iOS 14 leaks are proof why there should never be an encryption backdoor

Posted:
in General Discussion edited March 2020
There is nobody keener than an Apple fan to take a leaked version of iOS, pore over it in depth, and find out all its hidden secrets -- except one. Even more motivated and determined than even the greatest Apple spelunker, is the criminal, the terrorist, the bad actor -- and they absolutely shouldn't be given the chance to do so with an encryption backdoor of any sort.

It always comes down to technology and politics
It always comes down to technology and politics


It can be fun for us to know what's coming next, and we might even see it as useful. Based on the apparent leak of iOS 14, for instance, you might well put off buying an iPhone 11 because it looks like the "iPhone SE 2" will be out soon.

You might be right, you might be wrong. The worst that can happen is that you go for a few weeks without an iPhone. But, there is a larger point to be made.

We must not have encryption backdoors

These very leaks, and how they are being torn apart for any scintilla of clues in the code, are themselves proof that we must not ever have an encryption backdoor. Like all these features in iOS 14, holes will be found, and exploited.

Although, if you seriously ever doubted this, you're probably in an agency or a company that would benefit from a way to unlock iOS. That's not to be flippant about such agencies, it is to say that they know backdoors are a fallacy, but they continue to pursue them anyway.

Any backdoor will be found, any security lapse will be exploited, and it will be used -- those companies that specialize in breaking into iPhones are proof positive. If you ever doubted that, the spotting of everything from icon images to unannounced hardware in an operating system that won't publicly see the light of day until June, surely shows you the truth.

The argument they state publicly, is that law enforcement requires this access in order to protect us from people or organizations what would do us harm. Embedded in this is the unspoken idea that the world is divided neatly into goodies and baddies, that only people wearing white hats will use this backdoor.

FBI Director Comey wants an encryption backdoor that could only be used the good guys, please.
FBI Director Comey wants an encryption backdoor that could only be used the good guys, please.


It boils down to the old stance of if you've got nothing to hide, you shouldn't object to law enforcement being able to see what you do. That argument has always tried to use rhetoric to ride roughshod over civil liberties, but now it's been used as loudly as possible, and solely for political gain.

The safety argument simply does not work. There cannot actually be anyone in the FBI, or any law enforcement agency in the world, who actually believes in it. If you pay the idea more than even the slightest passing glance, you recognize that what's a backdoor for law enforcement is exactly as much a backdoor for anyone else, and the miscreants outnumber the good guys at least 100 to 1.

Apple under pressure

Apple pulled off a difficult job when it argued against opening a backdoor into iOS in the wake of the San Bernardino shooting. It's precisely when we are most shaken by events like this that cynical agencies can ramp up the pressure and bet on public support.

Apple's steady, calm, explanations of its counter-arguments won the day then, but the agencies have tried again after every shooting.

While this has applied to any administration, most recently US Attorney General William Barr has tried to raise the stakes. If Apple can successfully make its case for keeping encryption when it could help thieves, shooters, and terrorists, no one can stand agains the truth that children need protection from sexual abuse.

U.S. Attorney General William Barr speaking at the Center for Strategic & International Studies in February
U.S. Attorney General William Barr speaking at the Center for Strategic & International Studies in February


Barr has urged Apple to do more to combat such abuse, and while he avoided using the words backdoor or encryption, every measure he proposed would require precisely those.

This time around, Barr put the spotlight on online child abuse, and at the same time he kept it away from terms like backdoor. He continues to make it sound as if Apple and other big technology firms could open a backdoor with the flick of a switch with no impact to day-to-day security.

You can as easily make an argument that politicians are just uninformed as you can accuse them of playing short-term politics.

Nobody expects politicians to know how to keep sensitive data secure. They haven't demonstrated knowledge yet, and we're not expecting it to suddenly appear. However, everyone expects the Government's own National Security Agency to know -- and it does not.

This is the NSA, and it has admitted to multiple breaches of its security leading to the exfiltration of its highly secure hacking tools that it hoards.

Despite this, the NSA's general counsel, Glenn S. Gerstell, is in favor of adding backdoors to iOS. He didn't have a shooting to use as topical leverage, so he wrote his 2019 New York Times opinion piece about it for the day after September 11.

The NSA can't keep its own house in order, and as with so many politicians, it attempts to work not by making a case, but by herding public opinion. It wants to make us champion encryption backdoors when it not only knows they can't work, it knows its own systems are vulnerable even without a backdoor.

