UK Demanded Apple Add a Backdoor to iCloud

Last month, the UK government demanded that Apple weaken the security of iCloud for users worldwide. On Friday, Apple took steps to comply for users in the United Kingdom. But the British law is written in a way that requires Apple to give its government access to anyone, anywhere in the world. If the government demands Apple weaken its security worldwide, it would increase everyone’s cyber-risk in an already dangerous world.

If you’re an iCloud user, you have the option of turning on something called “advanced data protection,” or ADP. In that mode, a majority of your data is end-to-end encrypted. This means that no one, not even anyone at Apple, can read that data. It’s a restriction enforced by mathematics—cryptography—and not policy. Even if someone successfully hacks iCloud, they can’t read ADP-protected data.

Using a controversial power in its 2016 Investigatory Powers Act, the UK government wants Apple to re-engineer iCloud to add a “backdoor” to ADP. This is so that if, sometime in the future, UK police wanted Apple to eavesdrop on a user, it could. Rather than add such a backdoor, Apple disabled ADP in the UK market.

Should the UK government persist in its demands, the ramifications will be profound in two ways. First, Apple can’t limit this capability to the UK government, or even only to governments whose politics it agrees with. If Apple is able to turn over users’ data in response to government demand, every other country will expect the same compliance. China, for example, will likely demand that Apple out dissidents. Apple, already dependent on China for both sales and manufacturing, won’t be able to refuse.

Second: Once the backdoor exists, others will attempt to surreptitiously use it. A technical means of access can’t be limited to only people with proper legal authority. Its very existence invites others to try. In 2004, hackers—we don’t know who—breached a backdoor access capability in a major Greek cellphone network to spy on users, including the prime minister of Greece and other elected officials. Just last year, China hacked U.S. telecoms and gained access to their systems that provide eavesdropping on cellphone users, possibly including the presidential campaigns of both Donald Trump and Kamala Harris. That operation resulted in the FBI and the Cybersecurity and Infrastructure Security Agency recommending that everyone use end-to-end encrypted messaging for their own security.

Apple isn’t the only company that offers end-to-end encryption. Google offers the feature as well. WhatsApp, iMessage, Signal, and Facebook Messenger offer the same level of security. There are other end-to-end encrypted cloud storage providers. Similar levels of security are available for phones and laptops. Once the UK forces Apple to break its security, actions against these other systems are sure to follow.

It seems unlikely that the UK is not coordinating its actions with the other “Five Eyes” countries of the United States, Canada, Australia, and New Zealand: the rich English-language-speaking spying club. Australia passed a similar law in 2018, giving it authority to demand that companies weaken their security features. As far as we know, it has never been used to force a company to re-engineer its security—but since the law allows for a gag order we might never know. The UK law has a gag order as well; we only know about the Apple action because a whistleblower leaked it to the Washington Post. For all we know, they may have demanded this of other companies as well. In the United States, the FBI has long advocated for the same powers. Having the UK make this demand now, when the world is distracted by the foreign-policy turmoil of the Trump administration, might be what it’s been waiting for.

The companies need to resist, and—more importantly—we need to demand they do. The UK government, like the Australians and the FBI in years past, argues that this type of access is necessary for law enforcement—that it is “going dark” and that the internet is a lawless place. We’ve heard this kind of talk since the 1990s, but its scant evidence doesn’t hold water. Decades of court cases with electronic evidence show again and again the police collect evidence through a variety of means, most of them—like traffic analysis or informants—having nothing to do with encrypted data. What police departments need are better computer investigative and forensics capabilities, not backdoors.

We can all help. If you’re an iCloud user, consider turning this feature on. The more of us who use it, the harder it is for Apple to turn it off for those who need it to stay out of jail. This also puts pressure on other companies to offer similar security. And it helps those who need it to survive, because enabling the feature couldn’t be used as a de facto admission of guilt. (This is a benefit of using WhatsApp over Signal. Since so many people in the world use WhatsApp, having it on your phone isn’t in itself suspicious.)

On the policy front, we have two choices. We can’t build security systems that work for some people and not others. We can either make our communications and devices as secure as possible against everyone who wants access, including foreign intelligence agencies and our own law enforcement, which protects everyone, including (unfortunately) criminals. Or we can weaken security—the criminals’ as well as everyone else’s.

It’s a question of security vs. security. Yes, we are all more secure if the police are able to investigate and solve crimes. But we are also more secure if our data and communications are safe from eavesdropping. A backdoor in Apple’s security is not just harmful on a personal level, it’s harmful to national security. We live in a world where everyone communicates electronically and stores their important data on a computer. These computers and phones are used by every national leader, member of a legislature, police officer, judge, CEO, journalist, dissident, political operative, and citizen. They need to be as secure as possible: from account takeovers, from ransomware, from foreign spying and manipulation. Remember that the FBI recommended that we all use backdoor-free end-to-end encryption for messaging just a few months ago.

Securing digital systems is hard. Defenders must defeat every attack, while eavesdroppers need one attack that works. Given how essential these devices are, we need to adopt a defense-dominant strategy. To do anything else makes us all less safe.

This essay originally appeared in Foreign Policy.

Posted on February 26, 2025 at 7:07 AM53 Comments

Comments

Stéphan February 26, 2025 7:37 AM

It will be interesting to see if the UK Govt is satisfied with the disabling of ADP, because that would confirm the backdoor is already in place for non-ADP iCloud accounts. Which would mean it is likely also in place for non-E2E-encrypted cloud services like Google and MS365 accounts. With this move Apple came up with a clever canary about the true underlying situation.

ing. Massimo Beltramo February 26, 2025 8:31 AM

I’m an apple user from mists of time, and last decades mainly for security, should apple give in I will exit from the brand, I said.

wiredog February 26, 2025 8:52 AM

If I have data I want to keep secure I don’t upload it to any cloud service. If it needs to go between devices I use USB keys or just plug the iphone into the mac.

Backups go to external drives kept in a fire safe.

Wes Reynolds February 26, 2025 9:24 AM

Outstanding post, Bruce. This is a HUGE issue – thanks for doing the research! There is a lot of information here for anybody who will take 10 minutes and follow some of the links.

I’m glad we have you on our side!

@Massimo: me too.

wiredog February 26, 2025 9:26 AM

@Brian
I started out in college hanging tapes on vaxes and I’ve never seen any reason to store important data online unless I intended to share it, like with Flickr. If it’s important enough to hide from the government, a corporation, or my friend’s annoying kid sister, it’s stored offline. Well, offline enough that a warrant will be needed for a physical search, or a hack of my computer that can be executed when it’s online.

This also applies to data I don’t want to lose. I suspect most of us know someone who lost important data that was only stored on someone else’s server.

gt February 26, 2025 10:30 AM

“This means that no one, not even anyone at Apple, can read that data. It’s a restriction enforced by mathematics—cryptography—and not policy.”

