RIPA s 12(7)
Peter Fairbrother
zenadsl6186 at zen.co.uk
Sat Jun 21 01:26:40 BST 2014
On 16/06/14 08:04, Caspar Bowden (lists) wrote:
> On 06/16/14 00:26, Peter Fairbrother wrote:
>> On 12/06/14 12:20, Caspar Bowden (lists) wrote:
[...]
>>> Wonder opinions if this sufficient for UK to (coercively) "do a
>>> Hushmail" ? Or under Intel Services Act, or RIPA Pt.2 ?
>>
>> I'm not sure what you mean here.
>
> http://www.wired.com/2007/11/encrypted-e-mai/
>
> Actually I had forgotten that this case involved server-side extraction
> of key (read above). This is obviously within RIP Pt.3 - I remain
> worried about trying to find combo of UK powers which could coerce a
> client-side attack (e.g. he provider has to inject back-doored
> javascript code)
It seems Hushmail had/have two different products, one a Java-based
applet, one JavaScript-based. The Java-based applet may or may not be
secure against warrants, but the JavaScript-based one most definitely isn't.
Afaict, in the JavaScript-based app user's passwords and emails are sent
behind a TSL connection, but otherwise in plain language, nothing is
hidden from the server - in the case of a sent email, the server then
does the public key encryption for the recipient. In the case of a
received email, the server does the private key decryption, then just
re-encrypts for link TLS.
This of course breaks the end-to-end model, and it is no wonder that
Hushmail could provide plaintext under a warrant - server-side
extraction of key, or just supplying users passwords (if that is what
they did, I'm not clear on that) is just one of many ways in which they
could have made plaintext available.
I don't see any reason why you couldn't operate a real end-to-end
encryption scheme via a browser and JavaScript - it would be a bit
clunky, but I can't see why it wouldn't technically be possible.
So, to get to the question - supposing you did have such a JavaScript on
your server, could UK Plod force you to backdoor it so you/they could
read traffic?
I think it depends a bit on the situation, eg what you are protecting,
email-type messaging or voip traffic might be different - and it might
also matter whether you are supplying a total service, or just the
JavaScript software.
On the one hand, if you are just supplying software (and not a telecomms
service) then I don't think they could force you to backdoor the
software - on the other hand, if you are supplying a complete voip
service like Skype (in the UK) then I think they probably could require
you to have the capability to read traffic on 1 in 10,000 conversations
- after all, you can't buy telephone equipment which doesn't have
interception capability these days - even if that requirement meant
installing a backdoor.
Though the lack of non-interception-capable telephone equipment is
actually because there is no market for it, rather than any prohibition
of sales.
In between these, I'm not so sure. May post more later.
-- Peter Fairbrother
More information about the ukcrypto
mailing list