• UK Home Office silent on alleged Apple backdoor order

    From Jethro_uk@21:1/5 to All on Fri Feb 7 18:26:08 2025
    Yes, it's that time of year again ...

    https://www.theregister.com/2025/02/07/home_office_apple_backdoor_order/


    The UK's Home Office refuses to either confirm or deny reports that it
    recently ordered Apple to create a backdoor allowing the government to
    access any user's cloud data.

    Such a mechanism would enable the government to independently access and
    read encrypted data, both within the UK and potentially for users
    worldwide.

    The Home Office told The Register: "We do not comment on operational
    matters, including for example confirming or denying the existence of any
    such notices."

    Apple did not immediately reply to our request for input and the UK's NCSC deferred the matter to the Home Office.

    Sources speaking to the Washington Post, which first reported the story,
    said the order cited the Investigatory Powers Act 2016, often referred to
    as the Snooper's Charter.

    The law was expanded in April last year with the passing of the
    Investigatory Powers Bill, which further increased the UK's digital surveillance capability with a range of new powers.

    These include allowing intelligence agencies and law enforcement to
    gather Brits' internet connection records, revealing the services they connected to and when. The bill also made provisions for authorities to
    gather data en masse from sources with little to no expectation of
    privacy. Such examples include footage from CCTV cameras and images
    posted to social media.

    The IPA also outlaws the disclosure of the government making a request
    using the law's powers.

    Insiders spoke on condition of anonymity, adding that Apple would likely
    cease offering encrypted backups in the UK, but that alone wouldn't
    satisfy the secret order issued in January, according to reports.

    Rumors of such an order began circulating in March 2024, prior to the Investigatory Powers Bill passing in the House of Lords. But the UK's
    ambition to find ways of defeating encryption technologies, especially in communication platforms, has predated for many years. The prevailing
    arguments the UK government has made to support its desired encryption
    backdoor relate to child safety and anti-terror.

    The Online Safety Act became law in 2023 and retained a controversial encryption-breaking clause, although it could only be invoked where
    technically feasible. With end-to-end encryption still a feature of most popular messaging platforms, that feasibility does not yet exist.

    The legislation faced substantial backlash. Big tech and privacy
    advocates again condemned the UK's approach to encryption, with Signal threatening to pull out of the country, refusing to compromise the
    security of its platform for the region.

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • From Sam Plusnet@21:1/5 to All on Fri Feb 7 19:54:03 2025
    On 07/02/2025 18:26, Jethro_uk wrote:
    Yes, it's that time of year again ...

    https://www.theregister.com/2025/02/07/home_office_apple_backdoor_order/


    The UK's Home Office refuses to either confirm or deny reports that it recently ordered Apple to create a backdoor allowing the government to
    access any user's cloud data.


    "The Home Office told The Register: "We do not comment on operational
    matters, including for example confirming or denying the existence of
    any such notices." "

    In order to be consistent, they would of course be forced to give
    exactly the same response if asked if they were mining green cheese on
    the moon.

    --
    Sam Plusnet

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • From Graham.@21:1/5 to All on Fri Feb 7 21:10:52 2025
    The Online Safety Act became law in 2023 and retained a controversial >encryption-breaking clause, although it could only be invoked where >technically feasible.

    As the old adage goes, The impossible takes a little longer.

    --
    G

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • From Max Demian@21:1/5 to Graham. on Sat Feb 8 12:49:31 2025
    On 07/02/2025 21:10, Graham. wrote:

    The Online Safety Act became law in 2023 and retained a controversial
    encryption-breaking clause, although it could only be invoked where
    technically feasible.

    As the old adage goes, The impossible takes a little longer.

    As long as it takes longer than the time to the future heat death of the Universe, that's long enough for me (modulo "quantum computers" capable
    of cracking the code, if they are ever capable of doing so).

    --
    Max Demian

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • From David@21:1/5 to All on Sun Feb 9 14:08:17 2025
    On Fri, 07 Feb 2025 18:26:08 +0000, Jethro_uk wrote:

    Yes, it's that time of year again ...

    https://www.theregister.com/2025/02/07/home_office_apple_backdoor_order/


    The UK's Home Office refuses to either confirm or deny reports that it recently ordered Apple to create a backdoor allowing the government to
    access any user's cloud data.

    Such a mechanism would enable the government to independently access and
    read encrypted data, both within the UK and potentially for users
    worldwide.

    The Home Office told The Register: "We do not comment on operational
    matters, including for example confirming or denying the existence of
    any such notices."

