Skip Navigation

France is about to pass the worst surveillance law in the EU.

95 comments
  • The eventual outcome of this sort of thing is more widespread use of steganographic data storage schemes. We already have plenty, such as ones that make your data look like unused LTS blocks of garbage and code blocks with multiple hidden partitions, so that you can open one block showing pedestrian data and the court unable to prove there are other hidden blocks.

    These are technologies that already exist for those people who are really interested preserving their renegade data.

    But if I own a business and I don't want my rivals reading my accounting, and open crypto is illegal, I may go stegan whether or not I have secret slush funds.

  • Its funny, I'm watching this show called Prime Target and basically the NSA is trying to prevent people from figuring out some sort of mathematical equation that would instantly break all encryption and talking about how it would be the end of the world as we know it.

    Meanwhile the EU is forcing everyone to put in an express lane IRL.

    • I haven't seen that show, but it sounds like it has a basis in reality: there has been a real concern that quantum computers might be able to break much of current encryption because they are far quicker than classical computers at problems like finding the prime factors of a number, and widely used schemes like RSA encryption depend on that being hard to do. And that could be fairly catastrophic, not only for current communications and for data encrypted at rest, but because communications data can be collected now and decrypted later when the technology becomes available. As far as we know, no one has done it yet, but quantum computers are developing rapidly so the day may well come. So there's a reason to move to encryption algorithms that are hard for quantum computers, even before such computers become a practical reality.

      • They do talk about quantum computing in the show in a different context, saying it's still a decade away. Their tech has something to do with Prime numbers (hence the title).

        But also several companies already advertise "quantum resistant encryption" for whatever that's worth.

    • I'm no cryptographer, so take this with a good heap of salt.

      Basically, all encryption multiplies some big prime numbers to get the key. Computers are pretty slow at division and finding the right components used to create the key takes a long time, it's basically trial and error at the moment.
      If you had an algorithm to solve for prime numbers, you could break any current encryption scheme and obviously cause a lot of damage in the wrong hands.

      • Basically, all encryption multiplies some big prime numbers to get the key

        No, not all encryption. First of all there's two main categories of encryption:

        • asymmetrical
        • symmetrical

        The most widely used algorithms of asymmetrical encryption rely on the prime factorization problem or similar problems that are weak to quantum computers. So these ones will break. Symmetrical encryption will not break. I'm not saying all this to be a pedant; it's actually significant for the safety of our current communications. Well-designed schemes like TLS and the Signal protocol use a combination of both types because they have complementary strengths and weaknesses. In very broad strokes:

        • asymmetrical encryption is used to initiate the communication because it can verify the identity of the other party
        • an algorithm that is safe against eavesdropping is used to generate a key for symmetric encryption
        • the symmetric key is used to encrypt the payload and it is thrown away after communication is over

        This is crucial because it means that even if someone is storing your messages today to decrypt them in the future with a quantum computer they are unlikely to succeed if a sufficiently strong symmetric key is used. They will decrypt the initial messages of the handshake, see the messages used to negotiate the symmetric key, but they won't be able to derive the key because as we said, it's safe against eavesdropping.

        So a lot of today's encrypted messages are safe. But in the future a quantum computer will be able to get the private key for the asymmetric encryption and perform a MitM attack or straight-up impersonate another entity. So we have to migrate to post-quantum algorithms before we get to that point.

        For storage, only symmetric algorithms are used generally I believe, so that's already safe as is, assuming as always the choice of a strong algorithm and sufficiently long key.

      • Yep that's kinda how they explained it, too.

  • So I'm going to get down voted to hell for this, but: this kind of legislation is a response to US tech companies absolutely refusing to compromise and meet non-US governments half-way.

    The belief in an absolute, involute right to privacy at all costs is a very US ideal. In the rest of the world - and in Europe especially - this belief is tempered by a belief that law enforcement is critical to a just society, and that sometimes individual rights must be suspended for the good of society as a whole.

    What Europe has been asking for is a mechanism to allow law enforcement to carry out lawful investigation of electronic communications in the same way they have been able to do with paper, bank records, and phone calls for a century. The idea that a tech company might get in the way of prosecuting someone for a serious crime is simply incompatible with law in a lot of places.

    The rest of the world has been trying to find a solution to the for a while that respects the privacy of the general public but which doesn't allow people to hide from the law. Tech has been refusing to compromise or even engage in this discussion, so now everyone is worse off.

    • I can invite someone over to my house and talk about anything I want with no risk of government meddling. Why should it be any different in online communication regardless of the country?

      • Continuing the analogy, government agencies can absolutely eavesdrop on in-person conversations unless you expend significant resources to prevent it. This is exactly what I believe will happen - organized crime will develop alternate methods the government can't access while these backdoors are used to monitor less advanced criminals and normal people.

    • It sounds like you haven't observed the conversation.

      And it's not the tech companes so much as the Linux community who have pushed for e2e.

      Considering how many abuses (pretty clear violations of the fourth amendment to the Constitution of the United States) have been carved out by SCOTUS during mob investigations and the International War on Terror, no, the people of the US want secure communication. The law enforcement state wants back doors and keep telling tech folk to nerd harder to make back doors not already known to industrial spies, enthusiast hackers and foreign agents.

      You're asking for three perpendicular lines on a plane. You're asking for a mathematical impossibility.

      And remember industrial spies includes the subsets of industries local and foreign, and political spies behind specific ideologies who do not like you and are against specifically your own personhood.

      • This is exactly the sort of argument I was talking about

        • The forth amendment counts for less than the paper it is written on outside the bounds of the US
        • Most of the rest of the world has laws requiring companies that operate in their jurisdiction - even if they aren't based in that country - to prove access to law enforcement if requested
        • If complying with the law is truly actually impossible, then don't be surprised if a country turns around and says "ok, you can't operate here". Just because you are based in the US and have a different set of cultural values, doesn't mean you get to ignore laws you don't like

        To illustrate the sort of compromise that could have been possible, imagine if Apple and Google had got together and proposed a scheme where, if presented with:

        • A physical device
        • An arrest warrant aledging involvement in one of a list of specific serious crimes (rape, murder, csam etc)

        They would sign an update for that specific handset that provided access for law enforcement, so long as the nations pass and maintain laws that forbid it's use outside of a prosecution. It's not perfect for anyone - law enforcement would want more access, and it does compromise some people privacy - but it's probably better than "no encryption for anyone".

95 comments