[HN Gopher] Signal threatens to dump US market if EARN IT act pa...
       ___________________________________________________________________
        
       Signal threatens to dump US market if EARN IT act passes
        
       Author : tzm
       Score  : 504 points
       Date   : 2020-04-09 17:58 UTC (5 hours ago)
        
 (HTM) web link (uk.pcmag.com)
 (TXT) w3m dump (uk.pcmag.com)
        
       | aeurielesn wrote:
       | Are companies afraid that opposing the Anti-Encryption Bill will
       | automatically label them as in favor of online child
       | exploitation?
       | 
       | I'm honestly curious about why there's no widespread opposition
       | to the bill yet.
        
         | lonelappde wrote:
         | Which companies? Most companies don't use e2e encryption
         | because they read your data for ads. Apple, maybe?
         | 
         | Big companies don't generally make ethical stands, and small
         | companies can't afford to. Apple makes some stands but only to
         | be competitive against Android.
        
         | Barrin92 wrote:
         | In general they seem to be afraid of standing up to the
         | administration on virtually everything. Facebook in that regard
         | seems particularly embarassing with Thiel on the board
         | apaprently writing Facebook policy.
        
         | IAmEveryone wrote:
         | There are other methods of lobbying than just public, visible
         | disagreement. They probably are registering their disagreement
         | in private talks with people in congress.
         | 
         | Facebook publicly coming out against this might not be helpful:
         | most people just don't care. Those that (potentially) do care
         | are far more likely to be mobilized by the EFF or ACLU, which
         | they tend to trust. Facebook isn't the most trusted brand name
         | in privacy, as far as I can tell. Their support might actually
         | be detrimental for the cause.
         | 
         | An open split of Silicon Valley and Republicans would also
         | "politicize" the issue. Almost instantly, you'd have the 35% of
         | Trump supporters galvanizing around the bill, even if they were
         | previously ignorant or lukewarm on it. See the recent train
         | wreck around Qunines-against-covid for a great example of this
         | effect.
        
       | hjkgfdfgh wrote:
       | If Signal were federated, there would be no single entity to shut
       | down. Alas...
        
         | thanksforfish wrote:
         | Given the amount of open source code already, it should be
         | possible to clone.
         | 
         | Edit: see below, server code is open. Keeping original text
         | below:
         | 
         | IIRC the server code is proprietary, but the clients are open.
         | That's a decent starting point.
         | 
         | https://github.com/signalapp/Signal-Android
        
           | tialaramex wrote:
           | A pile of separate Signal clones = zero interoperability =
           | zero functionality. So that's why there aren't any.
           | 
           | You could solve that by Federating, except... Federation
           | would be lovely _if_ you could actually deliver Signal 's
           | goals and do federation for free, but what we always see from
           | proponents of Federation is that was their goal and so
           | they're done. Oh you wanted _security_? Sorry, we federated
           | everything, so you 'll need to get every single member of the
           | federation on board with every single change you need, we
           | know you can't get that done but that's fine because our
           | priority was federating stuff, so we are successful, shame
           | about your goals.
           | 
           | As an example, somebody earlier in this thread mentions you
           | can "just" know who is communicating with who anyway. Signal
           | got rid of that, because they can, and it's a security
           | improvement, so they put all the work in and did it. Now even
           | Signal's own servers don't know who sent most messages!
           | "Sealed Sender" means Signal has no idea who is sending this
           | message to my friend Steve. Maybe it's me? No idea. It just
           | has to be somebody who Steve allows to send him messages.
           | Could be Steve loves spam and so it's a spammer. Could be
           | Steve loves the AfD and so it's a Nazi. No way to know
           | without reading the message which only Steve's Signal client
           | can do.
           | 
           | Now imagine trying to roll that out to a federated system.
           | After years of effort maybe you switch it on, and then you
           | find a bug and have to switch it off again for a few years
           | while you fix that. Hopeless.
        
             | int_19h wrote:
             | But conversely, if legislation really succeeds in killing
             | Signal in the entirety of US (and EU won't be far behind!)
             | to the point where they're forced to use geo-IP blocks, the
             | end result is still strictly worse off.
        
           | correct_horse wrote:
           | The server is also open source
           | https://github.com/signalapp/Signal-Server
        
         | ComputerGuru wrote:
         | I get where you are coming from but given the walled garden
         | there is no need to kill the severs. Merely blocking all
         | clients from the Apple Store and the Play Store would
         | accomplish the same thing, federated or not.
        
           | mkup wrote:
           | That's why it is essential for end user to have an ability to
           | sideload apps to the phone (i.e. to bypass vendor's store).
        
             | einpoklum wrote:
             | Which they do. Well, on Android phones anyway.
        
               | wyre wrote:
               | Signal recommends downloading through the play store.
               | They don't endorse downloaded apks
        
         | ccktlmazeltov wrote:
         | Your comment makes zero sense, let me explain: most people use
         | signal through the iOS app. It is very easy to shut down an iOS
         | app.
         | 
         | Hope you got it!
        
           | mirimir wrote:
           | That'd be easy to fix, if Apple wanted to.
        
           | pengaru wrote:
           | > Your comment makes zero sense, let me explain: most people
           | use signal through the iOS app. It is very easy to shut down
           | an iOS app.
           | 
           | If Apple users actually controlled the software running on
           | their devices that wouldn't be an issue.
           | 
           | A want for federated services complements a want for control
           | over our computing.
        
           | sudosysgen wrote:
           | If you care so much about uncensorable resilient service you
           | probably already use either jailbroken iOS or Android. And if
           | you don't, then do. iOS has a 13% market share anyways.
           | 
           | Hope you got it!
        
             | ccktlmazeltov wrote:
             | Sorry but iOS actually has a 60% market share in the US[1],
             | which is the country we're talking about, hope you got it!
             | 
             | [1]: https://lmgtfy.com/?q=ios+market+share+us
        
         | eeZah7Ux wrote:
         | Why the stupid downvotes? Signal's walled garden can be its
         | demise.
        
           | jplayer01 wrote:
           | Signal is open source. If you want to develop and host your
           | own Signal, go right ahead. You'd just be opening yourself up
           | to the same problem facing the Signal Foundation. As it is,
           | the Signal Foundation would suddenly be open to lawsuits, and
           | they're the main developers of Signal.
        
             | mirimir wrote:
             | So don't be discoverable!
        
       | mirimir wrote:
       | If EARN IT passes, and if Signal wimps out, something tougher
       | will replace it.
        
       | djaque wrote:
       | If you haven't already, please take the time to email your
       | federal representatives. The EFF's tool [1] only takes a few
       | clicks to use.
       | 
       | [1] https://act.eff.org/action/protect-our-speech-and-
       | security-o...
        
         | SkyMarshal wrote:
         | For reps that require it, which topic should we select for this
         | - Science/Technology or Communications/Telecommunications/FCC?
        
           | pc86 wrote:
           | It would depend on the representative - if they're on
           | committees related to one or the other, I'd select that one.
           | If it's 50/50 I'd probably choose Telecom/FCC as that seems
           | more technically accurate.
        
         | thaumasiotes wrote:
         | > The EFF's tool [1] only takes a few clicks to use.
         | 
         | Your input is discounted at least in direct proportion to how
         | little you sacrificed in order to provide it. If you really
         | want to make an impression, telephone your representative.
        
           | owenshen24 wrote:
           | I attempted to call them today. All of their offices were
           | closed due to COVID-19. I was unable to leave a message.
        
           | shadowoflight wrote:
           | > Your input is discounted at least in direct proportion to
           | how little you sacrificed in order to provide it.
           | 
           | If this were true, corporations would be completely ignored
           | when they provided a measly few million dollars in campaign
           | contributions...
        