Simple mathematics tells me that providers who control both ends of end-to-end encryption with their own applications (Apple, WhatsApp, Signal, Facebook, Google, Proton, Tuta…) can access the readable version of that data if they wish (or are forced enough). On the other hand, although modern laws allow companies to resist state demands, in practice the economic manifestation of political pressure (taxes and fines, exclusion from incentives and tenders, opening the way for competitors, access barriers if the country’s market is large…) is enough to bring them to their knees. Entrusting privacy to companies (or “angels”) and expecting an idealistic resistance from them does not seem realistic.

pattimichelle February 26, 2025 1:02 PM

Haha! 5-eyes countries. These are sometimes referred-to as the “Anglosphere” in more politically oriented discussions.

Clive Robinson February 26, 2025 1:06 PM

@ gt,

With regards,

“Simple mathematics tells me that providers who control both ends of end-to-end encryption with their own applications (Apple, WhatsApp, Signal, Facebook, Google, Proton, Tuta…) can access the readable version of that data if they wish (or are forced enough).”

I guess you are not a regular long term reader of this blog.

I’ve repeatedly indicated for several years on this blog the dangers of “Secure Message Apps”[1] that are not actually secure…

Because they are a part of an “insecure system” vulnerable to “end run” attacks around the “security endpoint”. And as a consequence how you mitigate / deal with it “off device”[2].

[1] I was quite unpopular with some people at first, till it became clear to enough people that I was simply stating a factual position. One that could be demonstrated on a “white board” in about 30secs of drawing… I also demonstrated that if you wish to not have any entity remotely evesedropping on your message contents you take the “security endpoint” bot just “of device” but away from all “communications endpoints”.

[2] You can do the mathematical proof that it’s secure from evesdropping by the use of Claude Shannon’s paper from the 1940’s, where he demonstrates that to communicate information, redundancy in the communications channel –now Shannon Channel– is required. And then the later work of Gustavus Simmons on using redundancy to create a “Shannon Channel within a Shannon Channel”. Again it’s quick it’s simple and can be done in a paragraph or two (and you will find I’ve posted it up on this blog a few times before).

Montecarlo February 26, 2025 1:08 PM

The prudent default assumption is that any data held in the cloud is insecure.

The fact that governments are passing laws to mandate insecurity makes that default assumption even more prudent.

It is all just a Theater February 26, 2025 1:39 PM

What is very troubling is the realization of a fact that all encryption, security, privacy, VPNs, Proxies, Firewalls, and all other commercially available/sold solutions are easily bypassed with a simple Gag Order by any court in the United States, and the Gag Order by definition does not allow that the “Subject in question/Subject of Surveillance” is aware of the Court-Ordered WireTap.

In a Perfect World without ROGUE JUDGES and ROGUE PROSECUTORS/COPS I’d have no problem with it whatsoever for it benefits the “good guys” aka, the “decent population / peaceful, law abiding citizenry” but in a case like the one where the Defendant is the Government itself, and where they are preventing this guy from hiring a lawyer to go after the criminals working for the government due to their ability to spy on him, giving them the tactical advantage to phone any lawyer he already called and talk them into not taking his case – now, that’s some heavy, deep state $hit which calls for some public square hanging to be brought back.

Just by reading what this guy’s been through sends chills down my spine.
America, as I knew it – is D E A D !

Clive Robinson February 26, 2025 1:41 PM

@ Bruce,

I’m glad you pointed out,

“But the British law is written in a way that requires Apple to give its government access to anyone, anywhere in the world.”

It’s something I pointed out with the original UK RIPA 2000 legislation along with Ross J. Anderson and others back last century as well as some of the extra judicial implications, which for some reason people keep forgetting about or ignoring them.

Thus the original MSM leak of this action against Apple by the UK “Home Office” did not mention it and most people who read it in the US and other parts of the globe as a consequence incorrectly thought it did not effect them…

Yes I keep jumping up and down and waving my hands about it but all to often “Memories are short” (as was also seen with the “2004 Greek Affair” and how the NSA/CIA “suicided” a Greek Engineer).

As for “Going Dark” it’s just another dog whistle like “think of the children” designed to make people think emotionally not rationally.

Research has shown that in the UK certainly the Police and other Law Enforcement are,

1, Incompetent and or lazy.
2, Under Resourced.

The second point is due to various “Home Office Ministers” over the past few decades doing what Elon Musk is currently trying to do to the entire US Federal Government.

Unsurprisingly it makes the first point worse by a significant amount.

But of those arrested in the UK for crimes such as burglary, street crimes, higher value thefts, and organised crime. Well over 8 out of 10 happen because the criminals or their associates “flap their gums in public” or “grass them up”.

Whilst forensics might help, they are seen as,

1, To expensive to do.
2, To slow to catch people.
3, Upset / lengthen court proceedings.

Which might explain why the criminal “conviction rate” is so atrocious.

lurker February 26, 2025 2:50 PM

I assumed that the UK Govt had been asked by somebody else to put the nips on Apple. In spite of their global manufacturing and tax shuffling, they are a US company, so it wouldn’t look good for the US Govt to be too heavy on them.

There was nothing, and still is nothing, stopping Apple users from doing their own encryption, looking after their own endpoints and keymat, and storing the cyphertext on iCloud, but
1. How many Apple users would be able and willing to do this?
2. Of those, how many would trust iCloud as safe storage?

Clive Robinson February 26, 2025 4:40 PM

@ Lurker,

To answer your two questions of,

“1. How many Apple users would be able and willing to do this?
2. Of those, how many would trust iCloud as safe storage?”

It’s not so much a case of “would be able and willing”, admittedly not many would actually care to do it, but of the few that do there are two issues,

1.1, Longterm “OpSec”.
1.2, Issues with 2nd parties.

I suggest people try doing the required level of OpSec for a week without making a mistake or lapsing into “convenience” when under “pressure” from a boss etc.

Remember this also means not making correlations between your communications and files and your observable life by 3rd parties.

That is don’t send a plaintext or encrypted message that says “Meet for a beer Wed Evening” which is actually a “code phrase” for something else and not making preparations and either one or more not turning up for the beer.

Remember the occasional story of mobsters making their location known by ordering large quantities of “take out” or similar…

Your observable life and messages have to align as much as is humanly possible.

Why because the 2nd party in the communications might betray you to a hostile 3rd party to save their own skin or the skin of someone they care more about than you.

One massive failing of “humans” is usually they “implicitly over trust others” because we are a “social species” and it’s made worse by the fact that “we love to share” etc.

But there is another issue with 2nd parties in general and that is the “peer pressure” of “being in the group” or from ancient times “tribe”.

It’s why “Social Media” gets so much out of people to sell, trade, barter and at the end of the day “sell you out to the G-man” or worse for less than a couple of nickels…

And just one of many reasons why I don’t do “social media” or “secure messaging” or any of the rest of that nonsense.

If you think about it there is a lesson that even Elon Musk should ve cognizant of,

“There is no amount of money you can have to stop you being ‘sold out’ or ‘betrayed'”.

