Sign In

Communications of the ACM

Practice

More Encryption Means Less Privacy


View as: Print Mobile App ACM Digital Library Full Text (PDF) In the Digital Edition Share: Send by email Share on reddit Share on StumbleUpon Share on Hacker News Share on Tweeter Share on Facebook
More Encryption Means Less Privacy, illustration

Credit: Alicia Kubista / Andrij Borys Associates

back to top 

When Edward Snowden made it known to the world that pretty much all traffic on the Internet was collected and searched by the U.S. National Security Agency (NSA), the U.K. Government Communications Headquarters (GCHQ), and various other countries' secret services as well, the IT and networking communities were furious and felt betrayed.

A wave of activism followed to get traffic encrypted so as to make it impossible for NSA to indiscriminately snoop on the entire world population. When all you have is a hammer, all problems look like nails, and the available hammer was the SSL/TLS encryption protocol, so the battle cry was "SSL/TLS/HTTPS everywhere." A lot of nails have been hit with that!

After an animated plenary session in Vancouver, the Internet Engineering Task Force (IETF) published "Best Current Practice 188" (https://tools.ietf.org/html/bcp188), which declared that pervasive monitoring is a technical attack that should be mitigated in the design of IETF protocols where possible. Now, with this manifesto in hand, SSL/TLS and encryption are being hammered into and bolted onto protocols and standards throughout the IETF working groups.

Victoryprivacyseemed certain. Or maybe not.

  • Kazakhstan recently announced that a "state root certificate" would have to be installed on all computers wanting to use SSL/TLS/HTTPS out of the country.
  • France's ministry of the interior is working on banning free WiFi connections and the use of the Tor protocol and networks.
  • President Obama urged high-tech and law enforcement leaders to make it more difficult for terrorists to use technology to escape from justice.

Other countries, notably the U.K., are also working to clamp down on encryption. The Great Firewall of China has been in operation for a number of years, and for all we know, the NSA's total monitoring of the Internet continues unabated 2.5 years after Snowden revealed it to the world. The things worth noting here are:

  • Kazakhstan did not just require criminals to install the "state root certificate" so their communications could be scrutinized, it required everybody in Kazakhstan to do so.
  • France will not just ban criminals from using free WiFi and Tor, it will ban anybody and everybody from using them.
  • While Obama wants to make it "harder for terrorists," I don't think he contemplates Apple offering an "OS X terrorist edition" or that terrorists will take an FBI-sponsored "Are you a terrorist?" quiz to find out if they should be using it.

Whatever the high-tech and law enforcement leaders decide, it will apply to everybody.

Back to Top

How Did More Encryption Cause Less Privacy?

In Terry Pratchett's Going Postal, the hero postmaster, Moist von Lipwig, has a knack for noticing what is not in a text. He would have had a field day with BCP188 because none of the following words are anywhere to be found:

  • law
  • court
  • crime
  • human
  • secret
  • warrant
  • espionage
  • constitution
  • jurisdiction

It was not by accident, mind you, the authors of the document deliberately stayed clear of anything that could even faintly smell of "politics." Unfortunately, that is not the way politics works. Politics springs into action the moment somebody disagrees with you because of their political point of view, even if you think you do not have a political point of view.

In spite of leaving out all those "hot" words, the substance of BCP188 is still a manifesto declaring a universal human right to absolute privacy in electronic communicationsno matter what.

That last bit is half the troubleno matter what.

Even against law enforcement.

Even if law enforcement has a court order.

Even if ...

No matter what.

To be totally fair, BCP188 nowhere states "no matter what." The real reason the result ends up being "no matter what" is the SSL/TLS protocol, when properly configured, works as advertised: there is no way to break it.

The other half of the trouble is the hallmark of a civilized society is a judicial system that can right wrongs, and therefore human rights are always footnoted. The United Nation's Human Rights Charter has §29.2, which explains:

"In the exercise of his rights and freedoms, everyone shall be subject only to such limitations as are determined by law solely for the purpose of securing due recognition and respect for the rights and freedoms of others and of meeting the just requirements of morality, public order and the general welfare in a democratic society."

Politicians, whose jobs are to maintain "public order" and improve "the general welfare," follow the general principle that if criminals can use X to commit crimes, the legal system should be able to use X to solve crimes, with only two universally recognized exemptions: when "X = your brain" and when "X = your spouse."

For instance, U.S. kids learn in school that the Fourth Amendment affords a right to privacy, but that is only the first half of it. The second half details precisely how and why you may lose that privacy:

"The right of the people to be secure in their persons, houses, papers, and effects, against unreasonable searches and seizures, shall not be violated, and no Warrants shall issue, but upon probable cause, supported by Oath or affirmation, and particularly describing the place to be searched, and the persons or things to be seized."


