• andrew_bidlaw
    link
    fedilink
    182 years ago

    If apps would turn off e2e encryption, how would it be? Would it affect bordering regions? Users of VPNs inside EU?

    My country proposed a ban on VPN software (targeting appstores providibg them), it can also target messengers. If I get a EU version of this app, or if I use a european VPN to connect via it, would I be less safe sending political memes?

      • Onii-Chan
        link
        fedilink
        22 years ago

        Fascism, authoritarianism, totalitarian dystopian thinking, it’s all the same to me when it comes to the State overstepping and blatantly looking to pass laws that remove the right to privacy and autonomy from citizens. I’m no leftist ideologue, I skew libertarian right (although I couldn’t describe all the nuance of my views within the context of a simple label), but if there’s one thing we have in common, it’s our hatred of government overreach and corporate control of the masses.

        Fuck authoritarianism. Fuck collectivist bullshit. Never stand for the trampling of your rights.

  • @[email protected]
    link
    fedilink
    462 years ago

    While this would be terrible if it passes, a part of me hopes a silver lining would be a massive surge in open source development focusing on privacy respecting software that does not follow or enable this disgusting behavior by the eu

        • @[email protected]
          link
          fedilink
          162 years ago

          If you are using Windows or mac, they will be first in line to implement “protection” against “insecure software” :)

          • @[email protected]
            link
            fedilink
            72 years ago

            When I said privacy respecting software, I definitely did not mean windows or Mac lol. Open source is the only way to actually know something respects your privacy, so both those pieces of software are inherently not that. Linux for life!

          • @[email protected]
            link
            fedilink
            42 years ago

            That’s like already the thing, if I modify my little “secure encrypted sharing protocol” windows will flag it as a virus if I send it (the software) to someone … Then after some time it’s ok. Guess it’s about those antivirus heuristics, but it’s not like it’s not putting a big stick in my bicycle wheel.

          • @[email protected]
            link
            fedilink
            102 years ago

            Or Android with Google Play. It already does this BS, even if you disable scanning.

            Lineage/Graphene/DivestOS here I come.

            • @[email protected]
              link
              fedilink
              32 years ago

              Yesterday Google play kindly un-installed KDE connect for my “security” as it is a “dangerous app”

              I promptly re-installed from f-Droid.

              • @[email protected]
                link
                fedilink
                1
                edit-2
                2 years ago

                And since I didn’t want to root my old phone, I just disabled all of the Google services via adb.

                • @[email protected]
                  link
                  fedilink
                  12 years ago

                  But, but, now your phone could be hacked!! 🤣

                  (yes, sarcasm, lol)

                  The Google bootlickers tell me my phone is at risk since it’s rooted. As if every single Linux, Unix, and Windows box doesn’t have root access for specific users. And Windows is so flawed they require a privilege escalation to perform fairly innocuous functions.

              • @[email protected]
                link
                fedilink
                22 years ago

                But all the Google defenders will say “it was for our own good” or the app dev did something that looked suspicious. 🤦‍♂️

    • @[email protected]
      link
      fedilink
      72 years ago

      I’m sure they will tell you it’s weighing the security (against terrorists, criminals, etc) of the many against the security (from seeing dick pics or messaging a mistress) of the few.

      • @[email protected]
        link
        fedilink
        42 years ago

        The thing that always kills me about that phrase is “the needs of the many” are “the needs of the few,” because “the many” is just a gaggle of “fews.”

    • @[email protected]
      link
      fedilink
      132 years ago

      As I remember at the moment partly Von Der Leyen, the current Commission president. She is a German Christian democrat and apparently bit with capital C. Meaning she has bit of a moral panic streak on her of the “won’t you think of the children” variety. As I understand this current proposal is very much driven by her.

      However her driving it doesn’t mean it sail through to pass as legislation. Some whole memberstate governments are against the encryption busting idea.

