#KeyEscrow

Kevin Karhan :verified:kkarhan@infosec.space
2025-03-23

@Catwoman69y2k @dragonfriend most importantly:

Only with #SelfCustody of all the keys, #SelfHosting of the entire infrastructure and everything being #OpenSource, one can assure (and [let it be] audit[ed] independently) that the #advertised #promises are in fact true.

Cuz not expecting @Mer__edith to break is the same level of "#TrustMeBro!" assurances as #ANØM, #EncroChat, #SkyECC, #WhatsApp etc. do in their #advetising #lies!

  • Remember: Corporations/Foundations/non-profits/... don't have a right to be silent , only individuals, and even then there are certain juristictions that have #KeyEscrow laws (i.e. #France, #Russia, #KSA, #China, #India, #UK , ...) in the books!
Alec Muffettalecmuffett
2025-02-03

Former UN Rapporteur David Kaye: “for anyone who ever argued for key escrows, i offer you the example of the muskovites rampaging through USG systems” | Ofcom, please take note…
alecmuffett.com/article/111104

2025-02-03

Former UN Rapporteur David Kaye: “for anyone who ever argued for key escrows, i offer you the example of the muskovites rampaging through USG systems” | Ofcom, please take note…

…but of course I’m certain that it could never happen here.

<cough>Reform Party</cough>

https://bsky.app/profile/davidakaye.bsky.social/post/3lh7qhncccs2u

#backdoors #davidKaye #elonMusk #endToEndEncryption #keyEscrow #privacy

Remember that #story last week, where the #US #FBI came out and actually recommended people switch to using #encrypted #communications, because Chinese government hackers had burrowed deeply into the US phone infrastructure ?

Remember the #cognitive #dissonance that announcement caused, after literally decades of the FBI and other #American #intelligence agencies demanding backdoors and key escrow and deliberately weakened #encryption #algorithms?

Ya, well, apparently part of that announcement was missed. They're still demanding "responsibly managed encryption":

forbes.com/sites/zakdoffman/20

Remember: "responsible encryption" is neither. It's their demand for a back-door. And every back door can be used by the "bad guys" just as easily as it can be used by the "good guys". Anyone who tells you different is #lying to your face; encryption is math, and there is no such thing as math which the "good guys" can do but which the "bad guys" cannot.

The #USA intelligence agencies' demand for backdoors to be built into all parts of the #phone system years ago are exactly what let the #Chinese government #hackers to penetrate and control the phone system now, and which they aren't going to be able to fix for many years, if at all, because it would require replacing a *lot* of equipment with versions that don't have back doors (and which would then not be eavesdrop-able at will).

#CognitiveDissonance #BackDoor #KeyEscrow #ClipperChip #network

2023-09-19

#NSA #Backdoor Key from #Lotus-Notes (1997)

Before the US #crypto export regulations were finally disolved the export version of #Lotus Notes used to include a #keyescrow / backdoor feature called differential #cryptography. The idea was that they got permission to export 64 bit crypto if 24 of those bits were #encrypted for the NSA's public key
#privacy #encryption #publickey

cypherspace.org/adam/hacks/lot

Kevin Karhan :verified:kkarhan@mstdn.social
2023-05-22

@thatguyoverthere based off second sources, they can basically criminalize any services and systems that don't have #Govware #backdoors to allow #wiretapping and #KeyEscrow systems as well as charge people if they don't want to potentially self-inctiminate.

And even if that wasn't the case, the #PocketCrypto would literally fulfill their definition as in correctly setup encryption isn't attackable outside of brute-forcing passwords!

2023-04-26

#Facepalm — what we really don’t need right now is somebody trying to reboot failed 1997 Key Escrow, e.g. like in this letter to the @FT

This is disappointing, misconceived, and woefully repetitious of some nonsense which we last (?) saw back in 1996/ish when secret-sharing was still relatively new, cool & trendy.

