Return to Video

34C3 - WTFrance

  • 0:00 - 0:17
    34C3 preroll music
  • 0:17 - 0:24
    Herald Angel: Good. I have the pleasure
    and the honor of introducing to you two
  • 0:24 - 0:35
    persons here who are really working at
    'La QuadratureDuNet'. Alors, c'est vraiment
  • 0:35 - 0:39
    quelque chose en Français ! It's an
    organization NGO, it's actually working
  • 0:39 - 0:46
    really on the rights, on freedom of
    citizens on the internet. I understood
  • 0:46 - 0:52
    that Agnes is there responsible for the
    coordination mainly about legal issues and
  • 0:52 - 0:58
    that Okhin - I'll pronounce this well - is
    more responsible at the technical side.
  • 0:58 - 1:05
    He runs as well, I think, a bunch of
    volunteers, or helping you around.
  • 1:05 - 1:08
    Please give them a welcome applause.
    Let the show start!
  • 1:08 - 1:17
    applause
  • 1:17 - 1:20
    Agnes: Hello, here is Okhin, but he has
  • 1:20 - 1:26
    already been introduced, the third person
    from 'La Quadrature du Net', and I am
  • 1:26 - 1:32
    Agnes and I work on legal and political
    issues at 'LaQuadrature' as well. So
  • 1:32 - 1:38
    LaQuadrature is an organization that
    fights for fundamental rights and freedoms
  • 1:38 - 1:44
    in the digital area. We are here today to
    talk about the danger lying above your
  • 1:44 - 1:50
    jobs, especially if you're building or
    maintaining cryptographic tools. We're
  • 1:50 - 1:56
    here because we think it's important to
    demonstrate that the worst authoritarian
  • 1:56 - 2:06
    laws don't only come from far right
    governments such as Hungaria or Poland,
  • 2:06 - 2:10
    but mostly from the "social democracy
    compatible with market economy", to quote
  • 2:10 - 2:19
    Angela Merkel. Along with Germany and the
    United Kingdom (but with Brexit, exit the
  • 2:19 - 2:26
    UK), France is one of the biggest forces
    within the EU. And if France can rally at
  • 2:26 - 2:31
    least one of the two others on board it
    can obtain what it wants from its European
  • 2:31 - 2:40
    partners. It works both ways, of course!
    But it's important because the problem
  • 2:40 - 2:44
    with that: France is not only exporting
    its knowledge and practice of law
  • 2:44 - 2:51
    enforcement and anti-riot gear to various
    governments such as Tunisia or others.
  • 2:51 - 3:00
    France is now also shining for its anti-
    privacy lobbying as you will see later.
  • 3:00 - 3:12
    sound issues on Okhin's microphone
  • 3:12 - 3:15
    Okhin: What is interesting here is to
    think about what we can do as technicians,
  • 3:15 - 3:21
    developers, sysadmins, sysops,
    or legal persons
  • 3:21 - 3:26
    specialised in technology issues.
    Because the threats come from legal,
  • 3:26 - 3:32
    political and technical area and endanger
    not only us but also sex workers, abused
  • 3:32 - 3:37
    women and abused people, who
    need to flee their home etc.
  • 3:37 - 3:40
    We have to think about our role
    and to find ways to act, to fight
  • 3:40 - 3:44
    against the threats against encryption.
  • 3:44 - 3:51
    We're going to start with a quick but
    sadly non-exhaustive history of laws
  • 3:51 - 3:55
    trying to weaken or circumvent
    cryptography in France one way or another.
  • 3:55 - 4:02
    We are including here everything that
    talks about spyware and keyloggers,
  • 4:02 - 4:06
    because they're a direct threat against
    a lot of cryptographic tools.
