34C3 preroll music Herald Angel: Good. I have the pleasure and the honor of introducing to you two persons here who are really working at 'La QuadratureDuNet'. Alors, c'est vraiment quelque chose en Français ! It's an organization NGO, it's actually working really on the rights, on freedom of citizens on the internet. I understood that Agnes is there responsible for the coordination mainly about legal issues and that Okhin - I'll pronounce this well - is more responsible at the technical side. He runs as well, I think, a bunch of volunteers, or helping you around. Please give them a welcome applause. Let the show start! applause Agnes: Hello, here is Okhin, but he has already been introduced, the third person from 'La Quadrature du Net', and I am Agnes and I work on legal and political issues at 'LaQuadrature' as well. So LaQuadrature is an organization that fights for fundamental rights and freedoms in the digital area. We are here today to talk about the danger lying above your jobs, especially if you're building or maintaining cryptographic tools. We're here because we think it's important to demonstrate that the worst authoritarian laws don't only come from far right governments such as Hungaria or Poland, but mostly from the "social democracy compatible with market economy", to quote Angela Merkel. Along with Germany and the United Kingdom (but with Brexit, exit the UK), France is one of the biggest forces within the EU. And if France can rally at least one of the two others on board it can obtain what it wants from its European partners. It works both ways, of course! But it's important because the problem with that: France is not only exporting its knowledge and practice of law enforcement and anti-riot gear to various governments such as Tunisia or others. France is now also shining for its anti- privacy lobbying as you will see later. sound issues on Okhin's microphone Okhin: What is interesting here is to think about what we can do as technicians, developers, sysadmins, sysops, or legal persons specialised in technology issues. Because the threats come from legal, political and technical area and endanger not only us but also sex workers, abused women and abused people, who need to flee their home etc. We have to think about our role and to find ways to act, to fight against the threats against encryption. We're going to start with a quick but sadly non-exhaustive history of laws trying to weaken or circumvent cryptography in France one way or another. We are including here everything that talks about spyware and keyloggers, because they're a direct threat against a lot of cryptographic tools. Agnes: Okay, so let's be clear here, we are only to talk about very specific aspects of the digital related law. Access to the Internet, filtering, censorship can probably be discussed in other talks with the same quantity of laws hindering those rights. But we will focus here on cryptography only. Before 1998 use of cryptographic tools for the public was essentially forbidden. The key length was limited to 128 bits for asymmetric cryptography. There were authentication of communication or for ensuring integrity of the message a prior declaration was necessary. For all other uses, especially for confidentiality, ex ante authorization from Prime Minister was required as well. Okhin: After lengthy negotiations with intelligence services cryptography has been freed in 1998. But it still required that the system used respects one of those three following limitations. The cryptography system cannot be used for confidentiality purposes without authorisation. Or the cryptography system is operated by a third party owning a master key which the police may have access to. Or the user does not need a strong confidentiality and can use a standard encryption solution with a key lower than 40 bits. bad sound, subtitles now from author's transcript Furthermore: people providing encryption tools for confidentiality purposes were required to give the code, decryption devices or conventions when law required by them. In 2001 the use of cryptography is freed, but still requires that the system used has been first registered at the Interior Ministry's office. Now it's one of the ANSSI mission, the French National Cybersecurity Agency ANSSI that reports to the Prime Minister. France's doctrine toward cryptography has always been dictated by intelligence services and the army. They want to collect as much data as possible, multiple times, and to have the capability to decrypt every conversation at any given time. This is at this condition that they consented to give free access to cryptography for the general public. That's why, French law oblige to declare to the ANSSI the supply or importation of a cryptology tool. This procedure is an obstacle for the deployment of such services in France, mostly because you have to face an administrative system which refuses to speak non-French. The delay for the transportation (?) is at least one month. For a long time, all administrative documents were in French only, ANSSI now provides the translation as a courtesy, but you're still supposed to fill the forms in French. You're supposed to provide your source code, but since you all develop open software, this is fine, isn't it? And of course, you have to send it by regular snail mail, there's no electronic version of it, in triplicate, which is much more expensive, especially if you're not in France. Let's say that administrative documents are sometimes very complicated for French-speaking people, who are supposed to be used to them. Agnes: So.. Okhin: How enabling foreign people - not French speaking ones - to understand them and to correctly fill them? proper sound back again Agnes: Since then cryptography legislation has not really evolved. However, one national security or counter terrorism law after another - we had something like 30 of them in the last 15 years - the judiciary and repressive arsenal did grow. For example, police were authorized to install keyloggers in the LOPPSI 2 law in 