           | reaperducer wrote:
           | _Your input is discounted at least in direct proportion to
           | how little you sacrificed in order to provide it._
           | 
           | One of my college roommates works for a congresscritter. He
           | says, at least for his guy, written letters still have the
           | most impact, followed by telephone calls. He didn't mention
           | faxes.
           | 
           | E-mail and social media are waaaay down on the list because
           | they take the least effort and can be gamed so easily.
        
             | sailfast wrote:
             | Many of my reps have stopped providing phone numbers on
             | their websites. Kinda cowardly, but it allows them to
             | validate emails with addresses that come via their website
             | from actual constituents.
        
             | akeck wrote:
             | I'll probably send certified letters in this case.
        
               | ihaveajob wrote:
               | Hand delivered.
        
               | akeck wrote:
               | I'll break out my calligraphy pen, ink, and sealing wax.
        
               | egl2020 wrote:
               | I use my owl.
        
           | thanksforfish wrote:
           | Don't let that discourage you if you've only got time to tap
           | a few buttons. Better to send a weak signal than none.
           | 
           | In either case, contact instructions are here:
           | https://www.usa.gov/elected-officials/
        
             | pc86 wrote:
             | I take issue with the premise that there is anyone who
             | _doesn 't_ have time to send a better signal? It takes all
             | of about 4 minutes to call the Capitol offices of your two
             | representatives in Congress. They'll get your name address
             | and you can make it as quick as "I just wanted to let
             | Rep./Sen. so-and-so know that I am for/against HB/SB 1234."
             | and it's done. You will absolutely spend more time looking
             | up their phone numbers than you will on the phone.
             | 
             | You can do this while walking out of the office to the
             | parking lot or metro station.
        
           | mohaine wrote:
           | I've heard this so many times but I'm not sure it is true.
           | 
           | I helped with processing the results of a large government
           | RFC for a large government aid bill (Farm Bill 201?) and the
           | exact opposite was true. There were too many responses to
           | individually read each one so the responses just got bucketed
           | and counted. You could be fine with a one off response but it
           | would be less likely to be bucketed correctly and would still
           | only be counted once per bucket at most.
           | 
           | To cover your bases I would always do the easy one click
           | option and then write the handwritten letter as well.
        
           | lliiffee wrote:
           | I was a little apprehensive, but decided to try this. I
           | called my representative as well as both senators. In all
           | cases (3:30pm on a thursday) I just got a voicemail. I left a
           | short message in each case. Nothing could be easier.
        
           | hanniabu wrote:
           | If you really want to make an impression, create a SuperPAC
           | and donate millions to their campaigns.
        
             | pas wrote:
             | No, don't! After you've spent the money they'll do whatever
             | they want. Instead, threaten to donate to their opponent if
             | they don't bow to your will, then after roll call you can
             | wire the money to them.
        
               | StillBored wrote:
               | Hehe, the only difference between what you and parent
               | said, is that he is wiring it to their _next_ election
               | campaign. Do it preferably in smaller sums so you can
               | strong arm them multiple times before the next election.
        
         | ipsin wrote:
         | I was going to contact my senators. One of them is Dianne
         | Feinstein, and... ugh, why is she always on the worst side when
         | it comes to privacy? She's actually a sponsor of this thing.
         | 
         | I've written her enough that I can already write my own reply
         | from her office. Shorter Feinstein: "Thank you for your
         | concerns, but you're wrong."
        
           | coldpie wrote:
           | > why is she always on the worst side when it comes to
           | privacy
           | 
           | Because she is a terrible Senator. Please, please, please
           | stop voting for her already.
        
             | catalogia wrote:
             | She's 86 now and the next time she'll be up for reelection
             | is in 2024. There's a good chance she won't be around long
             | enough to ever lose reelection.
        
               | yjftsjthsd-h wrote:
               | > There's a good chance she won't be around long enough
               | to ever lose reelection.
               | 
               | No need to be so negative. Isn't it nicer to say,
               | "There's a good chance that she won't win reelection*."?
        
         | yingw787 wrote:
         | I just filled it out! I didn't realize from the previous HN
         | post Signal was threatening to leave the U.S. market
         | altogether! I don't recall if they have ever done that before.
         | So I'm taking this seriously.
        
       | garyfirestorm wrote:
       | Guns kill children!! Politicians - we need to defend ourselves
       | and our rights. Keep the guns.
       | 
       | Encryption is dangerous to children Politicians - yup...take it
       | away guys.
        
         | floren wrote:
         | Feinstein, one of the co-sponsors of this bill, has a pretty
         | good track record of going against _anything_ which could give
         | power to the people rather than the government, including guns.
         | Now, that didn 't stop her from being one of the only people in
         | San Francisco with a concealed carry permit (up until 2012)...
         | laws for _thee_ , but not for _me_.
        
       | mirimir wrote:
       | OK, instead of "dump US market", why don't they (or someone)
       | create a clone that can't be fscked with? Maybe hybridize with
       | Briar, or whatever. Take everything off clearnet, and have
       | everything anonymous.
       | 
       | I was thinking that Session/Loki was better protected, but the
       | Loki Foundation is likely just as vulnerable.
        
       | vibesngrooves wrote:
       | With all the press around EARN IT, this would be a great
       | opportunity for companies with even a mild focus on combating
       | criminal activity on their platforms (Facebook, Mailchimp, etc.)
       | to collaborate with bureaucrats and/or testify in congress.
       | 
       | Thorn seems especially poised as mitigating child abuse is the
       | essence of their organization. Whatever their stance, they appear
       | to be an authority in the private sector spearheading technical
       | efforts to combat child abuse. If any Thorn
       | engineers/representatives - or any platform engineers focused on
       | abuse prevention - are reading, I'd love to hear your take on the
       | proposed legislation. It's imperative that we grant resources
       | necessary to challenge such a horrific human issue without
       | sacrificing our privacy and subsequent civil liberties
       | 
       | For context... https://www.thorn.org/
        
       | DenisM wrote:
       | Interestingly, The term "interactive computer service" has the
       | meaning given the term in section 230(f)(2) of the Communications
       | Act of 1934 (47 U.S.C. 230(f)(2)):
       | 
       |  _The term "interactive computer service" means any information
       | service, system, or access software provider that provides or
       | enables computer access by multiple users to a computer server,
       | including specifically a service or system that provides access
       | to the Internet and such systems operated or services offered by
       | libraries or educational institutions._
       | 
       | It appears that a P2P app would be off the hook, at least for
       | now, because there is no "server" in the picture.
        
         | r3trohack3r wrote:
         | > any information service, system, or access software provider
         | that provides or enables computer access by multiple users to a
         | computer server
         | 
         | Wouldn't that mean every node on a P2P network would be
         | considered a client, server, and interactive computer service?
         | 
         | Another way of interpreting this, I think, is that everyone
         | participating in a DHT or scuttlebutt network would be
         | responsible for every other user's behavior on that network.
        
           | DenisM wrote:
           | I am thinking two phones knowing about each other's IP-6
           | addresses. No central directory.
           | 
           | You might be right though.
        
       | viklove wrote:
       | EARN IT will affect all encryption software, not just Signal.
       | This bill is just the newest way Congress is trying to enforce
       | required backdoors in all apps/devices. Last time it was under
       | the guise of protecting us from terrorists, this time it's under
       | the guise of protecting the children from pedophiles. I wonder
       | what they'll try next time, when this inevitably fails again.
        
         | null0pointer wrote:
         | I feel like as soon as someone uses a "think of the children"
         | argument they immediately invalidate any point they may have
         | had. It's a total cop out argument. I wish more people could
         | see through it.
        
           | mywittyname wrote:
           | There are a million better ways to help children.
        
         | elliekelly wrote:
         | The federal government enjoys a freely accessible and wide open
         | back door to our _entire_ financial system under the guise of
         | protecting us from terrorists. What makes you so sure the same
         | trick won 't work again?
         | 
         | Most Americans don't seem to know enough about how the
         | government uses the backdoor to care.
        