The only two solutions to this are,

1, Never tell anyone anything about you of even the slightest consequence / use.
2, Always have considerably more on others you have to deal with than they do on you.

And yes that second option is in effect “blackmail / extortion” of either the 2nd party or someone or something the 2nd party holds as greater value than you. Which is why the first point arises, they can only betray you to a 3rd party if they have something of advantage to betray.

Which brings us to your second point about “storage”. In effect if you don’t 100% own it, and more importantly 100% control it, such that no others can have access to it then as our host has pointed out in the past it’s a liability not an asset.

That is iCloud is “not safe” as a repository even for strongly encrypted files that only you have the KeyMat for.

Because for each and every file has not just “Meta-data” such as size and time stamps and traceable location / device, there is also data about meta-data. As “Meta-meta-data” it’s hard for most to get their heads around, but part of it is “patterns”.

Few of us “don’t run on rails” to some extent in our lives, because most of us do fairly much the same thing every day or same day of the week etc. Either doing something new, or not doing something expected from your previous behaviours is a “red flag” and is the result of Meta-meta-data being noted by an observer.

There are only two things realistically you can do about killing Meta-meta-datas use to an opponent.

1, Be entirely inconsistent.
2, Have long term patterns that are beneficial to you.

The first is what “close protection” personnel etc tell VIPs in hostile areas. Put simply if your opponent can not predict your behaviour, they have to expend often considerable resources to track you. If as a VIP or close protection person you get a little lucky the expending of such resources by your opponent will inform you about the opponents intentions.

The second is a little harder to explain but it’s linked to the first point. As you might know people have been investigated for crimes and evidence obtained from the accused’s mobile phone, exercise band, or even medical implant. As they “log” time, place, bio activity and similar. There are two ways they can be used against a person, by the records they log, or by the fact the person “breaks habit” and does not have it on them at the time of the crime thus it can be said it’s premeditation or intent.

The way to stop this is to develop habits like not taking your phone with you when you go to lunch or go shopping always “put it on charge” in your desk or at home.

Oh and never ever wear a “step counter” etc outside of actually doing intentional physical exercise. And never ever have one of those tags/tiles on your key ring etc.

But don’t be consistent with what you do, be spontaneous etc that way a “base line” pattern can be difficult for an opponent to establish.

In short,

“In a ‘consistently connected’ world, be ‘inconsistently disconnected’.”

You will be surprised just how difficult it can be.

AlexT February 26, 2025 6:59 PM

@Brice: regarding the Greek hack I think there is a LOT of evidences pointing it one direction…

lurker February 26, 2025 10:03 PM

Not your usual “neither confirm nnr deny”, this looks like an outright denial. And yet … there’s been so much distortion of the truth coming out of Washington lately, what’s a mere mortal to believe?

”https://www.bbc.com/news/articles/c1kjmddx2nzo

Clive Robinson February 27, 2025 2:14 AM

@ Lurker,

I would expect her not to be informed…

She is after all one of those,

“Low life politicians / political appointees that can not nor should not be trusted.”

I’ve mentioned before that the “Five Eyes” have always seen themselves as

“Above politicians and their petty concerns.”

And as such the Intelligence Services in all the Five Eyes have more allegiance to the Intelligence Services in the other Nations than they do for their own National Politicians and others selected by “the scum” that form the voting citizens and pay through taxes the Intelligence Service members wages etc.

It’s just the way it is, when you have people who realise that,

“The absolute form of power.”

Is not to be “the puppet on the throne” but the almost unseen “humble servant whispering in the puppets ear”.

Originally such people were “Churchmen” who had power way beyond that of a landed Barron or Duke, and mostly the monarch as well.

Something various forms of “Church” are desperate to re-establish.

Clive Robinson February 27, 2025 4:31 AM

@ Bruce, ALL,

As feared the MSM and even the trade press don’t get it…

As an example,

https://www.theregister.com/2025/02/24/apple_adp_replacements_e2ee/

Shows a failure to understand,

1, “The what and the how” of ADP.
2, “Device side scanning” and “on device encryption” failings.

As long as the “security endpoint” is “on device” the Apple iPhone is “insecure” because the “KeyMat” can be grabbed due to insufficient segregation.

Just to make it plain,

No application can be secure on an Insecure device

Due to the issue of,

“Weakest link in the system.”

I know this will upset a lot of people, but I’ve lived through it before with saying the same thing with “secure messaging apps”.

wiredog February 27, 2025 6:31 AM

There is no perfect user level security. Any system is vulnerable to, for example, this: https://www.schneier.com/blog/archives/2009/02/xkcd_on_cryptan.html

The question is, what is good enough? No effective security for someone accessing things I’ve posted to Flickr (somewhat, but not much, more for someone posting to that account) because I want to share the images.

Fairly high security for things like birth certificates, passports, title to the car, etc. which are stored, physically, in a fire safe.

Midrange security for the data on the computer at home which is, after all, connected to the interned while turned on. Any individual bit of data might not be useful to an attacker, but all of it together is. So I make life difficult for an attacker by not storing backups online and only connecting to the internet when I’m using it.

Passwords in a password manager, passkeys where possible, 2fa (with an app, not SMS) where possible.

But a serious attacker can get quite a lot, especially from databases where others have gathered the data. That’s where I’m really vulnerable.

ResearcherZero February 27, 2025 7:58 AM

@Bruce

We do know that the Australian Federal Police has used extraordinary powers on at least three separate occasions. Again what for, we do not know. Possibly in operations against criminal groups engaging in widespread campaigns. We do know:

“Cyber units from at least one nation state routinely try to explore and exploit Australia’s critical infrastructure networks, almost certainly mapping systems so they can lay down malware or maintain access in the future.”

ASIO said one of the same units targeting Australia had also been “recently” doing the same activities on “critical networks in the United States”.

Despite such powers, there has been one successful prosecution for foreign interference.

“In adopting a country-agnostic stance, we blinded ourselves to the very factor that matters most in evaluating and responding to foreign influence—its source country.”

‘https://ad-aspi.s3.ap-southeast-2.amazonaws.com/2021-07/Losing%20our%20agnosticism.pdf

ResearcherZero February 27, 2025 8:11 AM

Fire safes, CCTV and USB sticks are all easy pickings. They also get “burned”.

‘https://www.nytimes.com/wirecutter/reviews/advice-fireproof-safe-best-practices/

wiredog February 27, 2025 8:21 AM

@ResearcherZero
From the article you linked:
“In a typical house fire, where the fire department arrives swiftly and the flames are extinguished expeditiously, you can reasonably expect your fireproof safe to live up to its name.”

Zaichik February 27, 2025 8:30 AM

As a result of this I have moved my encrypted data storage to a combination of Alibaba Encrypted Cloud and Yandex Cloud.

I have also written to my MP to raise this issue and to point out the irony of the UK gov driving me to use services from Russia and China because they are secure from the UK gov undermining them.

