[ weird things ] | why we can’t give governments encryption backdoors

why we can’t give governments encryption backdoors

District Attorneys want tech companies to create a backdoor to access encrypted information. And if they ever get their wish, you can kiss e-commerce goodbye.
cybersecurity

Imagine that every time you had to buy a lock to your house, you had to send a key to some far off government office which could use it to enter your house at any time. Whoever it sent would not be required to have a warrant, or may have obtained one in a secret procedure you’d have no right to challenge, or even talk about with others, and can make copies of anything you own, liable to be used against you in whatever investigations sent him there. And what if a greedy or desperate government clerk in charge of people’s keys sells them to gangs of thieves who now have access to your house, or mandated that all locks should be easy to pick for agents since a key sent in by a person could be fake or misplaced? Sounds like the plot of a dystopian novel in which a dictator tries to consolidate newly found power, doesn’t it? And when questioned, could you not see this despot justifying such overreach by claiming it was your protection and it would only be used for catching and convicting the worst sort of violent and perverted criminals?

Well, a similar situation is currently happening in the tech world as governments demand that a system designed to keep your private data secure from prying eyes comes with a backdoor for spooks and cops. The data about your comings and goings, your searches for directions, your medical data, your browsing habits, your credit card information and sensitive passwords, they want it all to be accessible at the click of a button to stop all manner of evildoers. Just listen to a passionate plea from a New York District Attorney designed to make you think that encryption is only for the criminally malevolent mastermind trying to escape well-deserved justice…

This defendant’s appreciation of the safety that the iOS 8 operating system afforded him is surely shared by […] defendants in every jurisdiction in America charged with all manner of crimes, including rape, kidnapping, robbery, promotion of child pornography, larceny, and presumably by those interested in committing acts of terrorism. Criminal defendants across the nation are the principal beneficiaries of iOS 8, and the safety of all American communities is imperiled by it.

Wow, terrorists, pedophiles, rapists, kidnappers, and more, all in one sentence. If he only found some way to work in illegal immigrants, we could have won a game of Paranoia Bingo. Notably missing from his list of principal beneficiaries of better encryption, however, are those trying to keep their banking and credit card information safe from the very defendants he’s so very keen on prosecuting. Who, by the way, vastly outnumber the defendants for whom having some sort of an encryption defeating backdoor would be a huge boon for committing more crimes. If your primary goal is to stop crime, you should not be asking for a technical solution which would very quickly become the primary means of committing more of it. Computers will not understand the difference between a spy trying to catch a terrorist sleeper cell and a carder trying to get some magnetic strip data for a shopping spree with someone else’s money. A backdoor that will work for the former, will work exactly the same way for the latter, and no amount of scaremongering, special pleading, and threats from the technically illiterate will ever change that fact.

# tech // encryption / law enforcement / scare mongering


  Show Comments