Issue 111: End-to-end Encryption

by  Peter E. Murray  ·   Posted on 
 ·  10 minutes reading time

This week's thread of articles looks at the ever-evolving landscape of digital security and privacy through end-to-end encryption. End-to-end encryption is a method of securing communication where only the people communicating can read the messages. In principle, it prevents potential eavesdroppers — including telecom providers, Internet providers, and even the provider of the communication service — from being able to access the cryptographic keys needed to decrypt the conversation. In practice, governments and others want to be able to put themselves in the middle of those conversations for both noble and dishonorable reasons. From unprecedented cyberattacks leading US officials to urge citizens to use encrypted messaging apps, to tech companies like Apple butting heads with the UK government over data privacy, the balance of power and privacy is under constant tension.

Also on DLTJ this past week:

Feel free to send this newsletter to others you think might be interested in the topics. If you are not already subscribed to DLTJ's Thursday Threads, visit the sign-up page. If you would like a more raw and immediate version of these types of stories, follow me on Mastodon where I post the bookmarks I save. Comments and tips, as always, are welcome.

U.S. government urges use of encrypted messaging apps in the wake of a major telecom breach

Amid an unprecedented cyberattack on telecommunications companies such as AT&T and Verizon, U.S. officials have recommended that Americans use encrypted messaging apps to ensure their communications stay hidden from foreign hackers. The hacking campaign, nicknamed Salt Typhoon by Microsoft, is one of the largest intelligence compromises in U.S. history, and it has not yet been fully remediated. Officials on a news call Tuesday refused to set a timetable for declaring the country’s telecommunications systems free of interlopers. Officials had told NBC News that China hacked AT&T, Verizon and Lumen Technologies to spy on customers.
U.S. officials urge Americans to use encrypted apps amid cyberattack, NBC News, 3-Dec-2024

Late last year, the U.S. announced a significant attack against telecommunication companies. This hacking campaign, known as Salt Typhoon, is one of the largest intelligence breaches in U.S. history, with officials stating that the full extent of the compromise has not been resolved. The attackers accessed various types of sensitive information, including call metadata and live conversations of specific targets, notably around Washington, D.C. In light of that, the FBI and CISA recommended that Americans use messaging apps that feature end-to-end encryption. There is more than just a touch of irony here because federal law enforcement pushed for the passage of the Communications Assistance for Law Enforcement Act (CALEA) in the mid-1990s that put backdoors into telecommunications equipment for law enforcement. It was these backdoors that were used by the Salt Typhoon attackers. There is no such thing as an encryption backdoor that will only be used by authorized law enforcement.

Apple takes on the UK government over data access demands

Apple is taking legal action to try to overturn a demand made by the UK government to view its customers' private data if required... It is the latest development in an unprecedented row between one of the world's biggest tech firms and the UK government over data privacy. In January, Apple was issued with a secret order by the Home Office to share encrypted data belonging to Apple users around the world with UK law enforcement in the event of a potential national security threat. Data protected by Apple's standard level of encryption is still accessible by the company if a warrant is issued, but the firm cannot view or share data encrypted using its toughest privacy tool, Advanced Data Protection (ADP). ADP is an opt-in feature and it is not known how many people use it.
Apple takes legal action in UK data privacy row, BBC News, 4-Mar-2025

In response to the UK order, Apple removed ADP from the UK market rather than create a "backdoor" for access. The UK Home Office maintains that privacy is only compromised in exceptional cases related to serious crimes. But, as the previous article points out, there is no such thing as a law-enforcement-only capability; if there is a weakness in an encryption system, it will eventually be exploited by someone with the time or talent to break it.

Sweden's proposed backdoor in encrypted messaging apps ignites global privacy concerns

Sweden’s law enforcement and security agencies are pushing legislation to force Signal and WhatsApp to create technical backdoors allowing them to access communications sent over the encrypted messaging apps.... The bill could be taken up by the Riksdag, Sweden’s parliament, next year if law enforcement succeeds in getting it before the relevant committee, SVT Nyheter reported. The legislation states that Signal and WhatsApp must retain messages and allow the Swedish Security Service and police to ask for and receive criminal suspects’ message histories, the outlet reported. Minister of Justice Gunnar Strömmer told the Swedish press that it is vital for Swedish authorities to access the data.
Swedish authorities seek backdoor to encrypted messaging apps, The Record, 25-Feb-2025

A few paragraphs down in the article, the Swedish Armed Forces are mentioned as opposing the bill because they routinely use Signal, and a backdoor could introduce vulnerabilities that bad actors could exploit.