2011. Then police were authorized to force any person or entity they think able to decrypt or to analyze every kind of encrypted content they get their hands on in the counter-terrorism law of 2014, and the army and intelligence agency of course can help to do those crypto analysis if needed. bad sound, again from author transcript now Okhin: And now the so-called "Black boxes" entered the game in the Surveillance Law of 2015. Those are algorithms collecting and analysing metadata in order to catch terrorists. We know they are made by Palantir and we had the confirmation on November of their deployment. The fun fact: the internal intelligence service signed the agreement with Palantir but the military intelligence and foreign intelligence services are quite concerned about it, because they would rather maintain a strategic autonomy. In the same law, the use of IMSI Catchers is granted to cops and they can install spyware on your terminal without prior validation of a judge. IMSI Catchers and spywares may be used to gather any information that may help protect vague interests, such as the "industrial and economic well being" of France or the prevention of undeclared protests. recording audio back to quality Thanks to the state of emergency since 2015 and now made permanent in last October, search warrants may now be delivered on mere rumour and suspicions, after the fact, without any investigations. They allow for collection of any data found on site. And data is kept during three months, but if they are encrypted the judge can decide to retain them indefinitely until they decrypt them. And without any investigative power. Agnes: So to conclude this depressive state of affairs we need to add that cryptography is an aggravating circumstance in a long list of crimes and felonies linked primarily to organized crime and terroism, but also conveniently to aiding refugees for example. So encrypting things makes you even more suspect and more guilty. Okhin: Oh and we almost forgot - if ever you're operating a cryptographic system for third parties you have an obligation to provide either decryption key or plain text to cops if they ask for it and you have 72 hours to comply - which means a lot of pressure on you. It probably can apply to yourself if you're being investigated upon, but it might clash with the right to remain silent and to not self-incriminate we do not have a lot of choice here. But we recently had cases where cops.., where the law has been used one of them was to coerce a teenager to provide decryption key for an encrypted chat with OTR he was operating and which had been used by people who were making fake bomb alert in schools. And for one we know about, how many of them have gone unnoticed, people chosing to keep living their lives instead of risking jails time and huge fines ? Agnes: So here it's important to note that there's difference being made between cryptography which enforces security communication and cryptography which enforces confidentiality. In this presentation we're addressing the issue of cryptography in the concept context of confidentiality only. To illustrate that this debate goes beyond the classic lines of left/right politics we like to display some quotes on the topic by various ministers, candidates, elected representatives and prominent political speakers. For example, Éric Ciotti, he is a member of parliament from the right- wing. He wants to fine Apple 1.5 million euro, if they refuse to give encryption keys, among other outrageous things he said, this is one taking hold. Okhin: François Molins, Paris Prosecutor, wrote about that in the New York Times against cryptography. The title is quite explicit it states: "When Phone Encryption Blocks Justice" And he talks about the importance of privacy rights of the individual in the same paragraph of the "marginal benefits of full disk encryption". He signed this bullshit with his colleague Cyrus Vance Jr, District Attorney of Manhattan, Adrian Leppard, commissioner of London City Police and Javier Zaragoza, chief prosecutor of the national court of Spain. I let you read the full quote in all its splendor. Agnes: So we have also Guillaume Poupard from the ANSSI we talked about before. He said just before the Bataclan attack in 2015 that backdoors and key sequestrations is a bad idea and that he instead proposes to work on "points of cleartext". Whatever it means it probably stands for transport security and against confidentiality of communications. Okhin: Emmanuel Valls, then Prime Minister, used the term "legal cryptography" in interviews where the official discourse for the last 20 years was that all cryptography was legal. Agnes: Here the digital national council, then chaired by Mounir Mahjoubi, who is now Secretary of State for digital issues, did oppose the ideas of backdoors and did advocate for the use and development of end-to-end encryption just before the presidential electoral race - you'll see later why it's important. Okhin: Bernard Debré, another elected representative from the right wing he actually ordered drugs online, cocaine for 80 euros a gram on onion-services to prove how dangerous it is. He also said you can buy body parts and guns there and that it's easier than ordering shoes online. He also bought a lot of drugs from a non- identified website in Netherlands, so surely the encryption is at fault here. Agnes: So Jean-Jacques Urvoas who was Minister of Justice said he wants to access computers, Skype communications and so on and to put all suspects and their entourage under permanent recording. Between the first and second turn of the last presidential elections he broke the professional secret and sent to Thierry Solère who is a member of parliament from the white ring the information that he was investigated upon. He sent a message by Telegram and the note was saved on Thierry Solère's phone and found during a police search at his house later on. Okhin: In August 2016 there was a joint declaration of Thomas de Maizière and Bernard Cazeneuve, interior ministers