ResearcherZero February 27, 2025 8:45 AM

@wiredog

I’m using the term loosely with a different meaning intended. A determined adversary can still bypass safes, CCTV and air gaped systems. Its still better to have security at home than leaving the blueprints out on top of a cabinet at an unguarded contractor facility.

A long series of screw ups and an inability to secure or complete projects…

‘https://www.smh.com.au/politics/federal/our-defences-have-been-tested-and-they-ve-failed-20250226-p5lfcu.html

Military comms are potentially left vulnerable to cyber and electronic warfare attacks.
https://theconversation.com/australia-is-axing-a-7bn-military-satellite-project-leaving-defence-comms-potentially-vulnerable-242761

Systems on-one wanted to own. (not in the conventional sense)
https://www.abc.net.au/news/2024-11-04/defence-technology-project-cancelled-following-investment/104560128

Raython employees were lugging their “secure” laptops around Russia and Iran.
https://www.abc.net.au/news/2024-09-08/australian-links-revealed-in-global-defence-company-scandal/104324088

ResearcherZero February 27, 2025 8:58 AM

@Zaichik

I wouldn’t put my money on any systems being secure. 4th party collection is common.

‘https://www.welivesecurity.com/en/eset-research/mind-air-gap-goldenjackal-gooses-government-guardrails/

“Previously, security protocols were so strict that a contractor plugging a non-government-issued computer into an Ethernet port in a government agency office was considered a major security violation.”

https://www.theatlantic.com/technology/archive/2025/02/elon-musk-doge-security/681600/

Clive Robinson February 27, 2025 1:11 PM

@ ResearcherZero, ALL,

With regards,

‘Fire safes, CCTV and USB sticks are all easy pickings. They also get “burned”’.

Don’t they just, and in more ways than one…

First thing everyone should realise is that nothing is fireproof or indefinitely. It’s all about “Energy in a given mass/volume”.

We often see the blowtorch on a piece of wood and somebody putting their hand on the other side.

The thing is as long as there is a mechanism to take the thermal energy away as fast if not faster than it rises by conduction… That piece of wood will have to “burn through” at quite a slow rate rather than heat up. You can see this with some NASA designed “aerogel” solids you can keep a blowtorch at 2000C+ on them for a long period of time, one side glowing way hotter than “orange” the other with an ice-cube up against it. But even a book will burn through very slowly compared to a lump of wood and some “fire retardant materials are quite literally loosely crumpled “papier mache” made with water with strongly fire retardant chemicals dissolved in it.

But… As with a “Turkey in the oven” given enough time the object inside will rise to the same temprature as the hot gasses unless the heat energy is somehow “pumped out” of the object.

But knowing this consider where in a building with a cellar, ground floor, first floor and attic space,

“On what floor would you put your fire safe?”

Most would think “in the cellar to be “below a house fire” and yes that would be true if the fire is going to get put out by water from fire hoses relatively quickly. However if the firemen are not going to turn up, as the house burns through the very hot coals will drop into the cellar on top of the fire safe burying it in the equivalent of a forge capable of turning iron to molten metal…

Thus you would think the opposite must be true, that is put the fire safe in the attic so it drops on top of the hot coals but the temperature will be “lower on top”.

No similar issues apply… The best answer is buried in a 6ft hole dug in the back garden well away from trees and buildings and keep your fingers crossed.

The truth is there is no right or wrong answer, but Samuel Pepys a well known writer and gormand buried his Italian cheese in the back garden of his house in 1666 during the great fire of London (and I can not find out if it survived or not as he could not later find it even though his house survived),

https://britishfoodhistory.com/2021/10/22/samuel-pepyss-parmesan/

When London was rebuilt it’s clear a number of lessons had been learned and the Monarch of the time, made what was probably the first “metropolitan fire zoning” legislation. As a result Few buildings made of wood even though they survived the fire remain.

ResearcherZero February 28, 2025 2:04 AM

@Clive Robinson

If something looks secure and it says it is secure on the packaging, or in other scenarios there is a gatepost, big fences and guards on duty – of course people imagine it is secure.

If it is made of metal, there do not appear to be any gaps or other means of entry apart from the secure point of entry, which also appears to be under observation, naturally people are lead to believe that there is no other way – and hence the contents are secure.

Some structures are built for rigidity, others are built to handle shock or moving forces. Few constructions can withstand all forms of assault that might breach or compromise their design and integrity. Other attacks use simple methods to instead bypass their purpose.
People forget that cameras are just a bunch of lenses and wires, or pick guns can defeat locks. An intruder with the rights tools barely even needs any real ability or skills.

Well how else did that mouse get in there, not to mention everyone inside and their dog?

Frank February 28, 2025 4:09 AM

Maybe I am paranoid, but I would assume that Apple (and Google) have the capability to exfiltrate the keys from individual devices when served a secret NSL.

jelo 117 February 28, 2025 9:38 AM

Off-device encryption/decryption with cloud storage may be too much for the average user, but they of course are not of interest to governments. Those of legitimate interest will not find off-device encryption objectionable.

Clive Robinson February 28, 2025 10:11 AM

@ jelo 117, ALL,

With regards,

Off-device encryption/decryption with cloud storage may be too much for the average user, but they of course are not of interest to governments.”

Yes it is to hard for most especially where “convenience” is their crutch. Be it Government or Criminals the distinction is fairly moot, “convenience” is giving them an easy run at you for their profit.

Which brings us to your “not of interest to governments”, it is of course not true…

The current UK Government is abusing legislation to stop people having what in the US would be called “Free Speech” to speak out about the UK politicians and supporting Government and it’s policies and very questionable behaviours.

They UK “Government” have been scanning through social media using similar letters as they have with Apple. Basically not looking for terrorism or actual criminality… But looking for “dissenting comments” and then sending the Police around to intimidate those who have made them unser threat of detention untill it gets to court in maybe three years or so (yup UK courts are well backed up due to “Government Policy” not to dissimilar to what DOGE in the US is trying to do).

It’s also fairly clear that the current US Executive is going down a similar route of intimidation. The latest nonsense with the “Epstein Papers” only being given to “influencers” seen in a good light by the Executive… (It’s actually unlawful behaviour by the Executive, because either those papers are classified, so should be seen by none without clearance, or the papers are open to all US citizens undet the FOI rules and other legislation).

ResearcherZero March 1, 2025 1:31 AM

@Clive Robinson

I think what is referred to as “free speech” in the US today is an attempt to outwit reality itself with ‘slick’ or ‘smart’ words which attempt to defy very real limits and tolerances. One might believe they are clever and tough enough to dig themselves out of a hole, even as that hole continues to grow deeper and deeper. All the intelligence collection in the world cannot help you if you are too arrogant to pay it any heed.

JD Vance is not smart or slick to believe he can also ‘outwit’ geostrategic reality.