    Apple did not immediately reply to our request for input and the UK's
    NCSC deferred the matter to the Home Office.
    <snip>

    Of course, if you encrypt the data locally before sending to the cloud
    there isn't much they can do about it.

    Cheers



    Dave R


    --
    AMD FX-6300 in GA-990X-Gaming SLI-CF running Windows 10 x64

    --
    This email has been checked for viruses by Avast antivirus software. www.avast.com

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • From Andy Burns@21:1/5 to David on Sun Feb 9 14:16:38 2025
    David wrote:

    Of course, if you encrypt the data locally before sending to the cloud
    there isn't much they can do about it.

    If you view a RIPA section 49 notice as "not much" ...

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • From Max Demian@21:1/5 to David on Sun Feb 9 16:39:48 2025
    On 09/02/2025 14:08, David wrote:
    On Fri, 07 Feb 2025 18:26:08 +0000, Jethro_uk wrote:

    Yes, it's that time of year again ...

    https://www.theregister.com/2025/02/07/home_office_apple_backdoor_order/


    The UK's Home Office refuses to either confirm or deny reports that it
    recently ordered Apple to create a backdoor allowing the government to
    access any user's cloud data.

    Such a mechanism would enable the government to independently access and
    read encrypted data, both within the UK and potentially for users
    worldwide.

    The Home Office told The Register: "We do not comment on operational
    matters, including for example confirming or denying the existence of
    any such notices."

    Apple did not immediately reply to our request for input and the UK's
    NCSC deferred the matter to the Home Office.
    <snip>

    Of course, if you encrypt the data locally before sending to the cloud
    there isn't much they can do about it.

    Apple could put software on your phone that checks for naughtiness
    before you encrypt it.

    --
    Max Demian

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • From Jethro_uk@21:1/5 to Max Demian on Sun Feb 9 17:39:50 2025
    On Sun, 09 Feb 2025 16:39:48 +0000, Max Demian wrote:

    On 09/02/2025 14:08, David wrote:
    On Fri, 07 Feb 2025 18:26:08 +0000, Jethro_uk wrote:

    Yes, it's that time of year again ...

    https://www.theregister.com/2025/02/07/
    home_office_apple_backdoor_order/


    The UK's Home Office refuses to either confirm or deny reports that it
    recently ordered Apple to create a backdoor allowing the government to
    access any user's cloud data.

    Such a mechanism would enable the government to independently access
    and read encrypted data, both within the UK and potentially for users
    worldwide.

    The Home Office told The Register: "We do not comment on operational
    matters, including for example confirming or denying the existence of
    any such notices."

    Apple did not immediately reply to our request for input and the UK's
    NCSC deferred the matter to the Home Office.
    <snip>

    Of course, if you encrypt the data locally before sending to the cloud
    there isn't much they can do about it.

    Apple could put software on your phone that checks for naughtiness
    before you encrypt it.

    You would (obviously) encrypt it off the device and then copy it onto the device to be uploaded. The plaintext should never leave your control.

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • From Jon Ribbens@21:1/5 to David on Sun Feb 9 18:44:29 2025
    On 2025-02-09, David <wibble@btinternet.com> wrote:
    On Fri, 07 Feb 2025 18:26:08 +0000, Jethro_uk wrote:
    Yes, it's that time of year again ...

    https://www.theregister.com/2025/02/07/home_office_apple_backdoor_order/


    The UK's Home Office refuses to either confirm or deny reports that it
    recently ordered Apple to create a backdoor allowing the government to
    access any user's cloud data.

    Such a mechanism would enable the government to independently access and
    read encrypted data, both within the UK and potentially for users
    worldwide.

    The Home Office told The Register: "We do not comment on operational
    matters, including for example confirming or denying the existence of
    any such notices."

    Apple did not immediately reply to our request for input and the UK's
    NCSC deferred the matter to the Home Office.
    <snip>

    Of course, if you encrypt the data locally before sending to the cloud
    there isn't much they can do about it.

    That is exactly what Apple's system does, and the UK government is
    demanding that they change their code so it doesn't.