An NSA data center in Utah
An NSA data center in Utah


It's easy to see the leaders of agencies, and to think of politicians, as somehow separate from government bodies, but together they are supposed to have our safety at heart, and they are failing. Instead, it's a commercial company that is doing the better job.

Apple, whether you like its products or not, exists to make money, not to be a political body. Its hugely successful tools are hugely successful in part because Apple seems to take security more seriously than the government.

Apple's security and anti-leak measures appear to have failed with the leak of iOS 14, but that's endangered corporate commercial trade secrets, not lives. Apple's job is to keep its users' privacy safe, and if anything the government should working with Apple to keep the public safe, instead of trying to use it as a scapegoat because it wants things to be easy.

This is not about technology

The leak of iOS 14 will not dissuade any government or law enforcement agency from making the specious arguments against encryption, or for back doors. The gain for these agencies is not greater security for us all, it is the creation of a boogeyman.

Law enforcement, so the idea goes, would be able to prevent every crime and tragedy if only Apple would let them into all iPhones, at the drop of a hat. And if it couldn't have unfettered access, a convenient key under the doormat would be good. The only problem with that argument is everybody would know the key is under the doormat, as plain as if it was labeled with an arrow and a giant label saying that it's there.

Tim Cook runs a company whose purpose is to make money, yet he wants to face the DOJ in court because security is so crucial
Tim Cook runs a company whose purpose is to make money, yet he wants to face the DOJ in court because security is so crucial


It is a lot easier to blame a trillion-dollar company for your problems than to admit them or do anything to fix them. It's even easier when big technology companies are cause for genuine concern over privacy and security. We are in a world where Facebook has a billion users, and somewhere in its offices is probably a sign saying "2 Days Without Security Breach."

We are primed to be wary of big tech, and so we should be. There is reason to doubt, and to question, and to be careful about our use of technology. Our entire society needs law enforcement agencies, it just needs them to be doing their job instead of hoping we are giving only the odd passing glance to the problems that face us.

Google doesn't appear to be under a fraction of the pressure Apple is. Android phones hugely outsell iPhones, and given recent user base numbers, Android devices are used in the perpetration of more crimes than iPhones are. But it's Apple that gets called out even by the government.

Even with its security focus, and the commercial benefits that stance gets it, Apple is no more guaranteed to keep its software safe than the NSA is. The last few days clearly demonstrate that willingly opening a door that cannot, by its very nature, be kept secure is a very bad idea.
StrangeDaysEric_WVGGdysamoriawatto_cobra
«1

Comments

  • Reply 1 of 26
    SoliSoli Posts: 10,035member
    I hope this thread doesn't get closed down. 🙏
    wg45678chasmwatto_cobra
  • Reply 2 of 26
    Mike WuertheleMike Wuerthele Posts: 6,861administrator
    Soli said:
    I hope this thread doesn't get closed down. 🙏
    I'm hopeful. This isn't a partisan issue.
    StrangeDaysmacseekerdavgregdysamoriarazorpitchasmwatto_cobra
  • Reply 3 of 26
    DAalsethDAalseth Posts: 2,783member
    It is really simple. You can’t be a little bit pregnant, you can’t be partially dead, and you can’t be mostly secure. You either are or are not. Any back door for law enforcement, would be stolen, distributed, and exploited within weeks of it’s being introduced. 
    beeble42felix01mwhitemattinozGG1macseekerbloggerbloghcrefugeecommon sense 65wg45678
  • Reply 4 of 26
    bluefire1bluefire1 Posts: 1,302member
    I agree: There shouldn’t be any encryption. Period.
    edited March 2020
  • Reply 5 of 26
    Mike WuertheleMike Wuerthele Posts: 6,861administrator
    bluefire1 said:
    I agree: There shouldn’t be any encryption. Period.
    I'm not sure what you're agreeing with.
    StrangeDaysking editor the gratefastasleepmuthuk_vanalingamCarnageolsdysamoriarazorpitjony0chasm
  • Reply 6 of 26
    StrangeDaysStrangeDays Posts: 12,877member
    Considering the NSA couldn't even keep their own hacking tools secure and they leaked to the public, there is no way any rational mind could suggest these agencies could be trusted with backdoor keys. The NSA's tools were in the wild for over a year before anyone found out...so if they did the same w/ iOS backdoors, we'd all be at major risk of compromise by bad actors.

