Global crypto survey proves govt backdoors completely pointless

Like playing a frustrating game of whack-a-mole


In 1999, when a fierce crypto war was raging between governments and developers, researchers undertook a global survey of available encryption products.

Now security guru Bruce Schneier and other experts have repeated the exercise, and it spells bad news for those demanding backdoors in today's cryptography.

The latest study analyzed 865 hardware and software products incorporating encryption from 55 countries, with a third of them coming from the US. That's up from 805 in 35 countries in 1999.

The goal of the survey is to catalogue available products and applications, rather than score or rate them. The team did not have the time to evaluate each system in depth. One thing the list does demonstrate, though, is the wide availability of software with builtin encryption, distributed from all corners of the globe.

Schneier told The Register this shows calls for backdoors are pretty pointless because it's rather easy for a person to move from one encryption system to another. If one product is found to be flawed by design, or compromised by a government, there will be another package available that isn't.

"Assuming substitution is relatively low cost, any domestic encryption regulations won't have the desired effect," Schneier said. "As for enforcement, it would be ridiculous to try and enforce a ban on non-government-approved encryption."

He pointed out that in 1999, distributing software was a lot harder than it is today. The internet population was way smaller, there was no GitHub, there were precious few online software repositories, and there were limited ways to obtain stuff from overseas in an untraceable manner.

But with the internet today, all of those problems have been virtually solved. Now people can build encryption into software for free and let anyone download and use their code. Of the 546 non-US encryption systems studied, 44 per cent are free and 34 per cent are open source, and even commercial systems usually have a free trial version.

"A lot of this stuff is very niche," Schneier noted. "People are making it because they want to – there's a lot more altruistic encryption."

Furthermore, a lot of products store their source code on servers in multiple countries, making it tricky for the authorities in one country to claim a clear jurisdiction over a particular project. Some development efforts are spread out over systems in Iraq, the British Virgin Islands, Cyprus, Saint Kitts, Tanzania, and you get the drift.

Schneier said that, in terms of quality, the products available are a mixed bag when it came to effectiveness, but that most were perfectly usable and would make law enforcement trying to snoop on the contents of conversations very difficult.

The bottom line, Schneier said, was that the minute a nation introduced laws requiring government-only backdoors in software, people will simply move to a new encryption product. Such regulations could cripple that country's global software industry's sales – something Apple, Google et al are nervously aware of. ®

Similar topics

Broader topics


Other stories you might like

  • Telegram adds paid tier as it cracks 700 million users
    Without so much as a mention of encryption, but with a pastel-hued emoji-heavy nod to ‘sustainable monetization’

    Messaging app Telegram, which came to prominence for offering end-to-end encryption that irritated governments, has celebrated passing 700 million active monthly users with a pastel-hued announcement: a paid Premium tier of service.

    A Sunday post celebrates the 700 million user milestone by announcing a $4.99/month tier. The Premium tier distinguishes itself from the freebie plebeian tier with the ability to upload 4GB files, unthrottled downloads that come as fast as users' carriers will allow, and the chance to follow up to 1000 channels, create up to 20 chat folders each containing up to 200 chats, and to run four accounts in the Telegram app.

    Paying punters will also get exclusive stickers and reactions and won't see ads once they sign up to hand over coin each month.

    Continue reading
  • Protecting data now as the quantum era approaches
    Startup QuSecure is the latest vendor to jump into the field with its as-a-service offering

    Analysis Startup QuSecure will this week introduce a service aimed at addressing how to safeguard cybersecurity once quantum computing renders current public key encryption technologies vulnerable.

    It's unclear when quantum computers will easily crack classical crypto – estimates range from three to five years to never – but conventional wisdom is that now's the time to start preparing to ensure data remains encrypted.

    A growing list of established vendors like IBM and Google and smaller startups – Quantum Xchange and Quantinuum, among others – have worked on this for several years. QuSecure, which is launching this week after three years in stealth mode, will offer a fully managed service approach with QuProtect, which is designed to not only secure data now against conventional threats but also against future attacks from nation-states and bad actors leveraging quantum systems.

    Continue reading
  • Cheers ransomware hits VMware ESXi systems
    Now we can say extortionware has jumped the shark

    Another ransomware strain is targeting VMware ESXi servers, which have been the focus of extortionists and other miscreants in recent months.

    ESXi, a bare-metal hypervisor used by a broad range of organizations throughout the world, has become the target of such ransomware families as LockBit, Hive, and RansomEXX. The ubiquitous use of the technology, and the size of some companies that use it has made it an efficient way for crooks to infect large numbers of virtualized systems and connected devices and equipment, according to researchers with Trend Micro.

    "ESXi is widely used in enterprise settings for server virtualization," Trend Micro noted in a write-up this week. "It is therefore a popular target for ransomware attacks … Compromising ESXi servers has been a scheme used by some notorious cybercriminal groups because it is a means to swiftly spread the ransomware to many devices."

    Continue reading

Biting the hand that feeds IT © 1998–2022