Eskenzi PR ad banner Eskenzi PR ad banner
  • About Us
Wednesday, 7 June, 2023
IT Security Guru
Eskenzi PR banner
  • Home
  • Features
  • Insight
  • Events
    • Most Inspiring Women in Cyber 2022
  • Topics
    • Cloud Security
    • Cyber Crime
    • Cyber Warfare
    • Data Protection
    • DDoS
    • Hacking
    • Malware, Phishing and Ransomware
    • Mobile Security
    • Network Security
    • Regulation
    • Skills Gap
    • The Internet of Things
    • Threat Detection
    • AI and Machine Learning
    • Industrial Internet of Things
  • Multimedia
  • Product Reviews
  • About Us
No Result
View All Result
  • Home
  • Features
  • Insight
  • Events
    • Most Inspiring Women in Cyber 2022
  • Topics
    • Cloud Security
    • Cyber Crime
    • Cyber Warfare
    • Data Protection
    • DDoS
    • Hacking
    • Malware, Phishing and Ransomware
    • Mobile Security
    • Network Security
    • Regulation
    • Skills Gap
    • The Internet of Things
    • Threat Detection
    • AI and Machine Learning
    • Industrial Internet of Things
  • Multimedia
  • Product Reviews
  • About Us
No Result
View All Result
IT Security Guru
No Result
View All Result

Cameron rubbishes Snapchat and WhatsApp – is there an alternative?

by The Gurus
January 12, 2015
in Opinions & Analysis
Share on FacebookShare on Twitter

In a presentation today, Prime Minister David Cameron promised a “comprehensive piece of legislation” which will close the “safe spaces” used by suspected terrorists to communicate online with each other.
 
According to BBC News, Cameron said he would increase the authorities’ power to access both the details of communications and their content. He also said he recognised such powers were “very intrusive” but he believed that they were justified to counter the growing threat to the UK, as long as proper legal safeguards were in place.
 
In a hat tip to modern communication, Cameron also said that legislation would be needed to allow for “more modern forms of communication” and he would legislate in the “more contentious” area of the content of these online communications.
 
He said: “I am confident the powers we need, whether it is on communications data or the content of communications, I am very comfortable they are absolutely right for a modern liberal democracy.”
 
Add to this the report from Independent today, which claims that the PM could block iMessage, WhatsApp and Snapchat as part of his plans for new surveillance powers announced in the wake of the shootings in Paris.
 
He said that he would stop the use of methods of communication that cannot be read by the security services even if they have a warrant.
 
He said: “In our country, do we want to allow a means of communication between people which […] we cannot read?”
 
This is an interesting point which has been addressed by both the Metropolitan Police and the FBI, who have both highlighted the problem of cracking modern encryption.
 
In the case of the FBI, director James Comey said that he believes “unbreakable encryption of user data has gone too far” and in an interview last September, he acknowledged that whilst personal privacy is important, access to sensitive information may one day be vital to national security.
Comey said: “What concerns me about this is companies marketing something expressly to allow people to place themselves above the law. Google is marketing their Android the same way: Buy our phone and law-enforcement, even with legal process, can never get access to it.”
 
So the problem is that after the Snowden revelations of 2012, device manufacturer and communication technology providers have sought out ways to offer security “as a service” to users, and as a result the forensic providers cannot access the data.
 
Apple’s iOS8 is apparently built on an encryption system that is unable to be broken, even if law enforcement agencies request it. So surely those communication methods – BlackBerry BBM, Apple iMessage, the app-based WhatsApp and Snapchat and others see security “as a service” as the security of the user and their data is what is important to them and puts them above their competitors.
 
I talked to Voltage Security C
TO Terence Spies on this subject. He related a situation in the US where the FBI wanted it mandated that a front door is put into technologies, rather than a back door. “The open research community are learning how to build systems that are secure against these kind of entities and they are starting to react to it, and it is a natural reaction,” he said.
 
He recalled the NSA’s Clipper Chip, where it would be developed with a front door built into it and it was unanimously rejected; so it was a case of ‘does society want this?’
 
He said: “The technical guys make the point that we understand how to build systems or are starting to understand that what is resilient in achieving a goal of getting from A to B securely, and with a front door in can we enable that?
 
“A front door is going to undermine the security of that, as suddenly you are making the security goal more complicated in terms of how to build encryption systems between you and your website and there will be a selective leak on how it is mandated, but that has to be engineered so it will not impact the mainline security of the thing, that is much more complicated.”
 
Spies claimed that the debate on how strong encryption is will be determined by cryptographers. “It will be a societal debate on what rights do we want these entities to have, as the genie is out of the bottle now, and we understand how to build crypto systems now,” he said.
 
Of course what will happen is that if current encryption standards are broken, the new and better functionality will be built. Likewise if secure communications functions are proven to be unsafe or breakable, their users will abandon them and move to the next offering that claims to be more secure.
 
That is probably being built as I type, but as Apple CEO Tim Cook said in his open letter, “security and privacy are fundamental to the design of all our hardware, software, and services”, and it will take a lot to make that change.

FacebookTweetLinkedIn
Tags: attackCameronCyberGovernmentObama
ShareTweet
Previous Post

Microsoft angered at Google's vulnerability disclosure

Next Post

Google feels Microsoft wrath over vulnerability disclosure

Recent News

large open office, bright.

Employees Feel 10 Times Calmer in an Environmentally Friendly Office Space

June 7, 2023
Blue Logo OUTPOST24

Outpost24 Acquires EASM Provider Sweepatic

June 7, 2023
Standard post, logos of brands, headshot.

J Brand: The Challenges of Putting Mental Health First in an Unfamiliar Industry

June 6, 2023
iPad with Anxiety written on it in capitals.

Half of UK Employees Suffer From “Sunday Scaries”

June 6, 2023

The IT Security Guru offers a daily news digest of all the best breaking IT security news stories first thing in the morning! Rather than you having to trawl through all the news feeds to find out what’s cooking, you can quickly get everything you need from this site!

Our Address: 10 London Mews, London, W2 1HY

Follow Us

© 2015 - 2019 IT Security Guru - Website Managed by Calm Logic

  • About Us
No Result
View All Result
  • Home
  • Features
  • Insight
  • Events
    • Most Inspiring Women in Cyber 2022
  • Topics
    • Cloud Security
    • Cyber Crime
    • Cyber Warfare
    • Data Protection
    • DDoS
    • Hacking
    • Malware, Phishing and Ransomware
    • Mobile Security
    • Network Security
    • Regulation
    • Skills Gap
    • The Internet of Things
    • Threat Detection
    • AI and Machine Learning
    • Industrial Internet of Things
  • Multimedia
  • Product Reviews
  • About Us

© 2015 - 2019 IT Security Guru - Website Managed by Calm Logic

This site uses functional cookies and external scripts to improve your experience.

Privacy settings

Privacy Settings / PENDING

This site uses functional cookies and external scripts to improve your experience. Which cookies and scripts are used and how they impact your visit is specified on the left. You may change your settings at any time. Your choices will not impact your visit.

NOTE: These settings will only apply to the browser and device you are currently using.

GDPR Compliance

Powered by Cookie Information