  • 4:06 - 4:14
    Agnes: Okay, so let's be clear here, we
    are only to talk about very specific
  • 4:14 - 4:20
    aspects of the digital related law. Access
    to the Internet, filtering, censorship can
  • 4:20 - 4:25
    probably be discussed in other talks with
    the same quantity of laws hindering those
  • 4:25 - 4:33
    rights. But we will focus here on
    cryptography only. Before 1998 use of
  • 4:33 - 4:38
    cryptographic tools for the public was
    essentially forbidden. The key length was
  • 4:38 - 4:47
    limited to 128 bits for asymmetric
    cryptography. There were authentication
  • 4:47 - 4:56
    of communication or for ensuring integrity
    of the message a prior declaration
  • 4:56 - 4:59
    was necessary. For all
    other uses, especially
  • 4:59 - 5:02
    for confidentiality, ex ante authorization
    from Prime Minister was required as well.
  • 5:02 - 5:11
    Okhin: After lengthy negotiations with
  • 5:11 - 5:16
    intelligence services cryptography has
    been freed in 1998. But it still
  • 5:16 - 5:20
    required that the system used respects one
    of those three following limitations.
  • 5:20 - 5:23
    The cryptography system cannot be used
    for confidentiality purposes without
  • 5:23 - 5:27
    authorisation. Or the cryptography system
    is operated by a third party owning a
  • 5:27 - 5:32
    master key which the police may have
    access to. Or the user does not need a
  • 5:32 - 5:36
    strong confidentiality and can use a
    standard encryption solution with a key
  • 5:36 - 5:37
    lower than 40 bits.
  • 5:37 - 5:38
    bad sound, subtitles now
    from author's transcript
  • 5:38 - 5:39
    Furthermore: people providing encryption
    tools for confidentiality purposes were
  • 5:39 - 5:40
    required to give the code, decryption
    devices or conventions when law required
  • 5:40 - 5:41
    by them. In 2001 the use of cryptography
    is freed, but still requires that the
  • 5:41 - 5:42
    system used has been first registered at
    the Interior Ministry's office. Now it's
  • 5:42 - 5:43
    one of the ANSSI mission, the French
    National Cybersecurity Agency ANSSI that
  • 5:43 - 5:44
    reports to the Prime Minister. France's
    doctrine toward cryptography has always
  • 5:44 - 6:56
    been dictated by intelligence services and
    the army. They want to collect as much
  • 6:56 - 7:53
    data as possible, multiple times, and to
    have the capability to decrypt every
  • 7:53 - 7:54
    conversation at any given time. This is at
    this condition that they consented to give
  • 7:54 - 7:55
    free access to cryptography for the
    general public. That's why, French law
  • 7:55 - 7:56
    oblige to declare to the ANSSI the supply
    or importation of a cryptology tool.
  • 7:56 - 7:57
    This procedure is an obstacle for the
    deployment of such services in France,
  • 7:57 - 7:58
    mostly because you have to face an
    administrative system which refuses to
  • 7:58 - 7:59
    speak non-French. The delay for the
    transportation (?) is at least one month.
  • 7:59 - 8:00
    For a long time, all administrative
    documents were in French only, ANSSI
  • 8:00 - 8:02
    now provides the translation as
    a courtesy, but you're still supposed
  • 8:02 - 8:04
    to fill the forms in French. You're
    supposed to provide your source code, but
  • 8:04 - 8:05
    since you all develop open software, this
    is fine, isn't it? And of course, you have
  • 8:05 - 8:06
    to send it by regular snail mail, there's
    no electronic version of it, in triplicate,
  • 8:06 - 8:07
    which is much more expensive, especially
    if you're not in France. Let's say that
  • 8:07 - 8:08
    administrative documents are sometimes
    very complicated for French-speaking
  • 8:08 - 8:09
    people, who are supposed
    to be used to them.
  • 8:09 - 8:10
    Agnes: So..
    Okhin: How enabling foreign people - not
  • 8:10 - 8:11
    French speaking ones - to understand them
    and to correctly fill them?
  • 8:11 - 8:12
    proper sound back again
    Agnes: Since then cryptography legislation
  • 8:12 - 8:14
    has not really evolved. However, one
    national security or counter terrorism law
  • 8:14 - 8:21
    after another - we had something like 30
    of them in the last 15 years - the
  • 8:21 - 8:27
    judiciary and repressive arsenal did grow.
