• @[email protected]
    link
    fedilink
    31 day ago

    The only way to add a backdoor to E2EE is to make it not E2E, so I don’t see how apple bad here, in this case. Can somebody clue me in?

    • @[email protected]OP
      link
      fedilink
      31 day ago

      You can add a switch inside the program which makes it give up its E2E encryption keys to some random third party who asks, who is able to demonstrate to the program’s satisfaction that they are from the government. I don’t know about this particular case, but that is the type of feature that governments periodically try to demand that software companies add to E2EE products, and it is exactly as bad an idea as it sounds like. And yes, Apple is being good by telling them “absolutely not.” They have also said the same to the US government several times now.

      Very, very occasionally, governments have succeeded in talking people into doing this. On every occasion that I know of, people who are not the government have started using the feature to eavesdrop on people’s communications. Even though it means they have to lie to the software! I know, it’s terrible, the things that people do in the modern world.

  • Nightwatch Admin
    link
    fedilink
    19
    edit-2
    2 days ago

    Aside from regular users: Bad news for businesses that rely on such features, even if only for their compliance tickboxes. Or are those exempt?

    Edit: so many more questions:

    • why only Apple? Why not, say, Proton?
    • how does this work for tourists, expats, business travelers, … ? Is Apple relying on IP address, account details?
    • @[email protected]
      link
      fedilink
      115 hours ago

      For your first question, my guess would be its the largest fish. Proton probably has some users that harbor useful information but think about apples market dominace. It’s massive. And as far as I know, proton doesn’t have a business presence directly under UK jurisdiction; Apple has an enormous presence and billions in previous investments for employees and infrastructure there. Making it much easier to enforce those laws on them.

      In other words, it’s like living in the country versus living in another country. My home country will have a much easier time forcing laws on me than a country I’m not even living in.

      I’m unable to answer your second question though. I don’t know enough about legality.

    • @[email protected]
      link
      fedilink
      92 days ago

      Apple is probably betting they can twist the UKs arm until they roll back the requirements. In the long run this is better for users.

    • metaStatic
      link
      fedilink
      302 days ago

      it’s the only way to maintain trust. as soon as you publicly compromise even a small part of the system the whole thing is worthless.

      • _cryptagion [he/him]
        link
        fedilink
        English
        32 days ago

        Yeah, they should have taken a stand and been banned for breaking the law, that would have showed the government.

      • @[email protected]
        link
        fedilink
        11 day ago

        What’s the alternative? Strong arm a democratically elected — even if stupid at times — government to change policy? That’s a terrifying precedent.

        The other alternative is to backdoor or otherwise compromise users in other jurisdictions. Glad they didn’t do that.

  • @[email protected]
    link
    fedilink
    English
    02 days ago

    Eh, just doing it for the good PR I guess. UK is still going to get access to everyone’s files through the NSA-to-UK pipeline.

    • @[email protected]OP
      link
      fedilink
      32 days ago

      I wouldn’t be completely sure.

      1. The NSA doesn’t just do whatever is the worst thing for everyone at every given time. There’s no particular guarantee that the NSA will share any given communication with any given UK agency that wants it at the drop of a hat, although for major problems (like climate activists! those awful people /s) they may share pretty freely. E2EE is still a significant obstacle even if the NSA has it broken completely.
      2. There’s no guarantee that the NSA has broken it completely. Edward Snowden’s leaks about how the NSA had HTTPS broken are a fascinating and rare window into what the reality of their secret capabilities actually are. TL;DR, they either couldn’t or didn’t want to spend the resources to break the core encryption, so instead they arranged to smuggle subtly insecure master keys into vital places in the supply chain, so that they could exploit the flaws in those keys and read a significant fraction but not all HTTPS traffic (the fraction that was derived from those insecure keys). Of course their capabilities have improved since then, but so have the standards of encryption. I think the assumption “they can read some but not all encrypted traffic” is probably a good ballpark to use for their present-day capabilities, after however many years of both sides of the arms race continuing to evolve in tandem from that point.
          • @bokherif
            link
            -22 days ago

            Lol I mean honestly if you believe that the governments allow people to use tech that they don’t have a backdoor in, I believe that’s good for your mental health. Just a bit naive is all.

            • @[email protected]OP
              link
              fedilink
              5
              edit-2
              1 day ago

              Not everything that happens in every single software company, university, and so on, all across the land, is because the government has “allowed” it. For one thing, a lot of cryptography research and software development happens outside of “the” country, far from anywhere that “the” governments would be able to allow it or not.

              Actually, the US government in the 90s actually did make a really substantial effort to make it illegal to use cryptography that they couldn’t crack. Their efforts did not meet with universal success even before they abandoned them. That was the whole impetus behind T-shirts with the PGP source code (And tattoos! Seriously, one of my friends met somebody with a PGP source code tattoo, back when it was questionably legal to have one.) There are quotes by many many people about the limits of what the government is able to dictate to people that they are and are not able to do, even in very strict totalitarian societies.

              You seem very confident in your opinion so I won’t try to dissuade you from it any further. Just taking a little time to try to shed some light. There actually are ways you can find out about how this stuff works in reality, though, to at least a little bit of an extent. Like I said, the Snowden leaks are a really good and fascinating way.

              Best of luck! Starting from a standpoint of total skepticism and suspicion of everything online-related and government-related probably isn’t a bad place to start from, all things considered.

            • Natanael
              link
              fedilink
              21 day ago

              The governments doesn’t control enough of the world’s programmers to pull that off