Key Takeaways
The new Information Technology (IT) Rules, 2021 mandate significant social media intermediaries (intermediaries with over 5 million users) that provide services primarily in the nature of messaging to enable the identification of the first originator of a message if issued an order by a court or relevant government authority. Although the rules state that less intrusive methods will be used available, experts argue that this provision will require the breaking of end-to-end encryption offered by platforms like WhatsApp and Signal.
In a panel discussion held by MediaNama on Impact of IT Rules 2021 on Intermediaries, experts shared their views on the traceability mandate and what it means in the context of end-to-end encryption.Debayan Gupta, Assistant Professor of Computer Science,Ashoka University; Priyadarshi Banerjee, Lawyer at Banerjee & Grewall; Yash Kadakia, Founder and CTO of Security Brigade;Rakesh Maheshwari, Ministry of Electronics & Information Technology (MeitY), participated in this discussion. This discussion was supported by Google. All quotes have been edited for clarity and brevity.
The provision stumbles upon its first hurdle in defining who an originator of a message is and what information about the originator it expects.
Is it someone with a +91 number:Debayan Gupta argued that if the law is targeting only originators within India, does it mean it wants the originator with a +91 number, and in that case, what if someone with a +91 number moves to a different country? Will the laws of the country where the person has moved to allow sharing the details of said person? There is also the opposite case where a person with a non-Indian WhatsApp number might be residing in India, will they fall under this search for originator?
How does this work for a non-forwarded message:While tracking a forwarded message might be possible by breaking encryption, how will a platform trace a message that has been copied and pasted, Gupta asked. Wont the metadata of the message originator be lost in this case and wouldnt it be an easy way for bad actors to get away by doing this?Adding on to this point, Yash Kakadia asks what if a person saves a photo or video and reuploads it from his phone. This breaks the forward chain but it is still the same content. Will this person be considered the originator, although someone else was the actual originator? The image could also very easily be from a different messaging platform and there will be no way to go back to the actual originator in this case.
What about slightly modified messages: Gupta asks if forwarded messages that are slightly modified and then forwarded again be considered the same as the original message or as a different message? The same question applies to images and videos that are given a caption.
The broad consensus among the panellists was that enabling traceability without breaking end-to-end encryption is not possible, but they still offered scenarios where it is possible and what problems can this lead to.
Maybe for photos and videos:Yash Kakadia argues that in limited scenarios such as images and videos, tracking the originator without breaking encryption might be possible. If you take an image and I send it to you, you send it to 400 different people and it goes on from there, right? If you go into WhatsApp Web or something of that sort, the URL for the image is exactly the same. And its a cached image that theyre just sending forward. So fundamentally, WhatsApp will be able to say, the first person to upload this image was x and that I can see reasonably possible without breaking into encryption, he added. But this cannot be done for texts, which is the more universal case, Kakadia conceded.
Yes, but anyone can be made to look like the originator: One of the ways platforms can enable traceability is by hashing the sender information and including it as metadata when a message is sent. This could potentially work when everyone is using the official version of WhatsApp, for example, instead of a doctored version. But there is no guarantee that this is the case, especially when considering bad actors, and an unofficial version of the app gives users the ability to make anyone like the originator.
Lets say Im sending a message to Yash. And Im supposed to be attaching something at the bottom of that message that looks like garbage to you, but somehow encapsulates my ID in some fashion or the other. Whats preventing me from lying? Well, I can put Nikhils number in there, for example. And whats preventing Yash from changing that to something else when he forwards it the next time. How do you make sure that nobody lies during the process? Gupta argued.
You can take Narendra Modis phone numbers should you know it, attach that number on top of the message call him the originator and attach Narendra Modis hash at the bottom of it because you can compute it too. And thats that. So look, when I send you a message, either that hash is computable and verifiable by you in which case you can replace my number and my hash with Narendra Modis number and Narendra Modis hash or it isnt, in which case, I could have given you garbage and you wouldnt know, Gupta added.
