🚨 Another EU mass surveillance attempt. Will kill privacy on web. Must not pass. 🚨

“[A]ll web browsers distributed in Europe will be required to trust the certificate authorities and cryptographic keys selected by EU governments.

These changes radically expand the capability of EU governments to surveil their citizens by ensuring cryptographic keys under government control can be used to intercept encrypted web traffic across the EU.”

https://last-chance-for-eidas.org

#eu #privacy #surveillance #eidas

Last Chance for eIDAS

13 days before the first eIDAS vote, still no public text

@aral mandating putting a specific key in trust stores?

Well WHAT THE ACTUAL FUCK!!!!!
@aral interesting how all of a sudden cryptography is not the enemy anymore. Looking at you, #chatcontrol
@grob Oh, it’s always the enemy. This is just one way of bypassing it. Client-side scanning is another. Signalling capture is a third (“let’s add another end to the end-to-end without telling anyone”). As far as I can see, they’re still very much interested in trying their luck with all these approaches. (When they’re not busy trying to outlaw mathematics, that is.)
@aral that’s some scary shit. The implications are crystal clear even to laymen like myself.
@aral how does that affect VPNs?

@JohnDal Depends on how you have setup things and how they try to tap you.
*Generally* won't be a big issue as they need to tap between the VPN server and the destination server.

@aral

@JohnDal This is about browser certificates so whether you’re on a VPN shouldn’t factor into it either way. They’re looking to MITM TLS.
@aral so in the future a DigiNotar would be able to continue to service EU citizens with crap certificates, because it would be a pain to Dutch government? https://en.wikipedia.org/wiki/DigiNotar #certificates #eu #DigiNotar
DigiNotar - Wikipedia

@murb

DigiNotar issued the fraudulent certificates under WebTrust rules, not EU Electronic Signature rules.

@aral

@aral sometimes I wonder who are the technical people advising the minds that come up with this stuff and why are they so ineffective.

For privacy minded users, there's a whole distribution chain that can remove said certificates from the browser. There's no world in which the existence of the certificates can be guaranteed on a "target"'s computer so that it would be effective against whatever the hell they imagine it to be effective against. Sigh.

@mariusor @aral It's well-considered enough it isn't stupidity, it's malice.

Such users may also become targets in other ways, if their fast move to authoritarian surveillance goes as intended.

@lispi314 so much certainty for such an amorphous group of people. I doubt you know what you're talking about.

@aral

@mariusor @aral Abetting authoritarianism in self-delusion and rationalization of one's misdeeds isn't meaningfully differentiable from malice, and that's the only real alternative left.
Veraport: Inside Korea’s dysfunctional application management

While Wizvera Veraport is supposed to manage security applications easily, it suffers from a number of design flaws. In the worst case, these can lead to arbitrary websites installing malicious applications without the user noticing.

Almost Secure
@aral Iirc, Iran does the same as well and The Netherlands has been doing so for a while as well.

@finlaydag33k @aral eIDAS started nine years ago. I've had a Bulgarian cert for at least five years.

Utility is limited by the refusal to distribute the certificates of less-powerful counties. We all have cryptographically-verifiable PKI, but Google wants us to use their app instead.

@finlaydag33k @aral

I remember reading quite a few years back about how the Dutch Communications Ministry Agentschap Telecom (now the Rijksinspectie voor Digitale Infrastructuur) had started introducing this - (with surprisingly little comment about it across Europe)

@vfrmedia @finlaydag33k The Netherlands is scary in just how much Orwellian legislation/processes they can introduce without anyone batting an eyelid. They embraced body scanners by default at the airports*. They’re also going cash-free at an alarming rate. And few folks seem to be worried.

(An uncomfortable eye opener for me was when I was processed by G4S at one end of my trip and by G4S at the other while traveling to the Netherlands from possibly the UK once.)

@aral @finlaydag33k NL and UK are neighbours and have worked very closely together on surveillance/cop/military tech for decades, alongside East and South East Asian countries as part of the wider electronics industry - its been a thing since the 1970s.. (it was Phillips which initially made CCTV cameras small enough and affordable that they could be deployed just about everywhere)

@aral Yea, I still pay a bunch in cash but indeed it's getting harder and harder to do so.
Places where you can put cash into your bank account are also becoming increasingly rare.

