wordpress blog stats
Connect with us

Hi, what are you looking for?

, , , ,

France looking to ban Tor as Governments gear up to weaken encryption

https://www.flickr.com/photos/dogwelder/46901789/in/photolist-59ogx-5nAfHH-io1mct-gK4D1f-inZF2N-7fqz8Y-49eeGq-bB4iAp-niEXJQ-5oXYLQ-agrpJ7-4TQg2e-8WnoZh-HaAT4-8kqWBn-2zgB3X-dUkzTW-9xwiyQ-pSs21K-wXHsqo-wXQwKR-wXHn1q-wiiXef-wXQuyX-xeydeG-wXQsPe-wit2YM-9M2DUT-9NvgtE-5nEvyq-2b6w2P-cgqeuW-4WfWyn-mnAMbw-cFgWLA-873kx5-8kqUgt-5EXZPg-gK4z2n-8QyWVd-a6BM2e-wXHh6f-4xJQKU-8ifvHZ-cvJrtA-7ZaHVm-91HnQa-dX2FY1-qi9WAf-au7aBq

The French Government is considering a proposal to ban free and shared WiFi connections during a state of emergency, and block Tor permanently, reports Ars Technica. The proposals could be presented to parliament as early as January 2016.

The legislatures are justifying the WiFi blocking by citing the difficulty faced in tracking people using public hotspots. The second proposal will make it illegal to access Tor networks within France, although it is not clear if the Ministry of Interior (France) will look to block the service as well.

What is Tor? Tor is a free software that enables anonymous communication. It directs internet traffic through a free volunteer network concealing the user’s location. The routing is implemented by encrypting the data multiple times, including the destination IP address and sending it through randomly selected nodes of its network. The final node sends the original data to its destination without knowing the source IP address, thereby eliminating a single point at which the source and the destination can be revealed. However, due to all exit nodes of a Tor network being known, the entire network can be banned by blocking those IP ranges or specific servers.

If Tor networks are banned, users using the network for legitimate purposes will suffer the most. There are other ways to encrypt and send data which won’t be as simple blocking ToR nationwide, making this a pretty shortsighted move.

Of course, since the Paris terrorist attack, it’s not just Tor network that have come under attack. The EU and other governments around the world are looking to scapegoat encryption as the biggest point of failure causing terrorist attacks.

Advertisement. Scroll to continue reading.

EU’s stand against encryption: Earlier this month, firms including Facebook, Twitter, Microsoft, Apple and Google met with government and law-enforcement officials from the EU to discuss whether tech firms should build backdoors into encryption tools that could be used by terrorists to plan future attacks, a rhetoric, which has only grown stronger after the Paris attacks.

US takes a similar stand: In October, FBI Director James Comey said that the government would not ask for a legislation requiring the tech sector to install backdoors in products to access encrypted data for now, but said it ‘made sense to continue conversations with industry.’ However, many officials in the country have called for backdoors in encryption, and post the Paris attack, Comey went as far as to say Silicon Valley’s encryption is a “business model problem”.

Kazakhstan national security certificate: In Asia, the Kazakh Government recently mandated that from the 1st of January 2016, all devices that are capable of connecting to the internet will require a national security certificate. The certificate will essentially act as a man-in-the-middle attack, reading all packets sent from the device before they are encrypted, and keeping track of all incoming communication.

Weakening security in the name of security: Making encryption the scapegoat, and a solution to terrorism is a wrong and dangerous idea. In case a mandate is passed to ensure that the HTTPS protocol has a backdoor, is there a reason why terrorists will be obliged to used the encryption in its weakened state? They can instead use the previous versions which did not have such a backdoor and nothing is stopping them from coming up with their own form of encryption.

With weakened encryption, terrorists and malicious users will simply find an alternate encryptions to use, rather than use the globally accepted methods. This will lead to common users being forced to use insecure encryption, making them more vulnerable to terrorists and malicious social elements, while the actual culprits stay safe. As the Information Technology Industry Council, whose members include Apple and Microsoft, aptly put it, “Weakening security with the aim of advancing security simply does not make sense.”

Also read:

Advertisement. Scroll to continue reading.

Draft National Encryption Policy paper withdrawn, says telecom minister R S Prasad

Updated: India’s draft encryption policy puts user privacy in danger

Written By

MediaNama’s mission is to help build a digital ecosystem which is open, fair, global and competitive.

Views

News

The US and other countries' retreat from a laissez-faire approach to regulating markets presents India with a rare opportunity.

News

When news that Walmart would soon accept cryptocurrency turned out to be fake, it also became a teachable moment.

News

The DSCI's guidelines are patient-centric and act as a data privacy roadmap for healthcare service providers.

News

In this excerpt from the book, the authors focus on personal data and autocracies. One in particular – Russia.  Autocracies always prioritize information control...

News

By Jai Vipra, Senior Resident Fellow at Vidhi Centre for Legal Policy The use of new technology, including facial recognition technology (FRT) by police...

You May Also Like

Advert

135 job openings in over 60 companies are listed at our free Digital and Mobile Job Board: If you’re looking for a job, or...

News

Rajesh Kumar* doesn’t have many enemies in life. But, Uber, for which he drives a cab everyday, is starting to look like one, he...

News

By Aroon Deep and Aditya Chunduru You’re reading it here first: Twitter has complied with government requests to censor 52 tweets that mostly criticised...

News

Google has released a Google Travel Trends Report which states that branded budget hotel search queries grew 179% year over year (YOY) in India, in...

MediaNama is the premier source of information and analysis on Technology Policy in India. More about MediaNama, and contact information, here.

© 2008-2021 Mixed Bag Media Pvt. Ltd. Developed By PixelVJ

Subscribe to our daily newsletter
Name:*
Your email address:*
*
Please enter all required fields Click to hide
Correct invalid entries Click to hide

© 2008-2021 Mixed Bag Media Pvt. Ltd. Developed By PixelVJ