    https://arstechnica.com/information-technology/2019/05/stolen-nsa-hacking-tools-were-used-in-the-wild-14-months-before-shadow-brokers-leak/
    wg45678wonkothesanedysamoriaDogpersonrazorpitwatto_cobra
  • Reply 7 of 26
    bluefire1 said:
    I agree: There shouldn’t be any encryption. Period.
    I'm not sure what you're agreeing with.
    Or that there's any understanding of what the statement "There shouldn't be any encryption. Period." even means.
    StrangeDayswatto_cobra
  • Reply 8 of 26
    DAalseth said:
    Any back door for law enforcement, would be stolen, distributed, and exploited within weeks of it’s being introduced. 

    Honestly, I think that you are giving a lot more credit there. I don't think it would take weeks or even days: I am thinking hours. I have literally seen a computer melt because of "Code Red" and "Nimda" viruses that were able to exploit backdoors (admittedly those are Windows backdoors, but the analogy works). Smart phones are many factors more powerful than the computers were back in the early 00's, so that kind of open door would definitely be exploited much quicker.

    Edit: grammer

    edited March 2020 wg45678dysamoriawatto_cobra
  • Reply 9 of 26
    georgie01georgie01 Posts: 436member
    Good article, thanks!
    chasmwatto_cobra
  • Reply 10 of 26
    bloggerblogbloggerblog Posts: 2,464member
    DAalseth said:
    It is really simple. You can’t be a little bit pregnant, you can’t be partially dead, and you can’t be mostly secure. You either are or are not. Any back door for law enforcement, would be stolen, distributed, and exploited within weeks of it’s being introduced. 
    The other concern is they could and will be abused by those who the backdoor is for.
    wg45678hammeroftruth
  • Reply 11 of 26
    It's a somewhat tenuous link between leaks of commercially sensitive information and a clear need for effective encryption. Did Apple fail to encrypt this information? Probably irrelevant; it failed at another aspect of information security which is to restrict access to the data. I'm not judging, I know how hard the trade-off is between enforcing security and allowing people to do their job.

    I think the article could have done better by explaining the extent to which motivated attackers will go (details of how the "iOS 14" leaks were obtained), the depth of analysis that will be employed on a data trove (tools of the trade), and the justification for security measures based on these. It would then be appropriate to argue for effective encryption.

    More generally:

    The political aspect of encryption stems from trust - encryption is a tool for validating and enforcing trust. Trust is required for co-operation; without that humanity would not have flourished and become the pre-eminent species on this planet. Trust is, however, difficult to establish at scale - especially Internet scale - and we run into all sorts of problems that information theory is supposed to help with. As an example, consider that we all trust that the majority of people will "do the right thing" in most circumstances and simultaneously we trust that if you give someone an inch they will take a mile. How do we take knowledge that a certain percentage of the population will act in ways that require intervention from government and then identify those individuals using methods that don't rely on data-gathering techniques that are no longer effective? How do we prove beyond a reasonable doubt that a given individual is guilty of a crime when the proof relies on statistical methods to generate a probability and we chain those probabilities together to justify action?