           | mcny wrote:
           | That's a good point. I would like to plug taler here. There
           | is no technical reason why the federal government needs to
           | have access to all our financial information as far as I
           | know.
           | 
           | https://en.wikipedia.org/wiki/GNU_Taler
        
         | GrinningFool wrote:
         | > I wonder what they'll try next time, when this inevitably
         | fails again. We're at a major disadvantage, so I'm not sure
         | where that optimism is coming from.
         | 
         | We have to stop it every time, and in every variation. On the
         | other hand, they can keep trying over and over again.
         | 
         | I'd much rather see EFF and others working with congress to
         | introduce laws that _prevent_ this kind of thing, saving the
         | long sequence of future fights as this resurfaces under names.
         | One of those fights, we're bound to lose.
        
         | kitotik wrote:
         | > when this inevitably fails again
         | 
         | May I ask where your confidence comes from?
         | 
         | I'll actually be more surprised if this _doesn't_ go through,
         | at least in some form.
        
           | giancarlostoro wrote:
           | With so many eyeballs locked up at home, bored, not paying
           | attention to congress. I think this is definitely much more
           | concerning.
        
             | jimbob45 wrote:
             | Not paying attention to Congress...until a big player gets
             | taken down by this bill and makes a loud fuss about it.
        
               | StillBored wrote:
               | They just need to word it correctly:
               | 
               | "This product is designed with the highest levels of
               | security in order to keep you safe from criminals and
               | other illicit actors on the internet. Because of this, it
               | has been deemed inappropriate for use by citizens of the
               | USA by the EARN IT act. Until this changes, it is only
               | available outside of US jurisdiction. Please contact your
               | congressional representatives for more information"
        
           | Nasrudith wrote:
           | To be fair even if they get what they think they it will fail
           | and then they'll pout and try to move the goal posts again
           | like how the DMCA failed to stop piracy or DRM from being
           | cracked.
           | 
           | Of course indulging their utter folly leaves us all worse off
           | so we need to stop them. I notably haven't gotten even an
           | email or after sending an email calling out EARN IT as
           | downright nationally suicidal given the how much of the US
           | economy is dependent upon secure cryptography, and the
           | obvious relationship between GDP and power, and that if they
           | gave a damn about the children they would be investing more
           | in social services and investigation instead of trying to
           | seize more power.
           | 
           | Not sure if I reached them or got it put in a proverbial
           | circular file or "enemies list/ban from volunteering as
           | disgruntled" by a staffer but the fact they didn't send a
           | "for the children" form letter bullshit is somewhat
           | reassuring that it reached a real human and they at least
           | recognized one case of "too pissed to even try to form letter
           | bullshit" is a small victory and enough negative tickmarks to
           | say "this is a bad plan" is the current win condition.
           | 
           | Of course a large victory would be dropping from sponsorship
           | but that would be near impossible even if I was a connected
           | great speaker who called him out in person.
        
         | vardump wrote:
         | I hope it's not against people who vote "wrong".
        
       | unknown2374 wrote:
       | What is wrong with the wording of the title? The first line is
       | "Signal is warning that an anti-encryption bill circulating in
       | Congress could force the private messaging app to pull out of the
       | US market." Being forced out of the market is different than
       | "threatening to dump the market".
        
         | thanksforfish wrote:
         | The bill seems like it would result in forcing e2e out of the
         | market. Each product that offers e2e would then need to make a
         | choice. Remove e2e or keep e2e. If they keep e2e then either
         | they proactively dump the US market or they face legal peril.
         | It seems like the same thing to me.
         | 
         | They don't want to offer a product that doesn't support e2e.
        
         | dylan604 wrote:
         | It might be a bit hyperbolic, but the end result is the same.
         | Rather than compromising the integrity of their app, they'd
         | rather no longer offer it to an entire country's market.
         | Whether it is "dumping" the users or "pulling" out of the
         | market, what's the difference? Lavabit shut their entire
         | operation down once they were forced to compromise their
         | system. While Lavabit didn't have much notice, Signal is
         | signaling their intent to their users. If that signals their
         | users to take action by contacting their congress critters to
         | put pressure, then it seems like a good idea.
        
       | einpoklum wrote:
       | In Soviet Russia, government spy on everyone's phone.
       | 
       | In Capitalist America, phone spy on everyone for government.
        
       | LatteLazy wrote:
       | You can't maintain democracy or the rule of law with these laws
       | in place. This isn't about privacy, making it about that is
       | missing the point. Privacy is a nice side benefit, something we
       | give up routinely for safety. Democracy isn't.
        
       | rlt wrote:
       | > Although the goal of the legislation, which has bipartisan
       | support, is to stamp out online child exploitation, it does so by
       | letting the US government regulate how internet companies should
       | combat the problem--even if it means undermining the end-to-end
       | encryption protecting your messages from snoops.
       | 
       | As usual, one of the Horsemen of the Infocalypse:
       | 
       | https://en.wikipedia.org/wiki/Four_Horsemen_of_the_Infocalyp...
        
       | GekkePrutser wrote:
       | This is why something serverless is needed. Then there is nobody
       | to sue.
        
         | neets wrote:
         | Well there is tox and other protocols that work through Tor
         | network
        
       | throwaway55554 wrote:
       | This just kills me: https://arstechnica.com/tech-
       | policy/2020/04/senator-backing-...
        
         | RickS wrote:
         | There's a coherent worldview where this isn't hypocritical:
         | 
         | > Encryption is for hiding our comms from China and Facebook,
         | which keeps you safe. Hiding your comms from America makes it
         | harder for America to keep you safe. Encryption should be weak
         | enough to let the US government have the knowledge it deems
         | necessary, but strong enough to build a moat around that
         | superiority.
         | 
         | It's misguided for a bunch of reasons that HN well understands,
         | but it holds water. That's what makes it scary: not that it's
         | absurd, but that unless you're both well educated and
         | skeptical, it sounds downright responsible.
        
           | ummonk wrote:
           | People keep saying that backdoors weaken security in general,
           | but that's simply not true. If you create a cryptographic
           | backdoor that only one third party entity can access (because
           | only they have the private key to do so), this doesn't
           | fundamentally make it any weaker than ordinary end-to-end
           | encryption (where the recipient has the private key to
           | decrypt the messages you send them).
        
             | saagarjha wrote:
             | It does, because the third party may share their keys with
             | others.
        
               | throwaway55554 wrote:
               | > It does, because the third party may share their keys
               | with others.
               | 
               | It makes the store where the keys are kept a priority
               | target as well.
        
           | lonelappde wrote:
           | If the US government can access zoom data, then China
           | government can too.
        
       | president wrote:
       | Has anyone here actually read the full-text of the bill [1]? I
       | don't see any mention of banning cryptography/encryption in it at
       | all. In fact, the only thing that the bill proposes is the
       | creation of a commission to establish best practices for child
       | exploitation. Seems a bit unfair to call this an ANTI-ENCRYPTION
       | bill.
       | 
       | [1] https://www.govtrack.us/congress/bills/116/s3398/text
        
         | mundo wrote:
         | Scroll down to section 6 - it amends CDA 230 to strip
         | protections from companies that don't follow the "best
         | practices" (which might not involve backdoors, but are presumed
         | to based on past statements by the commisioners-to-be,
         | especially AG Barr) established by this commission.
        
       | yingw787 wrote:
       | So...assuming this bill passes and Signal pulls out of the U.S.,
       | what can the average person do to continue to access Signal's
       | servers in other countries? Can we VPN into an Apple computer
       | based in the EU, build our own Signal client, and then somehow
       | scp the files back to the U.S.? I think TestFlight would be out
       | of the question, since you probably would need to sign Apple U.S.
       | Terms and Conditions, and because Apple Developer Program is $99
       | / year.
       | 
       | Maybe I should get a Purism phone.
        