      • Fox Trenton
        link
        fedilink
        62 years ago

        And the fact that Ylva Johansson, being technologically illiterate as well as a close bed buddy with companies in the surveillance industry that stand to earn a crap load of money doesn’t help…

      • @[email protected]
        link
        fedilink
        32 years ago

        Wait, you have a choice to vote for either puppet 1, puppet 2, or puppet 3. Your choice matters! … as long as the politicians podiums are provided by the rich we don’t have a real say.

  • @[email protected]
    link
    fedilink
    162 years ago

    I wonder if openPGP will ever gain popularity.

    The only ones I have seen that even publish a key for me to use are a few famous internet individuals (people like Richard stallman, (I don’t know if he specifically uses it)), a few companies like mullvad, a few orgs like EFF, whistleblowers, and a few governmental organisations like the Financial Supervisory Authority in my country.

    • Barthol
      link
      fedilink
      12
      edit-2
      2 years ago

      @lud @makeasnek With more government controls and intervention, its possible. I learned how to use PGP pretty efficiently but there is absolutely no one in my daily life that also uses it.

      Manual encryption with personal keys may become the norm if less and less services are able to use it.

  • Scott
    link
    fedilink
    English
    542 years ago

    Making it illegal only hampers those that follow the law.

    Criminals, by definition, already don’t follow the law.

    • @[email protected]
      link
      fedilink
      32 years ago

      Thing is, there are a load of people who don’t have the know how, time and/or care to use an alternative. That goes for scum bags sharing child porn, terrorists teaching how to make an easy pipe bomb, journalists reporting on local corruption, people sending flirty sexts to their spouses, activists trying to get a movement going, anti-vax groups, people trying to source dubiously legal and/or ethical drugs/medicines… and so on.

      Banning it in mainstream apps and legal stores makes it harder - and harder to know if you can trust an app (is this niche one I found through pirates-r-us forum really trustworthy) - and easier to spot and target those who use illegal/minority options.

      So I think you would catch and block a load of CSAM, even though obviously not all.

  • UnfortunateShort
    link
    fedilink
    452 years ago

    This is almost definitely not going through the ECJ. If they pass this directive I’m gonna take my chances.

    Thanks to the Matrix protocol there is no chance of getting rid of E2EE communication anyway. There is no feasible way to stop decentralized communication like that, no without killing the internet.

    • @[email protected]
      link
      fedilink
      92 years ago

      Also I would add, not like this is unanimously supported in EU among memberstates. So this isn’t a done deal, this is a legislative proposal. Ofcourse everyone should activate and campaign on this, but its not like this is “Privacy activists vs all of EU and all the member state governments” situation. Some official government positions on this one are “this should not pass like it is, breaking the encryption is bad idea”.

      Wouldn’t be first time EU commission proposal falls. Plus as you said ECJ would most likely rule it as being against the Charter of Rights of European Union as too wide breach of right to privacy.

  • Flying Squid
    link
    fedilink
    82 years ago

    Assume any encrypted system can be decrypted at some point anyway. The best encryption is at the source- your language and the way you present the message you want to keep hidden.

    Of course, this does not apply to people who just want their general conversation encrypted. To you, I say you’re out of luck and I’m sorry.

    • @[email protected]
      link
      fedilink
      32 years ago

      I suspect you can easily relate to the frustration of being dragged into arguments on irrelevant details of a thing for which the actual concerns are fundamental in nature. That’s not nothing.

      • WuTang
        link
        fedilink
        English
        12 years ago

        yep, like a magician driving your sight to his left hand…

  • @[email protected]
    link
    fedilink
    82 years ago

    Can this be circumvented somehow? And how would apps with end to end encryption work if a person in a non-EU state spoke to someone inside the EU?

    • hackerman
      link
      fedilink
      162 years ago

      Anything can be circumvented, VPNs, Tor, I2P, and some other more unknown apps like briar. The issue will become will using those services become illegal too, and the barrier of entry becoming too high for those outside of the technical world. Signal will definitely just pull support for the EU, so you’ll have to trick it into thinking you’re not in the EU. But now you’re at risk of running a foul with the law.