Technology behind forwarded many times cannot be used for traceability:In response to a question on why the same technology used to label messages as forwarded many times cannot be used to keep track of originator, Gupta explained that WhatsApp, in fact, cannot see the number of times a message is forwarded and the entire system behind this is not really secure. If I ran a fake version of WhatsApps app, I could mess around with that and change that counter to whatever I wanted.The reason that this forwarded many times thing ends up working is because of WhatsApps assumption that if a message spreads like a wildfire, then presumably most of the users doing it are legitimate users using legitimate versions of the app Gupta said.
Less intrusive means for identification is a legal artifice:The government has added a clause that if there are less intrusive means for identification of the originator those can be used instead, but Priyadarshi Banerjee said that this is just a legal artifice that will help the government in court. I mean without breaking the end-to-end encryption traceability is just not possible. Then in that circumstance, its a meaningless proviso that has been put in, just to garnish the legislation for the benefit of the judiciary at a future date, he said.
FISA-like warrants for tapping:One solution Gupta proposed, but conceded wont be very effective, is for the government to implement a provision where a court allows law enforcement agencies to tap a persons chat for a legitimate reason similar to the FISA warrant system in the US. Platforms like WhatsApp can maintain end-to-end encryption for most users and disable it only for users who have a warrant issued against them. The two pitfalls to this are that everyone who the targeted person converses with will also be compromised and bad actors will not use the platform once they know law enforcement agencies can pursue them through this method.
Law should not mandate technology to do a particular thing:When a law instructs a company to do a particular thing, then the law is, in fact,dictating how technological innovation happens and at the pace there off, which is not in the realm of law at all, argues Priyadarshi Banerjee. Its impossible for either lawyers or judges or policymakers to determine what is actually in the domain of engineers, he added.
Government giving solutions rather than the problems to solve:Giving an apt metaphor, Debayan Gupta said Think about aeroplanes, the government is asking to have roll-down windows on aeroplanes. And all the aeronautical engineers are like, are you mad, you cant have roll-down windows on aeroplanes, people will die. This doesnt work. Until the government tells us, hold on, theres this thing called COVID. And we need some way to get fresh air on aeroplanes. Now, the aeronautical engineers say, oh, okay, now that makes sense. Your reasoning has been you have a real reason why youre asking us for this, we can put in these special filters weve created for this occasion. The problem is the government is telling us all this stuff about originator information, hashing and we cant expect the government to have expertise on everything. The problem is theyre giving us implementations or solutions. What they need to do is they need to show us the data, they need to tell us here are the problems.
Is there a right to anonymously exist or communicate online:While the law cannot give a positive mandate and tell companies what they should do, they can tell them not to deploy a particular kind of technology because anegative injunction is something that can be legally enforced according to Banerjee. But such injunctions must also satisfy certain other conditions of legality, he added.
In the present circumstance with regard to end-to-end encryption, I believe this dovetails into the primordial query that whether there is a right to anonymously exist or communicate online. If it can be determined that there is no such right then the law can surely injunct, said Banerjee.
Only affects law-abiding citizens:Debayan Gupta argued that whenever the government wants to pass new rules they use child porn and terrorism as a pretext but the rules dont actually solve those problems. If Im running a child porn ring, and I know if I use WhatsApp I can get tracked, I wouldnt use WhatsApp, Im going to use something else that I can find elsewhere on the internet, he said. He further adds that only the security of law-abiding citizens will be affected.
Bad guys move to harder to reach platforms: Every time you break one level of encryption, or one level of security, youre essentially going to have the bad guys move to a different, harder to reach, platform and then again its going to keep cycling on from there, Kadakia added. Technology evolution is always going to take place, and the bad guys are always going to find safe-havens. If we talk about child pornography right now, whether its moving to the dark web where it becomes even harder now for the government to sort of track that right. And the next request is going to be lets decentralize and lets monitor the dark web, he added.
Tiny corner case of badness:While conceding that the government might have a legitimate reason for the traceability mandate, Gupta said that there should be evidence that shows that enabling traceability will indeed help the government because otherwise, it applies broadly. All too often we are told that there is a legitimate reason for doing X. So were talking over Zoom right, were getting all of these benefits and youre suddenly saying, I dont want this tiny corner case of badness to happen, it doesnt work that way, Gupta said.
What youre doing is, youre taking a good system that works across the world, and youre creating a separate point of failure for it. And that point of failure is going to become a prime target for hackers, Debayan Gupta said.