         | paxys wrote:
         | Thing is the VPN service would be subject to the same law, and
         | so the connection would likely still be insecure.
        
           | yingw787 wrote:
           | Hmm, okay, so I can drive over to Canada, make a developer
           | friend there, build an instance of the Signal iOS app using
           | the licenses there, load it onto my phone via TestFlight or
           | USB stick, then drive back to the U.S. and use it assuming
           | TSA doesn't touch my phone?
        
             | sudosysgen wrote:
             | Smuggle the phone back using an electric dirt bike crossing
             | the Canada-US border in the middle of the night, that way
             | the TSA won't bother you.
        
               | yingw787 wrote:
               | I guess I should work on my bushwhacking skills.
        
             | aspenmayer wrote:
             | After you load TestFlight and Signal build onto your phone,
             | make a full encrypted local backup via iTunes.[0] Upload
             | that backup image somewhere. Turn off Find My (iPhone) to
             | disable activation lock. Restore iPhone to factory
             | setttings. Return iPhone to factory sealed box. Optional:
             | mail phone to self at destination or other location of your
             | choosing in destination. Cross border. When at desired use
             | location, unbox phone. Fetch backup you made earlier.
             | Restore backup to iPhone. Use Signal.
             | 
             | [0] https://support.apple.com/guide/itunes/back-up-your-
             | ios-devi...
        
               | yingw787 wrote:
               | That sounds much more feasible! I copied and pasted your
               | tip into my notes app. Thanks!
        
           | Nextgrid wrote:
           | But if Signal is end to end encrypted then the VPN being
           | compromised is not a problem.
        
             | dilippkumar wrote:
             | Signal would be end to "the other side of VPN end"
             | encrypted. The VPN channel itself would have a backdoor and
             | thus defeat the whole point.
        
               | Nextgrid wrote:
               | If Signal is end to end encrypted (or even _just_
               | encrypted to a server that has no backdoors) then
               | observing the network traffic towards that server (which
               | is what the compromised VPN would do) wouldn't help. This
               | is how even "basic" HTTPS remains secure against
               | malicious attackers.
        
           | PureParadigm wrote:
           | I don't think that's true. If the VPN is compromised then the
           | Signal traffic over it should still be encrypted (that's the
           | point of Signal). As long as the VPN doesn't block your
           | access to Signal you should be fine, and there is no risk the
           | VPN would read your messages.
        
             | paxys wrote:
             | The connection needs to be secure at least initially when
             | you are exchanging encryption keys.
        
               | maqp wrote:
               | This is an incredibly complex problem and it really
               | depends on the details. which keys are used, which are
               | pinned. Which keys the government has, and which
               | certificates it can and will issue itself. Which clients
               | it will backdoor, and where will it attempt MITM attack
               | if necessary.
        
               | PureParadigm wrote:
               | On Signal you're encouraged to verify out-of-band (such
               | as in person) with the "safety number" which allows users
               | to verify each other's keys to prevent a man-in-the-
               | middle attack. This way you'll notice if the initial key
               | exchange has been compromised.
        
           | alkonaut wrote:
           | So this would be a complete ban on VPNs? How does that even
           | work? It's enforceable in Uganda and China, but in the US?
        
       | pgm8705 wrote:
       | Presumably, this would affect Apple and iMessage as well,
       | correct?
       | 
       | Hopefully, Apple will publically denounce this act, putting
       | stronger pressure on representatives and increasing public
       | awareness.
        
         | maqp wrote:
         | Apple can already silently eavesdrop on all iMessages, because
         | they control the public keys inserted to your device. There are
         | no fingerprints to verify you're not under MITM attack so they
         | can just start attacking everyone. Read my longer post on this
         | topic here: https://news.ycombinator.com/item?id=21425897
        
           | saagarjha wrote:
           | Apple cannot do this "silently".
        
             | maximente wrote:
             | what evidence do you have to refute the longer post that
             | the OP linked to where they explain the exact mechanism
             | that this can be done silently?
        
               | saagarjha wrote:
               | The fact that adding a new key is no longer silent?
               | iMessage will alert you when a new device is added to the
               | account.
        
       | cageface wrote:
       | This kind of thing and the pulling of HKMaps are the main reason
       | I'm running Android again. Being able to run apps on my phone
       | that my government won't allow in an official app store is
       | looking more and more likely to be an essential freedom.
        
       | flattone wrote:
       | The state of respect from law and corporations upon consumers is
       | already the single most depressing thing and now earnit. Grew up
       | wanting to live in the future now i just want out. Remember that
       | 15 year joke 'dont be evil'?
       | 
       | I believe i could self immolate a million times over in front of
       | a variety of scenes and meanings, people could call, write and
       | click, teach and learn. There is however an absolute, it seems,
       | that there is no profitable path for relatively infinite powers
       | (politicians and corporations) to allow any meaningful movement
       | towards the more humanitarian, civil/passionate version of a
       | culture.
       | 
       | Instead we will visibly or not be corralled into a highly
       | monitored and monetized form of drone happiness. Its cool.. as
       | long as zoom always works, right? In a sort of twisted 'we will
       | do things to them but it wont happen to us'. Perhaps quarantine
       | brain is boiling over into my comment style.
        
         | mirimir wrote:
         | > The state of respect from law and corporations upon consumers
         | is already the single most depressing thing and now earnit.
         | 
         | After five decades of the bloody War on Drugs, I have _zero_
         | respect for the rule of law.
        
         | dTal wrote:
         | >Perhaps quarantine brain is boiling over into my comment
         | style.
         | 
         | Quite honestly this comment sounds like you're entering a
         | schizophrenic episode. I don't mean to be disrespectful and I
         | am not a psychologist, but there's a characteristic tone and I
         | recognize it. Quarantine is hard for brains. If you're in
         | quarantine and you sense that your brain isn't working quite
         | right, give your loved ones a call. Actually, do that anyway.
        
           | soheil wrote:
           | > and I am not a psychologist, but
           | 
           | You probably should have just stopped there.
        
           | flattone wrote:
           | I appreciate your sharing this view... but i lack background
           | as to why. This tone and line of thinking is quite regular
           | with the exception of a few friends who prefer surrendering
           | privacy for safety.
           | 
           | Tell me more about your views? Basically im trying to get at
           | does this non psychologist have valid insight or is this just
           | a knee jerk disagreement+quarantine comment?
           | 
           | And to better clarify my boiling over thing it is really to
           | say that with the added time on our hands we all have so much
           | time to read and think about our lives.
           | 
           | Just in case you're right... hello from loony town. Haha.
           | Sorry not funny.
        
             | dTal wrote:
             | >Basically im trying to get at does this non psychologist
             | have valid insight or is this just a knee jerk
             | disagreement+quarantine comment?
             | 
             | Neither. I am only reacting to your writing style, which
             | reminds me very much of some schizophrenic people I have
             | known. If I had to describe it, I would say it is
             | characterized by disjointedly jumping around a theme, often
             | using sentence fragments instead of complete sentences. It
             | makes sense to you, but it is difficult for others (well,
             | me) to follow. Again I don't mean this as an attack at all,
             | just as an encouragement to reach out.
             | 
             | I don't have a lot to say about the actual content of your
             | comment, except to say that it sounds awfully pessimistic
             | and that life can surprise us with history's twists and
             | turns. I'm sure things felt similarly hopeless in the early
             | 20th century with the robber barons, or during the plague
             | that immediately preceded the enlightenment. Chin up!
        
       | lonelappde wrote:
       | Why can't clients encrypt client side?
       | 
       | Chat apps should support input plugins. If a user encrypts
       | locally, there's nothing the network can do about it.
        