    For example, police were authorized to
  • 8:27 - 8:40
    install keyloggers in the LOPPSI 2 law in
    2011. Then police were authorized to force
  • 8:40 - 8:51
    any person or entity they think able
    to decrypt or to analyze every kind of
  • 8:51 - 8:58
    encrypted content they get their hands on
    in the counter-terrorism law of 2014, and
  • 8:58 - 9:07
    the army and intelligence agency of course
    can help to do those crypto analysis
  • 9:07 - 9:34
    if needed.
    bad sound, again from author transcript now
  • 9:34 - 10:05
    Okhin: And now the so-called "Black boxes"
    entered the game in the Surveillance Law
  • 10:05 - 10:08
    of 2015. Those are algorithms collecting
    and analysing metadata in order to catch
  • 10:08 - 10:10
    terrorists. We know they are made by
    Palantir and we had the confirmation on
  • 10:10 - 10:12
    November of their deployment.
    The fun fact: the internal intelligence
  • 10:12 - 10:14
    service signed the agreement with Palantir
    but the military intelligence and foreign
  • 10:14 - 10:17
    intelligence services are quite concerned
    about it, because they would rather maintain a
  • 10:17 - 10:18
    strategic autonomy.
  • 10:18 - 10:19
    In the same law, the use
    of IMSI Catchers is granted to cops
  • 10:19 - 10:20
    and they can install spyware on your
    terminal without prior validation of a
  • 10:20 - 10:21
    judge. IMSI Catchers and spywares may be
    used to gather any information that may
  • 10:21 - 10:24
    help protect vague interests, such as the
    "industrial and economic well being" of
  • 10:24 - 10:30
    France or the prevention of undeclared
    protests. recording audio back to quality
  • 10:30 - 10:33
    Thanks to the state of emergency since
    2015 and now made permanent in last
  • 10:33 - 10:35
    October, search warrants may now be
    delivered on mere rumour and suspicions,
  • 10:35 - 10:36
    after the fact, without any investigations.
    They allow for collection of any data found
  • 10:36 - 10:37
    on site. And data is kept during three
    months, but if they are encrypted the judge
  • 10:37 - 10:39
    can decide to retain them indefinitely
    until they decrypt them.
  • 10:39 - 10:41
    And without any investigative power.
  • 10:41 - 10:43
    Agnes: So to conclude this
    depressive state of affairs
  • 10:43 - 10:48
    we need to add that cryptography
    is an aggravating circumstance
  • 10:48 - 10:57
    in a long list of crimes
    and felonies linked
  • 10:57 - 11:02
    primarily to organized crime and terroism,
    but also conveniently to aiding refugees
  • 11:02 - 11:04
    for example. So encrypting things makes
    you even more suspect and more guilty.
  • 11:04 - 11:07
    Okhin: Oh and we almost forgot - if ever
    you're operating a cryptographic system
  • 11:07 - 11:11
    for third parties you have an obligation
    to provide either decryption key or plain
  • 11:11 - 11:15
    text to cops if they ask for it and
    you have 72 hours to comply
  • 11:15 - 11:20
    - which means a lot of pressure
    on you. It probably can
  • 11:20 - 11:24
    apply to yourself if you're being
    investigated upon, but it might clash with
  • 11:24 - 11:27
    the right to remain silent and to not
    self-incriminate we do not have a lot of
  • 11:27 - 11:36
    choice here. But we recently had cases
    where cops.., where the law has been used
  • 11:36 - 11:40
    one of them was to coerce a teenager to
    provide decryption key for an encrypted
  • 11:40 - 11:44
    chat with OTR he was operating and which
    had been used by people who were making
  • 11:44 - 11:55
    fake bomb alert in schools. And for one we
    know about, how many of them have gone
  • 11:55 - 12:00
    unnoticed, people chosing to keep living
    their lives instead of risking jails time
  • 12:00 - 12:04
    and huge fines ?