Government has a number of security issues:Stating that government agencies face a number of security issues, Priydarshi Banerjee and Debayan Gupta argue that creating a backdoor for the government to identify the originator of a message will inevitably allow criminals in as well. So the question is also that is the price of potentially putting all our communications, every single one at risk worth the value that theyre sort of asking for in this context, Banerjee asked.
People in the middle of a message chain will be compromised:Even if the government is only trying to track down the originator of a message, all the others in the message chain will also be compromised because there is no way to only identify the originator without maintaining records throughout the chain. Giving an analogy to the postal system, Gupta said This idea of shortcutting everything is like would you do that to the postal system? How would you require the postal system to look inside every envelope, and keep track of every message that was sent? So that if a threatening message was received by the president of India, you could immediately track it back to the first person who wrote that message, rather than the 15 intermediaries that went through. Is that what were saying, that we now require the postal system to do that because that is the exact equivalent of what has been proposed.
Representing the government, Rakesh Maheshwari, Senior Director and Group Co-ordinator, Cyber Law & Security, MeitY, conveyed the governments intent regarding various subrules. He also fielded questions from MediaNama on traceability, compliance, timelines, clarifications of definitions, and more. Here are his views on traceability and encryption:
Not looking at the encryption aspect: We are not at all looking at the way the encryption has been done, the way decryption is being done. We are not at all looking at it, we are only looking that at the end-user device, the message does remain unencrypted. And if it is being simply being forwarded, then before it is being forwarded, it is the same message, and hence the hash should remain the same. Now, how exactly it is to be done, which technical architecture to be deployed, is best for the platform [to decide], Rakesh Maheswari noted.
Platforms cannot take shelter using end-to-end encryption:There are certain expectations that users shall not be engaged in certain activities. Platforms cannot just put that in the terms of conditions and use end-to-end as a shelter when users do engage in them, Maheswari noted. Our intent is that if there is trouble being created in the system, the system cannot just take the shelter of it being end-to-end encrypted and therefore be completely unaware and hence completely escape out of the problem. We want platforms to be accountable, we want people to also be accountable, he added.
More than three months given:In response to MediaNamas question on whether the government thinks it has given sufficient time for implementation of this mandate and Debayan Guptas argument that there is no way to know if three months is enough,Maheswari responded that the government has in fact given more than three months because this mandate has been in the public draft for the last two years and platforms knew it was coming. He also added that if three months is not enough to implement a certain rule or subrule, the government will be practical and accommodate extension requests.
Lots of checks and balances in place:Maheswari argued that the government has put lots of checks and balances in place to prevent the misuse of the traceability provision but does not give examples of any such measures. The rules also do not provide any details regarding the safeguards in place.
No cost-benefit analysis done:In response to an audience question on whether the government has done a cost-benefit analysis of the traceability mandate, Maheshwari responded that it isnot for government to do the cost-benefit analysis and that the government has the right to know the root cause of a problem.
There is always a bypass:Maheswari did concede that despite all the measures the government takes, criminals will find a way to bypass the law. But he argues that the rules are meant to suffice for the general case and not these extreme situations. The rule should by and large be able to meet the expectations of the government, as well as, I hope the users, he added.
Also Read
See original here:
#NAMA: The traceability mandate and what it means for end-to-end encryption - MediaNama.com
- WhatsApp overhauling status tab with encrypted Snapchat Stories-like feature - 9 to 5 Mac [Last Updated On: February 21st, 2017] [Originally Added On: February 21st, 2017]
- GOP demands inquiry into EPA use of encrypted messaging apps - CNET [Last Updated On: February 21st, 2017] [Originally Added On: February 21st, 2017]
- Encryption Apps Help White House Staffers Leakand Maybe Break the Law - WIRED [Last Updated On: February 21st, 2017] [Originally Added On: February 21st, 2017]
- World Wide Web Creator Calls for Internet Decentralization & Encryption - The Data Center Journal [Last Updated On: February 21st, 2017] [Originally Added On: February 21st, 2017]
- What It Means to Have an 'Adult' Conversation on Encryption - Pacific Standard [Last Updated On: February 21st, 2017] [Originally Added On: February 21st, 2017]
- Confide in me! Encryption app leaks sensitive info from Washington DC - SC Magazine UK [Last Updated On: February 21st, 2017] [Originally Added On: February 21st, 2017]
- Gmail v7.2 Prepares to Add Support for S/MIME Enhanced Encryption - XDA Developers (blog) [Last Updated On: February 26th, 2017] [Originally Added On: February 26th, 2017]
- Top 6 Data Encryption Solutions - The Merkle [Last Updated On: February 26th, 2017] [Originally Added On: February 26th, 2017]
- Your Guide to the Encryption Debate - Consumer Reports - ConsumerReports.org [Last Updated On: February 26th, 2017] [Originally Added On: February 26th, 2017]
- Google helps put aging SHA-1 encryption out to pasture - Engadget [Last Updated On: February 26th, 2017] [Originally Added On: February 26th, 2017]
- Decipher your Encryption Challenges - Infosecurity Magazine [Last Updated On: February 28th, 2017] [Originally Added On: February 28th, 2017]
- How the Politics of Encryption Affects Government Adoption - Freedom to Tinker [Last Updated On: February 28th, 2017] [Originally Added On: February 28th, 2017]
- How Encryption Makes Your Sensitive Cloud-Based Data an Asset, Not a Liability - Security Intelligence (blog) [Last Updated On: February 28th, 2017] [Originally Added On: February 28th, 2017]
- Set up VMware VM Encryption for hypervisor-level security - TechTarget [Last Updated On: February 28th, 2017] [Originally Added On: February 28th, 2017]
- How The Media Are Using Encryption Tools To Collect Anonymous Tips - NPR [Last Updated On: February 28th, 2017] [Originally Added On: February 28th, 2017]
- Encryption patent that roiled Newegg is dead on appeal | Ars Technica - Ars Technica [Last Updated On: February 28th, 2017] [Originally Added On: February 28th, 2017]
- Research proposes 'full-journey' email encryption - The Stack [Last Updated On: March 1st, 2017] [Originally Added On: March 1st, 2017]
- Database-as-a-service platform introduces encryption-at-rest - BetaNews [Last Updated On: March 1st, 2017] [Originally Added On: March 1st, 2017]
- Encrypted Messaging Service 'Signal' Adds Video Call Option - Top Tech News [Last Updated On: March 2nd, 2017] [Originally Added On: March 2nd, 2017]
- Germany, France lobby hard for terror-busting encryption backdoors ... - The Register [Last Updated On: March 2nd, 2017] [Originally Added On: March 2nd, 2017]
- How to Send Encrypted Nudes, a Guide for the Discerning Lover - Inverse [Last Updated On: March 2nd, 2017] [Originally Added On: March 2nd, 2017]
- Ironclad Encryption Corporation Announces New Ticker Symbol OTCQB: IRNC - Yahoo Finance [Last Updated On: March 2nd, 2017] [Originally Added On: March 2nd, 2017]
- The Best Email Encryption Software of 2017 | Top Ten Reviews [Last Updated On: March 2nd, 2017] [Originally Added On: March 2nd, 2017]
- No, you shouldn't delete Signal or other encrypted apps - TechCrunch [Last Updated On: March 11th, 2017] [Originally Added On: March 11th, 2017]
- Best encryption software: Top 5 - Computer Business Review [Last Updated On: March 11th, 2017] [Originally Added On: March 11th, 2017]
- Encryption Backdoors, Vault 7, and the Jurassic Park Rule of Internet Security - Just Security [Last Updated On: March 11th, 2017] [Originally Added On: March 11th, 2017]
- That Encrypted Chat App the White House Liked? Full of Holes - WIRED [Last Updated On: March 11th, 2017] [Originally Added On: March 11th, 2017]
- What the CIA WikiLeaks Dump Tells Us: Encryption Works - New York Times [Last Updated On: March 11th, 2017] [Originally Added On: March 11th, 2017]
- Snake-Oil Alert Encryption Does Not Prevent Mass-Snooping - Center for Research on Globalization [Last Updated On: March 11th, 2017] [Originally Added On: March 11th, 2017]
- Customer Letter - Apple [Last Updated On: March 11th, 2017] [Originally Added On: March 11th, 2017]
- Don't Let WikiLeaks Scare You Off of Signal and Other Encrypted Chat Apps - WIRED [Last Updated On: March 12th, 2017] [Originally Added On: March 12th, 2017]
- BT to offer customers encryption service for data - Capacity Media (registration) [Last Updated On: March 12th, 2017] [Originally Added On: March 12th, 2017]
- Encryption - technet.microsoft.com [Last Updated On: March 12th, 2017] [Originally Added On: March 12th, 2017]
- Use FileVault to encrypt the startup disk on ... - Apple Support [Last Updated On: March 12th, 2017] [Originally Added On: March 12th, 2017]
- Viber launches secret chats to go beyond encryption - SlashGear [Last Updated On: March 13th, 2017] [Originally Added On: March 13th, 2017]
- Zix wins 5-vendor email encryption shootout - Network World [Last Updated On: March 13th, 2017] [Originally Added On: March 13th, 2017]
- A lesson from the CIA WikiLeaks dump: Encryption works - The Seattle Times [Last Updated On: March 13th, 2017] [Originally Added On: March 13th, 2017]
- What the CIA WikiLeaks Dump Tells Us: Encryption Works - NewsFactor Network [Last Updated On: March 18th, 2017] [Originally Added On: March 18th, 2017]
- Panicked Secret Service Says It Lost Encrypted Laptop But It's Fine, Everything's Fine - Gizmodo [Last Updated On: March 18th, 2017] [Originally Added On: March 18th, 2017]
- Google Cloud adds new customer-supplied encryption key partners ... - ZDNet [Last Updated On: March 18th, 2017] [Originally Added On: March 18th, 2017]
- Preseeding Full Disk Encryption - Linux Journal [Last Updated On: March 18th, 2017] [Originally Added On: March 18th, 2017]
- Bypassing encryption: 'Lawful hacking' is the next frontier of law enforcement technology - Boston Business Journal [Last Updated On: March 18th, 2017] [Originally Added On: March 18th, 2017]
- SecurityBrief NZ - Gemalto introduces on-prem encryption key solution for 'highly regulated' organisations - SecurityBrief NZ [Last Updated On: March 21st, 2017] [Originally Added On: March 21st, 2017]
- 'Always Be Concerned': US Court Slaps Down Fifth Amendment Defense of Encryption - Sputnik International [Last Updated On: March 21st, 2017] [Originally Added On: March 21st, 2017]
- Quantum Key System Uses Unbreakable Light-Based Encryption to Secure Data - Photonics.com [Last Updated On: March 21st, 2017] [Originally Added On: March 21st, 2017]
- Wikileaks Only Told You Half The Story -- Why Encryption Matters More Than Ever - Forbes [Last Updated On: March 21st, 2017] [Originally Added On: March 21st, 2017]
- EPA Sued For Withholding Info On Encrypted Text Messages | The ... - Daily Caller [Last Updated On: March 22nd, 2017] [Originally Added On: March 22nd, 2017]
- Opinion Data encryption efforts ramp up in face of growing security threats - Information Management [Last Updated On: March 22nd, 2017] [Originally Added On: March 22nd, 2017]
- Bypassing encryption: Lawful hacking is the next frontier of law enforcement technology - Salon [Last Updated On: March 22nd, 2017] [Originally Added On: March 22nd, 2017]
- NeuVector Announces Container Visualization, Encryption, and Security Solution for NGINX Plus - DABCC.com [Last Updated On: March 23rd, 2017] [Originally Added On: March 23rd, 2017]
- Is encryption one of the required HIPAA implementation specifications? - TechTarget [Last Updated On: March 23rd, 2017] [Originally Added On: March 23rd, 2017]
- Paper Spells Out Tech, Legal Options for Encryption Workarounds - Threatpost [Last Updated On: March 23rd, 2017] [Originally Added On: March 23rd, 2017]
- Encryption debate needs to be nuanced, says FBI's Comey - TechTarget [Last Updated On: March 25th, 2017] [Originally Added On: March 25th, 2017]
- Comey Renews Debate Over Encryption - 550 KTSA [Last Updated On: March 25th, 2017] [Originally Added On: March 25th, 2017]
- UK minister says encryption on messaging services is unacceptable - Reuters [Last Updated On: March 28th, 2017] [Originally Added On: March 28th, 2017]
- The why and how of encrypting files on your Android smartphone - Phoenix Sun [Last Updated On: March 28th, 2017] [Originally Added On: March 28th, 2017]
- UK targets WhatsApp encryption after London attack - Yahoo News [Last Updated On: March 28th, 2017] [Originally Added On: March 28th, 2017]
- Critical flaw alert! Stop using JSON encryption | InfoWorld - InfoWorld [Last Updated On: March 28th, 2017] [Originally Added On: March 28th, 2017]
- SecureMyEmail is email encryption for everyone - TechRepublic - TechRepublic [Last Updated On: March 28th, 2017] [Originally Added On: March 28th, 2017]
- Apple iOS 10.3 will introduce encryption which makes it MORE difficult for cops and spooks to crack into ISIS nuts ... - The Sun [Last Updated On: March 29th, 2017] [Originally Added On: March 29th, 2017]
- How to Analyze An Encryption Access Proposal - Freedom to Tinker [Last Updated On: March 29th, 2017] [Originally Added On: March 29th, 2017]
- Questions for the FBI on Encryption Mandates - Freedom to Tinker [Last Updated On: March 29th, 2017] [Originally Added On: March 29th, 2017]
- Justice Department anti-terror chief keeps pressing on encryption - Politico (blog) [Last Updated On: March 29th, 2017] [Originally Added On: March 29th, 2017]
- UK government can force encryption removal, but fears losing, experts say - The Guardian [Last Updated On: March 29th, 2017] [Originally Added On: March 29th, 2017]
- Encryption FAQs [Last Updated On: March 29th, 2017] [Originally Added On: March 29th, 2017]
- Why isn't US military email protected by standard encryption tech? - Naked Security [Last Updated On: April 9th, 2017] [Originally Added On: April 9th, 2017]
- How have ARM TrustZone flaws affected Android encryption? - TechTarget [Last Updated On: April 9th, 2017] [Originally Added On: April 9th, 2017]
- Keeping the enterprise secure in the age of mass encryption - Information Age [Last Updated On: April 9th, 2017] [Originally Added On: April 9th, 2017]
- Lack of encryption led to Dallas siren hack - WFAA [Last Updated On: April 12th, 2017] [Originally Added On: April 12th, 2017]
- Internet Society tells G20 nations: The web must be fully encrypted - The Register [Last Updated On: April 12th, 2017] [Originally Added On: April 12th, 2017]
- Make Encryption Ubiquitous, Says Internet Society - Infosecurity ... - Infosecurity Magazine [Last Updated On: April 12th, 2017] [Originally Added On: April 12th, 2017]
- Can we encrypt the web while giving governments a backdoor to snoop? - SC Magazine UK [Last Updated On: April 12th, 2017] [Originally Added On: April 12th, 2017]
- Why we need to encrypt everything - InfoWorld [Last Updated On: April 12th, 2017] [Originally Added On: April 12th, 2017]
- Hacked Dallas sirens get extra encryption to fend off future attacks - Computerworld [Last Updated On: April 12th, 2017] [Originally Added On: April 12th, 2017]
- SHA-1 Encryption Has Been Broken: Now What? - Forbes [Last Updated On: April 14th, 2017] [Originally Added On: April 14th, 2017]
- Hewlett Packard Enterprise touts encryption tool for federal clients - The Hill [Last Updated On: April 14th, 2017] [Originally Added On: April 14th, 2017]
- Encryption on the Rise in Age of Cloud - Infosecurity Magazine - Infosecurity Magazine [Last Updated On: April 14th, 2017] [Originally Added On: April 14th, 2017]
- Lawmaker Pushes Bill That Requires Encryption by Pennsylvania State Employees - Government Technology [Last Updated On: April 14th, 2017] [Originally Added On: April 14th, 2017]
- Disk encryption - Wikipedia [Last Updated On: April 14th, 2017] [Originally Added On: April 14th, 2017]
- The apps to use if you want to keep your messages private - Recode [Last Updated On: April 15th, 2017] [Originally Added On: April 15th, 2017]