Salt Lake City News


January 31, 2022 | [OPINION] UK Planning a Fake News Blitz to Portray Encryption as Evil

The UK Government is planning to "blitz" the public with fake news in an attempt to undermine encryption.

According to an article published to Rolling Stone the "Home Office has hired a high-end ad agency to mobilize public opinion against encrypted communications - with plans that include some shockingly manipulative tactics".

The UK Government continues to be frustrated with Meta Platforms for its focus on extending end-to-end encryption to all its messaging platforms.

The move by Meta to focus on user privacy through encryption has also frustrated the country's top security and intelligence agency, GCHQ.

They claim end-to-end encryption "will diminish the effectiveness of UK bulk surveillance capabilities, make fighting organized crime more difficult, and hamper the ability to stop terror attacks".

Despite the high level of cooperation between the NSA and GCHQ, the planned publicity blitz appears limited only to the UK.

How will this publicity blitz affect American opinion?

It won't change anything.

Nobody in America is going to give a shit.

Most Americans are totally clueless about encryption - except for organized crime and 'terrorists', who know OpSec and use multiple layers of encryption and obfuscation.

Ever since Apple started providing law enforcement cleartext transcripts, the number one secure communications platform was compromised.

Third-party platforms like Telegram, Signal, WhatsApp and Messenger are only as secure as the provider is willing to support.

What privacy advocates sometimes forget is that laws enforcing the right to privacy already exist, from Constitutional guarantees, to individual Federal, State and local laws prohibiting the Government and private sector or individuals from compromising the privacy of communications.

However, all this protection comes with legal tools to compromise privacy under very specific circumstances and requires the supervision of a neutral judge that specializes in privacy and security law.

Despite the concerns of abuse of power, you'd be surprised at how few requests for breach of privacy are actually granted by both open courts and the secret FISA courts, which were established specifically to deal with requests to breach Constitutional and Federal statutes.

Another aspect virtually no one considers (even Snowden didn't mention this) is that when the content of comms is kept private, the metadata is not private.

In order to deliver messages, the source and destination are required.

They may be obfuscated and obscured by tools like Tor, but the message can be observed entering the Tor complex.

If a matching message comes out of the router (still encrypted) the source and destination are now known.

Australian law permits the collection of metadata and for it to be retained for 2 years.

The Australian Government has tried to argue that metadata is useless and wanted complete access to content for intelligence gathering.

Metadata is not useless when combined with the hundreds of other data points of collection the Five Eyes they have access to.

You can paint a very good accurate picture of someone's activities and metadata is a very useful tool in a rather expansive toolset.

Tor helps, but it is not a complete anonymous solution in itself.

Exit nodes are especially vulnerable because they are the final node before data arrives at its destination.

The laws around whether some random dude could be prosecuted for nefarious data flowing through the exit node he is running on a spare computer out of Momma's basement are a little gray.

It is the possibility of being identified as the one responsible for the transmission of data flowing through the exit node which is why so many people opt to run only a relay server, leaving exit nodes to big establishments who can throw an army of defense lawyers at a potential problem with the law.

At the end of the day there is no 100% anonymous solution and private comms will always be open to compromise by someone, somewhere - whether it be through metadata or some other data trail.

In America, we haven't had truly private communications for over 100 years.

Simultaneously, the actual real world absolute privacy of our individual communications is preserved by uncompromising laws that invoke the steepest penalties for failing to follow the legal precedent.

So, while we can take measures to protect our communication, it can still be decrypted if required and authorized.

US Press Office - Salt Lake City News

Written by The Editorial Board.



© Copyright 2013-2023
GC Media Publishing Management
ABN: 98 317 740 240