    Agnes: So here it's important to note that
  • 12:04 - 12:10
    there's difference being made between
    cryptography which enforces security
  • 12:10 - 12:16
    communication and cryptography which
    enforces confidentiality. In this
  • 12:16 - 12:20
    presentation we're addressing the issue of
    cryptography in the concept context of
  • 12:20 - 12:27
    confidentiality only. To illustrate that
    this debate goes beyond the classic lines
  • 12:27 - 12:33
    of left/right politics we like to display
    some quotes on the topic by various
  • 12:33 - 12:40
    ministers, candidates, elected
    representatives and prominent political
  • 12:40 - 12:47
    speakers. For example, Éric Ciotti, he is
    a member of parliament from the right-
  • 12:47 - 12:57
    wing. He wants to fine Apple 1.5 million
    euro, if they refuse to give encryption
  • 12:57 - 13:02
    keys, among other outrageous things he
    said, this is one taking hold.
  • 13:02 - 13:08
    Okhin: François Molins, Paris Prosecutor,
    wrote about that in the New York Times
  • 13:08 - 13:12
    against cryptography. The title is quite
    explicit it states: "When Phone Encryption
  • 13:12 - 13:20
    Blocks Justice" And he talks about the
    importance of privacy rights of the
  • 13:20 - 13:24
    individual in the same paragraph of the
    "marginal benefits of full disk
  • 13:24 - 13:29
    encryption". He signed this bullshit with
    his colleague Cyrus Vance Jr, District
  • 13:29 - 13:33
    Attorney of Manhattan, Adrian Leppard,
    commissioner of London City Police and
  • 13:33 - 13:38
    Javier Zaragoza, chief prosecutor of the
    national court of Spain. I let you read
  • 13:38 - 13:46
    the full quote in all its splendor.
    Agnes: So we have also Guillaume Poupard
  • 13:46 - 13:53
    from the ANSSI we talked about before. He
    said just before the Bataclan attack in
  • 13:53 - 14:00
    2015 that backdoors and key sequestrations
    is a bad idea and that he instead proposes
  • 14:00 - 14:07
    to work on "points of cleartext". Whatever
    it means it probably stands for transport
  • 14:07 - 14:10
    security and against confidentiality of
    communications.
  • 14:10 - 14:15
    Okhin: Emmanuel Valls, then Prime
    Minister, used the term "legal
  • 14:15 - 14:19
    cryptography" in interviews where the
    official discourse for the last 20 years
  • 14:19 - 14:28
    was that all cryptography was legal.
    Agnes: Here the digital national council,
  • 14:28 - 14:35
    then chaired by Mounir Mahjoubi, who is
    now Secretary of State for digital issues,
  • 14:35 - 14:40
    did oppose the ideas of backdoors and did
    advocate for the use and development of
  • 14:40 - 14:44
    end-to-end encryption just before the
    presidential electoral race - you'll see
  • 14:44 - 14:48
    later why it's important.
    Okhin: Bernard Debré, another elected
  • 14:48 - 14:54
    representative from the right wing he
    actually ordered drugs online, cocaine for
  • 14:54 - 15:01
    80 euros a gram on onion-services to prove
    how dangerous it is. He also said you can
  • 15:01 - 15:05
    buy body parts and guns there and that
    it's easier than ordering shoes online. He
  • 15:05 - 15:10
    also bought a lot of drugs from a non-
    identified website in Netherlands, so
  • 15:10 - 15:18
    surely the encryption is at fault here.
    Agnes: So Jean-Jacques Urvoas who was
  • 15:18 - 15:25
    Minister of Justice said he wants to
    access computers, Skype communications and
  • 15:25 - 15:35
    so on and to put all suspects and their
    entourage under permanent recording.
  • 15:35 - 15:41
    Between the first and second turn of the
    last presidential elections he broke the
  • 15:41 - 15:47
    professional secret and sent to Thierry
    Solère who is a member of parliament from
  • 15:47 - 15:53
    the white ring the information that he was
    investigated upon. He sent a message by
  • 15:53 - 16:00
    Telegram and the note was saved on Thierry
    Solère's phone and found during a police
  • 16:00 - 16:07
    search at his house later on.
    Okhin: In August 2016 there was a joint
  • 16:07 - 16:11
    declaration of Thomas de Maizière and
    Bernard Cazeneuve, interior ministers of
  • 16:11 - 16:17
    Germany and France respectively about
    European internal security and they stated
  • 16:17 - 16:21
    that: "At the european level, it will
    require to force the non cooperatives
  • 16:21 - 16:25
    operators to remove illegal content or to
    decrypt messages during investigation."