         | t-writescode wrote:
         | That is how E2E works. But that means the software you're using
         | must be able to communicate with your client, unless you want
         | to copy-paste every message into a decrypted. That's a pain for
         | normal communication.
         | 
         | Therefore, we have programs like Signal that do that for us.
        
           | mLuby wrote:
           | I wonder if a keyboard app could do it, since they sit
           | between the user input and the chat app.
           | 
           | It would be nice if message transportation were decoupled
           | from composition and consumption. Default bundling is fine
           | for ease of use, but allow first-class replacements.
        
       | lisper wrote:
       | If anyone here is interested in helping to develop E2E encryption
       | that cannot be shut down by the government here is my effort
       | towards that end:
       | 
       | https://github.com/Spark-Innovations/SC4
       | 
       | The project has been moribund for a while because it's hard to
       | compete with Signal but it wouldn't take a lot of encouragement
       | for me to take it up again. First on the agenda is adding a
       | ratchet. Most of the heavy lifting is already done
       | (https://github.com/rongarret/ratchet-js) it just needs to be
       | integrated. I also have an iOS app that was kinda sorta working
       | the last time I tried it.
        
       | lambdasquirrel wrote:
       | The sheer irony being that Federal workers have started using
       | Signal instead of other apps, because it's encrypted.
        
       | AlexandrB wrote:
       | It's not really a "threat". I don't think Signal could legally
       | operate in the US with this act in place. More like saying: "If
       | you effectively ban end-to-end encryption, we can't offer our
       | end-to-end encrypted chat app in your jurisdiction any more."
        
         | FigmentEngine wrote:
         | it is a threat. signal could still operate, they would just be
         | at risk of being killed by a thousand cuts.
        
         | mirimir wrote:
         | > I don't think Signal could legally operate in the US with
         | this act in place.
         | 
         | I could do that, because nobody knows who I am.
         | 
         | But then, I'm not technical enough. And I couldn't do that as
         | Mirimir, because that persona has existed too long, and has
         | been far too public.
         | 
         | The point, though, is that I'm confident that it's doable.
        
         | pacificmint wrote:
         | > I don't think Signal could legally operate in the US with
         | this act in place.
         | 
         | Of course they could operate. They would just have to backdoor
         | their encryption. Which, presumably, is what this legislation
         | wants to achieve.
         | 
         | They don't want a world with no chat apps, they want a world
         | with chat apps they can listen to.
         | 
         | What Signal is saying in this blog post is that they would
         | rather give up the US market than weaken their encryption.
         | Which is worth saying, because it's probably not true for most
         | other apps. Most corporations would not give up the US market,
         | no matter what compromises they have to make.
        
           | AlexandrB wrote:
           | > Of course they could operate. They would just have to
           | backdoor their encryption.
           | 
           | Is it even possible to have end-to-end encryption (in the
           | technical sense of the term) with a backdoor? If your
           | product's marquee feature is security via end-to-end
           | encryption your product is a non-starter in a jurisdiction
           | that bans end-to-end encryption, no?
        
             | mumbisChungo wrote:
             | ask the CEO of Zoom
        
           | maqp wrote:
           | Spot on. The thing is, content is still valuable and
           | companies would like to access it on behalf of the
           | government, but they now have to compete with private
           | messaging apps. The big tech companies want the government to
           | force them to make more profits on user data by forcing the
           | backdoor. If this was something the tech companies didn't
           | want, they'd be spending billions to lobby for the human
           | right to privacy.
        
         | ardy42 wrote:
         | > It's not really a "threat". I don't think Signal could
         | legally operate in the US with this act in place. More like
         | saying: "If you effectively ban end-to-end encryption, we can't
         | offer our end-to-end encrypted chat app in your jurisdiction
         | any more."
         | 
         | Could they operate, so long as they implemented a mechanism to
         | scan for and report child pornography? Assuming
         | (optimistically) that the government committee that the EARN IT
         | act mandates adopts reasonable standards.
         | 
         | I think this article gives a good background on the problem:
         | https://blog.cryptographyengineering.com/2020/03/06/earn-it-...
         | 
         | I (personally) think that client-side photo hashing and
         | automated comparison against one of the child abuse databases
         | should be sufficient. Alternatively, Signal could probably just
         | disable features for sharing images in the US.
        
           | toast0 wrote:
           | > Could they operate, so long as they implemented a mechanism
           | to scan for and report child pornography?
           | 
           | Signal's model is that their servers are never able to
           | understand any user content. You can't effectively scan for
           | prohibited content on the client side for several reasons:
           | 
           | A) someone who wants to send or receive prohibited content
           | could alter the client to skip the checks.
           | 
           | B) shipping the check to the clients makes it possible for
           | distributors to run the checks and alter their content until
           | it passes the checks.
           | 
           | If client side filtering was effective, the ask should be for
           | Google, Microsoft, and Apple to scan and report prohibited
           | content on their operating systems, which together cover the
           | vast majority of user terminals.
        
             | ardy42 wrote:
             | > You can't effectively scan for prohibited content on the
             | client side for several reasons:
             | 
             | I disagree. I think these scanners can only be good, but
             | never perfect, so they're mainly effective against
             | technically unsophisticated abusers. Weakness that are only
             | exploitable by someone with advanced technical skills are
             | not actually a problem.
             | 
             | > A) someone who wants to send or receive prohibited
             | content could alter the client to skip the checks.
             | 
             | That's true in any kind of scanner. Server side checks
             | could be defeated pretty trivially by using _any_ encoding
             | scheme not anticipated by the scanner 's authors (e.g.
             | sending an image as text messages encoded with rot13
             | Base64). No scanner can be robust against even a mildly
             | technically savvy opponent unless the scanner has complete
             | end-to-end control over everything, including the clients.
             | 
             | > B) shipping the check to the clients makes it possible
             | for distributors to run the checks and alter their content
             | until it passes the checks.
             | 
             | My understanding is those databases and algorithms are not
             | secret information, but are publicly available to provide
             | low barriers to implementation, so someone could download
             | one and do what you propose now.
        
             | Paul-ish wrote:
             | You're right that it wouldn't work technically. But legal
             | compliance doesn't always make things work the regulators
             | want them to.
        
       | ENGNR wrote:
       | They achieved this in Australia by saying "we don't care how you
       | achieve both security and putting backdoors in, just have a
       | 'capability'". If you don't have the ability to open a backdoor
       | for them you've committed an offence
       | 
       | The best counterargument I came up with at the time is the
       | security of our children. Who the hell knows what teenagers are
       | sending to each other these days? Do we even want to know? I
       | don't, and it's weird that Attorney General Barr wants to open
       | this door. Why risk letting the wrong person sneak into a
       | position where they can see all of our children's messages,
       | everyone deserves real security
        
       | steindavidb wrote:
       | Senator Feinstein (D-CA) is a do's-onshore of the bill. Here's
       | the form to contact her office and encourage her to not support
       | the bill:
       | https://www.feinstein.senate.gov/public/index.cfm/e-mail-me
        
         | tln wrote:
         | do's-onshore = co-sponsor?
         | 
         | Thanks for the link, I sent an email with it.
        
       | mikece wrote:
       | 1. The police are either lazy or incompetent if they say they
       | cannot trace criminals because of E2E secure chat.
       | 
       | 2. You don't need to know the contents of a chat to glean massive
       | amounts of metadata. FB Messenger and WhatsApp going truly E2E
       | encrypted will still put FB (and anyone serving them with
       | warrants) to know in real time who is talking to whom, what their
       | IP addresses are, and possibly real location (if they are using
       | the app on their phone). This can be used to created a Signature
       | profile... many Pakistanis and Yemeni have died from a Hellfire
       | missile strike because they matched a pattern of activity. Google
       | "signature strike" for more info.
       | 
       | 3. The terrorists and pedophiles that are the most dangerous are
       | using far more sophisticated means of communication than Wire,
       | Signal, WhatsApp, Wickr, etc. Saying that this is "for the
       | children" or "for our safety" is complete bullshit and anyone
       | saying otherwise needs to prove it.
        
