This article is more than 1 year old
UK data watchdog calls for end-to-end encryption across video chat apps by default
Then backtracks and tells El Reg: 'It's not a formal opinion'
Britain's new Information Commissioner has called for video conferencing companies to enable end-to-end encryption on their products – even as police managers and politicians condemn the technology and demand its removal.
This week the ICO urged tech companies to make end-to-end encryption (E2EE) "available to all users" regardless if they're "enterprise, consumer, paid or free" in a statement jointly backed by seven countries' data protection regulators – even including China.
"Ease of staying in touch must not come at the expense of people's data protection and privacy rights," warned last year's open letter, which was reiterated this week by the ICO.
Calling for E2EE to be applied to widely used communication apps pits these data protection authorities against their own governments and law enforcement agencies, potentially laying the ground for a vicious policy fight in the West.
This week's document said:
The joint signatories acknowledge the reported use by the VTC companies of industry standard encryption as a minimum. They also welcome the development or implementation of end-to-end encryption (where the meeting host creates the key and only they and participants have access to it) in certain circumstances.
It also added that users ought to be given "clear and easily understandable information" about the difference between what it called "standard" encryption and E2EE.
Figures such as Home Secretary Priti Patel and National Crime Agency manager Rob Jones have previously condemned E2EE, while the governments of the Five Eyes espionage alliance (comprising the UK, US, Canada, Australia and New Zealand) have have repeatedly condemned the technology.
Belatedly recognising this, the ICO backtracked when The Register asked about the move, saying:
This work is clear that these observations are specific to this context and these technologies following our engagement with the companies involved and in light of their rapid growth during the pandemic; particularly in health and education settings. It is not a formal opinion with wider application beyond these uses and is clear it does not bind future findings of any future enquiries any of the authorities or their next Commissioners might undertake.
Privacy advocates say E2EE protects users against surveillance by hostile governments and police agencies, and helps secure their data against intrusions by criminals looking to steal and leak personal information from web-facing corporate infrastructure.
The ICO added that it supports "lawful instances of law enforcement and third party data requests," saying: "It is important that any approach to E2EE seeks to reconcile addressing harms with privacy and safety impacts."
- UK.gov is launching an anti-Facebook encryption push. Don't think of the children: Think of the nuances and edge cases instead
- Better late than never: Microsoft rolls out a public preview of E2EE in Teams calls
- Zoom finally adds end-to-end encryption for all, for free – though there are caveats
- Won't somebody please think of the children!!! UK to mount fresh assault on end-to-end encryption in Facebook
Police workers, on the other hand, claim that E2EE would force them to obtain court warrants each and every time they want to spy on criminal suspects, risking judges turning down overbroad demands. At the moment unencrypted conversations can potentially be surveilled by social media companies, with messages of interest forwarded to police and other law enforcement agencies.
A joint review carried out last year by British, Canadian, Australian, Chinese, Swiss, Gibraltarian and Hong Kong data protection regulators called on global tech companies to implement end-to-end encryption as a user safety measure. Microsoft, Google, Cisco and Zoom all responded, while Houseparty (a short-lived video chat app) didn't, its owners since having shut it down.
The ICO and the other data regulators also said they expected video conferencing app providers to carry out "regular testing of security measures" including pentests, audits and deploying bug bounty programs. ®