‘https://www.rnz.co.nz/news/world/543284/china-tells-australia-to-expect-more-warship-visits-but-insists-its-navy-poses-no-threat

Airliners listen on the 121.5 international distress frequency for announcements.
https://edition.cnn.com/2025/02/25/australia/china-live-fire-drills-australia-new-zealand-intl-hnk-ml/index.html

Explain what you are talking about.
https://www.smh.com.au/world/north-america/asked-about-aukus-trump-replies-what-does-that-mean-20250228-p5lfua.html

ResearcherZero March 1, 2025 1:47 AM

At least I assume those very same politicians in the UK have and do use iPhones?

ResearcherZero March 1, 2025 2:44 AM

Barracuda vulnerability led to VSSE compromise.

‘https://www.brusselstimes.com/1462020/belgian-intelligence-loses-private-data-to-chinese-hackers

France also wants to backddor security and privacy services.
https://tuta.com/blog/france-surveillance-nacrotrafic-law

Here is how law enforcement can already access phones:

CVE-2024-53104 (USB Video Class exploit) *patched on some phones*
CVE-2024-53197 (ALSA USB-sound driver exploit)
CVE-2024-50302 (USB HID device exploit)

Attackers combined them to achieve privilege escalation, as evidenced by kernel logs showing root shell access 10 seconds after the final USB HID device connection.

https://www.digitaltrends.com/mobile/android-security-usb-vulnerability-surveillance-patch/

ResearcherZero March 1, 2025 3:34 AM

@Bruce

The CLOUD Act agreement would allow for the bypass of privacy protections through the transfer of data across borders. The CLOUD Act requires cloud providers to provide access to data, potentially introducing vulnerabilities that malicious actors could exploit.

Under the CLOUD Act, law enforcement agencies (including those in the United States) can compel cloud providers to disclose customer data, regardless of its physical location.

On top of proposed access to cloud services, data from seized devices might be accessed. So someone is picked up in one country, and overseas police put in a request and voila … all the contents of their online accounts are obtained along with access to their phone.

Creating and incentivizing a series of security vulnerabilities in products, adding to the expansion of an already unregulated spyware industry which regularly breaks the law.

As we have seen, even law enforcement and intelligence cannot secure their own systems.

‘https://citizenlab.ca/2025/02/canada-us-cross-border-surveillance-cloud-act/

The Linux USB stack presents a large a range of driver support which is not well tested for vulnerabilities. The USB connected devices appear to be emulated via a Cellebrite dongle.

https://securitylab.amnesty.org/latest/2025/02/cellebrite-zero-day-exploit-used-to-target-phone-of-serbian-student-activist/

Cellebrite exploits for iOS 17.4 or newer as of April 2024 were “In Research”

‘https://www.documentcloud.org/documents/24833832-cellebrite-ios-document-april-2024/

Clive Robinson March 1, 2025 11:34 AM

@ ResearcherZero, Bruce, any one who can feel which way the wind is blowing…

With regards the “CLOUD Act” and it’s myriad of dangers both written into the legislation and that will subsequently be pushed by prosecutors and amenable judges, just some of which you highlight with,

“On top of proposed access to cloud services, data from seized devices might be accessed. So someone is picked up in one country, and overseas police put in a request and voila … all the contents of their online accounts are obtained along with access to their phone.

Long before ED Snowden I’ve warned here and other places of “I/O issues” and how via DMA it was giving access to anything and everything on a computing device, via what we now might call an “Evil Maid” attack (or front panel if you go back to the 70’s or earlier).

And such attacks have frequently been based on “serial comms” which is what the S&B in USB is all about.

Thus USB has always been “flakey” “from day one” with regards Privacy and Criminals getting at what you want to keep confidential for good and proper reasons.

It’s why I keep talking about the use of “two devices” and keeping one gapped as best you can and never connected to “external communications”. With the “Security Endpoint” on the gapped device not the communications device thus if the gapping is working effectively beyond any physical access or “Communications Endpoint” and potential “End-Run” attacks.

Likewise the use of “deniable encryption” “within plaintext” for communications with any 2nd Party no matter how much they are trusted. In case they “betray to a 3rd Party” for the MICE[1] or worse reasons.

I’ve explained why Claude Shannon’s “Perfect Secrecy” should where possible be used and how using a variation of Gus Simmon’s development of subliminal channels –by the use of the necessary redundancy in the Shannon Channel communications– create a “plaintext” where a 3rd Party can not prove there is a private communication within, even if the 2nd party betrays to a 3rd Party. (Something others have tried to extend using redundancy issues in current AI LLM systems).

No matter what we might think about the future, it’s clear so far things have been a downward spiral.

Worse it’s been made “easy” for attackers by “off secure device storage” in the cloud or even worse the use of easy to spy on “Cloud Apps” and similar.

The “Ease of Convenience” and “Quick buck profits” has in effect destroyed all “confidentiality” that is a necessary requirement for society as we used to know it to function.

[1] Definition of MICE,

https://thecyberwire.com/glossary/mice

“A mnemonic device used in counterintelligence training to remind trainees of the four general motivations that could lead someone to commit treason, become an insider threat, or collaborate with a hostile agency or organization. It stands for Money, Ideology, Compromise, and Ego.”

ResearcherZero March 2, 2025 1:54 AM

@Clive Robinson

Someone definitely has access to good information and importantly, knows how to use it.

Universal Plug & Play – Putin’s ‘reverse cowboy’ cuts Trump out of critical minerals deal.

‘https://www.forbes.com/sites/arielcohen/2025/02/28/putins-trolling-a-strategic-minerals-offer-for-trump/

ResearcherZero March 3, 2025 3:06 AM

@Clive Robinson, ALL

You mentioned ego. Often this is not exploited directly. Approaches are made through intermediaries so that we are not even aware that we are being worked to become more receptive to information provided to us, at least when we ourselves are the target of such intentions. Often in the media we hear talk of kompromat, but that is rarely how people are compromised. Instead it is through ego and indirect methods which ensure we are not receptive to information that contradicts our judgement or warnings of malign approaches.

Context is what we often overlook, allowing us ignore the effectiveness of attempts over time. Rather we often only look at an event in that moment of time and dismiss the wider implications, too often judging it as insignificant and without influence over us. Through a combination of events or piecemeal techniques, the entirety of actions can escape our realization. The technique itself is refereed to as “Salami Tactics”.

‘https://www.iar-gwu.org/print-archive/implications-for-nato-latvia-and-the-russian-hybrid-warfare-threat

or, “a deployment of resources for cognitive ends that foster or change a targeted audience’s [or individual’s] *behavior.”

https://harvardnsj.org/2022/04/12/expanding-lawful-influence-operations/

Clive Robinson March 3, 2025 8:19 PM

@ Bruce,

The UK and Privacy Next battle

The UK has recently passed regulation to do with “Online Age Verification” and it is just as “ill thought out” as both RIPA-2000 and IPA-2016.

I’ve mentioned before that it’s been “outsourced” to a NGO-Regulator that has a very long history of incompetence and quite deliberate behaviour with regards “unwritten policy objectives by English Ministers” that is in practice “unlawful”.

