[AusNOG] Dutton decryption bill
Paul Wilkins
paulwilkins369 at gmail.com
Tue Sep 4 17:56:09 EST 2018
"We have agreed to a Statement of Principles on Access to Evidence and
Encryption
<https://www.homeaffairs.gov.au/about/national-security/five-country-ministerial-2018/access-evidence-encryption>
that sets out a framework for discussion with industry on resolving the
challenges to lawful access posed by encryption, while respecting human
rights and fundamental freedoms."
Interesting...
On Tue, 4 Sep 2018 at 17:34, Serge Burjak <sburjak at systech.com.au> wrote:
>
> https://www.homeaffairs.gov.au/about/national-security/five-country-ministerial-2018
>
> I think it's just been released. Apologies if it's a dupe.
>
> On Tue, 4 Sep 2018 at 14:16, Jim Woodward <jim at alwaysnever.net> wrote:
>
>> Hi All,
>>
>>
>>
>> The problem with the ‘device malware’ approach is also that if such an
>> approach is used where the intention is to target a single device and the
>> software / hardware vendor screws up and deploys the ‘weakened’ application
>> to many devices instead of one specific device then there is the potential
>> to weaken the security and compromise the privacy of others.
>>
>>
>>
>> I’m sure there’s some political double talk that would cover this
>> scenario and that the onus would be solely on the vendor for making sure
>> this does not happen, the worry is that this exact scenario is possible,
>> especially if proof of concepts accidently get released into the wild.
>>
>>
>>
>> The public should be concerned about this for if we end up in a situation
>> where users don’t trust security updates (or updates of any type) then
>> we’re in the same boat as having a purposefully compromised application
>> deployed, we’d have devices with known vulnerabilities with updates turned
>> off which would be arguably more serious as time goes on.
>>
>>
>>
>> I truly believe the reason this legislation is so vague is that they’re
>> trying to find a solution where no one scenario is without significant
>> risks, they’re trying to hold water in a sieve by tipping more water into
>> it in an effort to fill it.
>>
>>
>>
>> Kind Regards,
>>
>> Jim.
>>
>>
>>
>>
>>
>> *From:* AusNOG <ausnog-bounces at lists.ausnog.net> *On Behalf Of *Paul
>> Brooks
>> *Sent:* Tuesday, 4 September 2018 12:05 AM
>> *To:* ausnog at lists.ausnog.net
>> *Subject:* Re: [AusNOG] Dutton decryption bill
>>
>>
>>
>> On 3/09/2018 11:47 AM, Chris Ford wrote:
>>
>> Paul,
>>
>>
>>
>> I agree with you in general as to the point that if we are happy with the
>> premise of the current TIA Act that LEAs should be able to intercept
>> communications with a duly authorised warrant, then extending that to
>> encrypted services seems a reasonable extension to keep up with technology.
>>
>>
>>
>> However, the current intercept regime is very difficult if not impossible
>> for a bad actor to exploit. The intercept points are within the Carrier and
>> CSP networks, out of reach of most people. When we move to intercept
>> end-to-end encrypted services you either need to break the encryption
>> (which thankfully does not seem to be the path anybody is proposing), OR,
>> you need to access the clear text at the end point itself. The problem I
>> have with this is that the end point is out in user land, often accessible
>> to anyone on the internet, and now exposed to exploit by bad actors.
>>
>> ..And this is it. The new legislation is NOT about encryption, primarily,
>> despite what we thought before the draft was released.
>> They've explicitly acknowledged they can't 'break' encryption, and do not
>> want to weaken encryption. They want the sent and received message text,
>> stored in the device after/before the encrypted transport.
>>
>> Its actually a 'device malware' bill - a bill to enable general police
>> forces to achieve things that previously only shadowy four-letter agencies
>> could do - implant malware and modify the function of any end-user device,
>> handset, modem, laptop, tablet, printer, connected TV, Amazon Alexa/Google
>> Home/etc. Actually it goes further - rather than implant the malware
>> themselves once they've achieved physical access, this 'device malware'
>> bill enables them to ask nicely for assistance, and then to require, the
>> device suppliers and manufacturers to build and implant the exploit for
>> them. Why should AS** develop an exploit, when they can ask Apple or
>> Netgear or Samsung nicely to develop and install the exploit for them.
>>
>> We've spent decades educating users that the green padlock on a website
>> means something, and that 'IOT devices' such as your average Smart TV might
>> be easily hijacked and be recording and watching the home through its
>> microphone and embedded webcam. This bill makes government-authorised
>> modified firmware with exploits that the network and software industry have
>> spent billions developing virus scanning apps to detect and eradicate.
>>
>> Paul.
>>
>>
>>
>>
>>
>>
>> --
>>
>> Chris Ford | CTO
>>
>> Inabox Group Limited
>>
>>
>>
>> Ph: + 61 2 8275 6871
>>
>> Mb: +61 401 988 844
>>
>> Em: chris.ford at inaboxgroup.com.au
>> ------------------------------
>>
>> *From:* AusNOG <ausnog-bounces at lists.ausnog.net>
>> <ausnog-bounces at lists.ausnog.net> on behalf of Paul Wilkins
>> <paulwilkins369 at gmail.com> <paulwilkins369 at gmail.com>
>> *Sent:* Monday, 3 September 2018 11:31:14 AM
>> *To:* AusNOG at lists.ausnog.net
>> *Subject:* Re: [AusNOG] Dutton decryption bill
>>
>>
>>
>> Bradley,
>>
>> The Common Law has always allowed judicial scrutiny of our privacy.
>> There's always been the right for judicial search warrants to override
>> what's considered one's private domain. I'm supportive of this bill where
>> it extends judicial oversite to the cyber domain, which is a gap that
>> exists only because legislation/common law has lagged behind technology.
>> While at the same time realising that conversations conducted over the
>> internet, even if encrypted, are more properly regarded as public
>> conversations, than say one you might have in your living room. Whether
>> government is going to regulate the internet, the boat has sailed on this
>> long ago. The hard line privacy advocates are simply going to be left out
>> of a conversation democracy needs to have over not whether the internet
>> should be regulated, but how.
>>
>>
>>
>> What's interesting in this bill is that it goes beyond extending judicial
>> writ, allowing law enforcement emergency powers the right to surveil
>> suspects. This will be authorised by law enforcement, without judicial or
>> governmental oversite. I think this probably goes too far. The best outcome
>> for everyone, to protect privacy, and to empower law enforcement to enforce
>> laws and to protect citizens rights, would be to limit the scope of these
>> new powers to judicial writ.
>>
>>
>>
>> Kind regards
>>
>>
>>
>> Paul Wilkins
>>
>>
>>
>>
>>
>>
>>
>>
>>
>>
>>
>>
>> _______________________________________________
>>
>> AusNOG mailing list
>>
>> AusNOG at lists.ausnog.net
>>
>> http://lists.ausnog.net/mailman/listinfo/ausnog
>>
>>
>> _______________________________________________
>> AusNOG mailing list
>> AusNOG at lists.ausnog.net
>> http://lists.ausnog.net/mailman/listinfo/ausnog
>>
> _______________________________________________
> AusNOG mailing list
> AusNOG at lists.ausnog.net
> http://lists.ausnog.net/mailman/listinfo/ausnog
>
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://lists.ausnog.net/pipermail/ausnog/attachments/20180904/d97ccd27/attachment.html>
More information about the AusNOG
mailing list