Re: DOJ asks Google to back off on https

Talk about ironic: None of us can read the story of DOJ complaining
about user encryption, because of Law360's use of encryption...

V'q funer zl gubhtugf ba gung ohg gurl ner rapelcgrq! ;)

On Wed, Jan 28, 2015 at 1:56 PM, Joe Hall <joe@cdt.org> wrote:
> I can't read it either but the focus of FBI/DOJ has been device
> encryption... if it is transport encryption (https, dtls, etc.)
> someone let me know!!! best, Joe
>
> On Wed, Jan 28, 2015 at 6:24 AM, Mike O'Neill
> <michael.oneill@baycloud.com> wrote:
>> -----BEGIN PGP SIGNED MESSAGE-----
>> Hash: SHA1
>>
>> I haven't got a subscription but this appears relevant to our discussions. Has anyone got more information?
>>
>> http://www.lexisnexis.com/legalnewsroom/technology/b/newsheadlines/archive/2015/01/27/doj-atty-joins-call-for-google-to-back-off-data-encryption.aspx
>>
>> Mike
>>
>>
>>
>>> -----Original Message-----
>>> From: Mike O'Neill [mailto:michael.oneill@baycloud.com]
>>> Sent: 28 January 2015 09:12
>>> To: 'David Singer'
>>> Cc: 'Danny Weitzner'; 'Rigo Wenning'; public-privacy@w3.org
>>> Subject: RE: On the european response to Snowden
>>>
>>> *** gpg4o | Valid Signature from 7331532E2E5E6D89 Mike O'Neill
>>> <michael.oneill@btinternet.com> ***
>>>
>>> David, comments to your comments inline
>>>
>>> > -----Original Message-----
>>> > From: David Singer [mailto:singer@apple.com]
>>> > Sent: 27 January 2015 14:33
>>> > To: Mike O'Neill
>>> > Cc: Danny Weitzner; Rigo Wenning; public-privacy@w3.org
>>> > Subject: Re: On the european response to Snowden
>>> >
>>> > Thanks Mike, comments inline
>>> >
>>> > > 1) Signalling.
>>> > >   We saw a bit of this in the DNT discussions. How to create a signal
>>> > conveying a user's explicit agreement for something or their preferences for
>>> > something to one or more entities that may exist across multiple origins, in a
>>> > secure untamperable way. This may eventually be superseded by:
>>> >
>>> > A challenging problem.  These signals and preferences tend to be small, and
>>> > padding them and then signing them digitally would seem to be using a
>>> > sledgehammer to crack a walnut.  But maybe the walnut is growing in
>>> > importance.  Other ideas?
>>>
>>> I was meaning more the general problem of signalling between entities, i.e.
>>> between the UA acting for an individual and companies which control many
>>> domains/origins. There are several use-cases that came up in DNT and it
>>> requires authentication of identity which was also why it will be subsumed into
>>> point 2.
>>>
>>> >
>>> > > 2) Anonymity.
>>> > >   To ensure privacy we should be able to trawl the net anonymously, but
>>> > with some identity available through defined transactional processes. For
>>> > example we may allow a subset of our identity to be discovered by some
>>> parties
>>> > we know about and have reached agreement with. This might just be a broad
>>> > audience categorisation (male, geek, whatever) or it might be more specific
>>> > (MEP, a particular child's parent, member of a club). Visible identity changes
>>> with
>>> > circumstances i.e. I could anonymously apply for a loan or agree to pay for a
>>> > purchase but I would need to be accountable. My legal identity would have to
>>> be
>>> > discoverable in certain agreed circumstances. We may also agree, through
>>> > membership of a "rule of law" jurisdiction ,that our identity is discoverable by
>>> > law enforcement under agreed (by society) circumstances.
>>> > >
>>> > > This may go beyond HTTP, i.e. IPv6 anon. auto configuration everywhere or
>>> a