When all you have is a hammer, all problems look like nails, and the available hammer was the SSL/TLS encryption protocol, so the battle cry was "SSL/TLS/HTTPS everywhere." A lot of nails have been hit with that!


As this example also shows, wise lawmakers are wary of making it too easy for the legal system, so they add checks and balances.

Political strategies regarding cryptography are all horrible: Kazakhstan brutally inserts state monitors into the middle of all encrypted traffic. France forbids all online anonymity. The U.S. wants backdoors built into all crypto. These ideas are all based on the same principle: If we cannot break the crypto for a specific criminal on demand, we will preemptively break it for everybody. And whatever you may feel about politicians, they do have the legitimacy and power to do so. They have the constitutions, legislative powers, courts of law, and police forces to make this happen.

The IT and networking communities overlooked a wise saying from soldiers and police officers: "Make sure the other side has an easier way out than destroying you."

But we didn't, and they are.

Slapping unbreakable crypto onto more and more packets is just going to make matters worse. The only way to retain any amount of electronic privacy is through political engagement.

q stamp of ACM QueueRelated articles
on queue.acm.org

More Encryption Is Not the Solution
Poul-Henning Kamp
http://queue.acm.org/detail.cfm?id=2508864

Hickory Dickory Doc
George Neville-Neil
http://queue.acm.org/detail.cfm?id=2791303

Compliance Deconstructed
J. C. Cannon and Marilee Byers
http://queue.acm.org/detail.cfm?id=1160449

Back to Top

Author

Poul-Henning Kamp (phk@FreeBSD.org) is one of the primary developers of the FreeBSD operating system which he has worked on from the very beginning. He is widely unknown for his MD5-based password scrambler which protects the passwords on Cisco routers, Juniper routers, and Linux and BSD systems.


Copyright held by author. Publication rights licensed to ACM.

The Digital Library is published by the Association for Computing Machinery. Copyright © 2016 ACM, Inc.


Comments


Richard Threlkeld

If the legal system got a warrant to seize all your correspondence, but some of it was in a language none of them read, they don't have the right to compel you to translate it for them. Similarly, if they can break your encryption and have a proper warrant, the can do so. They don't (at least by the US constitution) have the right to force you to decrypt it and they don't have the right to force third parties to intentionally break their products and lie to you about their security. That does not mean it won't happen, but in our system, it should not.

That said, those with sufficient motivation will always be able to create encryption or other obsfucation to meet their needs. If Apple is compelled to sell broken encryption they will develop their own. If SSL has to use a given root certificate, then they will not use SSL.

In the end, the bad guys can avoid these government intrusions into our privacy, but we generally cannot and any broken encryption will eventually end up in the hands of criminals as has been proven repeatedly.


Ajoy Bhatia

Nowhere in this article has Poul-Henning, the author, claimed that the solution is broken encryption. In my view, the last two sentences are the gist and main takeaway here, which Richard seems to have missed, going by his comment above. Those sentences are:
"Slapping unbreakable crypto onto more and more packets is just going to make matters worse. The only way to retain any amount of electronic privacy is through political engagement."

The solution to this problem has not yet been found, but there has to enough political will in the technology community to solve it. Moreover, the solution has to include the law enforcement perspective. I am yet to see any political will in the technology community to find a solution.


Robert Thibadeau

I am the inventor (at CMU and later as Chief Technologist for Seagate) on self-encrypting drives, now used everyday by over a billion people on earth.

I am very concerned by this article in ACM Communications. I have fought for many years for strong encryption by every man woman and child on earth, and this article plainly fights against it. (BTW:It should have referenced the Art of War in your second to last paragraph).

It say, "political engagement"...I have been on the American Bar Association Digital Evidence and eForensics committee since 2009. I am nearly the only technical person on the committee promoting strong encryption, people with technical expertise can just show up, you would be welcome. However, the lawyers, judges, etc., who show up are widely in favor of my views. There are those of use fighting the political side for years.

Got to www.drivetrust.com , top of the page is my 4 minute live interview on Fox News a few weeks ago, and please read the two pager at the top of that page ('Front Doors not Back Doors').

Giving a backdoor is a bad idea. There should only be Front Doors, and the law should reflect that...as it does by the way already in Medical privacy laws. All iPhones, iPads, TCG standard storage self-encrypting devices, and many other hardware encryption systems support Front door central management and have for many many years. The SSL/TLS proxy mechnism is a front door (but I wish Microsoft and others would make it easier for the user to monitor the certificates installed.) There is a community that has been very involved politically but we are usually ignored as "too techie" -- as Einstein said, roughly, 'simple but not too simple'. The article should really focus on the problem that people shut down their brains when they think you are being too complex but the front door mechanisms provide opportunity for better laws, as it has already happened in Medical PII privacy laws.


Displaying all 3 comments