It should only take a moment to realise that in an “On-Line Environment” “forced age verification” is not just an invasion of privacy it is also contrary to other existing legislation.

Well it looks like the same sort of “privacy invasion” issue is getting into US Courts,

https://blog.ericgoldman.org/archives/2025/02/another-conflict-between-privacy-laws-and-age-authentication-murphy-v-confirm-id.htm

It’s something to keep an eye on for at least two reasons,

1, It is not just already unlawful, it’s also currently unregulated.

Which means,

2, Not just “Data Brokers” but current AI LLM and ML Systems will “ingest, digest, excrete” in all directions.

With the very definite result,

3, Ordinary people will come to harm directly or indirectly.

Even though it can be easily prevented.

Clive Robinson March 6, 2025 9:03 AM

@ Bruce, ALL,

A question that arises is,

“Is this necessary, is there a better way?”

To which the answer in some areas/cases is,

“No, there are better ways.”

As we know for quite a few years now the likes of “Traffic Analysis” has been in use more and more frequently as “computer tools” or agents grow in power and people get “linked” or “identified” just by their contact traffic etc.

It’s not been said much but current AI LLM and ML systems make quite useful “tools or agents” in this respect (in fact they are almost ideal compared to other current automated systems).

Which is why this should be of interest, it’s an amature use of video and facial recognition to tag politicians using their phones during live televised meetings.

Automatically tagging Belgian politician when they use their phone on the daily livestreams. With the help of AI.

https://driesdepoorter.be/theflemishscrollers/

Whilst there are quite a number of photos of the system, the technical details are at best scant,

“Every meeting of the flemish government in Belgium is live streamed on a youtube channel. When a livestream starts the software is searching for phones and tries to identify a distracted politician. This is done with the help of AI and face recognition. The video of the distracted politician are then posted to a Twitter and Instagram account with the politician tagged.”

Whilst on the face of it, it’s “fairly innocent”, it does not take much imagination to see how else it could be used. Interestingly the person who created it is Dries Depoorter, a creative artist with techno leanings based in Belgium.

A little more on the artist can be read at,

https://cybernews.com/entertainment/flemish-politicians-slacking-social-media/

Clive Robinson March 6, 2025 9:49 AM

@ Bruce. All,

Apple take UK Home Office to Court.

The UK Financial times –a bit of a dodgy Rupert Murdoch news outlet– has apparently put out a story that Apple are pursuing the UK Home Office into an independent judgment over the alleged back door request[1].

So I’m reliant on an other UK “tech news” outlet “The Register”,

https://www.theregister.com/2025/03/05/apple_reportedly_ipt_complaint/

Which indicates,

“Apple has reportedly filed a legal complaint with the UK’s Investigatory Powers Tribunal (IPT) contesting the British government’s order that it must forcibly break the encryption of iCloud data.

The appeal will be the first of its kind lodged with the IPT, an independent judicial body that oversees legal complaints against potential unlawful actions by a public authority or UK intelligence services, according to the Financial Times, which broke the news.”

I would say that after the Apple v FBI-DoJ of a few years back this is to be expected and something the “Home Office Minister” should have considered before “signing off” on the “Technical Capability Notice”(TCN).

As is normal in such things I suspect the UK Government will argue “National Security” as a reason to vacate any action and refuse to supply any evidence.

I suspect if the tribunal rebuffs the UK Gov –and it should– things will get not just public but quite nasty as well.

Whilst Apple will based on history of such tribunals loose in part, I suspect they will certainly win not just for “the industry” but more importantly “in the court of public opinion” which is something the current Government really does not want happening as they are already in enough trouble over what people say in electronic communications.

[1] I don’t have FT access as it’s behind a ludicrous pay wall system that is not worth what it allegedly costs Murdoch

ResearcherZero March 9, 2025 10:31 AM

@Clive Robinson

The story can likely be found courtesy of Archive Today. At this time it seems like an excellent time to take an extended fishing holiday. If only a little rain could put all fires out, both the metaphorical and the ones that were burning for the last month or so.

It is typically good fishing after a storm stirs up the waters and there is no news. 😉

Clive Robinson March 13, 2025 8:46 PM

@ Bruce, ALL,

It’s still not clear if Apple are doing anything against this UK Home Office demand. Because of the stupidity of the legislation.

However,

https://techcrunch.com/2025/03/13/apples-appeal-against-uks-secret-icloud-backdoor-order-must-be-held-in-public-rights-groups-urge/

“Appeals on U.K. surveillance matters are heard by the Investigatory Powers Tribunal (IPT) — oftentimes behind closed doors. But, in a joint letter to the president of the IPT, rights groups Big Brother Watch, Index on Censorship, and the Open Rights Group call for the iCloud case to be heard in public.”

It can hardly be “secret” now if US and other Nations politicians are up in arms about how it can be used against their citizens who have never, nor have any desire, to either visit the UK or communicate with UK,

“Persons legal, natural, or governmental.”

So the “National Security” card if played by the IPT by UK Government Minister “request” –actually insistence– will show the world the UK has things to hide, not least would be their “illegal behaviour”.

Clive Robinson March 14, 2025 6:08 PM

@ Bruce, ALL,

UK Gov hides behind Nat Sec as expected, US Politicos reported as up in arms.

The Register has an updated piece on the “alledged appeal by Apple”,

https://www.theregister.com/2025/03/14/apple_uk_encryption_hearing/

It’s a bit tame to what I expect others UK MSM like the Guardian and Independent will report.

As I indicated in my posting above the legislation makes “being honest” at best difficult, and the Minister at the UK Home Office Yvette Cooper,

https://www.computerweekly.com/news/366620938/Apple-encryption-legal-challenge-heard-behind-closed-doors-despite-calls-for-public-hearing

Who –is a bit of a slim ball at best– is no doubt grateful for that as it is a mess of their own creation as noted in the article (but “On who’s urging?” would be interesting to find out).

Further “it ain’t exactly secret” any more so the NatSec argument kind of fails to other legislation, which means certain inference s can be drawn.

So the state of play is,

“The Investigatory Powers Tribunal (IPT) has held a day-long secret hearing into an appeal brought by Apple against a government notice requiring it to provide law enforcement access to data encrypted by its Advanced Data Protection (ADP) service on the iCloud, despite calls for the hearing to be opened to the public.”

Further, ten UK MSM and NGO’s have made submissions against this effective “Abuse of Power” by the puppet Yvette Cooper.

So what is going to happen next…

Well,

“Civil society groups Privacy International and Liberty have separately launched a legal challenge against a secret Home Office order. The campaign groups have filed a legal challenge against the Home Office at the Investigatory Powers Tribunal arguing that the way the government has used the secret order, known as a Technical Capability Notice, is not compatible with UK law or the Human Rights Act.”

This “Poking the Bear” can be risky as it can and has “drawn down” retaliatory behaviour by the “administrative” branch of UK Government in various ways in the past.