of Germany and France respectively about European internal security and they stated that: "At the european level, it will require to force the non cooperatives operators to remove illegal content or to decrypt messages during investigation." Agnes: However, so it was a joint communication but French written version of the joint declaration was different than Germans. Only France kept the part about how it would be so great to have back doors or golden keys. So either Germany did not want to publicly advocate for backdoors or they had a different strategy, but unfortunately very recently the same de Maizière announced that he wanted to force tech and car companies to provide the security services with hidden digital access to all devices and machines. He probably did not know that if you lowered the security of cars you dramatically increase the risk of accident among others. Okhin: All this was before Macron was elected last spring. It's like an actual photo. It's not a Photoshop. During his presidential campaign Emmanuel Macron said that we should put an end to cryptography by forcing the biggest companies to provide encryption keys or to give access to the complete content stating that "one day they'll have to be responsible of terror attacks complicity". Agnes: So Mounir Mahjoubi again. He was then concealing the candidate and he is now internet minister. He has been forced to backpedal and to explain that messing with end-to-end cryptography was out of question and that they'd rather force companies to cooperate faster with police forces. He specifically emphasized the importance of cryptography by companies to protect trade and industrial secrets and since then Mounir Mahjoubi has become totally silent on this topic. So it seems that encryption for confidentiality is a real problem for them. Would you be surprised to know that to communicate with his political party and representatives Emmanuel Macron, now president, uses telegram? An application regularly described by a lot of representatives as an enabling terrorism tool and which should be banned. Their words, not ours. Animal Farm is back: We are all equal with the use of cryptography, but some are more equal than the others. Coupled with this focus on protecting companies' secrets this confirms that the Start Up Nation doesn't care about protecting citizens but only about business and powerful friends. This becomes blatantly obvious when you look at Macron's social and economy's policies. Okhin: Last but not least, successive French government put pressure to add in the law possibility for cops to ask you for all of your online handles, including that all Yahoo mailboxes, ICQ numbers, your Twitter or Facebook account, all the weird nicknames you use on IRC and stuff like that. That's why mine is currently a fork-bomb embedded into a shellshock, but I think we can get more creative and find a way to be more destructive for a system when cops would have to enter it into their systems. Two attempts have been made already and rejected at some point. This kind of registration already exist in the UK in the US and we hope the government won't succeed in France to put this kind of limitation in law. Agnes: So, as demonstrated France is one of the very active power against cryptography within the EU. Even if some of other member states did express some concerns namely Poland, Croatia, Hungary, Italy, Latvia, and other countries, those concerns have been prompted by other member states and probably France. Each new bill is a risk to reduce the use of cryptography especially with the criminal, digital or judiciary laws that are coming soon. For instance France is pushing hard for avoiding any obligation on end-to-end encryption in the ePrivacy regulation. They explicitly ask to gain access to any communication or metadata, which is what is written here in French. Sorry, we didn't translate it. The government also pushes to obtain EU legislation on encryption which would limit end to end encryption, of course. The government intends then to use this EU legislation for justifying its position while it did create this proposal at the first place. In the next month the discussions eEvidence will start at the EU level. They will probably be a lot of talks about cryptography in the next "counter- terrorist package" expected in 2018. Counterterrorism is always a good way for the governments to make some provisions to enhance security and to lower the rights and freedoms. They threaten the Parliament to be responsible of the next attacks and the members of parliament thus vote anything just because they don't want to be responsible. Okhin: So as technician, what can we do? From a technical perspective we think we should operate communication infrastructure and systems in an illegal and clandestine way. It is important to build undetectable and encrypted communication systems that break the link between your online communications and yourself. Making those tools available to the general public and mass adopted by them is a critical and non trivial issue to address. Especially as French legal registration system might block access to high-quality privacy preserving encryption tools. For instance, Apple requires you to fill the ANSSI form and obtain a certificate from them to put your software on the Apple App Store already. Moreover it is paramount to think wider, because if your encrypted communication relies on centralized infrastructure at a highly identifying piece of information such as for instance a phone number, then a passive listener such as an IMSI catcher can get your phone number from a protest you were at for instance and then guess what your account is and then, they got your phone number, so they can ask to deploy key loggers and spyware on your phones. And this defeating all the security based on your phone number. At a time where more and more governments want to hinder encryption and secret of communications, it is critical to have access to communication systems that are free, pseudonymous, decentralised