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • From Roger Hayter@21:1/5 to jethro_uk@hotmailbin.com on Sun Feb 9 19:40:46 2025
    On 9 Feb 2025 at 17:39:50 GMT, "Jethro_uk" <jethro_uk@hotmailbin.com> wrote:

    On Sun, 09 Feb 2025 16:39:48 +0000, Max Demian wrote:

    On 09/02/2025 14:08, David wrote:
    On Fri, 07 Feb 2025 18:26:08 +0000, Jethro_uk wrote:

    Yes, it's that time of year again ...

    https://www.theregister.com/2025/02/07/
    home_office_apple_backdoor_order/


    The UK's Home Office refuses to either confirm or deny reports that it >>>> recently ordered Apple to create a backdoor allowing the government to >>>> access any user's cloud data.

    Such a mechanism would enable the government to independently access
    and read encrypted data, both within the UK and potentially for users
    worldwide.

    The Home Office told The Register: "We do not comment on operational
    matters, including for example confirming or denying the existence of
    any such notices."

    Apple did not immediately reply to our request for input and the UK's
    NCSC deferred the matter to the Home Office.
    <snip>

    Of course, if you encrypt the data locally before sending to the cloud
    there isn't much they can do about it.

    Apple could put software on your phone that checks for naughtiness
    before you encrypt it.

    You would (obviously) encrypt it off the device and then copy it onto the device to be uploaded. The plaintext should never leave your control.

    Do you think it possible to obtain a computer and operating system that you fully control? My understanding is that you cannot obtain a computer that does not require a closed-source 'authorisation' code to enable it to be 'trusted'.


    --

    Roger Hayter

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • From Jethro_uk@21:1/5 to Roger Hayter on Sun Feb 9 20:48:23 2025
    On Sun, 09 Feb 2025 19:40:46 +0000, Roger Hayter wrote:

    On 9 Feb 2025 at 17:39:50 GMT, "Jethro_uk" <jethro_uk@hotmailbin.com>
    wrote:

    On Sun, 09 Feb 2025 16:39:48 +0000, Max Demian wrote:

    On 09/02/2025 14:08, David wrote:
    On Fri, 07 Feb 2025 18:26:08 +0000, Jethro_uk wrote:

    Yes, it's that time of year again ...

    https://www.theregister.com/2025/02/07/
    home_office_apple_backdoor_order/


    The UK's Home Office refuses to either confirm or deny reports that
    it recently ordered Apple to create a backdoor allowing the
    government to access any user's cloud data.

    Such a mechanism would enable the government to independently access >>>>> and read encrypted data, both within the UK and potentially for
    users worldwide.

    The Home Office told The Register: "We do not comment on operational >>>>> matters, including for example confirming or denying the existence
    of any such notices."

    Apple did not immediately reply to our request for input and the
    UK's NCSC deferred the matter to the Home Office.
    <snip>

    Of course, if you encrypt the data locally before sending to the
    cloud there isn't much they can do about it.

    Apple could put software on your phone that checks for naughtiness
    before you encrypt it.

    You would (obviously) encrypt it off the device and then copy it onto
    the device to be uploaded. The plaintext should never leave your
    control.

    Do you think it possible to obtain a computer and operating system that
    you fully control? My understanding is that you cannot obtain a computer
    that does not require a closed-source 'authorisation' code to enable it
    to be 'trusted'.

    I have made that very point many times when people insist that FOSS is
    perfect.

    It's turtles all the way down.

    That being said, you can do your best.

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • From Roger Hayter@21:1/5 to Owen Rees on Mon Feb 10 01:44:38 2025
    On 10 Feb 2025 at 01:15:55 GMT, "Owen Rees" <orees@hotmail.com> wrote:

    Roger Hayter <roger@hayter.org> wrote:
    On 9 Feb 2025 at 17:39:50 GMT, "Jethro_uk" <jethro_uk@hotmailbin.com> wrote: >>
    On Sun, 09 Feb 2025 16:39:48 +0000, Max Demian wrote:

    On 09/02/2025 14:08, David wrote:
    On Fri, 07 Feb 2025 18:26:08 +0000, Jethro_uk wrote:

    Yes, it's that time of year again ...

    https://www.theregister.com/2025/02/07/
    home_office_apple_backdoor_order/


    The UK's Home Office refuses to either confirm or deny reports that it >>>>>> recently ordered Apple to create a backdoor allowing the government to >>>>>> access any user's cloud data.

    Such a mechanism would enable the government to independently access >>>>>> and read encrypted data, both within the UK and potentially for users >>>>>> worldwide.

    The Home Office told The Register: "We do not comment on operational >>>>>> matters, including for example confirming or denying the existence of >>>>>> any such notices."

    Apple did not immediately reply to our request for input and the UK's >>>>>> NCSC deferred the matter to the Home Office.
    <snip>

    Of course, if you encrypt the data locally before sending to the cloud >>>>> there isn't much they can do about it.