         | the8472 wrote:
         | > anyone saying otherwise needs to prove it
         | 
         | Sorry pal, that's top secret intel. Just Trust Us(tm).
        
         | ravenstine wrote:
         | Maybe the terrorists. Anyone who's seen "to catch a predator"
         | knows that most pedophiles are borderline mentally handicapped
         | and are way more likely to get caught by their own
         | incompetence; no extra laws necessary.
         | 
         | But you're otherwise right that people running CP rings are
         | probably using more sophisticated means that can't be stopped
         | by conventional means.
        
         | oconnor663 wrote:
         | > The terrorists and pedophiles that are the most dangerous are
         | using far more sophisticated means of communication
         | 
         | The "most dangerous" part is doing a lot of work there. Just
         | like I think law enforcement needs to admit what they can and
         | cannot do (e.g. they cannot protect a golden key), I think we
         | need to admit some things too. A lot of dangerous criminals are
         | stupid. Maybe not the most dangerous ones, sure. But if law
         | enforcement has a tactic that lets them catch, say, the
         | stupidest 30% of terrorists, that's an _extremely_ valuable
         | tactic that probably saves a lot of lives in practice. It would
         | be wrong to claim that society loses nothing by engineering
         | away that tactic.
         | 
         | I think this sort of thing leads to a lot of frustration on
         | both sides. As a programmer, I find it very frustrating that
         | law enforcement and the media consistently get some of the most
         | basic details wrong about how communication and encryption
         | work, and about the negative side effects of the new laws
         | they're proposing. But I assume that law enforcement folks also
         | feel frustrated about how people like me have no idea how they
         | actually get their jobs done day-to-day, or the negative side
         | effects of the technologies we're building.
        
           | tootie wrote:
           | The 1993 WTC bombers got caught when they tried to recoup the
           | deposit on the rented van they blew up. OTOH, we tapped bin
           | Laden's sat phone.
        
           | kevin_thibedeau wrote:
           | The stupidest 30% are walking around with phones that are
           | already easily tracked.
        
         | strictnein wrote:
         | I multihop VPN through service A. My criminal friends multihop
         | VPN through service B, C, etc. All hops are through non-US
         | friendly countries
         | 
         | We then communicate over a secure messaging platform like
         | Signal, Telegram, etc.
         | 
         | Knowing just that I communicated with one or more people, how
         | you would conduct your investigation to "trace" the
         | participants in this conversation?
         | 
         | The feds would be really put up to unravel this (and are on a
         | daily basis), let alone the police.
        
           | chatmasta wrote:
           | Why are the feds watching these conversations in the first
           | place? Has a crime been committed? If they're investigating a
           | crime, surely there are more avenues of investigation than
           | Facebook chats that didn't even exist ten years ago. Whatever
           | happened to good old fashioned police work? Seems like they
           | just expect everyone's chats to be handed to them on a silver
           | platter when they ask for it.
        
             | strictnein wrote:
             | I'm responding to this statement and showing how it is
             | rather ignorant:                  1. The police are either
             | lazy or incompetent if they say they cannot trace criminals
             | because of E2E secure chat.
             | 
             | As for the rest of your comments: The feds are watching
             | criminals online because lots of crime is committed online.
             | I do not think weakening encryption will help them in this
             | pursuit.
        
         | mywittyname wrote:
         | > far more sophisticated means of communication
         | 
         | Or far more simple means. It's trivial, really, to write your
         | own app for encrypted communication or signaling. I bet I could
         | build one in a day.
         | 
         | Even without programming skills, you could set up a shared
         | drive containing only a keepass file. Download the file, use
         | your key and password to open it, then read the message.
         | Monitor the last updated timestamp to see if there have been
         | any changes.
         | 
         | Securing your communications is not hard.
        
         | Thriptic wrote:
         | I think its better to just admit that freedoms / tech will
         | always be misused by criminal actors, and that's just a price
         | we agree to pay for privacy, security, and liberty. I don't
         | think think that's a controversial statement, and we make such
         | trade offs all the time unconsciously. The United States has
         | largely agreed to accept a certain amount of criminal gun
         | violence in the name of personal gun ownership. We agree that a
         | certain amount of money laundering will occur due to shell
         | corporations and foreign ownership of assets. We agree that
         | police have to let a certain amount of crime go unpunished in
         | order to protect against unreasonable search and seizure. The
         | only difference between those things and this is that no one
         | has the balls to stand up and admit that a certain amount of
         | child abuse is an acceptable price given the stakes at hand,
         | even though it is true.
        
           | t-writescode wrote:
           | Truly, this is a stance we have to have for everything.
           | 
           | If we want criminal justice reform, too, for example, we have
           | to agree that some criminals will come out of prison after
           | their shorter sentences and they will get into positions and
           | jobs where they will cause harm.
           | 
           | Any lightening of sentences will come with bad people getting
           | through and hurting others. But, this is an acceptable price
           | to pay to allow the other felons redemption in this world.
        
           | ngold wrote:
           | And you need a warrant to go through a person's mail. How is
           | that not defacto policy for digital privacy?
        
             | lonelappde wrote:
             | The EARN IT law enables warrants for digital privacy. The
             | problem is that the choice is between "warrants are
             | impossible due to encryption" and "warrants can be skipped
             | by misbehaving actors".
             | 
             | There's no way to guarantee a middle ground.
        
             | caseysoftware wrote:
             | Third-party doctrine. It is awful but well-established.
             | 
             | If you want a good grounding in the legal precedents - both
             | laws and decisions - that have gotten us here, read Habeas
             | Data. Great book laying out all the terrible implications.
        
           | lonelappde wrote:
           | Not controversial?
           | 
           | Liberty is what wars are fought over.
        
             | code_duck wrote:
             | Maybe flame wars. It would be nice if people believed in
             | abstract principles that strongly, or rather, almost that
             | strongly would be perfect. Empirically wars are fought over
             | which groups get to control resources.
        
           | mirimir wrote:
           | > I think its better to just admit that freedoms / tech will
           | always be misused by criminal actors, and that's just a price
           | we agree to pay for privacy, security, and liberty.
           | 
           | Yes! Also, one sure way to know that we have "privacy,
           | security, and liberty" is that criminals are abusing them.
           | And, as an added benefit, efforts to identify and apprehend
           | criminals help identify weaknesses and OPSEC failures.
        
           | marta_morena_23 wrote:
           | > no one has the balls to stand up and admit that a certain
           | amount
           | 
           | Yeah no, that's not how this works. The reason they can't do
           | this with guns is because that would pull out the rug under
           | them, as most republican voters will stop voting for people
           | who want to curtail their gun rights. Now try to find people
           | who give a dusty fuck about online privacy, I am not even
           | sure a noteworthy portion of HN gives a F __*, let alone my
           | parents or granparents... Most people simply don 't
           | understand what WhatsApp even is. They use it and send stuff
           | but that is where their knowledge ends. That's also why Zoom
           | can get away with their end-to-end encryption. People don't
           | care. Period.
        
           | faster wrote:
           | It sounds like you accept the bill's authors' claim that
           | EARN-IT is about protecting children.
           | 
           | I'd be very interested in hearing from child abuse
           | investigators how the controls in the bill line up with how
           | tech is used in abusing children. My expectation is that
           | there is very little alignment, because "for the children" is
           | most often the rallying cry of politicians who want something
           | that is not in the best interests of the people they are
           | supposed to represent.
        