      • Fox Trenton
        link
        fedilink
        32 years ago

        I’m curious if only particular apps/software is going to be monitored this way? I mean, if I encrypt outside a messaging app like Signal or outside mail, using OTP, OpenPGP, AES-256or or something similar, or using a combination of VPN, Tor and Cryptpad för creating messages, meaning that when the message is entered into the monitored app, it is already encrypted?

        • @[email protected]
          link
          fedilink
          22 years ago

          That’s exactly why a law like this wouldn’t make sense, even if you don’t care about privacy.

          To enforce a ban of encrypted messaging, any software capable of encryption would have to be banned. Next step almost every existing operating system would have to be banned as well.

  • @[email protected]
    link
    fedilink
    52 years ago

    Would a way to legally bypass this be an app that can “encrypt” your text before your send it. The government would be able to see all of your messages but it would be scrambled in a way that they couldn’t read it.

    Something where both people would install the same text scrambling app and generate the same key to scramble all text (would need to do in person). They would then type all their text into the app and it would scramble it. The user would then copy The Scrambled text and send it over any messaging platform they want. The recipient would need to copy the text and put it back into the scrambling app to descramble it.

  • @[email protected]
    link
    fedilink
    1322 years ago

    I have helped a little with some ongoing research on the subject of client-side-scanning in a European research center. Only some low level stuff, but I possess a solid background in IT security and I can explain a little what the proposition made to the EU is. I am by no means condemning what is proposed here.I myself based on what experts have explained am against the whole idea because of the slippery slope it creates for authoritarian government and how easily it can be abused.

    The idea is to use perceptual hashing to create a local or remote database of known abuse material (Basically creating an approximation of already known CP content and hashing it) and then comparing all images accessible to the messaging app against this database by using the same perceptual hashing process on them.

    It’s called Client-Side-Scanning because of the fact that it’s simply circumventing the encryption process. Circumvention in this case means that the process happens outside of the communication protocol, either before or after the images, media, etc, are sent. It does not matter that you use end-to-end encryption if the scanning is happening on you data at rest on your device and not in transit. In this sense it wouldn’t directly have an adverse effect on end-to-end encryption.

    Some of the most obvious issues with this idea, outside of the blatant privacy violation are:

    1. Performance: how big is the database going to get? Do we ever stop including stuff?
    2. Ethical: Who is responsible for including hashes in the database? Once a hash is in there it’s probably impossible to tell what it represent, this can obviously be abused by unscrupulous governments.
    3. Personal: There is heavy social stigma associated with CP and child abuse. Because of how they work, perceptual hashes are going to create false positives. How are these false positives going to be addressed by the authorities? Because when the police come knocking on your door looking for CP, your neighbors might not care or understand that it was a false positive.
    4. False positives: the false positive rate for single hashes is going to stay roughly the same but the bigger the database gets the more false positive there is going to be. This will quickly lead to problems managing false positive.
    5. Authorities: Local Authorities are generally stretcht thin and have limited resources. Who is going to deal with the influx of reports coming from this system?
      • @[email protected]
        link
        fedilink
        62 years ago

        I’m deeply against this ridiculous proposal.

        But scanning of messages already happens, tbf, for spell checking, emoji replacement, links to known infectious sites.

        Photo copiers do client side scanning to prevent copying of money.

        There are precedents.

        I hate this proposal. But let’s be straight about the facts: The phone has full access to everything you send and receive already. This isn’t the same as having an encryption back door.

        • possibly a cat
          link
          fedilink
          72 years ago

          There are precedents, but we can forego these if we want. I don’t have to use Google’s keyboard. I can even degoogle my phone with Graphene OS. Some black boxes remain of course but they are small and relatively secure. Meanwhile a client-side scanner is adding an unavoidable increase to the attack surface. That’s a weakened security environment. And not just for your cat videos, but for journalists and others dealing with sensitive materials.

          I can’t wait to see how many horrible implementations devs come up with because this feature provides no value for their employers.

    • @[email protected]
      link
      fedilink
      332 years ago

      This is a really nice summary of the practical issues surrounding this.

      There is one more that I would like to call out: how does this client scanning code end up running in your phone? i.e. who pushes it there and keeps it up to date (and by consequence the database).