    It's a difficult job. The government is being asked to provide investigation and enforcement in a climate where the citizenry does not have the required knowledge to understand their arguments. While the best answer is an educated population, other political forces work to negate that option under the misguided belief that an ignorant population is easier to control. So I completely understand why certain government representatives are trying to negate effective encryption, even as I completely disagree with the argument. I also completely disagree with the notion that only the government agencies have to commit effort to finding a workable solution to their problems; this affects our society on a fundamental level so I think it's only natural that all of society has to develop something that works. We're trying to find a balance where everyone can trust each other.
    muthuk_vanalingam
  • Reply 12 of 26
    DAalsethDAalseth Posts: 2,783member
    DAalseth said:
    It is really simple. You can’t be a little bit pregnant, you can’t be partially dead, and you can’t be mostly secure. You either are or are not. Any back door for law enforcement, would be stolen, distributed, and exploited within weeks of it’s being introduced. 
    The other concern is they could and will be abused by those who the backdoor is for.
    Oh yes. I was hesitant to go there, but honestly I’m nearly as afraid of what some “law enforcement” groups might do with this ability as I am the defined bad guys.
    wg45678razorpitwatto_cobra
  • Reply 13 of 26
    One more thing: the irony of encryption is that it can be used to prove (insofar as we can prove anything) that a set of data belongs to or was sent from a particular individual - but only if those involved in the transaction allow it. Weakening encryption will destroy this aspect of it.
    watto_cobra
  • Reply 14 of 26
    DAalseth said:
    DAalseth said:
    It is really simple. You can’t be a little bit pregnant, you can’t be partially dead, and you can’t be mostly secure. You either are or are not. Any back door for law enforcement, would be stolen, distributed, and exploited within weeks of it’s being introduced. 
    The other concern is they could and will be abused by those who the backdoor is for.
    Oh yes. I was hesitant to go there, but honestly I’m nearly as afraid of what some “law enforcement” groups might do with this ability as I am the defined bad guys.
    McCarthyism was the first thing that sprang to my mind when I read the article. Then Hoover, then Stalin, then Pol Pot and a train of others. We have plenty of data to justify this position.
    sandordysamoriaDogpersonrazorpitwatto_cobra
  • Reply 15 of 26
    hexclockhexclock Posts: 1,252member
    DAalseth said:
    DAalseth said:
    It is really simple. You can’t be a little bit pregnant, you can’t be partially dead, and you can’t be mostly secure. You either are or are not. Any back door for law enforcement, would be stolen, distributed, and exploited within weeks of it’s being introduced. 
    The other concern is they could and will be abused by those who the backdoor is for.
    Oh yes. I was hesitant to go there, but honestly I’m nearly as afraid of what some “law enforcement” groups might do with this ability as I am the defined bad guys.
    McCarthyism was the first thing that sprang to my mind when I read the article. Then Hoover, then Stalin, then Pol Pot and a train of others. We have plenty of data to justify this position.
    Don’t forget JFK and FDR, who both used the CIA and IRS to go after opponents. 
    razorpitwatto_cobra
  • Reply 16 of 26
    M68000M68000 Posts: 725member
    So if I’m reading this article correctly - even Apple should not have a way to get back into a device it manufacturers?  On a side note,  I’ve wondered for years if Microsoft has some secret way of getting into any windows hard drive it wants to,  encrypted or not.  It would not surprise me if they do.
    edited March 2020 watto_cobra
  • Reply 17 of 26
    DAalsethDAalseth Posts: 2,783member
    hexclock said:
    DAalseth said:
    DAalseth said:
    It is really simple. You can’t be a little bit pregnant, you can’t be partially dead, and you can’t be mostly secure. You either are or are not. Any back door for law enforcement, would be stolen, distributed, and exploited within weeks of it’s being introduced. 
    The other concern is they could and will be abused by those who the backdoor is for.
    Oh yes. I was hesitant to go there, but honestly I’m nearly as afraid of what some “law enforcement” groups might do with this ability as I am the defined bad guys.
    McCarthyism was the first thing that sprang to my mind when I read the article. Then Hoover, then Stalin, then Pol Pot and a train of others. We have plenty of data to justify this position.
    Don’t forget JFK and FDR, who both used the CIA and IRS to go after opponents. 
    There’s an old saying, Power Corrupts, and Absolute Power Corrupts Absolutely.
    dysamoriarazorpitwatto_cobra
  • Reply 18 of 26
    bulk001bulk001 Posts: 764member
    I am in total agreement that there should be no backdoors. With one exception - if it could help save my wife or kid’s life or heaven for it, bring their killer to justice. And their lies the rub. I don’t trust politicians or government agencies to be able to resist temptation to expand a back door or keep it safe. 
  • Reply 19 of 26
    tzm41tzm41 Posts: 95member
    bulk001 said:
    I am in total agreement that there should be no backdoors. With one exception - if it could help save my wife or kid’s life or heaven for it, bring their killer to justice. And their lies the rub. I don’t trust politicians or government agencies to be able to resist temptation to expand a back door or keep it safe. 
    We all want a thing that could be used in justified ways, only by the good guys, to stop the bad guys. But the problem is such thing couldn't possibly exist.
    chabigdysamoriaFileMakerFellerwatto_cobra
  • Reply 20 of 26
    bluefire1bluefire1 Posts: 1,302member
    bluefire1 said:
    I agree: There shouldn’t be any encryption. Period.
    I'm not sure what you're agreeing with.
    I left out the word “backdoor”. 
    watto_cobra
Sign In or Register to comment.