Posted on 11/03/2015 11:58:52 AM PST by Swordmaker
UK -- Companies such as Apple, Google and others will no longer be able to offer encryption so advanced that even they cannot decipher it when asked to under the Investigatory Powers Bill
Internet and social media companies will be banned from putting customer communications beyond their own reach under new laws to be unveiled on Wednesday.
Companies such as Apple, Google and others will no longer be able to offer encryption so advanced that even they cannot decipher it when asked to, the Daily Telegraph can disclose.
Measures in the Investigatory Powers Bill will place in law a requirement on tech firms and service providers to be able to provide unencrypted communications to the police or spy agencies if requested through a warrant.
The move follows concerns that a growing number of encryption services are now completely inaccessible apart from to the users themselves.
It came as David Cameron, the Prime Minister, pleaded with the public and MPs to back his raft of new surveillance measures.
He said terrorists, paedophiles and criminals must not be allowed a "safe space" online.
(Excerpt) Read more at telegraph.co.uk ...
Brain Fart.
People forget that 'the Government' is nothing more than the guy down the street who works for the IRS or the post office...
'The Government' is your neighbors, people who have no business having any authority over you.
You would not let your neighbor snoop in your business, nor should you let 'The Government'.
Nope, the key will be 132 characters of which any of the characters can be any of 223 possible characters. . . The four digits can appear any where in the 132 characters. As I understand things, they do not know this UUID. . . or where the four passcode characters were entangled in this UUID or how. . . and the UUID and the entangled passcode are only the basis for creating the key, not the key itself.
There is an algorithm that actually creates the key. All of this occurs inside the A9 processor and is never allowed outside of the processor. HASHes of all of this are kept in the Secure Enclave portion of the Processor which is not accessible from outside the processor.
The same key is used to encrypt what leaves the iOS device and is sent to the iCloud. Apple gets pre-encrypted data. According to the white paper I read on the subject, Apple then takes the pre-encrypted data from the user, splits in four pieces entangles it with four other users according to an algorithm, encrypts it again with another 256 bit AES encryption to which they DO have the key, and then store it on their or leased servers. When the customer wants his data back, the process is reversed, his data is extracted and sent back. If the government requests data with an appropriate search warrant, Apple will provide them with the encrypted files, but will help no further, meeting the letter of the law. In other words, they get a pile of un-decypherable gobble-de-gook, useless without the users' key and ONLY decipherable on the user's device, where the original UUID is available. (Grin). They have to have BOTH pieces PLUS the algorithm that makes the key. Without all three, either piece and even both are useless. Essentially the white paper stated that any decryption had to be done on the device it was created on.
They also stated there's an increasing delay in each attempt at trying to do it. . . slowing down the process if they do attempt passcodes by brute force on the device. . .
If that's the case, then it makes sense. If they can get the UUID, then I stand by my previous question. Obviously, having put the entanglement algorithm into the phone, they know what the rules are and can recreate the steps, given the UUID. But if they don't know and can't discover the UUID, then it should be secure.
That's what I inferred would have to be the case but didn't realize they'd actually implement that (given that you can't decrypt on another Apple device that you own, etc.).
There’s a good selection of Android side-load apps for various types of encryption on FDroid
By that same logic, people should be able to be stopped and searched at any moment. Wouldn't want to give terrorists, paedophiles and criminals a "safe space" on the roads, sidewalks, their homes or anywhere else.
It has been discovered that Android keeps the keys in an unencrypted Text file in a Library outside of any locks and not even hidden. If one knows where to look, even the unlock key is there. They found even Samsung's Knox key in it. . . after they were given the US government's OK for full access secrets. OOPS.
PING!
It is time to discuss personal issues only when sitting next to a nice waterfall.
David Cameron has declared himself a fascist NWO pig and sealed his fate. He can either stay in Britain and be hanged as a traitor or try to flee the country and end up brutalized and shot dead on the hood of an SUV like Qaddhafi. The NWO is going down, and it will be very bloody for them and their families.
Carrier pigeons?
That’s why wind farms have been erected.
Uh-huh.
Disclaimer: Opinions posted on Free Republic are those of the individual posters and do not necessarily represent the opinion of Free Republic or its management. All materials posted herein are protected by copyright law and the exemption for fair use of copyrighted works.