A new report from the Manhattan District Attorney calls for law requiring "any designer of an operating system for a smartphone or tablet manufactured, leased, or sold in the U.S. to ensure that data on its devices is accessible pursuant to a search warrant."
Smartphones (a marketing category with no legal definition or firm boundaries) are general-purpose computers, capable of running any code that will compile, including the myriad of end-to-end cryptographic communications tools currently extant.
There's no practical way for a smartphone vendor to give me a computer capable of running all the valid programs, but still grant law enforcement access to the data stored on it if I don't cooperate.
There is, however, a very impractical way: the vendors could come up with a secret backdoor for my phone, perhaps a keylogger that stores all my keystrokes (including the passphrases for my secret files), and hope that I never discover and disable this.
The technical term for this security model is "wishful thinking."
The alternative is to just have phones that, out of the box, don't have working crypto. That would require criminals who want to have secrets from the police to download and install their own software. This is something that law enforcement agencies ensure us criminals are already doing.
The bulk of the DA's report deals with the potential objections to their proposal, but they don't engage with its lack of technical rigor. Instead, it goes through backflips to talk about why this isn't a violation of human rights law, and pointing out that governments in the UK and the Netherlands also like this dumb idea. If all the other DAs jumped off a bridge...
DISTRICT ATTORNEY’S OFFICE
ENCRYPTION AND PUBLIC SAFETY [PDF]
(via Interesting People)
A little over a year ago, Bloomberg stunned the world with a report that claimed that Chinese intelligence services had figured out how to put undetectable, rice-grain-sized hardware implants into servers headed for the biggest US cloud and enterprise IT firms, and that when some of the victims discovered this fact, they quietly ripped out […]
How can a single, ill-conceived law wreak havoc in so many ways? It prevents you from making remix videos. It blocks computer security research. It keeps those with print disabilities from reading ebooks. It makes it illegal to repair people's cars. It makes it harder to compete with tech companies by designing interoperable products. It's even been used […]
Early versions of the free/open Unix variant BSD came with password files that included hashed passwords for such Unix luminaries as Dennis Ritchie, Stephen R. Bourne, Eric Schmidt, Brian W. Kernighan and Stuart Feldman.
We have a theory about those throw blankets that are barely big enough to cover your legs. The only people who seem to make them or use them are grandmothers, and the blankets are only that small because Nana got bored halfway through the sewing job. Look, we’re sure she means well. But if you […]
Remember when the default state of your online presence was anonymity? That’s not so clear-cut anymore, and the worst part is you may not even know who is using your data or what they’re using it for. Small wonder that so many people are choosing to surf through virtual private networks. VPNs filter web access […]
Get ready for the stream of your dreams, binge-watchers. There’s a contest afoot, and at stake is a lifetime subscription to Netflix. All you have to do is sign up, and you’re entered to win this ultimate Netflix plan. When does it expire? Only when you do. And hey, just in case you need something […]