    Apple could put software on your phone that checks for naughtiness
    before you encrypt it.

    You would (obviously) encrypt it off the device and then copy it onto the >>> device to be uploaded. The plaintext should never leave your control.

    Do you think it possible to obtain a computer and operating system that you >> fully control? My understanding is that you cannot obtain a computer that does
    not require a closed-source 'authorisation' code to enable it to be 'trusted'.

    There are two issues there.

    Obtaining a computer and operating system that you fully control is
    uncertain for modern computers because of their complexity. Ken Thompson’s Turing Award lecture from 1984 “Reflections on Trusting Trust” is a good starting point. If someone can subvert the tools, you cannot be sure that things produced using those tools are free of trapdoors and trojan horses that give someone else control. That can go all the way down into what is usually considered to be hardware.

    As for the computer being ‘trusted’, it depends what you mean by that. I have just got out my copy of “Trusted Computing Platforms” by Siani Pearson
    et.al. published in 2003. One of the headings (on page 9) is “Trust: A Complex Notion” and that section explains why you need more than just the word ‘trust’ by itself to get to grips with the issues. The book also goes
    into detail about the Trusted Platform Module that is the hardware root of trust and which contains the private part of the endorsement key. As far as
    I know, the technology and processes described in the book are what you can find in modern devices even if they have different names.

    I remember that there was opposition to the idea of Trusted Platforms in
    some parts of the free software community because it could be used to
    support digital rights management. The technical issues for DRM are not so different from what is needed for a bank to verify that a customer is using
    a genuine version of their online banking app rather than one infected by malware.

    But it also means that you have to accept a binary blob from Microsoft even if you are using an open source OS, and the DRM means that even if you don't want to display protected media the protectors of that media have an unknown degree of access to your device.

    I can live without playing protected media on at least one computer, but I am not given that option.



    --

    Roger Hayter

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • From Owen Rees@21:1/5 to Roger Hayter on Mon Feb 10 01:15:55 2025
    Roger Hayter <roger@hayter.org> wrote:
    On 9 Feb 2025 at 17:39:50 GMT, "Jethro_uk" <jethro_uk@hotmailbin.com> wrote:

    On Sun, 09 Feb 2025 16:39:48 +0000, Max Demian wrote:

    On 09/02/2025 14:08, David wrote:
    On Fri, 07 Feb 2025 18:26:08 +0000, Jethro_uk wrote:

    Yes, it's that time of year again ...

    https://www.theregister.com/2025/02/07/
    home_office_apple_backdoor_order/


    The UK's Home Office refuses to either confirm or deny reports that it >>>>> recently ordered Apple to create a backdoor allowing the government to >>>>> access any user's cloud data.

    Such a mechanism would enable the government to independently access >>>>> and read encrypted data, both within the UK and potentially for users >>>>> worldwide.

    The Home Office told The Register: "We do not comment on operational >>>>> matters, including for example confirming or denying the existence of >>>>> any such notices."

    Apple did not immediately reply to our request for input and the UK's >>>>> NCSC deferred the matter to the Home Office.
    <snip>

    Of course, if you encrypt the data locally before sending to the cloud >>>> there isn't much they can do about it.

    Apple could put software on your phone that checks for naughtiness
    before you encrypt it.

    You would (obviously) encrypt it off the device and then copy it onto the
    device to be uploaded. The plaintext should never leave your control.

    Do you think it possible to obtain a computer and operating system that you fully control? My understanding is that you cannot obtain a computer that does
    not require a closed-source 'authorisation' code to enable it to be 'trusted'.

    There are two issues there.

    Obtaining a computer and operating system that you fully control is
    uncertain for modern computers because of their complexity. Ken Thompson’s Turing Award lecture from 1984 “Reflections on Trusting Trust” is a good starting point. If someone can subvert the tools, you cannot be sure that things produced using those tools are free of trapdoors and trojan horses
    that give someone else control. That can go all the way down into what is usually considered to be hardware.

    As for the computer being ‘trusted’, it depends what you mean by that. I have just got out my copy of “Trusted Computing Platforms” by Siani Pearson et.al. published in 2003. One of the headings (on page 9) is “Trust: A Complex Notion” and that section explains why you need more than just the word ‘trust’ by itself to get to grips with the issues. The book also goes into detail about the Trusted Platform Module that is the hardware root of trust and which contains the private part of the endorsement key. As far as
    I know, the technology and processes described in the book are what you can find in modern devices even if they have different names.

