ÌÇÐÄVlog

 
Affiliate Disclosure
If you buy through our links, we may get a commission. Read our ethics policy.

Apple condemns British spy agency group's proposal to evade message encryption

Apple, Google, Microsoft and WhatsApp have co-signed an open letter urging the UK government to abandon what's being called a "ghost protocol" to allow intelligence services to read encrypted messages.

Apple has joined with Google, Microsoft, WhatsApp and other technology firms in an open and co-signed letter protesting against the UK government's proposal to require the right to eavesdrop on encrypted messages. GCHQ (Government Communications Headquarters) had proposed that services should automatically and secretly copy all messages from every user to law enforcement.

GCHQ's Ian Levy and Crispin Robinson proposed this system in a that laid out principles for how "service providers" could implement it. "It's relatively easy for a service provider to silently add a law enforcement participant to a group chat or call," they wrote. "You end up with everything still being end-to-end encrypted, but there's an extra 'end' on this particular communication."

The paper's authors insist this was not the same as granting backdoor access to communications.

"This sort of solution seems to be no more intrusive than the virtual crocodile clips that our democratically elected representatives and judiciary authorize today in traditional voice intercept solutions," they said, "and certainly doesn't give any government power that they shouldn't have."

Start of the open letter co-signed by Apple Start of the open letter co-signed by Apple

The open letter, originally sent to GCHQ on May 22, describes this approach as adding a "ghost" to every message and decries what it calls this "ghost protocol," saying it would introduce "significant additional security threats."

"The GCHQ's ghost proposal creates serious threats to digital security," says the letter's writers. "Users would no longer be able to trust that they know who is on the other end of their communications, thereby posing threats to fundamental human rights, including privacy and free expression."

While not requiring a backdoor that allowed law enforcement access to messages after they were sent, the proposal would make companies such as Apple alter how iOS handles messaging.

"GCHQ's proposals would require messaging apps, service providers, and operating systems to change their software so that it would 1) change the encryption schemes used, and/or 2) mislead users by suppressing the notifications that routinely appear when a new communicant joins a chat."

The nine-page, 3,000-word letter concludes by pointing out that if the UK is allowed to require this, other countries will follow.

"There is no way to prevent other governments from relying on this newly built system," it says. "This is of particular concern with regard to oppressive regimes and any country with a poor record on protecting human rights."

The open letter asks that GCHQ abandon this "ghost protocol."

GCHQ has responded to the letter.

"We welcome this response to our request for thoughts on exceptional access to data — for example, to stop terrorists," said author Ian Levy in an email to . "The hypothetical proposal was always intended as a starting point for discussion."

"We will continue to engage with interested parties," he continued, "and look forward to having an open discussion to reach the best solutions possible."

by on Scribd

46 Comments


@"

automatically and secretly copy all messages from every user to law enforcement"

My bolding.

I trust they've got some serious data storage capability!

4 Likes · 0 Dislikes

Obviously a plot by Max Denbigh aka “C” to implement nine eyes for the benefit of a secret cabel. Crispin Robinson is sooo British it must be an alias.

3 Likes · 0 Dislikes

I am sure this key would ‘leak’ on the black market just like how CIA’s or NSA’s malware is being used to damage American cities.

3 Likes · 0 Dislikes

said:
I am sure this key would ‘leak’ on the black market just like how CIA’s or NSA’s malware is being to damage American cities.

I don't see how it would "leak" on the black market as there's no backdoor modification to any of Apple encrypted messaging service, nor are the Brits asking for one. They simply want Google and Apple and the rest to be legally required to add GCHQ as another recipient of the target's still encrypted message. Apple who whoever would still be the company responsible for actually doing it if I read this correctly. Certainly not something I would advocate for, but still far better than a weakened encryption service. 

In fact I'm wondering if this is already in play in a couple of other countries.  It would explain how Apple iMessage has escaped the same fate of the other encrypted messaging services who have refused to cow-tow in China and Russia. At least in China it is no longer Apple iCloud nor an Apple-controlled service, rebadged as GCBD iCloud and run by the Chinese. Simply inserting themselves as an additional recipient of still-encrypted iMessages would be the so-simple fix. Russia may bve in the process of doing something similar. 

1 Like · 0 Dislikes

said:
said:
I am sure this key would ‘leak’ on the black market just like how CIA’s or NSA’s malware is being to damage American cities.
I don't see how it would "leak" on the black market as there's no backdoor modification to any of Apple encrypted messaging service, nor are the Brits asking for one. They simply want Google and Apple and the rest to be legally required to add GCHQ as another recipient of the target's still encrypted message. Apple who whoever would still be the company responsible for actually doing it if I read this correctly. Certainly not something I would advocate for, but still far better than a weakened encryption service. 

In fact I'm wondering if this is already in play in a couple of other countries.  It would explain how Apple iMessage has escaped the same fate of the other encrypted messaging services who have refused to cow-tow in China and Russia. At least in China it is no longer Apple iCloud nor an Apple-controlled service, rebadged as GCBD iCloud and run by the Chinese. Simply inserting themselves as an additional recipient of still-encrypted iMessages would be the so-simple fix. Russia may bve in the process of doing something similar. 

iMessage keys are not held by . The new iMessage syncing feature is enabled by a circle of secure devices. iCloud storage holds your backup info, photos, contacts, etc. which  has a key for. Not your iMessage.I believe  is trying to enable this circle of secure devices, for more cloud features, so they dont have the keys. 

7 Likes · 0 Dislikes