  • 16:25 - 16:32
    Agnes: However, so it was a joint
    communication but French written version
  • 16:32 - 16:39
    of the joint declaration was different
    than Germans. Only France kept the part
  • 16:39 - 16:44
    about how it would be so great to have
    back doors or golden keys. So either
  • 16:44 - 16:50
    Germany did not want to publicly advocate
    for backdoors or they had a different
  • 16:50 - 16:56
    strategy, but unfortunately very recently
    the same de Maizière announced that he
  • 16:56 - 17:01
    wanted to force tech and car companies to
    provide the security services with hidden
  • 17:01 - 17:07
    digital access to all devices and
    machines. He probably did not know that if
  • 17:07 - 17:11
    you lowered the security of cars you
    dramatically increase the risk of accident
  • 17:11 - 17:15
    among others.
    Okhin: All this was before Macron was
  • 17:15 - 17:23
    elected last spring. It's like an actual
    photo. It's not a Photoshop. During his
  • 17:23 - 17:28
    presidential campaign Emmanuel Macron said
    that we should put an end to cryptography
  • 17:28 - 17:32
    by forcing the biggest companies to
    provide encryption keys or to give access
  • 17:32 - 17:38
    to the complete content stating that "one
    day they'll have to be responsible of
  • 17:38 - 17:46
    terror attacks complicity".
    Agnes: So Mounir Mahjoubi again. He was
  • 17:46 - 17:54
    then concealing the candidate and he is
    now internet minister. He has been forced
  • 17:54 - 17:59
    to backpedal and to explain that messing
    with end-to-end cryptography was out of
  • 17:59 - 18:04
    question and that they'd rather force
    companies to cooperate faster with police
  • 18:04 - 18:10
    forces. He specifically emphasized the
    importance of cryptography by companies to
  • 18:10 - 18:17
    protect trade and industrial secrets and
    since then Mounir Mahjoubi has become
  • 18:17 - 18:25
    totally silent on this topic. So it seems
    that encryption for confidentiality is a
  • 18:25 - 18:30
    real problem for them. Would you be
    surprised to know that to communicate with
  • 18:30 - 18:35
    his political party and representatives
    Emmanuel Macron, now president, uses
  • 18:35 - 18:41
    telegram? An application regularly
    described by a lot of representatives as
  • 18:41 - 18:48
    an enabling terrorism tool and which
    should be banned. Their words, not ours.
  • 18:48 - 18:53
    Animal Farm is back: We are all equal with
    the use of cryptography, but some are more
  • 18:53 - 18:59
    equal than the others. Coupled with this
    focus on protecting companies' secrets
  • 18:59 - 19:03
    this confirms that the Start Up Nation
    doesn't care about protecting citizens but
  • 19:03 - 19:09
    only about business and powerful friends.
    This becomes blatantly obvious when you
  • 19:09 - 19:12
    look at Macron's social and economy's
    policies.
  • 19:12 - 19:17
    Okhin: Last but not least, successive
    French government put pressure to add in
  • 19:17 - 19:21
    the law possibility for cops to ask you
    for all of your online handles, including
  • 19:21 - 19:26
    that all Yahoo mailboxes, ICQ numbers,
    your Twitter or Facebook account, all the
  • 19:26 - 19:31
    weird nicknames you use on IRC and stuff
    like that. That's why mine is currently a
  • 19:31 - 19:35
    fork-bomb embedded into a shellshock, but
    I think we can get more creative and find
  • 19:35 - 19:39
    a way to be more destructive for a system
    when cops would have to enter it into
  • 19:39 - 19:46
    their systems. Two attempts have been made
    already and rejected at some point. This
  • 19:46 - 19:51
    kind of registration already exist in the
    UK in the US and we hope the government
  • 19:51 - 19:54
    won't succeed in France to put this kind
    of limitation in law.