@vfrmedia

@finlaydag33k @vfrmedia There’s a reason in the prequel to The Handmaid’s Tale, one of the first things a fledgling Gilead does is to freeze the bank accounts of women – rendering them financially dependent on men from one day to the next.
@aral @finlaydag33k I can understand Dutch to about the level of a teenager/youth, and around 2012-4 read a lot of forums that young people in NL hung out on, and even on "alternative" subcultures like the electronic dance music scene I noticed a whole load of toxic attitudes about gender and race from young Dutch men (and these men will now be in their 30s and 40s, and possibly in positions of power) - and its the same problem here in the UK

@vfrmedia tbf, most toxic attitudes about gender and race have pretty much passed.
All it is nowadays is some fairly isolated cases.

The general population doesn't really bother much with it all.

@aral

@finlaydag33k @aral

That is good to know, what worried me is that I was on groups for subcultures that were previously (in 1980s/90s/00s) very inclusive so it seemed like NL (and UK) was sliding back.

But I did notice even on the piratenhits/pirate radio scene (where folk are even older and from rural areas) they were becoming more diverse and inclusive (eg I've heard more female DJ's on the pirates recently)

@vfrmedia Yea, we've mostly opened up luckily.
We kinda have a more "just don't bother me and we good" attitude towards a lot of shit.

Most of the toxicity is found in places where religion still matters a lot, like Urk... Then again, you don't wanna be found dead in those places anyways.

@aral

@finlaydag33k

Urk was the first place that came to mind when I thought of "parts of NL best avoided!"

culturally the part of England where I live is very similar to NL (even with the religious/conservative rural areas), just that "everything happens on the other side of the road" 😁

@aral

@vfrmedia ngl, Urk should have remained an island. XD

@aral

@aral I don't understand something, I'd love if you could help me. Today, does Let's Encrypt have the exact same power that the EU states would have if this law was enforced? Would something "in absolute" change or would it be just changing hands to different people? Thanks!
@aral it's all coming together , the WEF psychopaths are really on fire, but Trudeau and the PM of New Zealand is topping it all, the best WEF servants EVER

@ztimus

So... let me get this straight.

The WEF is doing this in Europe, because of...

*checks notes*

...Trudeau in Canada (North America) and Hipkins in New Zealand (Oceania).

Both of which, to my knowledge, have not done anything of the kind in their own country.

Ok.

@aral

@aral I don't think corporate certificate authorities are any better than government ones. The technology itself is questionable.

@aral Uh, no. This is some weird tinfoil hat nonsense. eiDAS isn't Clipper Chip, it PKI.

This regulation would require that browsers recognize the certificates of EU government-issued IDs.

It would allow me to use the same hardware token ID I use to file taxes and customs paper to verify my ID with banks, EU agencies, and other governments. It would allow us to use our IDs to sign PDFs, and widely enable passport verification.

@opendna Yep, we’re all tinfoil hat conspiracy theorists here, you really figured us out. Everyone at Mozilla too. They’re the worst! That’s why Google pays them half a billion dollars a year. Because – you guessed it (damn, you’re good) – Google are tinfoil hat conspiracy theorists too! Don’t let their trillion-dollar adtech business fool you, it’s tin foil hat all the way down. Ever wonder why you never see the inside of their propeller hats?… Now you know.

Viktor Orbán approves this message.

Joseph Cox (@[email protected])

Attached: 1 image New: YouTube's renewed 'war' on adblockers highlights something much deeper: how Google has its hands on every part of the ecosystem, meaning it can leverage power like no one else on this. https://www.404media.co/youtubes-war-on-adblockers-shows-how-google-controls-the-internet/

Infosec Exchange
@kravietz @aral Don't bother. Dude lost his shit and blocked me because I said it's tinfoil hat foolishness to believe RFID passports will mitm your Internet connection.

Just so we're all clear: if you fear eIDAS, burn your passport. Every passport issued in the last 15 years has essentially been an eIDAS document with a wireless antenna.

The question that is actually on the table is whether computers should be able verify the authenticity of an ID document without installing certificates for each national authority.

@opendna @aral Do you understand what PKI authorities do and their role in TLS interception?