    I remember that there was opposition to the idea of Trusted Platforms in
    some parts of the free software community because it could be used to
    support digital rights management. The technical issues for DRM are not so different from what is needed for a bank to verify that a customer is using
    a genuine version of their online banking app rather than one infected by malware.

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • From Owen Rees@21:1/5 to Roger Hayter on Mon Feb 10 08:45:15 2025
    Roger Hayter <roger@hayter.org> wrote:
    On 10 Feb 2025 at 01:15:55 GMT, "Owen Rees" <orees@hotmail.com> wrote:

    Roger Hayter <roger@hayter.org> wrote:
    On 9 Feb 2025 at 17:39:50 GMT, "Jethro_uk" <jethro_uk@hotmailbin.com> wrote:

    On Sun, 09 Feb 2025 16:39:48 +0000, Max Demian wrote:

    On 09/02/2025 14:08, David wrote:
    On Fri, 07 Feb 2025 18:26:08 +0000, Jethro_uk wrote:

    Yes, it's that time of year again ...

    https://www.theregister.com/2025/02/07/
    home_office_apple_backdoor_order/


    The UK's Home Office refuses to either confirm or deny reports that it >>>>>>> recently ordered Apple to create a backdoor allowing the government to >>>>>>> access any user's cloud data.

    Such a mechanism would enable the government to independently access >>>>>>> and read encrypted data, both within the UK and potentially for users >>>>>>> worldwide.

    The Home Office told The Register: "We do not comment on operational >>>>>>> matters, including for example confirming or denying the existence of >>>>>>> any such notices."

    Apple did not immediately reply to our request for input and the UK's >>>>>>> NCSC deferred the matter to the Home Office.
    <snip>

    Of course, if you encrypt the data locally before sending to the cloud >>>>>> there isn't much they can do about it.

    Apple could put software on your phone that checks for naughtiness
    before you encrypt it.

    You would (obviously) encrypt it off the device and then copy it onto the >>>> device to be uploaded. The plaintext should never leave your control.

    Do you think it possible to obtain a computer and operating system that you >>> fully control? My understanding is that you cannot obtain a computer that does
    not require a closed-source 'authorisation' code to enable it to be 'trusted'.

    There are two issues there.

    Obtaining a computer and operating system that you fully control is
    uncertain for modern computers because of their complexity. Ken Thompson’s >> Turing Award lecture from 1984 “Reflections on Trusting Trust” is a good >> starting point. If someone can subvert the tools, you cannot be sure that
    things produced using those tools are free of trapdoors and trojan horses
    that give someone else control. That can go all the way down into what is
    usually considered to be hardware.

    As for the computer being ‘trusted’, it depends what you mean by that. I >> have just got out my copy of “Trusted Computing Platforms” by Siani Pearson
    et.al. published in 2003. One of the headings (on page 9) is “Trust: A
    Complex Notion” and that section explains why you need more than just the >> word ‘trust’ by itself to get to grips with the issues. The book also goes
    into detail about the Trusted Platform Module that is the hardware root of >> trust and which contains the private part of the endorsement key. As far as >> I know, the technology and processes described in the book are what you can >> find in modern devices even if they have different names.

    I remember that there was opposition to the idea of Trusted Platforms in
    some parts of the free software community because it could be used to
    support digital rights management. The technical issues for DRM are not so >> different from what is needed for a bank to verify that a customer is using >> a genuine version of their online banking app rather than one infected by
    malware.

    But it also means that you have to accept a binary blob from Microsoft even if
    you are using an open source OS, and the DRM means that even if you don't want
    to display protected media the protectors of that media have an unknown degree
    of access to your device.

    I can live without playing protected media on at least one computer, but I am not given that option.

    Is there a binary blob from Microsoft on my iPad or my iPhone? Is there one
    on the rather old iMac I have?

    Can you be more specific about where the binary blob would be if I had a
    spare machine on which I could install Linux as the OS. Would it show up
    when running Linux as a guest under VirtualBox on the iMac?

    It would not surprise me if those promoting the idea of access to
    everyone’s data are dismissing the people who understand the technology as nerds who do not see the bigger picture.

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • From Max Demian@21:1/5 to All on Mon Feb 10 11:54:11 2025
    On 09/02/2025 17:39, Jethro_uk wrote:
    On Sun, 09 Feb 2025 16:39:48 +0000, Max Demian wrote:

    Apple could put software on your phone that checks for naughtiness
    before you encrypt it.