  • 19:54 - 20:01
    Agnes: So, as demonstrated France is one
    of the very active power against
  • 20:01 - 20:05
    cryptography within the EU. Even if some
    of other member states did express some
  • 20:05 - 20:13
    concerns namely Poland, Croatia, Hungary,
    Italy, Latvia, and other countries, those
  • 20:13 - 20:18
    concerns have been prompted by other
    member states and probably France. Each
  • 20:18 - 20:24
    new bill is a risk to reduce the use of
    cryptography especially with the criminal,
  • 20:24 - 20:31
    digital or judiciary laws that are coming
    soon. For instance France is pushing hard
  • 20:31 - 20:38
    for avoiding any obligation on end-to-end
    encryption in the ePrivacy regulation.
  • 20:38 - 20:45
    They explicitly ask to gain access to any
    communication or metadata, which is what
  • 20:45 - 20:51
    is written here in French. Sorry, we
    didn't translate it. The government also
  • 20:51 - 20:58
    pushes to obtain EU legislation on
    encryption which would limit end to end
  • 20:58 - 21:04
    encryption, of course. The government
    intends then to use this EU legislation
  • 21:04 - 21:12
    for justifying its position while it did
    create this proposal at the first place.
  • 21:12 - 21:21
    In the next month the discussions
    eEvidence will start at the EU level. They
  • 21:21 - 21:27
    will probably be a lot of talks about
    cryptography in the next "counter-
  • 21:27 - 21:32
    terrorist package" expected in 2018.
    Counterterrorism is always a good way for
  • 21:32 - 21:38
    the governments to make some provisions to
    enhance security and to lower the rights
  • 21:38 - 21:43
    and freedoms. They threaten the Parliament
    to be responsible of the next attacks and
  • 21:43 - 21:48
    the members of parliament thus vote
    anything just because they don't want to
  • 21:48 - 21:54
    be responsible.
    Okhin: So as technician, what can we do?
  • 21:54 - 21:59
    From a technical perspective we think we
    should operate communication
  • 21:59 - 22:04
    infrastructure and systems in an illegal
    and clandestine way. It is important to
  • 22:04 - 22:07
    build undetectable and encrypted
    communication systems that break the link
  • 22:07 - 22:11
    between your online communications and
    yourself. Making those tools available to
  • 22:11 - 22:16
    the general public and mass adopted by
    them is a critical and non trivial issue
  • 22:16 - 22:20
    to address. Especially as French legal
    registration system might block access to
  • 22:20 - 22:25
    high-quality privacy preserving encryption
    tools. For instance, Apple requires you to
  • 22:25 - 22:29
    fill the ANSSI form and obtain a
    certificate from them to put your software
  • 22:29 - 22:35
    on the Apple App Store already.
    Moreover it is paramount to think wider,
  • 22:35 - 22:39
    because if your encrypted communication
    relies on centralized infrastructure at a
  • 22:39 - 22:45
    highly identifying piece of information
    such as for instance a phone number, then
  • 22:45 - 22:50
    a passive listener such as an IMSI catcher
    can get your phone number from a protest
  • 22:50 - 22:55
    you were at for instance and then guess
    what your account is and then, they got
  • 22:55 - 22:59
    your phone number, so they can ask to
    deploy key loggers and spyware on your
  • 22:59 - 23:09
    phones. And this defeating all the
    security based on your phone number. At a
  • 23:09 - 23:12
    time where more and more governments want
    to hinder encryption and secret of
  • 23:12 - 23:16
    communications, it is critical to have
    access to communication systems that are
  • 23:16 - 23:19
    free, pseudonymous, decentralised and
    distributed to the widest audience
  • 23:19 - 23:24
    possible, meaning user-friendly, yes, and
    to think about way to push those tools
  • 23:24 - 23:31
    everywhere. It is also important to lead
    political battles. We need all available
  • 23:31 - 23:35
    help to slow down this attack at the
    national and European levels. We need to
  • 23:35 - 23:40
    get out of the security discourses and to
    break the link between encryption and
  • 23:40 - 23:45
    security for the state and to control the
    argument that only people committing
  • 23:45 - 23:49
    crimes and felonies do use cryptography.