Signal Foundation president warns of threat to privacy

Stop playing games with online security, Signal president warns EU lawmakers, TechCrunch, 17-Jun-2024

The open source Signal messaging app is considered the gold standard for end-to-end encrypted messaging. Meridith Whittaker is the president of the Signal Foundation, and she has strong words for lawmakers' efforts to weaken encryption algorithms. Ms Whittaker was also quoted in the previous article about Sweden's efforts. The European Commission originally proposed legislation to scan private messages for child sexual abuse material, but the European Parliament has rejected the approach. Experts like Whittaker argue this would create vulnerabilities that could be exploited by hackers and hostile states. The EU's data protection supervisor has also voiced concerns that the plan threatens democratic values.

Signal Foundation prepares for quantum threats with a revision to its end-to-end encryption protocol

The Signal Foundation, maker of the Signal Protocol that encrypts messages sent by more than a billion people, has rolled out an update designed to prepare for a very real prospect that’s never far from the thoughts of just about every security engineer on the planet: the catastrophic fall of cryptographic protocols that secure some of the most sensitive secrets today. The Signal Protocol is a key ingredient in the Signal, Google RCS, and WhatsApp messengers, which collectively have more than 1 billion users.
The Signal Protocol used by 1+ billion people is getting a post-quantum makeover, Ars Technica, 20-Sep-2023

I don't know if quantum computing will be what breaks the current generation of encryption protocols, but progress in faster hardware and more research into encryption means that the day will come at some point. The Signal protocol revision uses a "post-quantum cryptography algorithm" adopted by the U.S. National Institute of Standards and Technology (NIST). There are researchers on both sides of this divide: those working to advance encryption protocols and those seeking to break them.

Apple Launches Post-Quantum Encryption in iMessage

While practical quantum computing technology may still be years or decades away, security officials, tech companies, and governments are ramping up their efforts to start using a new generation of post-quantum cryptography. These new encryption algorithms will, in short, protect our current systems against any potential quantum computing-based attacks. Today Cupertino is announcing that PQ3—its post-quantum cryptographic protocol—will be included in iMessage.
iMessage Gets Post-Quantum Encryption in New Update, WIRED, 21-Feb-2024

Apple follows Signal's lead in deploying its own quantum-safe encryption protocol for iMessage. Apple is using the same Kyber algorithm tha Signal adopted. Deploying post-quantum encryption now aims to limit the impact of "harvest now, decrypt later" attacks, where encrypted data is collected and held until quantum computers can break it.

Exploring the intersection of AI and end-to-end encryption

Recently I came across a fantastic new paper by a group of NYU and Cornell researchers entitled “How to think about end-to-end encryption and AI.”... I was particularly happy to see people thinking about this topic, since it’s been on my mind in a half-formed state this past few months. On the one hand, my interest in the topic was piqued by the deployment of new AI assistant systems like Google’s scam call protection and Apple Intelligence, both of which aim to put AI basically everywhere on your phone — even, critically, right in the middle of your private messages. On the other hand, I’ve been thinking about the negative privacy implications of AI due to the recent European debate over “mandatory content scanning” laws that would require machine learning systems to scan virtually every private message you send.
Let’s talk about AI and end-to-end encryption, Matthew Green, 17-Jan-2025

This blog post discusses the implications of AI technologies on the security and privacy of encrypted communications. The author emphasizes the importance of maintaining robust encryption standards in the face of evolving AI capabilities that could potentially undermine these protections. Take, for example, the need for AI agents to be snooping in on your conversations so it has the context to take actions on your behalf: "Agent, book a two-person reservation at the restaurant Dave just messaged me about." The author advocates for a collaborative approach between cryptographers and AI developers to ensure that AI advancements do not compromise encrypted data security.

This Week I Learned: Plants reproduce by spreading little plant-like things

This is where pollen comes in. Like sperm, pollen contains one DNA set from its parent, but unlike sperm, pollen itself is actually its own separate living plant made of multiple cells that under the right conditions can live for months depending on the species... So this tiny male offspring plant is ejected out into the world, biding its time until it meets up with its counterpart. The female offspring of the plant, called an embryosac, which you're probably less familiar with since they basically never leave home. They just stay inside flowers. Like again, they're not part of the flower. They are a separate plant living inside the flower. Once the pollen meets an embryosac, the pollen builds a tube to bridge the gap between them. Now it's time for the sperm. At this point, the pollen produces exactly two sperm cells, which it pipes over to the embryosac, which in the meantime has produced an egg that the sperm can meet up with. Once fertilized, that egg develops into an embryo within the embryosac, hence the name, then a seed and then with luck a new plant. This one with two sets of DNA.
Pollen Is Not Plant Sperm (It’s MUCH Weirder), MinuteEarth, 7-Mar-2025
Pollen is not sperm...it is a separate living thing! And it meets up with another separate living thing to make a seed! Weird! The video is only three and a half minutes long, and it is well worth checking out at some point today.

What did you learn this week? Let me know on Mastodon or Bluesky.

Pickle and Mittens bask in a sunspot

Two cats basking in a sunbeam on a carpeted floor. One black and white cat lies on its back, while the other stretches out comfortably. A woven basket and a cat toy are nearby, enhancing the cozy scene.