In case you’re not familiar: this proposal (a) will not scale to meet demand nor growth (b) is in any case an illiberal imposition, (c) breaks Ranum’s Law by attempting to technically bodge around a social problem, (d) will not be deployable globally because there is no such thing (and likely never will be) as global consensus on how to build a backdoor; not to mention (e) will doubtless be circumvented by motivated actors — because it can be.

This is a distraction at the time we least need one. At least we can be grateful that Andersen didn’t suggest putting the escrow onto the blockchain.

Letter: Here’s the democratic key to the encryption backdoor
From Andersen Cheng, Founder and Executive Chairman, Post-Quantum, London SE1, UK

Several encrypted messaging services, including Signal and WhatsApp, recently signed an open letter criticising UK government plans for an encryption backdoor, a method by which authorised and unauthorised users are able to get around normal security measures. They cited concerns around government surveillance and weakened security.

Separately, the FBI, Interpol and the UK National Crime Agency, in a statement about Meta, argued that encryption allows crimes to occur, such as child sex abuse (Report, April 20).

Clearly, a government backdoor infringes on personal privacy and a backdoor for one is a backdoor for all. This used to summarise our entire position, and that’s why we set up the world’s first quantum-safe encrypted messaging service in 2014. Our app was successful in keeping messages secure, but we soon found out this had made it a recommended tool for Isis. Without hesitation, we shut the otherwise very successful app down.

If a backdoor compromises security, but full end-to-end encryption makes investigations impossible for law enforcement agencies, surely there’s a middle ground?

What law enforcement agencies, the government and platforms all miss is the options that thread this fine needle — encryption key splitting. This allows governments, courts, external watchdog or any combination of actors to have one encryption key split between them so that a specific threshold is required for very restricted access.

Users will still have secure data, but if the government would like to access a message it would have to gain approval, perhaps from “fragment guardians” who hold part of the encryption key such as courts or external privacy watchdogs. Both sides make valid points, but the middle ground and cryptographically provable technology is already available and waiting to help settle the debate.

Andersen Cheng
Founder and Executive Chairman Post-Quantum, London SE1, UK

Share this post:

#back-to-the-future #end-to-end-encryption #key-escrow

https://alecmuffett.com/article/59280

Ludwig W. Miethlwm@social.mieth.net
2021-06-24
RT @harkank@twitter.com

Was da geplant wird setzt #E2E-Verschlüsselung mit Schlüsselhinterlegung auf der Providerseite voraus. Die bösen alten #KeyEscrow-Ideen aus den 90ern sind zurück.
https://fm4.orf.at/stories/3015903/

🐦🔗: https://twitter.com/harkank/status/1406903594985607170
Doc Edward Morbius ⭕​dredmorbius@toot.cat
2020-08-29
chrisiwonder
2019-11-03

Schon wieder ein durchdrehender Minister: Ferdinand Grapperhaus, niederländischer Justizminister, fordert Key Escrow.

nos.nl/nieuwsuur/artikel/23088

Félix Tréguerfelix@mamot.fr
2018-07-03

RT @MM_PolyTIC@twitter.com: Back to 1996;) #KeyEscrow. Le directeur technique de la DGSE peut même réutiliser le texte des loi et décrets d'époque;) cf. cette analyse (d'époque également;)): iris.sgdg.org/axes/crypto/decr cc @reesmarc@twitter.com twitter.com/nextinpact/status/

2018-04-27

"The security of this vault is no laughing matter, because it will ultimately store the master encryption key every single device that manufacturer ever makes. For Apple alone, that’s about a billion… [The] proposal relies fundamentally on the ability of manufacturers to secure massive amounts of extremely valuable key material against the strongest and most resourceful attackers on the planet."

blog.cryptographyengineering.c

A response to the #keyescrow proposal covered in WIRED. #infosec

2018-04-27

That article is a good read on the current thinking regarding #keyescrow, BTW. #infosec #privacy #surveillance

Client Info

Server: https://mastodon.social
Version: 2025.04
Repository: https://github.com/cyevgeniy/lmst