Thursday, August 18, 2016

Encryption keys

Federal law enforcement officials are still arguing for a US encryption standard that includes secret “backdoor keys” that would let law enforcement – presumably with a warrant – unlock people’s encrypted files and messages. In theory the government would hold these “secret keys” safely somewhere. That was what was behind the recent demand that Apple “un-encrypt” the contents of a terrorist’s cell phone.

Could the government actually do this? Could they actually manage to keep such “secret keys” safe? They couldn’t manage to keep safe the TSA “master keys” – the keys that let the TSA open those cute little TSA-approved luggage locks. They couldn’t manage to keep the highly private security clearance files of 22.1 million people safe from hackers. And now it turns out even the highly-secretive NSA – the very people who would presumably keep those government “secret keys” – has had some of their most sensitive hacking tools stolen online by hackers, who are offering them at auction over the internet.  The level of government incompetence here is absolutely mind-boggling.

Of course the whole exercise is fruitless anyway.  If the government approves an encryption standard with a backdoor into it people who don’t want the government to access their files and messages will simply not use it, or will encrypt their message with other software first before encrypting the result with the government’s standard.  It isn’t hard to find good encryption software that hasn’t been meddled with (and we know it hasn’t been “fixed” because the source code is open to inspection by everyone).

This is another one of those issues (of which there are many these days) where it is clear that the government policy-makers are simply so ignorant about the technology they are trying to control that their efforts are laughably ineffective.