>>> > new internetworking layer, focus on stopping fingerprinting, and it is a big one.
>>> > It will need heavy guns.
>>> >
>>> > Online anonymity -- secrecy -- is hard, as you know. ToR is hardly an easy or
>>> > universal solution. I recently did the thought experiment "what if every router
>>> > was a NAT box?" -- this would mean that IP addresses would be useless as
>>> > proxies for identity -- and the answer is that anonymity would improve but
>>> > many other things (e.g. phone calls) would suffer. Again, ideas for this would
>>> be
>>> > good.
>>>
>>> I think there should be an out-of-band identity exchange, non-trackable i.e. does
>>> not use UUIDs but established below the tunnel. Maybe in the https handshake
>>> or in an internetwork layer.
>>> The identity exchange should be under the control of both parties, but also
>>> visible to third-parties in defined circumstances for instance when accountability
>>> or law enforcement is required.
>>>
>>> >
>>> > > 3) Encryption.
>>> > >
>>> > > There is talk about making end-to-end encryption illegal. While this may
>>> seem
>>> > silly and is probably a shot across the bows, https everywhere stirs the hornet's
>>> > nest. I think an answer involves some process whereby https is made more
>>> > secure (via certificate pinning etc.), available to anyone but that law
>>> > enforcement is given the means to determine identity through an
>>> internationally
>>> > agreed process i.e. along the lines of 2).
>>> > >
>>> > > I think any backdooring process will just end up helping the bad guys, so we
>>> > have full ETO encryption available but if the net can properly ensure privacy
>>> and
>>> > security only a minority will need it.
>>> >
>>> > So you envisage encryption that is end-to-end and backdoor free, but
>>> > nonetheless accessible to lawful intercept. Challenging in today's
>>> environment,
>>> > but maybe there is a solution.
>>>
>>> I was thinking more that the identity was visible to lawful intercept, not
>>> necessarily the encrypted content. But if privacy and security are guaranteed
>>> without encryption then there would be less need for it. I forgot to mention
>>> integrity, there should be a way to ensure integrity of the data (such as
>>> javascript) transmitted between mutually identified parties, without having to
>>> put everything through an encrypted tunnel.
>>>
>>> >
>>> > David Singer
>>> > Manager, Software Standards, Apple Inc.
>>> >
>>>
>>> Mike
>>
>> -----BEGIN PGP SIGNATURE-----
>> Version: GnuPG v1.4.13 (MingW32)
>> Comment: Using gpg4o v3.4.19.5391 - http://www.gpg4o.com/
>> Charset: utf-8
>>
>> iQEcBAEBAgAGBQJUyMbdAAoJEHMxUy4uXm2JT/MIANU1HsCIzE0NvqYGBerIZOGm
>> ccTLlJ5JPs9FqRQ2rmhUVDZ0I8SbhbP0mSiHOMtMkXRJKr6HzTDWgQES4NcUOs2j
>> qvN5075sbyc/iySfEFqBRYM/nBtYBTMNZRc5Arv5VBCPaJVSfSxqSaEZ3HtD0hbW
>> L/2McPaw3ZAnEDAU1Dz0mFfdn0f40Gog0EqOFpTUIXC5QuuFiyDmJOKwE5IfOfoH
>> 4Ca9u4DHbyYAKn7H73wP3QfzLQUKNkgwPnH756RM3aGFhpHv/PRVAGhe7utRuPkP
>> r35134ey75dC+4aP9tNzDka5Vco+Nlk9TDfoGmPMCKr3UhHfu1P7GbWQajLC44o=
>> =C1+x
>> -----END PGP SIGNATURE-----
>>
>>
>
>
>
> --
> Joseph Lorenzo Hall
> Chief Technologist
> Center for Democracy & Technology
> 1634 I ST NW STE 1100
> Washington DC 20006-4011
> (p) 202-407-8825
> (f) 202-637-0968
> joe@cdt.org
> PGP: https://josephhall.org/gpg-key
> fingerprint: 3CA2 8D7B 9F6D DBD3 4B10  1607 5F86 6987 40A9 A871
>



-- 
John S. Erickson, Ph.D.
Director of Operations, The Rensselaer IDEA
Deputy Director, Web Science Research Center (RPI)
<http://tw.rpi.edu> <olyerickson@gmail.com>
Twitter & Skype: olyerickson

Received on Wednesday, 28 January 2015 19:44:14 UTC