and distributed to the widest audience possible, meaning user-friendly, yes, and to think about way to push those tools everywhere. It is also important to lead political battles. We need all available help to slow down this attack at the national and European levels. We need to get out of the security discourses and to break the link between encryption and security for the state and to control the argument that only people committing crimes and felonies do use cryptography. We need a positive discourse about cryptography: how it helps people with their daily lives, how it impr oves social structures, how it protects the identity of queers, how it helps abused women to seek help and to escape their home, how it enables a positive change in the society, as main change often comes from activities not approved by the society. If you want more concrete steps and ways to help we're currently running a support campaign so you can help us there at support.laquadrature.net. After the Q&A, because we have some time left, you can come drink some tea at the teahouse in the CCL building and have some tea and chat with us. Thank you all for listening and if you have any question I think we have some time. applause Herald Angel: Alright we have 5 minutes for questions. Are there people out there, maybe on the internet? No, are there some people here who have questions for this lovely organization? Well I have a question actually: So you gave us some advice regarding using avatars, alter egos. You know what, I'm teaching as well and my colleagues teachers even in that kind of digital age that we live in are always wondering why I am using several avatars, several devices. It seems like it's not accepted actually because they're looking at you like "Are you a criminal or what? What did you do wrong?" Don't you get that kind of questions as well from your audience? Ohkin: Yes, we got that a lot. The thing is, a lot of people commit crimes using their real name and IDs and stuff like that. Most of the people are asking people online, for instance, to not use a pseudonymous account or something like that, they want to be known as our same people and stuff like that. So it's like we need to get out of this kind of discourse and say: "I can do whatever I want with my online identities. It's not your business. And if I'm doing something wrong, you have to prove it, like with due process of law and stuff like that. Herald: Ok, I see there's a question raised in here. Microphone number two. Mic2: What counts in practice as import and export of cryptography. I mean, if I'm in France and I download open SSL, do I have to fill out the ANSSI form? Okhin: Not for open SSL, because it's not protocol that have a goal to provide confidentiality of communication which is end-to-end encryption. Mic2: So GPG? Okhin: Yeah, GPG is supposed to have an important certificate and I think they have it. Mic2: For individuals or for organizations? Okhin: For the organization which provides you the access to the tool. Like Google is supposed to provide that, Apple, Microsoft, Debian. Debian I think filled the paperwork. Each Linux distribution should do it. Herald: Question here, microphone number one? Mic1: Okay, thanks so much for the talk. I'd really love to hear a little bit more about the very crunchy in-depth bits about encryption policy in France. Now might not be the right time, but building off of the last question: What kinds of laws or policy are around taking encryption technology outside of France, like across a border? Agnes: Well for exporting to closed encryption technology there is the Wassenaar Arrangement signed by several countries, so I don't know by heart everything in there, but for example a system that can use for war and for other use. Then you have it's forbidden or you have to declare that you're exporting such tools etc. So for exporting you have this Wassenaar agreement and I think there is nothing else if it's not a double use system. Mic2: Thank you! Herald: Okay, one last question, please there, mister three. Mic3: It seems to me that all of these laws are mostly falling under national security. Are there any laws way to challenge any of this in the European level? So on the European level there's wonderful direct data protection directives and all the stuff. But my understanding is that all of these directives any state can kind of opt out of them for national security reasons. So is there anything that can be done on any level without invoking a national security exception? Agnes: Yeah well all data protection regulation policies at the EU level and especially the GDPR, general data protection regulation, has a specific provision that enable member states to say: okay, it doesn't apply because it's a national security issue. What I said, what I showed here, is that in in the ePrivacy regulation, which is currently under negotiation at the EU level, the EU Parliament has already adopted a position which promotes encryption as soon as it's possible to have end-to-end encryption. And that's why the French government is trying to push it away, there will be negotiation between the Council, the European Parliament and the European Commission. The Council represents all member states, so there will be a negotiation with all the institutions, beginning this summer probably. Or just after the summer, but maybe a little bit before. And then the French government is going to try to push it away. As we saw in the document which we showed in French, the government is trying to get to gain access to all communications and data. It's very clear in the French communication we showed. Herald: May I make a suggestion? They have a fantastic tea house. You have to continue this discussion later on there with a cup of tea, and some massage maybe. I have one last call for you both, you know, and the audience: « Indignez-vous ! » [i.e.“Time for Outrage!”] Ca, c'est! That's why we wanna hear you! (?) Indignez-vous ! applause postroll music Subtitles created by c3subtitles.de in the year 2018