Privacy is for paedophiles, UK government seems to be saying while spending £500k demonising online chat encryption

So far we've got a pisspoor video and... er, that's it

Opinion The British government's PR campaign to destroy popular support for end-to-end encryption on messaging platforms has kicked off, under the handle "No Place To Hide", and it's as broad as any previous attack on the safety-guaranteeing technology.

Reported by us well in advance last year, the £500k campaign aims to destroy public support for end-to-end encryption (E2EE) as part of a wider strategy.

That intends to make it easy for police workers and other public-sector snoopers to read the public's online conversations without having to get prior permission or defeat privacy protections.

Judging by videos earnestly distributed by organisations supporting it, the No Place To Hide campaign (being run by ad agency M&C Saatchi) is much wider than merely targeting Facebook Messenger as was previously thought.

Here the video's contents reflect the police view of E2EE as a digital smokescreen that prevents them from trawling through conversations at random and seizing on anything they don't like the look of. The message is clear: privacy is for paedophiles.

Inevitably, smart people have fought back – with one buying up an unclaimed domain name similar to the official No Place To Hide site and pointing those at informative material explaining the benefits of E2EE. Thus goes to ex-Facebook chap Alec Muffett's blog post titled "There are more and better ways to help kids, without destroying the future of internet privacy". We note that other similar domains appear to be unowned at the time of writing.

Otherwise, the campaign is off to a slow and unnoticeable start. This may be deliberate, so its opponents tire themselves out before it ramps up, but as an exercise in spending £500k in public money for minimal effect it's doing spiffingly so far.

E2EE is a force for good

Lest anyone reading this gets the idea that the UK government has a point about E2EE protecting paedophiles, the technology does far more than that and the government is deliberately omitting this information.

Your mobile banking app uses E2EE; online chats with HMRC are protected through E2EE; you'd no more have an unsecured web chat with the taxman's helpdesk than read out your P60 in the middle of a shopping centre.

Your family WhatsApp group is protected through E2EE, too, which prevents nefarious people from trawling it for information they can use to target and harm you and your loved ones. Yet the British government wants such protections taken away, mainly because it means police then have to do less work.

Do all these online protections help paedophiles? As an unwanted by-product of all the good E2EE does, yes. As an imperfect analogy, road accidents kill thousands of people by accident every year. Yet nobody argues that roads should be closed to prevent those deaths.

Money spent publicly lobbying Facebook not to enable E2EE and demonising the tech itself is money better spent on public awareness campaigns about ways to report crimes, outreach to children, parental education on how to talk to (and supervise) children about using social media today – and who children should talk to if a strange adult suddenly tries to befriend them online.

Money spent with M&C Saatchi, famous for its long association with the Conservative Party as well as a long-running accounting scandal, certainly won't hurt any police or civil service careers under today's Conservative government – but that doesn't sweep aside the fact this money has been wasted chasing a pointless target.

Demonising technology that has long been adopted as routine in the enterprise IT world is a road to nowhere, and an increasingly tech and security-savvy population simply aren't going to buy into "think of the children" rhetoric for something that will make them less safe online. No matter how hard public-sector figures try to make this about child abusers. ®

Other stories you might like

  • Lonestar plans to put datacenters in the Moon's lava tubes
    How? Founder tells The Register 'Robots… lots of robots'

    Imagine a future where racks of computer servers hum quietly in darkness below the surface of the Moon.

    Here is where some of the most important data is stored, to be left untouched for as long as can be. The idea sounds like something from science-fiction, but one startup that recently emerged from stealth is trying to turn it into a reality. Lonestar Data Holdings has a unique mission unlike any other cloud provider: to build datacenters on the Moon backing up the world's data.

    "It's inconceivable to me that we are keeping our most precious assets, our knowledge and our data, on Earth, where we're setting off bombs and burning things," Christopher Stott, founder and CEO of Lonestar, told The Register. "We need to put our assets in place off our planet, where we can keep it safe."

    Continue reading
  • Conti: Russian-backed rulers of Costa Rican hacktocracy?
    Also, Chinese IT admin jailed for deleting database, and the NSA promises no more backdoors

    In brief The notorious Russian-aligned Conti ransomware gang has upped the ante in its attack against Costa Rica, threatening to overthrow the government if it doesn't pay a $20 million ransom. 

    Costa Rican president Rodrigo Chaves said that the country is effectively at war with the gang, who in April infiltrated the government's computer systems, gaining a foothold in 27 agencies at various government levels. The US State Department has offered a $15 million reward leading to the capture of Conti's leaders, who it said have made more than $150 million from 1,000+ victims.

    Conti claimed this week that it has insiders in the Costa Rican government, the AP reported, warning that "We are determined to overthrow the government by means of a cyber attack, we have already shown you all the strength and power, you have introduced an emergency." 

    Continue reading
  • China-linked Twisted Panda caught spying on Russian defense R&D
    Because Beijing isn't above covert ops to accomplish its five-year goals

    Chinese cyberspies targeted two Russian defense institutes and possibly another research facility in Belarus, according to Check Point Research.

    The new campaign, dubbed Twisted Panda, is part of a larger, state-sponsored espionage operation that has been ongoing for several months, if not nearly a year, according to the security shop.

    In a technical analysis, the researchers detail the various malicious stages and payloads of the campaign that used sanctions-related phishing emails to attack Russian entities, which are part of the state-owned defense conglomerate Rostec Corporation.

    Continue reading

Biting the hand that feeds IT © 1998–2022