    You would (obviously) encrypt it off the device and then copy it onto the device to be uploaded. The plaintext should never leave your control.

    Inconvenient for casual use and you've no way of knowing that this
    second device isn't similarly equipped.

    --
    Max Demian

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • From Roger Hayter@21:1/5 to Owen Rees on Mon Feb 10 13:59:27 2025
    On 10 Feb 2025 at 08:45:15 GMT, "Owen Rees" <orees@hotmail.com> wrote:

    Roger Hayter <roger@hayter.org> wrote:
    On 10 Feb 2025 at 01:15:55 GMT, "Owen Rees" <orees@hotmail.com> wrote:

    Roger Hayter <roger@hayter.org> wrote:
    On 9 Feb 2025 at 17:39:50 GMT, "Jethro_uk" <jethro_uk@hotmailbin.com> wrote:

    On Sun, 09 Feb 2025 16:39:48 +0000, Max Demian wrote:

    On 09/02/2025 14:08, David wrote:
    On Fri, 07 Feb 2025 18:26:08 +0000, Jethro_uk wrote:

    Yes, it's that time of year again ...

    https://www.theregister.com/2025/02/07/
    home_office_apple_backdoor_order/


    The UK's Home Office refuses to either confirm or deny reports that it >>>>>>>> recently ordered Apple to create a backdoor allowing the government to >>>>>>>> access any user's cloud data.

    Such a mechanism would enable the government to independently access >>>>>>>> and read encrypted data, both within the UK and potentially for users >>>>>>>> worldwide.

    The Home Office told The Register: "We do not comment on operational >>>>>>>> matters, including for example confirming or denying the existence of >>>>>>>> any such notices."

    Apple did not immediately reply to our request for input and the UK's >>>>>>>> NCSC deferred the matter to the Home Office.
    <snip>

    Of course, if you encrypt the data locally before sending to the cloud >>>>>>> there isn't much they can do about it.

    Apple could put software on your phone that checks for naughtiness >>>>>> before you encrypt it.

    You would (obviously) encrypt it off the device and then copy it onto the >>>>> device to be uploaded. The plaintext should never leave your control. >>>>
    Do you think it possible to obtain a computer and operating system that you
    fully control? My understanding is that you cannot obtain a computer that does
    not require a closed-source 'authorisation' code to enable it to be 'trusted'.

    There are two issues there.

    Obtaining a computer and operating system that you fully control is
    uncertain for modern computers because of their complexity. Ken Thompson’s
    Turing Award lecture from 1984 “Reflections on Trusting Trust” is a good
    starting point. If someone can subvert the tools, you cannot be sure that >>> things produced using those tools are free of trapdoors and trojan horses >>> that give someone else control. That can go all the way down into what is >>> usually considered to be hardware.

    As for the computer being ‘trusted’, it depends what you mean by that. I
    have just got out my copy of “Trusted Computing Platforms” by Siani Pearson
    et.al. published in 2003. One of the headings (on page 9) is “Trust: A >>> Complex Notion” and that section explains why you need more than just the >>> word ‘trust’ by itself to get to grips with the issues. The book also goes
    into detail about the Trusted Platform Module that is the hardware root of >>> trust and which contains the private part of the endorsement key. As far as >>> I know, the technology and processes described in the book are what you can >>> find in modern devices even if they have different names.

    I remember that there was opposition to the idea of Trusted Platforms in >>> some parts of the free software community because it could be used to
    support digital rights management. The technical issues for DRM are not so >>> different from what is needed for a bank to verify that a customer is using >>> a genuine version of their online banking app rather than one infected by >>> malware.

    But it also means that you have to accept a binary blob from Microsoft even if
    you are using an open source OS, and the DRM means that even if you don't want
    to display protected media the protectors of that media have an unknown degree
    of access to your device.

    I can live without playing protected media on at least one computer, but I am
    not given that option.

    Is there a binary blob from Microsoft on my iPad or my iPhone? Is there one on the rather old iMac I have?

    Can you be more specific about where the binary blob would be if I had a spare machine on which I could install Linux as the OS. Would it show up
    when running Linux as a guest under VirtualBox on the iMac?

    It would not surprise me if those promoting the idea of access to everyone’s data are dismissing the people who understand the technology as nerds who do not see the bigger picture.

    I expect Apple have their own authorisation and don't use Microsoft's. But
    that is clearly irrelevant as Apple are another American multinational.

    --

    Roger Hayter

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)