terrorist investigations, but Russia or China might demand access to the same backdoor. What are they going to use it for? Maybe crack down on people who has the "wrong" political views. And no, it is not possible to create a backdoor that only the Australian government can use, and only for the "right" purposes.

 

 

1 minute ago, asus killer said:

don't you have to make hard choices in life every day?

You are basically saying crime get's a "all you can eat" pass just because the system can abuse it, bad guys can use it. Seems fair and unreasonable at the same time. You just have to measure the consequences of both. I'm going with not giving crime this tool unchecked even if it cost a bit of my privacy. You have always the option to not use a phone or use it with extra care to not reveal what you want to be private.

I don't have to make that many hard choices, no. Even if I had, mandatory backdoors is to me a very simple choice. They should not exist.

Again, this is not about privacy. It's just bad from a security standpoint. As soon as one of these tools leaks or gets discovered, which they will, everyone with a backdoored device is at risk. You think the alleged attacks from North Korea, China and Russia have been bad? They will be tiny in comparison.

 

Also, there are several open source encryption tools out there. If these backdoors became mandatory people would just use those.

Even if we ignore the fact that a lot of terrorist attacks are organized through face-to-face conversations and burner phones, terrorists could just add another layer of encryption and the entire backdoor would be pointless.

Link to comment
Share on other sites

Link to post
Share on other sites

1 minute ago, asus killer said:

don't you have to make hard choices in life every day?

You are basically saying crime get's a "all you can eat" pass just because the system can abuse it, bad guys can use it. Seems fair and unreasonable at the same time. You just have to measure the consequences of both. I'm going with not giving crime this tool unchecked even if it cost a bit of my privacy. You have always the option to not use a phone or use it with extra care to not reveal what you want to be private.

Agreed

 

I put safety above privacy

🌲🌲🌲

 

 

 

◒ ◒ 

Link to comment
Share on other sites

Link to post
Share on other sites

32 minutes ago, sazrocks said:

I did. And here's a quote from the Actual article:

Let's look at this part:

This essentially means that companies must compulsorily make their systems easier for the government to access. Now, unless the companies decide to just make it easier for everyone in the world to access those devices out of fairness, this is literally a backdoor.

Monitoring activity =/=backdoor into devices. Scanning traffic over one's servers is just that. It's not scanning the contents of a device. It's not forcing someone to decrypt their device arbitrarily.

 

And any international telecom company, Google, Facebook, Twitter, etc. is already doing this, partially because it does help investigators.

Come Bloody Angel

Break off your chains

And look what I've found in the dirt.

 

Pale battered body

Seems she was struggling

Something is wrong with this world.

 

Fierce Bloody Angel

The blood is on your hands

Why did you come to this world?

 

Everybody turns to dust.

 

Everybody turns to dust.

 

The blood is on your hands.

 

The blood is on your hands!

 

Pyo.

Link to comment
Share on other sites

Link to post
Share on other sites

4 minutes ago, overlord360 said:

The issue with a "back door" is that it's not listening to the current conversation but listening to every conversation you've ever had on this particular platform.

like them getting a search warrant to your house and even knowing the color of your underwear, of reading someones diary?

.

Link to comment
Share on other sites

Link to post
Share on other sites

Create an account or sign in to comment

You need to be a member in order to leave a comment

Create an account

Sign up for a new account in our community. It's easy!

Register a new account

Sign in

Already have an account? Sign in here.

Sign In Now


×