A new report from the Manhattan District Attorney calls for law requiring "any designer of an operating system for a smartphone or tablet manufactured, leased, or sold in the U.S. to ensure that data on its devices is accessible pursuant to a search warrant."
Smartphones (a marketing category with no legal definition or firm boundaries) are general-purpose computers, capable of running any code that will compile, including the myriad of end-to-end cryptographic communications tools currently extant.
There's no practical way for a smartphone vendor to give me a computer capable of running all the valid programs, but still grant law enforcement access to the data stored on it if I don't cooperate.
There is, however, a very impractical way: the vendors could come up with a secret backdoor for my phone, perhaps a keylogger that stores all my keystrokes (including the passphrases for my secret files), and hope that I never discover and disable this.
The technical term for this security model is "wishful thinking."
The alternative is to just have phones that, out of the box, don't have working crypto. That would require criminals who want to have secrets from the police to download and install their own software. This is something that law enforcement agencies ensure us criminals are already doing.
The bulk of the DA's report deals with the potential objections to their proposal, but they don't engage with its lack of technical rigor. Instead, it goes through backflips to talk about why this isn't a violation of human rights law, and pointing out that governments in the UK and the Netherlands also like this dumb idea. If all the other DAs jumped off a bridge...
DISTRICT ATTORNEY’S OFFICE
ENCRYPTION AND PUBLIC SAFETY [PDF]
(via Interesting People)
Journalist’s Resource published this great comic by Josh Neufeld, explaining the basic concepts behind differential privacy, the data collection method used to prevent bad actors from de-anonymizing the information gleaned from the 2020 Census. The original source includes some other great resources on differential privacy, but since the comic itself is made available under a […]
Last spring, a Baltimore underwent a grinding, long-term government shutdown after the city's systems were hijacked by ransomware. This was exacerbated by massive administrative incompetence: the city had not allocated funds for improved security, training or cyberinsurance, despite having had its emergency services network taken over by ransomware the previous hear, and five city CIOs […]
I’m not the kind of person who possesses the programming or IT knowledge to run my own servers and host my own email. But I can manipulate some things on the internet or on local networks, like how to access the gateway to your router and make some changes in there, even if I […]
Call it retro. Call it a throwback. Even call it kitsch. But the 80s are still a singular time in pop culture history. From Ghostbusters and Back to the Future to your neighborhood arcade and the Atari 2600, artifacts of that seminal decade still resonate, evoking audible excitement and sighs of pleasant yesteryear remembrance. But […]
With millions out of work, the global economy in a sharp recession, and legitimate fears for the future abound, you might think this is absolutely the worst time to strike out on your own and be your own boss as a work-for-hire freelancer. But according to numbers compiled by financial services company Payoneer, the current […]
For years, dirty countertops, appliances, or bathroom fixtures were just kind of gross. But unkempt corners of your kitchen and bathroom aren’t just a sign of laziness anymore. Now, they’re a potential breeding ground for infectious disease. You can’t just limp through cleaning these days. You’ve gotta get rigorous about it, which means it’s no […]