Australian Spies Want To Hack Tor After Realizing It Routes Around Their Surveillance
from the how-daft-can-you-get? dept
One of the key flaws with the data retention schemes being proposed by the UK and elsewhere, supposedly to catch terrorists and serious criminals, is that they won't work. It is trivially easy to avoid surveillance by using encrypted connections, for example those provided by The Onion Router (Tor). This means that the only people who are likely to end up being spied on are innocent members of the public.
According to this article in Crikey, the secret services in Australia have apparently woken up to this fact; but rather than convince their government that data retention is therefore an expensive and intrusive waste of time, they have decided to take the damage to the next level:
In a major admission, the Attorney-General's Department has revealed Australia's intelligence and law enforcement agencies are seeking the legal power to break into internet routing encryption services such as Tor, after admitting the centerpiece of its proposed national security reforms, data retention, will be "trivially easy" to defeat.
This is, of course, an incredibly stupid idea, for reasons that one of Tor's developers, Jacob Appelbaum, explains well in the Crikey piece:
"If they wish to break such [encrypted] services, they ensure that when they use such services, they will also be insecure -- this ensures again that only criminals will have privacy, regular people -- including the police fighting crime -- they will be left out of having strong privacy. This opens business people up to industrial and economic espionage. It also promotes the idea that to make ourselves more secure, we should weaken our networks and add the very backdoors that most attackers work day and night to create," he said.
The plan to create detailed, centralized stores of high-value information about people's Internet and telephone usage already exposes the public to an elevated risk of having personal information accessed and misused. Moving beyond that to break key encrypted Internet services like Tor and virtual private networks (VPNs) would deal another serious blow to online privacy and business confidentiality.
Follow me @glynmoody on Twitter or identi.ca, and on Google+
Thank you for reading this Techdirt post. With so many things competing for everyone’s attention these days, we really appreciate you giving us your time. We work hard every day to put quality content out there for our community.
Techdirt is one of the few remaining truly independent media outlets. We do not have a giant corporation behind us, and we rely heavily on our community to support us, in an age when advertisers are increasingly uninterested in sponsoring small, independent sites — especially a site like ours that is unwilling to pull punches in its reporting and analysis.
While other websites have resorted to paywalls, registration requirements, and increasingly annoying/intrusive advertising, we have always kept Techdirt open and available to anyone. But in order to continue doing so, we need your support. We offer a variety of ways for our readers to support us, from direct donations to special subscriptions and cool merchandise — and every little bit helps. Thank you.
–The Techdirt Team
Filed Under: australia, data retention, encryption, hacking, security, surveillance, tor
Reader Comments
Subscribe: RSS
View by: Time | Thread
[ link to this | view in chronology ]
Re: Roll Your Own Tunnel
[ link to this | view in chronology ]
Re: Re: Roll Your Own Tunnel
[ link to this | view in chronology ]
Re: Re: Re: Roll Your Own Tunnel
[ link to this | view in chronology ]
Re: Re: Re: Re: Roll Your Own Tunnel
[ link to this | view in chronology ]
Re: Re: Re: Re: Re: Roll Your Own Tunnel
[ link to this | view in chronology ]
Re: Re: Re: Re: Re: Roll Your Own Tunnel
Circle jerk?
[ link to this | view in chronology ]
Re:
[ link to this | view in chronology ]
Re:
[ link to this | view in chronology ]
[ link to this | view in chronology ]
Sounds like a good plan
[ link to this | view in chronology ]
Re: Sounds like a good plan
[ link to this | view in chronology ]
Re: Re: Sounds like a good plan
[ link to this | view in chronology ]
BREAKING: .gov.au has discovered criminals are evading surveillance by failing to connect to the internet. Voluntary universal internet connectivity program in the works, fines and gaol coming later.
[ link to this | view in chronology ]
have you not yet realised that this is exactly what is wanted? think about it. law enforcement agencies like the FBI will have even more people to set up as terrorists, more people to put their stupid schemes into play against and then more back slapping and praise to get for breaking another terrorist or criminal ring of people that didn't actually do anything wrong at all but were convinced by the agencies that if they didn't plead guilty to doing nothing, they would be charged, convicted and imprisoned for doing whatever the agencies could dream up as charges! and dont forget, there wont be any danger involved as most of these people will be old age pensioners that couldn't think about doing anything subversive, let alone actually able of doing it. unfortunately, just like the entertainment industries, law enforcement and governments wont listen to anyone that talks sense over anything when it involves them in doing the opposite to what they want to do. they want to spy continuously on everyone and that is what will happen. the fact that it wont help in capturing anyone or preventing any major (even minor) crimes, is beside the point. they want to do it, they will do it and the bullshit of how it stopped this, prevented that and helped capture so and so, will coming out thick and fast. all that will happen in reality is there will be so much information collected, it would take an army to sift through it. by then, anything of value will be so out of date, the disaster, if one was in the offing, would be long happened!!
[ link to this | view in chronology ]
Re:
[ link to this | view in chronology ]
Re:
[ link to this | view in chronology ]
The people who won't listen are the "ZOMG it's Bieber" public. They don't want to be bothered to even listen let alone vote (US - I believe Aussies are required to vote).
If the public is too much sheep and not enough people actively involved, you only get the truly psychotic in office making the rules. Think about politics in the US. Would *you* want to have your life raked over the coals ever 2/4/6 years? Sane people say no. Only people who have purposely lived a life so devoid of anything interesting can be elected - or people who have actively hidden their true selves from anyone else. Neither are what I'd consider good choices for leadership, yet it's all we get now.
[ link to this | view in chronology ]
This "seeking the legal power" means already have the ability.
[ link to this | view in chronology ]
Re: This "seeking the legal power" means already have the ability.
But that does not matter. Tor's source code is completely public, meaning anyone can check its security. Not only that, but tor is such a high-profile program, that anyone who breaks it will get instant fame among his peers.
If you look at the way tor works, you can see that the ones operating it do not have the ability to break it. And that is by design.
[ link to this | view in chronology ]
Re: This "seeking the legal power" means already have the ability.
[ link to this | view in chronology ]
Re: Re: This "seeking the legal power" means already have the ability.
[ link to this | view in chronology ]
Re: This "seeking the legal power" means already have the ability.
[ link to this | view in chronology ]
So it goes
Most of the public just doesn't have stuff worth all that effort to hide. It's incredibly difficult for them to justify an escalating war of technology to try to hide what they don't need to hide to start with.
[ link to this | view in chronology ]
Internet
[ link to this | view in chronology ]
Re: Internet
[ link to this | view in chronology ]
Re: Internet
[ link to this | view in chronology ]
Need HAcker?
[ link to this | view in chronology ]