{"id":640,"date":"2015-11-09T05:58:32","date_gmt":"2015-11-09T05:58:32","guid":{"rendered":"http:\/\/www.dogoodsoft.com\/blog\/?p=640"},"modified":"2024-12-23T07:58:23","modified_gmt":"2024-12-23T07:58:23","slug":"investigatory-powers-bill-could-allow-government-to-ban-end-to-end-encryption-technology-powering-imessage-and-whatsapp","status":"publish","type":"post","link":"https:\/\/www.dogoodsoft.com\/blog\/investigatory-powers-bill-could-allow-government-to-ban-end-to-end-encryption-technology-powering-imessage-and-whatsapp-640\/","title":{"rendered":"Investigatory Powers Bill could allow Government to ban end-to-end encryption, technology powering iMessage and WhatsApp"},"content":{"rendered":"<p><a href=\"https:\/\/www.dogoodsoft.com\/blog\/wp-content\/uploads\/2015\/11\/1.png\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-635 size-full\" src=\"https:\/\/www.dogoodsoft.com\/blog\/wp-content\/uploads\/2015\/11\/1.png\" alt=\"Investigatory Powers Bill could allow Government to ban end-to-end encryption, technology powering iMessage and WhatsApp\" width=\"620\" height=\"378\" srcset=\"https:\/\/www.dogoodsoft.com\/blog\/wp-content\/uploads\/2015\/11\/1.png 620w, https:\/\/www.dogoodsoft.com\/blog\/wp-content\/uploads\/2015\/11\/1-300x183.png 300w, https:\/\/www.dogoodsoft.com\/blog\/wp-content\/uploads\/2015\/11\/1-2x1.png 2w\" sizes=\"auto, (max-width: 620px) 100vw, 620px\" \/><\/a><\/p>\n<p>The new Investigatory Powers Bill could ban WhatsApp and iMessage as they currently exist and lead to the weakening of security.<\/p>\n<p>Introducing the Bill this week, Home Secretary Theresa May said that it didn\u2019t include a controversial proposal to ban the encryption that ensures that messages can\u2019t be read as they are sent between devices. But it does include rules that could allow the Government to force companies to create technology that allows those messages to be read, weakening encryption.<\/p>\n<p>The Bill gives wide-ranging powers to the Home Secretary to force companies to make services that that can be more easily read by intelligence agencies.<\/p>\n<p>Section 189 of the law allows the Government to impose \u201cobligations\u201d on companies that provide telecommunications services. That can include \u201cthe removal of electronic protection\u201d, as well as a range of others.<\/p>\n<p>It isn\u2019t clear how that law would be used in practice. But it could allow for the breaking of encryption so that messages can be read.<\/p>\n<p>Some of those powers were already available. But the new legislation repeats them \u2013 despite the suggestion that the ban on encryption has been dropped \u2013 as well as strengthening some of the ways that Government can impose such obligations.<\/p>\n<p>At the moment, services including WhatsApp and Apple\u2019s iMessage use end-to-end encryption. That means that the phones that are sending each other use keys to ensure that nobody else \u2013 including WhatsApp and Apple themselves \u2013 can\u2019t read messages.<\/p>\n<p>When end-to-end encryption is used, it isn\u2019t possible to set up a system so that it only allows for the breaking of messages from a specific phone, or of messages sent between two specific people. Instead, allowing for the viewing of just two messages would entail entirely re-engineering the system so that WhatsApp and Apple had the keys to unlock any message, sitting in the middle of all messages.<\/p>\n<p>Technology companies are understood to be concerned about that setup, because if they are able to read through messages then the same system could be used by members of staff or hackers to read through the messages of all of a services\u2019 users.<\/p>\n<p>Earlier this year, a report from some of the world\u2019s leading computer experts said that weakening encryption \u201cwill open doors through which criminals and malicious nation states can attack the very individuals law enforcement seeks to defend\u201d.<\/p>\n<p>\u201cIf law enforcement\u2019s keys guaranteed access to everything, an attacker who gained access to these keys would enjoy the same privilege,\u201d the report argued.<\/p>\n<p>Apparently partly in response to that criticism, the US Government has mostly walked back its attempts to weaken encryption.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>The new Investigatory Powers Bill could ban WhatsApp and iMessage as they currently exist and lead to the weakening of security. Introducing the Bill this week, Home Secretary Theresa May said that it didn\u2019t include a controversial proposal to ban the encryption that ensures that messages can\u2019t be read as they are sent between devices. &hellip; <a href=\"https:\/\/www.dogoodsoft.com\/blog\/investigatory-powers-bill-could-allow-government-to-ban-end-to-end-encryption-technology-powering-imessage-and-whatsapp-640\/\" class=\"more-link\">Continue reading <span class=\"screen-reader-text\">Investigatory Powers Bill could allow Government to ban end-to-end encryption, technology powering iMessage and WhatsApp<\/span><\/a><\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[8],"tags":[52,264,226],"class_list":["post-640","post","type-post","status-publish","format-standard","hentry","category-news","tag-encryption","tag-investigatory-powers-bill","tag-whatsapp"],"_links":{"self":[{"href":"https:\/\/www.dogoodsoft.com\/blog\/wp-json\/wp\/v2\/posts\/640","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.dogoodsoft.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.dogoodsoft.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.dogoodsoft.com\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.dogoodsoft.com\/blog\/wp-json\/wp\/v2\/comments?post=640"}],"version-history":[{"count":1,"href":"https:\/\/www.dogoodsoft.com\/blog\/wp-json\/wp\/v2\/posts\/640\/revisions"}],"predecessor-version":[{"id":642,"href":"https:\/\/www.dogoodsoft.com\/blog\/wp-json\/wp\/v2\/posts\/640\/revisions\/642"}],"wp:attachment":[{"href":"https:\/\/www.dogoodsoft.com\/blog\/wp-json\/wp\/v2\/media?parent=640"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.dogoodsoft.com\/blog\/wp-json\/wp\/v2\/categories?post=640"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.dogoodsoft.com\/blog\/wp-json\/wp\/v2\/tags?post=640"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}