             | zymhan wrote:
             | > It sounds like you accept the bill's authors' claim that
             | EARN-IT is about protecting children.
             | 
             | No, you're putting words in their mouth.
             | 
             | You have your head in the sand if you don't think people
             | use perfectly legitimate encryption service to discuss
             | illegal activity. But that is not a reason to ban
             | encryption. The entire US constitution is built on the
             | premise that people have rights.
             | 
             | But it has always been true that some people use their
             | rights to avoid having their criminal activity detected.
             | That doesn't make our rights any less important.
        
               | lukifer wrote:
               | > The entire US constitution is built on the premise that
               | people have rights.
               | 
               | As much as I'm near-absolutist on civil liberties, I
               | think it's also valuable to recognize that the intrinsic
               | good of individual rights are only one part of the story;
               | the other is the balance of power between government and
               | the governed.
               | 
               | I recently heard Sam Harris opine that from a utilitarian
               | perspective, an absolutist right to privacy pales in
               | comparison to allowing harm to come to children, and so
               | the tech community needs to flex a little on the privacy
               | question, and meet law enforcement halfway. Through that
               | reductionist lens, it's hard to find fault in the
               | argument.
               | 
               | The problem isn't limited to privacy, though. Unbreakable
               | digital locks exist, and they aren't going anywhere. [0]
               | And there is _power_ in the ability to keep secrets. You
               | can bet the Feds have little interest in a Panopticon,
               | where they too are obstructed from keeping digital
               | secrets, as  "meeting us halfway" for some greater good.
               | Rather, they want to hoard that asymmetric power as their
               | exclusive purview. No matter how well-intentioned, that
               | asymmetry of raw power is something We The People have a
               | vested interest in taking seriously, far beyond some
               | abstract notion of "I want to Google
               | ${CONSENTING_ADULT_SEXUAL_ACTIVITY} without worrying the
               | neighbors will find out".
               | 
               | [0] https://www.youtube.com/watch?v=VPBH1eW28mo
        
               | someguyorother wrote:
               | > I recently heard Sam Harris opine that from a
               | utilitarian perspective, an absolutist right to privacy
               | pales in comparison to allowing harm to come to children,
               | and so the tech community needs to flex a little on the
               | privacy question, and meet law enforcement halfway.
               | Through that reductionist lens, it's hard to find fault
               | in the argument.
               | 
               | I'd say it's pretty easy. For utilitarianism to make
               | sense, it has to take the future into account. And what
               | looks like an absolutist right to privacy might be a
               | utilitarian argument of the type that if you grant a
               | monopoly of power (private or public) the right to make
               | use of your private information, then it could well use
               | that private information against you later.
               | 
               | An integral utilitarian might then say "it's worth some
               | harm to children today to ensure there won't be great
               | harm tomorrow". That kind of being able to trade off
               | different scenarios of harm without regard to absolute
               | principle is pretty much what characterizes (act)
               | utilitarianism.
        
             | Thriptic wrote:
             | I don't believe that. I'm simply saying that if the stated
             | logic for this bill is that we need to regulate encryption
             | because there is an unacceptable risk of misuse, then my
             | response is that I actually accept the current level of
             | misuse risk given the current level of regulation.
             | Instituting further controls in the form of regulation
             | would cost us more than the perceived reduction of risk
             | that it affords.
             | 
             | Obviously this bill is about more than that, but I think
             | that statement pretty much torpedoes their main public
             | argument.
        
           | exolymph wrote:
           | This is my view, 100%. Yes there are downsides to strong e2e
           | comms, but the downsides of _not_ having strong e2e comms are
           | far worse.
        
           | dwighttk wrote:
           | > The only difference between those things
           | 
           | You listed two things that easily and obviously line up with
           | a Bill of Rights amendment... not sure there is one of those
           | for encryption. Unless I'm just blanking...
        
             | conradev wrote:
             | https://cyberlaw.stanford.edu/blog/2020/03/earn-it-act-
             | uncon...
        
           | AnthonyMouse wrote:
           | > I think its better to just admit that freedoms / tech will
           | always be misused by criminal actors, and that's just a price
           | we agree to pay for privacy, security, and liberty.
           | 
           | It's possible for both things to be true at the same time.
           | 
           | If Signal exists and is secure, will criminals use it? Sure
           | they will, criminals are people and people want private
           | communications.
           | 
           | But if you ban honest citizens from using Signal, will
           | _criminals_ stop using secure communications? No, they have
           | an unusually strong incentive to use them and will seek out
           | alternatives. The percentage of criminals who switch to
           | insecure communications will be lower than the percentage of
           | honest people who do.
           | 
           | Which _increases_ the amount of crime, because the amount you
           | 're helping law enforcement catch criminals is smaller than
           | the amount you're helping criminals exploit victims. This is
           | also compounded by the fact that there are more honest people
           | than criminals.
           | 
           | There is a theory of bureaucracy ("an institution will
           | attempt to preserve the problem to which it is a solution")
           | that says law enforcement agencies will ask for this even
           | when they know full well that it will increase the overall
           | amount of crime, because more crime is good for them since it
           | means more law enforcement.
        
             | null0pointer wrote:
             | I agree that criminals will use secure communications
             | regardless of the law. I don't understand what you mean
             | when you say it will increase crime though.
             | 
             | Regardless, I feel like there's a deeper motive from
             | governments/law enforcement. It would allow them to claim
             | that anyone using secure comms must have something to hide
             | and is thus a criminal. Combine that with mass surveillance
             | and anyone you see sending encrypted traffic can
             | automatically be assumed to be a criminal. I'm not saying
             | this is right, it's certainly not right. But I'm sure
             | that's the argument that will be used by those trying to
             | push it.
             | 
             | The only way to fix this is secure-by-default comms, such
             | that all traffic looks the same and you cannot make any
             | claims of criminality based on that alone.
        
               | AnthonyMouse wrote:
               | > I don't understand what you mean when you say it will
               | increase crime though.
               | 
               | Suppose you're a criminal organization or a foreign
               | government. You break into AT&T or Amazon or whomever and
               | get access to a bunch of data streams. If they're all
               | E2EE, you have a bunch of inscrutable ciphertext. If
               | they're not, you have everybody's passwords, trade
               | secrets, credit card numbers, information useful for
               | blackmail etc. Lack of strong encryption enables crime --
               | that's why honest people use strong encryption.
        
             | [deleted]
        
           | mikece wrote:
           | Just because an Ethernet cable _can_ be used to strangle
           | someone doesn 't mean that failing to stand in opposition to
           | network wiring is to accept a certain amount of murder by
           | strangulation. Don't focus on the tool being used for the
           | crime but on the tool committing the crime.
        
             | notJim wrote:
             | There are degrees to which tools are useful for committing
             | crimes, and it's naive to pretend otherwise. Encryption is
             | obviously an incredibly useful tool for committing a number
             | of crimes, and I think it's better to argue that it's worth
             | it than to act like there's no connection.
        
               | tehjoker wrote:
               | The government wants to expand surveillance so that way
               | potentially disruptive social movements can be monitored
               | and disrupted. Activists use signal too.
               | 
               | In case you hadn't noticed, the government is currently
               | on its backfoot and disruptive social policy reforms are
               | back on the table. They want to make sure that
               | corporations get everything and the people get nothing.
               | 
               | The encryption fight has been going on for decades, but
               | at root their complaints about terrorists and child
               | trafficking are covers for expanding a lazy version of
               | COINTELPRO. Lazy meaning that they can just sit in an
               | office and see everything. Let's not forget the FBI's
               | role in trying to get MLK to commit suicide. These
               | shadowy agencies are not in any way the good guys.
        