(No we do not live in a Democracy in the UK no matter how much various idiots still want you to believe so. Even despite recent actions by the incumbents highlighting the lack of it).

However there is a great deal to “play for” as representatives of the Campaign Groups have noted

“Journalists, researchers, lawyers, civil society and human rights defenders rely on encryption because it protects them – and their sources, clients and partners – from surveillance, harassment and oppression,”

And they further said that secure and trustworthy end-to-end encryption services are,

“Crucial for those who are discriminated against, persecuted or criminalised because of who they are”

As I’ve indicated several times in the past,

“Secure messaging Apps are not secure in use.”

Because they form “part of a system” and whilst the Apps might be viewed as “strong links in the chain” other parts of the system are “very weak links”. Think of the chain as having a “ten ton link” and a “loop of string link” you would laugh at it and not even try to use it. That is the state of play due to the way modern consumer and commercial electronic systems are designed.

I can predict with very high certainty, that the “next step” in this game will be compulsory “Plaintext on Device Scanning and reporting” also known as “client side scanning” and “device side scanning” depending on exactly where the “traitorous shim” is inserted on the users “communications end point” device.

In fact we know “the bones” of such has already been trialed to “supposedly” find CSAM. Which is a mealy mouthed “dog whistle” argument that “people with things to hide” like dishonest politicians tend to use. Apple tried it, but before they could “flesh it out” they got significant “kick back”.

However all the consumer and commercial “personal / Smart Device” OS’s “now contain the bones” in one way or another… So “the flesh is just an update away”, giving rise to the question of,

“For ‘Generic Mass Surveillance’ or ‘Targeted Surveillance’?”

At the moment I don’t think the “Communications backhaul” has sufficient bandwidth for “Generic Mass Surveillance”, but that will change fairly rapidly. So whilst “Mass Surveillance of Everything” is certainly the goal, to start with it will in effect be non generic “targeted content” for which “On Device AI” will unfortunately be very very helpful not just to keep bandwidth down but long long into the future as a very real “Surveillance Agent in your pocket”.

Expect to see other “Government Initiatives” like oh “National ID” to be put on personal devices with the requirements of “always carry” for “Have your Papers ready for inspection”, and if you don’t carry your device will “Turn You In” for “Your own Good and Public Safety” etc etc etc. There will be massive fines involved, as what Government will resist an “Easy Revenue Raising Scheme” and some idiot will –if they have not already– think up extending the idea of “Toll Tokens” to people… After all “Post-C19” most mobile OS’s have “BLE Contact Tracing” foundations still “built in”.

So if you need actual real “Privacy” for your own “Health and Safety” as well as “Security” from criminals, you need a way to obtain it.

It needs certain characteristics, such as,

1, Moves the “security endpoint” well beyond the “communications endpoint”.
2, Has “Perfect Secrecy” for “Full deniability” against 2nd Party Betrayal.
3, Generates all “ciphertext” as innocuous human or similar “plaintext”.

But most importantly and most difficult to solve is the need for,

4, Easy “KeyManagment”(KeyMan) for “Perfect Secrecy” “KeyMaterial”(KeyMat) to ensure the previous listed requirements.

I’ve mentioned some of the issues in the past but…

Then there is the question of “beyond message privacy”, of other analysis techniques. Thus,

5, Meta-Data Privacy.
6, Meta-Meta-Data Privacy.

Currently Meta-Data privacy gets mentioned from time to time… and my previous complaints against Tor with respect to “Traffic Analysis” still stand in this respect (and why I advised against using it and still do).

But we also need to consider what very very rarely gets talked about which is Meta-Meta-Data some of which falls under “Behavioural Analysis” but is actually larger in scope.

There are “Known Solutions” to many of these issues, but outside of “certain circles” they just do not get consideration therefore consideration and mitigation.

Also how many people realise that “Running a Tor Node” puts them in breach of CALAE legislation that goes back into the 1990’s amongst other legislation/regulation. Also they are subject to NatSec Letters and what this entire thread is about the UK “Snoopers Charter” and it’s “Technical Capability Notice”(TCN) requirements that,

1, Apply “World Wide”.
2, Apply to “Every person in the World”.

That is any person, any place, as long as “in theory” it/they are reachable from the UK. So effectively anyone who makes electronic communications” of any kind at any time,

“Past, Present and Future”

So anything you’ve ever put up on the Internet or earlier comms where things have been “stored” and may still be available.

Also a fun one to consider… It also covers information that is not just communicated but “stored” and being “processed”[1]…

So effectively stored in the weights of DNNs in LLM and other AI systems…

Thus in theory the UK can “Kill AI” entities of Google, Microsoft, OpenAI and all, just by serving a “Technical Capability Notice”…

[1] To see why, you need to look up the fairly recent appeals judgment in the case of the “EncroChat” “secret communications” mobile phones and the various nations “wire tapping” them and supplying the data to UK Authorities.

Clive Robinson March 14, 2025 7:48 PM

@ Bruce, ALL,

Next Generation Snake Oil.

Whilst looking for a link to Prof Ross J. Anderson’s report on Encrochat debacle and appeals, I came across this page,

https://www.digitalbank.capital/post/trails-of-encrochat-assumed-facts

However looking down the page shows it is in effect an excuse to advertise what it calls,

“ENCRYGMA.COM Encryption Machines : The Highest Level of Cyber Defense for Secret Critical Data.

Mathematically Unbreakable Quantum Safe Encryption. Anti Interception. Anti Espionage. Anti Hacking. Anti Spyware . Anti Digital Forensic Data Extraction. Immune to Online Attacks.”

OK some of that is possible but not all, therefore my “hinky senses” started to twitch…

Further down the page I found it was talking nonsense in a way that would be attractive to certain types of people…

There are several things to take exception with in the claims but I will point out just one that is less well known about.

They talk about transfering files visually using QR codes.

As I’ve pointed out in the past with a similar idea thought up by one of Ross Anderson’s students it’s easily open to a “covert side channel” that can actually leak more information than the QR Code can contain.

The reason is that,

The QR Code is assumed by the specification to be discrete in nature, and thus effectively a binary representation of a “countable number” or “integer” of large size.

In reality the “visual channel” is considered in classical physics as “not discrete but continuous”. Thus each bit in the image is in effect a “real number” or by the time you’ve pushed it through electronics effectively a “rational number” that then gets “quantitized” by both the sampling and measurement processes.

So think of the QR code as not “black and white” but a “Scale” of dynamic range not just in amplitude but also variable in frequency and time. Not defined by the “visual channel” but by the electronics at either end.

Thus the better the electronics the wider the “Shannon Channel” available, thus the wider the bandwidth to information that can be sent both overtly and covertly.