      I can think of a few options:

      1. The messaging app owner includes this as part of their code, and for every msg/image/etc checks before send (/receive?)
      2. The phone OS vendor puts it there, bakes it as part of the image store/retrieval API - in a sense it works more on your gallery than your messaging app
      3. The phone vendor puts it there, just like they already do for their branded apps.
      4. Your mobile operator puts it there, just like they already do for their stuff

      Each of these has its own problems/challenges. How to compel them to insert this (ahem “backdoor”), and the different risks with each of them.

      • @[email protected]
        link
        fedilink
        202 years ago

        Another problem: legislation like this cements the status quo. It’s easy enough for large incumbents to add features like this, but to a handful of programmers trying to launch an app from their garage, this adds another hurdle into the process. Remember: Signal and Telegram are only about a decade old, we’ve seen new (and better) apps launch recently. Is that going to stop?

        It’s easy to say “this is just a simple hash lookup, it’s not that big a deal!”, but (1) it opens the door to client-side requirements in legislation, it’s unlikely to stop here, (2) if other countries follow suit, devs will need to implement a bunch of geo-dependant (?) lookups, and (3) someone is going to have to monitor compliance, and make sure images are actually being verified–which also opens small companies up to difficult legal actions. How do you prove your client is complying? How can you monitor to make sure it’s working without violating user privacy?

        Also: doesn’t this close the door on open software? How can you allow users to install open source message apps, or (if the lookup is OS-level) Linux or a free version of Android that they’re able to build themselves? If they can, what’s to stop pedophiles from just doing that–and disabling the checks?

        If you don’t ban user-modifiable software on phones, you’ve just added an extra hurdle for creeps: they just need to install a new version. If you do, you’ve handed total control of phones to corporations, and especially big established corporations.

    • @[email protected]
      link
      fedilink
      52 years ago

      I get the concept but this doesnt realy offer any advantages over just not encrypting anything at all. The database being checked againts can still just include a hash of somethibg the governemnt doesnt like and boom u have a complete tool for absolute cencoring of everything.

    • @[email protected]
      link
      fedilink
      3
      edit-2
      2 years ago

      Thanks for the explanation. Do you know how they’re planning to implement this client side scanning? Take an iPhone for example— where Apple has already ditched their plans to do the same device-wide. Is it planned for WhatsApp, Signal etc. to be updated to force perpetual scanning of the iPhone’s photo album? Because that can be turned off quite easily at the OS level.

      The only way I could see them doing it is by scanning any image that is selectively chosen to be sent before the actual message itself is sent—i.e. after it’s selected but before the send button is pressed. Otherwise it’s breaking the E2E encryption.

      Is that the plan?

      • @[email protected]
        link
        fedilink
        52 years ago

        Client-Side-Scanning is going to be implemented by the messaging app vendor. This means that it’s limited by OS or Browser sandboxing . Therefore it’s definitely limited to what the messaging app has access to. However, I’m not sure what the actual scope would be, meaning if all accessible images are going to be scanned or only the one being transmitted to someone.

        • @[email protected]
          link
          fedilink
          42 years ago

          What stops you from using a free software client that verifiably doesn’t do so? The mainstream messengers were not safe already anyway.

  • bedrooms
    link
    fedilink
    1522 years ago

    Terrorists will have no problem writing their own encryption program, and more ordinary citizens will install malicious apps from unofficial app stores.

    • @[email protected]
      link
      fedilink
      422 years ago

      And everyone else will have their shit dumped out in the open when ai starts breaking through all the back doors and manipulating officials into clearing them

    • WuTang
      link
      fedilink
      English
      62 years ago

      Ah… terrorist, the magic word. That’s why you can’t have a SIM card which is not tied to your ID or passport in EU since 2015. Terrorists actions allowing an state entity throwing 4000t of explosive on civils in a weekend… yep yep…

      more seriously (though I wasn’t totally kidding), your non-tech relatives and friends are all on whatsapp/insta/messenger, good luck to move them.