If the answer to that is no, you might want to cease making a fool of yourself and read up on it first.

No one gives a shit about the keys to be trusted. The problem is the means to achieve that which are also concerned by the same legislation: the certificate authorities.

If you have a compromised root PKI certauth? You own the TLS net. That's it. You can eavesdrop and interfere with everything.

@opendna @aral Now, you might say "but there are some checks & means available to mitigate that" and they know, they specifically decided to include sections in that legislation to *forbid* using those means.

@lispi314 @aral There is nothing prohibiting them from declaring that a national CA is issuing fraudulent certificates, and the consequences of that would be much greater than you seem to appreciate.

The prohibition on revoking CAs is rule against a private American corporation autonomously revoking the identity documents of entire EU nations. And yes, they do have a habit of unlawful discrimination for profit.

@opendna @aral Considering several nations have already been caught doing so for such paltry and blanket reasons as "terrorism" (where predictably none was then found) and no consequences were had whatsoever, I don't see what consequences there would be to appreciate.

@lispi314 @aral I do understand what PKI authorities do. I also understand what eIDAS is, the precusor programs, and the real world risks of document security. I was very good at catching counterfeits before they were digital, and honestly, I'm probably one of the last.

I also understand that neither security agencies nor tyrants ask for permission, so worrying about whether Hungary might get a third CA in the future is many years too late. China has 17 CAs which can do what you fear.

@opendna @aral Fun fact about tyrants, they do in fact fairly often acquire power legally, and then they rewrite the laws.

Authoritarian regimes are a large part of the why I consider the whole PKI scheme fundamentally broken.

However, unlike very localized instances, this effectively pushes practical usability of its inherent flaws into global deployment.

You won't hear me defending the #clearnet much, the whole thing is ill-designed & compromised as anything beyond a routing layer.

@lispi314 @aral As long as browsers have a de facto monopoly on distributing certs, it's reasonable for them to require that the root identity CAs be recognized.

Reasonable people can believe PKI is broken. Reasonable people don't claim that it is possible to issue a valid SSL based on a government ID while also rejecting the authenticity of that government ID.

@lispi314 @aral And I will just add that if you want to claim that EU governments are more lax with the security of CAs that they use to issue national IDs and passports than the hundreds of unknown commercial CAs which issue SSL certificates for 9.99 plus VAT, reconsider whether that makes any sense.

@opendna @aral That is another part of the "PKI is fundamentally broken" deal, indeed.

Corposcum cannot be trusted either and their neglect (and perverse incentives in many/most cases) have already been well-documented.

@lispi314 @aral I think "PKI is broken" is a reasonable position. But "PKI is broken therefore we must use SMS 2FA and Google Authenticator" is not.

Browsers distributing eIDAS CAs means every EU citizen will have a hardware 2FA token. That's not perfect, but it's definitely an improvement.

@opendna @aral SMS (and indeed the telephone network infrastructure in general) is broken in a number of ways, both functionality-wise and security-wise, I won't defend it.

NIST is perfectly right to recommend against it as any sort of channel for authentication secrets (which banks then blithely ignore for some reason).

I also wouldn't trust a third party with conflicts of interest (such as a government) to secure my communications with my peers, which greatly limits the usefulness of that.

@opendna @aral Anything which facilitates lawful interception facilitates abusive yet legal interception and makes the (repeatedly proven wrong) assumption that the legal system and its operative organs cannot be corrupted.
@aral Jesus Christ! What is going on in the EU these days!?

@aral

If you keep giving the police what they ask for, you end up with a police state.

@aral Could malicious compliance be an option if this goes through? Like the page loads, but a big banner is displayed in the browser informing the user that an unsafe CA is being used which probably means that the web use is being directly surveilled?
@stephengentle No idea. Given malicious compliance is what companies like Google, etc., have been undertaking with GDPR/cookie notices/right to be forgotten, I don’t see why not. (Then again, things have a way of being implemented differently whenever “national security” enters into the picture… Here’s hoping we don’t have to find out.)

@aral

Aral, this story is bullshit. It’s yet another of US companies to thwart a regulation that hurts their business, nothing more - I’ve explained it in details here:

https://agora.echelon.pl/notice/AbOZJBmQBHLG8ySyZs

@kravietz This is all I see at that link: