-
34C3 preroll music
-
Herald Angel: Good. I have the pleasure
and the honor of introducing to you two
-
persons here who are really working at
'La QuadratureDuNet'. Alors, c'est vraiment
-
quelque chose en Français ! It's an
organization NGO, it's actually working
-
really on the rights, on freedom of
citizens on the internet. I understood
-
that Agnes is there responsible for the
coordination mainly about legal issues and
-
that Okhin - I'll pronounce this well - is
more responsible at the technical side.
-
He runs as well, I think, a bunch of
volunteers, or helping you around.
-
Please give them a welcome applause.
Let the show start!
-
applause
-
Agnes: Hello, here is Okhin, but he has
-
already been introduced, the third person
from 'La Quadrature du Net', and I am
-
Agnes and I work on legal and political
issues at 'LaQuadrature' as well. So
-
LaQuadrature is an organization that
fights for fundamental rights and freedoms
-
in the digital area. We are here today to
talk about the danger lying above your
-
jobs, especially if you're building or
maintaining cryptographic tools. We're
-
here because we think it's important to
demonstrate that the worst authoritarian
-
laws don't only come from far right
governments such as Hungaria or Poland,
-
but mostly from the "social democracy
compatible with market economy", to quote
-
Angela Merkel. Along with Germany and the
United Kingdom (but with Brexit, exit the
-
UK), France is one of the biggest forces
within the EU. And if France can rally at
-
least one of the two others on board it
can obtain what it wants from its European
-
partners. It works both ways, of course!
But it's important because the problem
-
with that: France is not only exporting
its knowledge and practice of law
-
enforcement and anti-riot gear to various
governments such as Tunisia or others.
-
France is now also shining for its anti-
privacy lobbying as you will see later.
-
sound issues on Okhin's microphone
-
Okhin: What is interesting here is to
think about what we can do as technicians,
-
developers, sysadmins, sysops,
or legal persons
-
specialised in technology issues.
Because the threats come from legal,
-
political and technical area and endanger
not only us but also sex workers, abused
-
women and abused people, who
need to flee their home etc.
-
We have to think about our role
and to find ways to act, to fight
-
against the threats against encryption.
-
We're going to start with a quick but
sadly non-exhaustive history of laws
-
trying to weaken or circumvent
cryptography in France one way or another.
-
We are including here everything that
talks about spyware and keyloggers,
-
because they're a direct threat against
a lot of cryptographic tools.
-
Agnes: Okay, so let's be clear here, we
are only to talk about very specific
-
aspects of the digital related law. Access
to the Internet, filtering, censorship can
-
probably be discussed in other talks with
the same quantity of laws hindering those
-
rights. But we will focus here on
cryptography only. Before 1998 use of
-
cryptographic tools for the public was
essentially forbidden. The key length was
-
limited to 128 bits for asymmetric
cryptography. There were authentication
-
of communication or for ensuring integrity
of the message a prior declaration
-
was necessary. For all
other uses, especially
-
for confidentiality, ex ante authorization
from Prime Minister was required as well.
-
Okhin: After lengthy negotiations with
-
intelligence services cryptography has
been freed in 1998. But it still
-
required that the system used respects one
of those three following limitations.
-
The cryptography system cannot be used
for confidentiality purposes without
-
authorisation. Or the cryptography system
is operated by a third party owning a
-
master key which the police may have
access to. Or the user does not need a
-
strong confidentiality and can use a
standard encryption solution with a key
-
lower than 40 bits.
-
bad sound, subtitles now
from author's transcript
-
Furthermore: people providing encryption
tools for confidentiality purposes were
-
required to give the code, decryption
devices or conventions when law required
-
by them. In 2001 the use of cryptography
is freed, but still requires that the
-
system used has been first registered at
the Interior Ministry's office. Now it's
-
one of the ANSSI mission, the French
National Cybersecurity Agency ANSSI that
-
reports to the Prime Minister. France's
doctrine toward cryptography has always
-
been dictated by intelligence services and
the army. They want to collect as much
-
data as possible, multiple times, and to
have the capability to decrypt every
-
conversation at any given time. This is at
this condition that they consented to give
-
free access to cryptography for the
general public. That's why, French law
-
oblige to declare to the ANSSI the supply
or importation of a cryptology tool.
-
This procedure is an obstacle for the
deployment of such services in France,
-
mostly because you have to face an
administrative system which refuses to
-
speak non-French. The delay for the
transportation (?) is at least one month.
-
For a long time, all administrative
documents were in French only, ANSSI
-
now provides the translation as
a courtesy, but you're still supposed
-
to fill the forms in French. You're
supposed to provide your source code, but
-
since you all develop open software, this
is fine, isn't it? And of course, you have
-
to send it by regular snail mail, there's
no electronic version of it, in triplicate,
-
which is much more expensive, especially
if you're not in France. Let's say that
-
administrative documents are sometimes
very complicated for French-speaking
-
people, who are supposed
to be used to them.
-
Agnes: So..
Okhin: How enabling foreign people - not
-
French speaking ones - to understand them
and to correctly fill them?
-
proper sound back again
Agnes: Since then cryptography legislation
-
has not really evolved. However, one
national security or counter terrorism law
-
after another - we had something like 30
of them in the last 15 years - the
-
judiciary and repressive arsenal did grow.
For example, police were authorized to
-
install keyloggers in the LOPPSI 2 law in
2011. Then police were authorized to force
-
any person or entity they think able
to decrypt or to analyze every kind of
-
encrypted content they get their hands on
in the counter-terrorism law of 2014, and
-
the army and intelligence agency of course
can help to do those crypto analysis
-
if needed.
bad sound, again from author transcript now
-
Okhin: And now the so-called "Black boxes"
entered the game in the Surveillance Law
-
of 2015. Those are algorithms collecting
and analysing metadata in order to catch
-
terrorists. We know they are made by
Palantir and we had the confirmation on
-
November of their deployment.
The fun fact: the internal intelligence
-
service signed the agreement with Palantir
but the military intelligence and foreign
-
intelligence services are quite concerned
about it, because they would rather maintain a
-
strategic autonomy.
-
In the same law, the use
of IMSI Catchers is granted to cops
-
and they can install spyware on your
terminal without prior validation of a
-
judge. IMSI Catchers and spywares may be
used to gather any information that may
-
help protect vague interests, such as the
"industrial and economic well being" of
-
France or the prevention of undeclared
protests. recording audio back to quality
-
Thanks to the state of emergency since
2015 and now made permanent in last
-
October, search warrants may now be
delivered on mere rumour and suspicions,
-
after the fact, without any investigations.
They allow for collection of any data found
-
on site. And data is kept during three
months, but if they are encrypted the judge
-
can decide to retain them indefinitely
until they decrypt them.
-
And without any investigative power.
-
Agnes: So to conclude this
depressive state of affairs
-
we need to add that cryptography
is an aggravating circumstance
-
in a long list of crimes
and felonies linked
-
primarily to organized crime and terroism,
but also conveniently to aiding refugees
-
for example. So encrypting things makes
you even more suspect and more guilty.
-
Okhin: Oh and we almost forgot - if ever
you're operating a cryptographic system
-
for third parties you have an obligation
to provide either decryption key or plain
-
text to cops if they ask for it and
you have 72 hours to comply
-
- which means a lot of pressure
on you. It probably can
-
apply to yourself if you're being
investigated upon, but it might clash with
-
the right to remain silent and to not
self-incriminate we do not have a lot of
-
choice here. But we recently had cases
where cops.., where the law has been used
-
one of them was to coerce a teenager to
provide decryption key for an encrypted
-
chat with OTR he was operating and which
had been used by people who were making
-
fake bomb alert in schools. And for one we
know about, how many of them have gone
-
unnoticed, people chosing to keep living
their lives instead of risking jails time
-
and huge fines ?
Agnes: So here it's important to note that
-
there's difference being made between
cryptography which enforces security
-
communication and cryptography which
enforces confidentiality. In this
-
presentation we're addressing the issue of
cryptography in the concept context of
-
confidentiality only. To illustrate that
this debate goes beyond the classic lines
-
of left/right politics we like to display
some quotes on the topic by various
-
ministers, candidates, elected
representatives and prominent political
-
speakers. For example, Éric Ciotti, he is
a member of parliament from the right-
-
wing. He wants to fine Apple 1.5 million
euro, if they refuse to give encryption
-
keys, among other outrageous things he
said, this is one taking hold.
-
Okhin: François Molins, Paris Prosecutor,
wrote about that in the New York Times
-
against cryptography. The title is quite
explicit it states: "When Phone Encryption
-
Blocks Justice" And he talks about the
importance of privacy rights of the
-
individual in the same paragraph of the
"marginal benefits of full disk
-
encryption". He signed this bullshit with
his colleague Cyrus Vance Jr, District
-
Attorney of Manhattan, Adrian Leppard,
commissioner of London City Police and
-
Javier Zaragoza, chief prosecutor of the
national court of Spain. I let you read
-
the full quote in all its splendor.
Agnes: So we have also Guillaume Poupard
-
from the ANSSI we talked about before. He
said just before the Bataclan attack in
-
2015 that backdoors and key sequestrations
is a bad idea and that he instead proposes
-
to work on "points of cleartext". Whatever
it means it probably stands for transport
-
security and against confidentiality of
communications.
-
Okhin: Emmanuel Valls, then Prime
Minister, used the term "legal
-
cryptography" in interviews where the
official discourse for the last 20 years
-
was that all cryptography was legal.
Agnes: Here the digital national council,
-
then chaired by Mounir Mahjoubi, who is
now Secretary of State for digital issues,
-
did oppose the ideas of backdoors and did
advocate for the use and development of
-
end-to-end encryption just before the
presidential electoral race - you'll see
-
later why it's important.
Okhin: Bernard Debré, another elected
-
representative from the right wing he
actually ordered drugs online, cocaine for
-
80 euros a gram on onion-services to prove
how dangerous it is. He also said you can
-
buy body parts and guns there and that
it's easier than ordering shoes online. He
-
also bought a lot of drugs from a non-
identified website in Netherlands, so
-
surely the encryption is at fault here.
Agnes: So Jean-Jacques Urvoas who was
-
Minister of Justice said he wants to
access computers, Skype communications and
-
so on and to put all suspects and their
entourage under permanent recording.
-
Between the first and second turn of the
last presidential elections he broke the
-
professional secret and sent to Thierry
Solère who is a member of parliament from
-
the white ring the information that he was
investigated upon. He sent a message by
-
Telegram and the note was saved on Thierry
Solère's phone and found during a police
-
search at his house later on.
Okhin: In August 2016 there was a joint
-
declaration of Thomas de Maizière and
Bernard Cazeneuve, interior ministers of
-
Germany and France respectively about
European internal security and they stated
-
that: "At the european level, it will
require to force the non cooperatives
-
operators to remove illegal content or to
decrypt messages during investigation."
-
Agnes: However, so it was a joint
communication but French written version
-
of the joint declaration was different
than Germans. Only France kept the part
-
about how it would be so great to have
back doors or golden keys. So either
-
Germany did not want to publicly advocate
for backdoors or they had a different
-
strategy, but unfortunately very recently
the same de Maizière announced that he
-
wanted to force tech and car companies to
provide the security services with hidden
-
digital access to all devices and
machines. He probably did not know that if
-
you lowered the security of cars you
dramatically increase the risk of accident
-
among others.
Okhin: All this was before Macron was
-
elected last spring. It's like an actual
photo. It's not a Photoshop. During his
-
presidential campaign Emmanuel Macron said
that we should put an end to cryptography
-
by forcing the biggest companies to
provide encryption keys or to give access
-
to the complete content stating that "one
day they'll have to be responsible of
-
terror attacks complicity".
Agnes: So Mounir Mahjoubi again. He was
-
then concealing the candidate and he is
now internet minister. He has been forced
-
to backpedal and to explain that messing
with end-to-end cryptography was out of
-
question and that they'd rather force
companies to cooperate faster with police
-
forces. He specifically emphasized the
importance of cryptography by companies to
-
protect trade and industrial secrets and
since then Mounir Mahjoubi has become
-
totally silent on this topic. So it seems
that encryption for confidentiality is a
-
real problem for them. Would you be
surprised to know that to communicate with
-
his political party and representatives
Emmanuel Macron, now president, uses
-
telegram? An application regularly
described by a lot of representatives as
-
an enabling terrorism tool and which
should be banned. Their words, not ours.
-
Animal Farm is back: We are all equal with
the use of cryptography, but some are more
-
equal than the others. Coupled with this
focus on protecting companies' secrets
-
this confirms that the Start Up Nation
doesn't care about protecting citizens but
-
only about business and powerful friends.
This becomes blatantly obvious when you
-
look at Macron's social and economy's
policies.
-
Okhin: Last but not least, successive
French government put pressure to add in
-
the law possibility for cops to ask you
for all of your online handles, including
-
that all Yahoo mailboxes, ICQ numbers,
your Twitter or Facebook account, all the
-
weird nicknames you use on IRC and stuff
like that. That's why mine is currently a
-
fork-bomb embedded into a shellshock, but
I think we can get more creative and find
-
a way to be more destructive for a system
when cops would have to enter it into
-
their systems. Two attempts have been made
already and rejected at some point. This
-
kind of registration already exist in the
UK in the US and we hope the government
-
won't succeed in France to put this kind
of limitation in law.
-
Agnes: So, as demonstrated France is one
of the very active power against
-
cryptography within the EU. Even if some
of other member states did express some
-
concerns namely Poland, Croatia, Hungary,
Italy, Latvia, and other countries, those
-
concerns have been prompted by other
member states and probably France. Each
-
new bill is a risk to reduce the use of
cryptography especially with the criminal,
-
digital or judiciary laws that are coming
soon. For instance France is pushing hard
-
for avoiding any obligation on end-to-end
encryption in the ePrivacy regulation.
-
They explicitly ask to gain access to any
communication or metadata, which is what
-
is written here in French. Sorry, we
didn't translate it. The government also
-
pushes to obtain EU legislation on
encryption which would limit end to end
-
encryption, of course. The government
intends then to use this EU legislation
-
for justifying its position while it did
create this proposal at the first place.
-
In the next month the discussions
eEvidence will start at the EU level. They
-
will probably be a lot of talks about
cryptography in the next "counter-
-
terrorist package" expected in 2018.
Counterterrorism is always a good way for
-
the governments to make some provisions to
enhance security and to lower the rights
-
and freedoms. They threaten the Parliament
to be responsible of the next attacks and
-
the members of parliament thus vote
anything just because they don't want to
-
be responsible.
Okhin: So as technician, what can we do?
-
From a technical perspective we think we
should operate communication
-
infrastructure and systems in an illegal
and clandestine way. It is important to
-
build undetectable and encrypted
communication systems that break the link
-
between your online communications and
yourself. Making those tools available to
-
the general public and mass adopted by
them is a critical and non trivial issue
-
to address. Especially as French legal
registration system might block access to
-
high-quality privacy preserving encryption
tools. For instance, Apple requires you to
-
fill the ANSSI form and obtain a
certificate from them to put your software
-
on the Apple App Store already.
Moreover it is paramount to think wider,
-
because if your encrypted communication
relies on centralized infrastructure at a
-
highly identifying piece of information
such as for instance a phone number, then
-
a passive listener such as an IMSI catcher
can get your phone number from a protest
-
you were at for instance and then guess
what your account is and then, they got
-
your phone number, so they can ask to
deploy key loggers and spyware on your
-
phones. And this defeating all the
security based on your phone number. At a
-
time where more and more governments want
to hinder encryption and secret of
-
communications, it is critical to have
access to communication systems that are
-
free, pseudonymous, decentralised and
distributed to the widest audience
-
possible, meaning user-friendly, yes, and
to think about way to push those tools
-
everywhere. It is also important to lead
political battles. We need all available
-
help to slow down this attack at the
national and European levels. We need to
-
get out of the security discourses and to
break the link between encryption and
-
security for the state and to control the
argument that only people committing
-
crimes and felonies do use cryptography.
We need a positive discourse about
-
cryptography: how it helps people with
their daily lives, how it impr
-
oves social structures, how it protects
the identity of queers, how it helps
-
abused women to seek help and to escape
their home, how it enables a positive
-
change in the society, as main change
often comes from activities not approved
-
by the society. If you want more concrete
steps and ways to help we're currently
-
running a support campaign so you can help
us there at support.laquadrature.net.
-
After the Q&A, because we have some time
left, you can come drink some tea at the
-
teahouse in the CCL building and have some
tea and chat with us. Thank you all for
-
listening and if you have any question I
think we have some time.
-
applause
Herald Angel: Alright we have 5 minutes
-
for questions. Are there people out there,
maybe on the internet? No, are there some
-
people here who have questions for this
lovely organization? Well I have a
-
question actually: So you gave us some
advice regarding using avatars, alter
-
egos. You know what, I'm teaching as well
and my colleagues teachers even in that
-
kind of digital age that we live in are
always wondering why I am using several
-
avatars, several devices. It seems like
it's not accepted actually because they're
-
looking at you like "Are you a criminal or
what? What did you do wrong?" Don't you
-
get that kind of questions as well from
your audience?
-
Ohkin: Yes, we got that a lot. The thing
is, a lot of people commit crimes using
-
their real name and IDs and stuff like
that. Most of the people are asking people
-
online, for instance, to not use a
pseudonymous account or something like
-
that, they want to be known as our same
people and stuff like that. So it's like
-
we need to get out of this kind of
discourse and say: "I can do whatever I
-
want with my online identities. It's not
your business. And if I'm doing something
-
wrong, you have to prove it, like with due
process of law and stuff like that.
-
Herald: Ok, I see there's a question
raised in here. Microphone number two.
-
Mic2: What counts in practice as import
and export of cryptography. I mean, if I'm
-
in France and I download open SSL, do I
have to fill out the ANSSI form?
-
Okhin: Not for open SSL, because it's not
protocol that have a goal to provide
-
confidentiality of communication which is
end-to-end encryption.
-
Mic2: So GPG?
Okhin: Yeah, GPG is supposed to have an
-
important certificate and I think they
have it.
-
Mic2: For individuals or for
organizations?
-
Okhin: For the organization which provides
you the access to the tool. Like Google is
-
supposed to provide that, Apple,
Microsoft, Debian. Debian I think filled
-
the paperwork. Each Linux distribution
should do it.
-
Herald: Question here, microphone number
one?
-
Mic1: Okay, thanks so much for the talk.
I'd really love to hear a little bit more
-
about the very crunchy in-depth bits about
encryption policy in France. Now might not
-
be the right time, but building off of the
last question: What kinds of laws or
-
policy are around taking encryption
technology outside of France, like across
-
a border?
Agnes: Well for exporting to closed
-
encryption technology there is the
Wassenaar Arrangement signed by several
-
countries, so I don't know by heart
everything in there, but for example a
-
system that can use for war and for other
use. Then you have it's forbidden or you
-
have to declare that you're exporting such
tools etc. So for exporting you have this
-
Wassenaar agreement and I think there is
nothing else if it's not a double use
-
system.
Mic2: Thank you!
-
Herald: Okay, one last question, please
there, mister three.
-
Mic3: It seems to me that all of these
laws are mostly falling under national
-
security. Are there any laws way to
challenge any of this in the European
-
level? So on the European level there's
wonderful direct data protection
-
directives and all the stuff. But my
understanding is that all of these
-
directives any state can kind of opt out
of them for national security reasons. So
-
is there anything that can be done on any
level without invoking a national security
-
exception?
Agnes: Yeah well all data protection
-
regulation policies at the EU level and
especially the GDPR, general data
-
protection regulation, has a specific
provision that enable member states to
-
say: okay, it doesn't apply because it's a
national security issue. What I said, what
-
I showed here, is that in in the ePrivacy
regulation, which is currently under
-
negotiation at the EU level, the EU
Parliament has already adopted a position
-
which promotes encryption as soon as it's
possible to have end-to-end encryption.
-
And that's why the French government is
trying to push it away, there will be
-
negotiation between the Council, the
European Parliament and the European
-
Commission. The Council represents all
member states, so there will be a
-
negotiation with all the institutions,
beginning this summer probably. Or just
-
after the summer, but maybe a little bit
before. And then the French government is
-
going to try to push it away. As we saw
in the document which we showed in
-
French, the government is trying to get to
gain access to all communications and
-
data. It's very clear in the French
communication we showed.
-
Herald: May I make a suggestion?
They have a fantastic tea house.
-
You have to continue this discussion
later on there with a cup of tea,
-
and some massage maybe. I have
one last call for you both, you know,
-
and the audience: « Indignez-vous ! »
[i.e.“Time for Outrage!”]
-
Ca, c'est! That's why we wanna hear you! (?)
Indignez-vous !
-
applause
-
postroll music
-
Subtitles created by c3subtitles.de
in the year 2018