Business Unusual

Who should be allowed access to your encrypted data?

Following the deaths on Westminster Bridge in London on 22 March and the news that the attacker had used WhatsApp minutes before the attack began saw the UK Home Secretary call for access to encrypted messages to be made available to authorities for occasions that justify it. It is not a new call and many other agencies around the world have suggested the same.

It seems reasonable, but misses the basis of how and what encryption seeks to do. No encryption is totally secure (quantum options come the closest though). However, creating a backdoor, in effect, renders the entire system insecure.

Confused? Here is how it works...

Our privacy is safeguarded with security measures. These include physical security like a fingerprint scanner or with access control like a password. Then there is data stored on a device or the contents of a message that is transmitted. This is where encryption comes in.

You could encode your message using a cipher to change the contents in a specific way.

Consider “Safe” is our message and our cipher was to replace each letter with the next in the alphabet which makes it “Tbgf” - it is meaningless unless you know how to use the cipher to decode it.

Using a code as we did here is also not very safe. Should it be intercepted someone could try many codes until it made sense. Computers are capable of testing many types of codes very quickly to, in effect, crack it.

Encryption limits access to the contents of a message using a formula for an equation.

There are two parts: the “public key” which is the means to create the equation and the “private key” which is the only one that can solve it.

The means to create the equation is shared with anyone, which allows a message to be encrypted, but only the person that created the key pair will be able to decode it.

Encryption as is used by services like WhatsApp uses the two keys, a public and a private key, the two parts of the equation.

When you wish to send someone a message, WhatsApp encrypts it on your phone using the public key for that message. It can’t be directly unencrypted because it is a number equation that is practically impossible to solve by testing possible options.

A very simple version would be to consider the number “15” as your public key and the equation “3x5” as your private key (they are typically prime numbers), it is easy to see that 15 is equal to 3x5 which unlocks the file.

The actual numbers are much bigger, hundreds of digits long, proving them is easy, solving them is very hard (if you are a regular of Business Unusual, you will recall how the blockchain uses a similar technique).

So how would a backdoor work?

Strictly speaking if a backdoor can be created, you enable another way for anyone to workout how to decrypt that file.

Authorities would like to think they could keep that method safe, but given how many people would need to get access to it, and that it existed would be public knowledge, the system could be compromised and rather than increasing security, you effectively remove it.

The error occurs with our understanding of how locks and keys work in the real world. A lock can have more than one key, but that key can still only open that one lock.

If someone were to make a master key, you would need to make all locks the same way and that one key would open everything.

There is very little security in a system that allows for a master key, so authorities requesting a master key are not only not likely to make their citizens more safe, they are likely to make them more vulnerable.

There is a reason we should be calling for even more security because most users are unable to keep up with the functionality of their devices and this ignorance makes them more likely to be compromised by suspect apps, or people physically gaining access to their phone.

This is a basic summary of the issue and it does not address what could or should be done to limit the use of services like this by those that will break the law or cause harm.

There are no arguments to say people should not get access to cars because they could run people over because we understand the relative threat versus benefits cars provide. However, because most of us have a limited understanding of digital security it seems justified to believe the current solutions are practical ones.

So the best answer to the question posed at the beginning (who should be allowed access to your encrypted data?) remains, for now, no-one without your express permission.


Recommended

by NEWSROOM AI

702 welcomes all comments that are constructive, contribute to discussions in a meaningful manner and take stories forward.

However, we will NOT condone the following:

  • Racism (including offensive comments based on ethnicity and nationality)
  • Sexism
  • Homophobia
  • Religious intolerance
  • Cyber bullying
  • Hate speech
  • Derogatory language
  • Comments inciting violence.

We ask that your comments remain relevant to the articles they appear on and do not include general banter or conversation as this dilutes the effectiveness of the comments section.

We strive to make the 702 community a safe and welcoming space for all.

702 reserves the right to: 1) remove any comments that do not follow the above guidelines; and, 2) ban users who repeatedly infringe the rules.

Should you find any comments upsetting or offensive you can also flag them and we will assess it against our guidelines.

702 is constantly reviewing its comments policy in order to create an environment conducive to constructive conversations.

Read More
How to win elections and influence people

How to win elections and influence people

You could say elections are being disrupted.

Technology disrupted tax income, but nobody escapes taxes

Technology disrupted tax income, but nobody escapes taxes

Digital companies have had a good run, but new taxes are coming.

Solving puzzles and mysteries, and what all of us may be missing about it

Solving puzzles and mysteries, and what all of us may be missing about it

At last, a way to future proof yourself against the 4th Industrial Revolution.

Boredom, loneliness and addiction

Boredom, loneliness and addiction

The best way to describe our relationship with the internet is “it's complicated".

The world is reliant on fertilizer and this is who controls most of it

The world is reliant on fertilizer and this is who controls most of it

One country holds as much as 70% of the world’s phosphate and we can’t feed the world without it.

How Instagram captured the moment

How Instagram captured the moment

An app so simple even Steve Jobs would have been proud.

Popular articles
Madiba’s private secretary Zelda la Grange opens up about money (hers and his)

Madiba’s private secretary Zelda la Grange opens up about money (hers and his)

Bruce Whitfield interviews La Grange about her and Madiba's attitude to money (hopes and fears, successes and failures, etc.)

You’re either a ‘money slave’ or a ‘money master’ (says author of 'My Money')

You’re either a ‘money slave’ or a ‘money master’ (says author of 'My Money')

The Money Show’s Bruce Whitfield interviews Sugar Creek financial expert and author of “My Money” Gerald Mwandiambira.

How to make money through ‘buy-to-let’ (using very little of your own money)

How to make money through ‘buy-to-let’ (using very little of your own money)

Bruce Whitfield interviews Francois Janse van Rensburg, author of “Making Money through Buy-To-Let in South Africa".

Retirement: 8 biggest mistakes people typically make…

Retirement: 8 biggest mistakes people typically make…

The Money Show’s Bruce Whitfield interviews Galileo Capital Financial Advisor Warren Ingram.

Friday Profile: Nelson Mandela Foundation's Sello Hatang

Friday Profile: Nelson Mandela Foundation's Sello Hatang

This Friday Azania Mosaka explores the life of Sello Hatang, chief executive officer of the Nelson Mandela Foundation.

MTN Walk The Talk with 702: Get your entries in and be part of a united Joburg!

MTN Walk The Talk with 702: Get your entries in and be part of a united Joburg!

Join Joburgers from all walks of life come together peacefully, united in their diversity for a fun family day out.

3 easy questions could bag you R2000!

3 easy questions could bag you R2000!

WIN R2000! But only if you can prove you're a whiz of the MTN Biz Quiz by answering the following three questions...

Blesserfinder: Matching you with a sugar daddy near you

Blesserfinder: Matching you with a sugar daddy near you

Is social trend Blesserfinder, where girls are allegedly matching up with rich 'benefactors' in exchange for sex, a real thing?