    We need a positive discourse about
  • 23:49 - 23:53
    cryptography: how it helps people with
    their daily lives, how it impr
  • 23:53 - 23:57
    oves social structures, how it protects
    the identity of queers, how it helps
  • 23:57 - 24:01
    abused women to seek help and to escape
    their home, how it enables a positive
  • 24:01 - 24:06
    change in the society, as main change
    often comes from activities not approved
  • 24:06 - 24:11
    by the society. If you want more concrete
    steps and ways to help we're currently
  • 24:11 - 24:16
    running a support campaign so you can help
    us there at support.laquadrature.net.
  • 24:16 - 24:22
    After the Q&A, because we have some time
    left, you can come drink some tea at the
  • 24:22 - 24:28
    teahouse in the CCL building and have some
    tea and chat with us. Thank you all for
  • 24:28 - 24:34
    listening and if you have any question I
    think we have some time.
  • 24:34 - 24:41
    applause
    Herald Angel: Alright we have 5 minutes
  • 24:41 - 24:50
    for questions. Are there people out there,
    maybe on the internet? No, are there some
  • 24:50 - 24:56
    people here who have questions for this
    lovely organization? Well I have a
  • 24:56 - 25:02
    question actually: So you gave us some
    advice regarding using avatars, alter
  • 25:02 - 25:09
    egos. You know what, I'm teaching as well
    and my colleagues teachers even in that
  • 25:09 - 25:13
    kind of digital age that we live in are
    always wondering why I am using several
  • 25:13 - 25:21
    avatars, several devices. It seems like
    it's not accepted actually because they're
  • 25:21 - 25:27
    looking at you like "Are you a criminal or
    what? What did you do wrong?" Don't you
  • 25:27 - 25:29
    get that kind of questions as well from
    your audience?
  • 25:29 - 25:35
    Ohkin: Yes, we got that a lot. The thing
    is, a lot of people commit crimes using
  • 25:35 - 25:40
    their real name and IDs and stuff like
    that. Most of the people are asking people
  • 25:40 - 25:43
    online, for instance, to not use a
    pseudonymous account or something like
  • 25:43 - 25:47
    that, they want to be known as our same
    people and stuff like that. So it's like
  • 25:47 - 25:51
    we need to get out of this kind of
    discourse and say: "I can do whatever I
  • 25:51 - 25:55
    want with my online identities. It's not
    your business. And if I'm doing something
  • 25:55 - 26:00
    wrong, you have to prove it, like with due
    process of law and stuff like that.
  • 26:00 - 26:05
    Herald: Ok, I see there's a question
    raised in here. Microphone number two.
  • 26:05 - 26:10
    Mic2: What counts in practice as import
    and export of cryptography. I mean, if I'm
  • 26:10 - 26:16
    in France and I download open SSL, do I
    have to fill out the ANSSI form?
  • 26:16 - 26:26
    Okhin: Not for open SSL, because it's not
    protocol that have a goal to provide
  • 26:26 - 26:29
    confidentiality of communication which is
    end-to-end encryption.
  • 26:29 - 26:35
    Mic2: So GPG?
    Okhin: Yeah, GPG is supposed to have an
  • 26:35 - 26:37
    important certificate and I think they
    have it.
  • 26:37 - 26:40
    Mic2: For individuals or for
    organizations?
  • 26:40 - 26:44
    Okhin: For the organization which provides
    you the access to the tool. Like Google is
  • 26:44 - 26:51
    supposed to provide that, Apple,
    Microsoft, Debian. Debian I think filled
  • 26:51 - 27:00
    the paperwork. Each Linux distribution
    should do it.
  • 27:00 - 27:04
    Herald: Question here, microphone number
    one?
  • 27:04 - 27:08
    Mic1: Okay, thanks so much for the talk.
    I'd really love to hear a little bit more
  • 27:08 - 27:14
    about the very crunchy in-depth bits about
    encryption policy in France. Now might not
  • 27:14 - 27:21
    be the right time, but building off of the
    last question: What kinds of laws or
  • 27:21 - 27:25
    policy are around taking encryption
    technology outside of France, like across
  • 27:25 - 27:30
    a border?