             | rapind wrote:
             | I think this depends on the tool. Certainly we could see
             | the tool being a problem if it was a mini nuke or Anthrax
             | (I don't for the record think encryption rises to this
             | level).
             | 
             | I'm very concerned that technology will put something
             | devastating (at scale) in people's pockets and then we're
             | kind of screwed (do we choose big brother and all that
             | entails, or indescribable mass destruction?). I don't have
             | a solution but it keeps me up some nights.
        
         | andai wrote:
         | > far more sophisticated means of communication than Wire,
         | Signal, WhatsApp, Wickr
         | 
         | Like better apps, or something homebrewed?
        
         | lonelappde wrote:
         | > The terrorists and pedophiles that are the most dangerous are
         | using far more sophisticated means of communication
         | 
         | Terrorism is mostly opportunistic radicals communicating via
         | YouTube and Twitter and Fox News, or national / quasinational
         | governments that are brazen and flagrant and don't need to
         | worry about being noticed.
        
           | cvwright wrote:
           | Sometimes these idiots have posted on Facebook about their
           | planned attacks. And we still did not manage to stop them.
        
         | formercoder wrote:
         | Yep, we know the CIA makes kill decisions based on metadata.
        
         | blfr wrote:
         | Perhaps I'm not hip enough but I'm pretty sure there is nothing
         | more sophisticated than Signal.
        
           | upofadown wrote:
           | Signal is all about making good cryptography usable for the
           | general public. If you actually use the "safety numbers" to
           | verify the identity of who you are communicating with then
           | you have real guaranteed end to end encryption. Unfortunately
           | not everyone does that.
           | 
           | People that really really need to be sure probably use
           | something super simple like PGP after they take the time to
           | learn how.
        
           | mikece wrote:
           | Session -- it just doesn't have as many features.
           | 
           | BTW, one of Signal's weaknesses is that you MUST use a phone
           | number with it. If you're savvy you realize this can be a
           | Twilio number you control making your account immune from SIM
           | hijacking. However, unless you override a bunch of defaults
           | Signal is not immune to other attack vectors like attempting
           | to unfurl a URL sent in a message -- which can expose your
           | true IP address -- or generate a thumbnail of a video --
           | which can launch a malware attack -- which is the method of
           | attack alleged to have been used by Saudi intelligence to
           | hijack Jeff Bezos' phone (via an E2E encrypted WhatsApp
           | message no less). A more sophisticated messenger system would
           | turn off lots of "convenience" features by default and let me
           | pick a random username and NOT make me enter a phone number
           | or email address. People who care about security don't need a
           | way to reset their randomly generated 128 character
           | passwords.
        
             | tialaramex wrote:
             | Beyond the (slightly behind trend) enthusiasm for
             | blockchains Session is the same punt on contact discovery
             | as lots of other systems that went nowhere. This works
             | great for little secret decoder ring cliques but doesn't
             | actually secure real people's day-to-day messages due to
             | lack of discovery - your local butcher and the guy your
             | sister went to college with never find out that you have
             | the same secure messaging app, and so their messages to you
             | aren't secured.
             | 
             | In contrast to your disinterest in convenience features,
             | Session does have a bunch of things that presumably its
             | principles felt were non-negotiable but clearly harm
             | security. The "Open Groups" feature for example is
             | basically "Eh, this is hard, we give up" for larger groups
             | (500+ people). No end-to-end encryption and you're given
             | either a moderator tool that doesn't work ("Ban"
             | pseudonymous people who can for zero cost just create a new
             | pseudonym) or one that's onerous ("Invite" everybody
             | manually).
        
             | rsync wrote:
             | "BTW, one of Signal's weaknesses is that you MUST use a
             | phone number with it. If you're savvy you realize this can
             | be a Twilio number you control making your account immune
             | from SIM hijacking."
             | 
             | Does Signal not ever send messages from, or otherwise use,
             | SMS shortcodes ?
             | 
             | I ask because no twilio number can receive an SMS shortcode
             | (because no twilio number is classified as a "mobile"
             | number).
             | 
             | Genuinely curious.
        
               | phaer wrote:
               | The do it once for the initial setup. But iirc, one can
               | also get an automated call for the pin.
        
             | UncleMeat wrote:
             | > BTW, one of Signal's weaknesses is that you MUST use a
             | phone number with it.
             | 
             | This isn't a weakness, it is a tradeoff. You use phone
             | numbers (downside) but the server does not have to store
             | any information about who is talking to who (upside). Other
             | tools reverse this choice and don't use phone numbers but
             | do need to maintain the communication metadata.
        
               | baybal2 wrote:
               | It's not a tradeoff, it's a weakness by design. All
               | features you mention are 100% doable without a phone
               | number
        
               | _wldu wrote:
               | Signal is not built for anonymity. It's built for message
               | privacy. It's a lot like PGP in that the government know
               | who emailed whom, but they cannot read the email. That's
               | the whole point. If you are trying to hide your phone
               | number, Signal is not going to help you and it's not
               | meant to.
        
               | nebulous1 wrote:
               | I believe it is both a weakness and a trade-off
        
               | maqp wrote:
               | Sure, and Signal is already working on usernames. Here's
               | the kink: When you have low latency (video) calls, you
               | can't route via Tor. When you can't route via Tor, you
               | leak your IP to the server. When you leak your IP you're
               | not anonymous, and when you're not anonymous, the server
               | having the hash of your phone number isn't adding too
               | much data to them.
               | 
               | When the server knows who you are, the app can use your
               | existing contact list to discover contacts. This means
               | unlike e.g. Telegram, Signal server doesn't store your
               | contact list.
               | 
               | I e.g. constantly see people whose phone number I've
               | already deleted appear on my Telegram contact list "X
               | joined Telegram". Telegram knows I had the number at some
               | point. This would never happen with Signal.
        
               | kosievdmerwe wrote:
               | > the server having the hash of your phone number isn't
               | adding too much data to them.
               | 
               | Wait how big is the hash of the phone number?
               | 
               | If it's enough bits (e.g., a full sha hash) then it's not
               | that secure to hash at all. 10^10 or even 10^11 is just
               | 10 or 100 billion. I can easily try all phone numbers
               | until I find the one that matches the hash.
               | 
               | It maybe protects against attacks against lots of people,
               | but it really doesn't protect an individual.
        
               | mirimir wrote:
               | > Here's the kink: When you have low latency (video)
               | calls, you can't route via Tor.
               | 
               | Sure, but you can use VPNs. Or Orchid, which is a multi-
               | hop VPN that routes through multiple VPN providers.
               | 
               | Or you can just use VoIP, which can be done via Tor, as
               | long as you can force TCP mode.
        
               | UncleMeat wrote:
               | Then why has nobody done it?
        
           | mikece wrote:
           | To be fair, "Signal the App" and "Signal the Protocol" are
           | two different things. If you were talking about the later
           | then your statement is quite possibly correct.
        
           | uoaei wrote:
           | Why not Keybase?
           | 
           | https://keybase.io/
        
             | QUFB wrote:
             | The lack of PFS is a big negative about keybase.
        
               | brobinson wrote:
               | I was just looking into keybase, and.... deleted. Thanks
               | for the heads up.
        
               | urxvtcd wrote:
               | I was under the impression it's the same for Signal.
               | Quick duckduckgo led me here:
               | https://signal.org/blog/asynchronous-security/ The more
               | you know!
        
               | cristoperb wrote:
               | You can set messages to expire in keybase:
               | 
               | https://keybase.io/blog/keybase-exploding-messages
        
               | majewsky wrote:
               | That looks completely orthogonal to Perfect Forward
               | Secrecy.
        
       | harikb wrote:
       | Can we please have new articles at least state the law correctly
       | as anti-security instead of anti-encryption?
        
       | hiq wrote:
       | Thread of the blog post (source of the article):
       | https://news.ycombinator.com/item?id=22815112
        
       ___________________________________________________________________
       (page generated 2020-04-09 23:00 UTC)