Hi All,

 

The problem with the ‘device malware’ approach is also that if such an approach 
is used where the intention is to target a single device and the software / 
hardware vendor screws up and deploys the ‘weakened’ application to many 
devices instead of one specific device then there is the potential to weaken 
the security and compromise the privacy of others. 

 

I’m sure there’s some political double talk that would cover this scenario and 
that the onus would be solely on the vendor for making sure this does not 
happen, the worry is that this exact scenario is possible, especially if proof 
of concepts accidently get released into the wild.

 

The public should be concerned about this for if we end up in a situation where 
users don’t trust security updates (or updates of any type) then we’re in the 
same boat as having a purposefully compromised application deployed, we’d have 
devices with known vulnerabilities with updates turned off which would be 
arguably more serious as time goes on.

 

I truly believe the reason this legislation is so vague is that they’re trying 
to find a solution where no one scenario is without significant risks, they’re 
trying to hold water in a sieve by tipping more water into it in an effort to 
fill it. 

 

Kind Regards,

Jim.

 

 

From: AusNOG <[email protected]> On Behalf Of Paul Brooks
Sent: Tuesday, 4 September 2018 12:05 AM
To: [email protected]
Subject: Re: [AusNOG] Dutton decryption bill

 

On 3/09/2018 11:47 AM, Chris Ford wrote:

Paul,

 

I agree with you in general as to the point that if we are happy with the 
premise of the current TIA Act that LEAs should be able to intercept 
communications with a duly authorised warrant, then extending that to encrypted 
services seems a reasonable extension to keep up with technology.

 

However, the current intercept regime is very difficult if not impossible for a 
bad actor to exploit. The intercept points are within the Carrier and CSP 
networks, out of reach of most people. When we move to intercept end-to-end 
encrypted services you either need to break the encryption (which thankfully 
does not seem to be the path anybody is proposing), OR, you need to access the 
clear text at the end point itself. The problem I have with this is that the 
end point is out in user land, often accessible to anyone on the internet, and 
now exposed to exploit by bad actors.

..And this is it. The new legislation is NOT about encryption, primarily, 
despite what we thought before the draft was released.
They've explicitly acknowledged they can't 'break' encryption, and do not want 
to weaken encryption. They want the sent and received message text, stored in 
the device after/before the encrypted transport.

Its actually a 'device malware' bill - a bill to enable general police forces 
to achieve things that previously only shadowy four-letter agencies could do - 
implant malware and modify the function of any end-user device, handset, modem, 
laptop, tablet, printer, connected TV, Amazon Alexa/Google Home/etc. Actually 
it goes further - rather than implant the malware themselves once they've 
achieved physical access, this 'device malware' bill enables them to ask nicely 
for assistance, and then to require, the device suppliers and manufacturers to 
build and implant the exploit for them. Why should AS** develop an exploit, 
when they can ask Apple or Netgear or Samsung nicely to develop and install the 
exploit for them.

We've spent decades educating users that the green padlock on a website means 
something, and that 'IOT devices' such as your average Smart TV might be easily 
hijacked and be recording and watching the home through its microphone and 
embedded webcam. This bill makes government-authorised modified firmware with 
exploits that the network and software industry have spent billions developing 
virus scanning apps to detect and eradicate.

Paul.






 

--

Chris Ford | CTO

Inabox Group Limited

 

Ph: + 61 2 8275 6871

Mb: +61 401 988 844

Em: [email protected] <mailto:[email protected]> 

  _____  

From: AusNOG  <mailto:[email protected]> 
<[email protected]> on behalf of Paul Wilkins  
<mailto:[email protected]> <[email protected]>
Sent: Monday, 3 September 2018 11:31:14 AM
To: [email protected] <mailto:[email protected]> 
Subject: Re: [AusNOG] Dutton decryption bill 

 

Bradley,

The Common Law has always allowed judicial scrutiny of our privacy. There's 
always been the right for judicial search warrants to override what's 
considered one's private domain. I'm supportive of this bill where it extends 
judicial oversite to the cyber domain, which is a gap that exists only because 
legislation/common law has lagged behind technology. While at the same time 
realising that conversations conducted over the internet, even if encrypted, 
are more properly regarded as public conversations, than say one you might have 
in your living room. Whether government is going to regulate the internet, the 
boat has sailed on this long ago. The hard line privacy advocates are simply 
going to be left out of a conversation democracy needs to have over not whether 
the internet should be regulated, but how.

 

What's interesting in this bill is that it goes beyond extending judicial writ, 
allowing law enforcement emergency powers the right to surveil suspects. This 
will be authorised by law enforcement, without judicial or governmental 
oversite. I think this probably goes too far. The best outcome for everyone, to 
protect privacy, and to empower law enforcement to enforce laws and to protect 
citizens rights, would be to limit the scope of these new powers to judicial 
writ.

 

Kind regards

 

Paul Wilkins

 

 

 

 






_______________________________________________
AusNOG mailing list
[email protected] <mailto:[email protected]> 
http://lists.ausnog.net/mailman/listinfo/ausnog

 

_______________________________________________
AusNOG mailing list
[email protected]
http://lists.ausnog.net/mailman/listinfo/ausnog

Reply via email to