But there are quite a few other whiffs of snake oil in there…

ResearcherZero March 19, 2025 9:37 PM

@Clive Robinson. ALL

With all of these products come the assurances that their wares and infrastructure is safe and secure and that no-one working for them is going to sell or leak information. These marvelous products have no backdoors (management knows about), no-one will hijack it and it will not become available for sale via black market channels. Simply press a button, when the light turns green – the information is now transmitted across the globe securely. 😉

Customers include Australia, Canada, Cyprus, Denmark, Israel, and Singapore.

‘https://citizenlab.ca/2025/03/a-first-look-at-paragons-proliferating-spyware-operations/

ResearcherZero March 19, 2025 10:36 PM

Shuffling backdoors to other places.

‘https://stateofit.com/interception/

Police agencies doubling up on “encryption-busting” requests.
https://www.itnews.com.au/news/police-agencies-duplicate-technical-requests-to-comms-providers-615641

Fast Access

ASIO can already decrypt data with specialist decryption techniques, but it takes time.
https://theconversation.com/the-devil-is-in-the-detail-of-government-bill-to-enable-access-to-communications-data-96909

Australian police still using Clearview AI which is still scraping your images.
https://ia.acs.org.au/article/2024/aussie-police-want-ai-facial-recognition-to-fight-child-abuse.html

ResearcherZero March 19, 2025 10:44 PM

How often is the Australian government requesting data from tech companies?

Spike in Australian government preservation requests – 20% request growth year-on-year.

‘https://transparencyreport.google.com/user-data/overview?user_requests_report_period=authority:AU&hl=en

Have you been shopping lately, or walking or driving in the last couple of years?
https://www.smartcompany.com.au/information-technology/grocery-chains-surveillance-tech-auror/

Australians are regularly being tracked and identified during their everyday lives.
https://www.abc.net.au/news/2025-01-16/qld-logan-cctv-artificial-intelligence-privacy-concerns/104818802

Australia compels telcos and ISPs to store customers’ phone and computer metadata.
https://www.abc.net.au/news/2015-03-26/data-retention-laws-pass-federal-parliament/6351278

Police may only require four data points from 30 days of purchases to identify you.

https://www.networkworld.com/article/935140/mit-researchers-show-you-can-be-identified-by-a-just-few-data-points.html

Clive Robinson March 20, 2025 9:56 AM

@ ResearcherZero, ALL,

Credit Cards bad for your health.

With Governments like the UK and India pushing to get people to stop using cash, my senses pick up on the incredible level of nonsense being put out about it including all the usuall “think of the children”, “to expensive to run” and similar dog whistle type lies and have done for over two decades.

So why do they want to do it?..

Well for nearly everyone what they spend where and when says volumes about them. It’s why the likes of Meta X-Facebook psycho in charge Mark Zuckerberg want’s to set up his own bank, digital currency and much else in the way of “money tracking”.

Likewise it’s why X-PayPal man Peter Tiel who has the worlds largest private Spying Outfit Palantir wants all those other records as well.

In this modern world you are “who and what you buy” in more ways than most can imagine and the information, profiles and associates information that can be built up within just a few weeks will hang around you for way longer than the rest of your life, just waiting for people to “cherry pick” and point an accusatory finger…

Am I being paranoid? Well that depends on how you define “paranoid”. Lets just say that my life’s experiences tends to make me see the truth or probable outcome of certain types of “looking over peoples shoulder” by “those with well proven ill intent”.

It’s just one of several reasons why I only use “cash” and “keep receipts”.

Which is why I find the report on the MIT research you link to at NetworkWorld.com unsurprising but I suspect that though it’s a decade or so old many others will be shocked when they read,

“90% of people can be identified from four samples out of 30 days of credit card transaction data from 1.1 million people.”

Personally I’d have put the probability as being higher in lesser time as many people “use their plastic” more than four times a day.

Years ago on the early days of this blog I stated that “RFIDs in everything” would have you identified and fully trackable by back linking RFID ID’s to Credit Card Purchases, by just the RFIDs in your “socks and undercrackers”.

Whilst this is all to easily possible, apparently “RFIDs in everything” did not happen but those beaconing “tap-n-go” payment cards did, and make a less data intensive “tracker in your pocket or bag”.

I’ve been involved in the past –just pre 9/11– with getting realtime mobile phone location data and using it to provide “Civil Census” information like “traffic flow” used for town and city planning and “Real Time Traffic Management”. We went quite a way to make the data “unlinked” to individuals, but as “start and end” of journey ends up in the data sieving it out is relatively trivial.

It’s why I also am unsurprised by the article saying,

“That’s pretty amazing and, at first blush, you might think that reducing the amount of data and its quality would improve privacy but you, my friend, would be wrong:”

Though others would be…

I’d found out that giving every mobile phone trace a random unique identifier every time or completely removing identifiers, could not stop even simple statistics identifying the “user”, and then by start and end points linking all their travels together…

It’s why I tell people to “leave your phone on charge in your desk draw or at home” and “turn it off before you get to the train/sub/bus stop” and “leave it off when you go out / shopping” and do it “in semi-irregular ways” such that trying to draw statistics mostly won’t work.

Then the final paragraph of the article makes a mistake, which I think many in the US will now feel in fear of…

“The bottom line is that with enough computing power and advanced algorithms it appears to be ridiculously easy for anyone who isn’t living in a cave to be tracked, analyzed, and targeted. It’s not the activities of the NSA, the CIA, the FBI, or any other TLA (three letter agency) we should be worried about, it’s the scientists working on Big Data and the corporations which have a huge incentive to use this technology to pigeonhole us so they can sell to us.”

It’s that bit in the middle about the TLA’s because as we now know the likes of Palantir are happily selling them “all the product” of the “Big Data” scientists, mathematicians, etc statistical workers.

To the likes of your “town sheriff” and other Law Enforcment in schools, colleges, Universities, Public Transport, and health workers, and the snotty clerck in your local town hall etc that might be shocking…

But consider the new kids on the block like DOGE who for political and worse personal reasons will use any and all data to target individuals to be “dealt with”. Primarily for the temerity of being inconvenient to mantra, or having spoken the truth etc.

Time to re-read George Orwell’s 1984 even though written getting on for eighty years ago, some people are using it still as a manual or political play book.

Oh and remember that even when different opinions come to power they will keep some or all of the changes, because they will be not just convenient, they can be easily blamed on others, especially if “run at arms length” as “commercial entities on hire”…

Hiskers in menlo March 22, 2025 1:59 AM

Optional edit:
“First, Apple can’t limit this capability to the UK government, or even only to governments whose politics it agrees with.”
Becomes:
“First, Apple can’t limit this capability to the UK government, or even only to governments whose politics Apple or the UK agrees with.”

No known backdoor technology will protect officials of the UK that might use iPhones.

Leave a comment

Blog moderation policy

Login

Allowed HTML <a href="URL"> • <em> <cite> <i> • <strong> <b> • <sub> <sup> • <ul> <ol> <li> • <blockquote> <pre> Markdown Extra syntax via https://michelf.ca/projects/php-markdown/extra/

Sidebar photo of Bruce Schneier by Joe MacInnis.