cross-posted from: https://programming.dev/post/37443248

Fight Chat Control.

Comments
Answer

Question no. 1425 (General part) from the Danish Parliament’s Legal Affairs Committee:

“Will the minister elaborate on the minister’s statement to TV2 on the 21st?”

August 2024, where the minister says: "We have to break with the totally mistaken notion that it is every man’s freedom to communicate on encrypted messaging services

(…)”?”

Answer:

We know that social media and encrypted services are unfortunately largely is used to facilitate many forms of crime. There are examples on how criminal gangs recruit completely through encrypted platforms young people to commit, among other things, serious crimes against persons. It is an expression of a cynicism that is almost completely incomprehensible.

We therefore need to look at how we can overcome this problem. Both in terms of what the services themselves do, but also what we from the authorities can do. It must not be the case that the criminals can hide behind encrypted services that authorities cannot access access to.

Therefore, we, as a government, will also strengthen the police’s capabilities in the area of ​​decryption, of course under appropriate legal guarantees, as is also the case today. In addition, the Ministry of Justice has The Criminal Justice Committee has just started working on a terms of reference that will look at the challenges that technological developments present to the police investigation, including the use of encrypted messaging services.

I also note that steps have been taken within the EU towards a strengthened regulation of, among other things, digital information services and social media platforms.

For example, the European Commission has proposed a new Regulation on rules for preventing and combating sexual abuse of children. The proposed regulation contains rules on obligations for certain online services to minimize the risk of their services being misused for online child sexual abuse, and the services can, if necessary, be required to track down, report, remove and block access to material showing sexual abuse of children.

  • Nibodhika@lemmy.world
    link
    fedilink
    English
    arrow-up
    1
    ·
    23 hours ago

    Single messages can be hidden in random conversations

    That’s all it takes, cryptographic communication is a list of single messages, if you can pass one without being detected you’re done.

    If network access is only allowed for bootlocked phones, how would you send those messages but by typing them by hand?

    First of all that is impossible, TCP/IP is an open protocol, you can build your own small computer and connect it to a network. But let’s for a moment assume this was possible, you can encrypt/decrypt messages with an offline machine and send them to the online one by any number of means, e.g. Build a QR code and scan it with your phone.

    That’s useful for activists but destroys any ability to organise a movement that needs to recruit followers.

    A movement that needs to recruit followers won’t encrypt their messages since they need people to be able to read them. They could use public key encryption to ensure that people could send messages to them and they can sign messages, but encrypting the messages is pointless. You only encrypt messages when you trust the other party, otherwise anyone could intercept and encryption is pointless.

    • plyth@feddit.org
      link
      fedilink
      English
      arrow-up
      1
      ·
      4 minutes ago

      , if you can pass one without being detected you’re done.

      You are not a nuclear submarine. You want to communicate.

      you can build your own small computer and connect it to a network.

      How, if all ports are blocked but for specific P2P connections?

      and send them to the online one by any number of means, e.g. Build a QR code

      Your phone is not yours. The excessive use of qr codes will be reported.

      A movement that needs to recruit followers won’t encrypt their messages since they need people to be able to read them.

      Exactly. Without movements there is no need for encryption.