    Agnes: Well for exporting to closed
  • 27:30 - 27:37
    encryption technology there is the
    Wassenaar Arrangement signed by several
  • 27:37 - 27:56
    countries, so I don't know by heart
    everything in there, but for example a
  • 27:56 - 28:08
    system that can use for war and for other
    use. Then you have it's forbidden or you
  • 28:08 - 28:12
    have to declare that you're exporting such
    tools etc. So for exporting you have this
  • 28:12 - 28:24
    Wassenaar agreement and I think there is
    nothing else if it's not a double use
  • 28:24 - 28:26
    system.
    Mic2: Thank you!
  • 28:26 - 28:30
    Herald: Okay, one last question, please
    there, mister three.
  • 28:30 - 28:35
    Mic3: It seems to me that all of these
    laws are mostly falling under national
  • 28:35 - 28:40
    security. Are there any laws way to
    challenge any of this in the European
  • 28:40 - 28:44
    level? So on the European level there's
    wonderful direct data protection
  • 28:44 - 28:48
    directives and all the stuff. But my
    understanding is that all of these
  • 28:48 - 28:54
    directives any state can kind of opt out
    of them for national security reasons. So
  • 28:54 - 28:59
    is there anything that can be done on any
    level without invoking a national security
  • 28:59 - 29:05
    exception?
    Agnes: Yeah well all data protection
  • 29:05 - 29:11
    regulation policies at the EU level and
    especially the GDPR, general data
  • 29:11 - 29:19
    protection regulation, has a specific
    provision that enable member states to
  • 29:19 - 29:28
    say: okay, it doesn't apply because it's a
    national security issue. What I said, what
  • 29:28 - 29:35
    I showed here, is that in in the ePrivacy
    regulation, which is currently under
  • 29:35 - 29:45
    negotiation at the EU level, the EU
    Parliament has already adopted a position
  • 29:45 - 29:52
    which promotes encryption as soon as it's
    possible to have end-to-end encryption.
  • 29:52 - 29:57
    And that's why the French government is
    trying to push it away, there will be
  • 29:57 - 30:03
    negotiation between the Council, the
    European Parliament and the European
  • 30:03 - 30:07
    Commission. The Council represents all
    member states, so there will be a
  • 30:07 - 30:13
    negotiation with all the institutions,
    beginning this summer probably. Or just
  • 30:13 - 30:20
    after the summer, but maybe a little bit
    before. And then the French government is
  • 30:20 - 30:31
    going to try to push it away. As we saw
    in the document which we showed in
  • 30:31 - 30:39
    French, the government is trying to get to
    gain access to all communications and
  • 30:39 - 30:43
    data. It's very clear in the French
    communication we showed.
  • 30:43 - 30:48
    Herald: May I make a suggestion?
    They have a fantastic tea house.
  • 30:48 - 30:52
    You have to continue this discussion
    later on there with a cup of tea,
  • 30:52 - 30:57
    and some massage maybe. I have
    one last call for you both, you know,
  • 30:57 - 31:00
    and the audience: « Indignez-vous ! »
    [i.e.“Time for Outrage!”]
  • 31:00 - 31:05
    Ca, c'est! That's why we wanna hear you! (?)
    Indignez-vous !
  • 31:05 - 31:10
    applause
  • 31:10 - 31:23
    postroll music
  • 31:23 - 31:31
    Subtitles created by c3subtitles.de
    in the year 2018
Title:
34C3 - WTFrance
Description:

more » « less
Video Language:
English
Duration:
31:31
Schnapspraline edited English subtitles for 34C3 - WTFrance
Schnapspraline edited English subtitles for 34C3 - WTFrance
NosCandidats @34C3 #Datalove edited English subtitles for 34C3 - WTFrance
Schnapspraline edited English subtitles for 34C3 - WTFrance
Schnapspraline edited English subtitles for 34C3 - WTFrance
Schnapspraline edited English subtitles for 34C3 - WTFrance
Maximilian Marx edited English subtitles for 34C3 - WTFrance
Maximilian Marx edited English subtitles for 34C3 - WTFrance
Show all

English subtitles

Revisions