Surveillance strategies in the UK and Israel often go global

      • Korkki@lemmy.ml
        link
        fedilink
        arrow-up
        3
        ·
        1 month ago

        What is the fundamental difference. Evil men and arrogant idiots might as well be the same thing.

        • ☂️-@lemmy.ml
          link
          fedilink
          arrow-up
          3
          ·
          1 month ago

          it shouldn’t be different but focusing on the ‘they are idiots’ fallacy completely misdirects blame and disencourages deeper critical thought.

          • Korkki@lemmy.ml
            link
            fedilink
            arrow-up
            1
            arrow-down
            1
            ·
            1 month ago

            the real misdirection is focusing on individuals and their blame. The real question is why does UK political system produces these people rule and how do they keep ruling.

            • hector@lemmy.todayBanned from community
              link
              fedilink
              arrow-up
              1
              ·
              1 month ago

              Both parties were captured by the aristocracy/super rich, call them what you will, and they support a total surveillance of a population they obviously fear and want tools to persecute as they see fit. Starmer is a perfect example of this, he’s done more damage arguably than the tories did in over a decade. Their betrayal of the country will throw the elections to the far right too, that is the only protest vote against the status quo, and they will affix themselves in power and implement even worse privacy.

              A popular reform party would fix the problems but the aristocracy is too greedy and arrogant for that, thinking they can control a far right party or otherwise shut them out electorally indefinitely and continue to sell out the public to the rich, even as discontent is increasing and the plutocratic rot is visible on the surface and spread throughout the whole.

            • ☂️-@lemmy.ml
              link
              fedilink
              arrow-up
              1
              ·
              1 month ago

              sure, focusing on how dumb they are isn’t very condusive to discussing the intricacies of capitalism.

              seriously though, they do have a plan. we need to figure out ours.

    • minorkeys@lemmy.world
      link
      fedilink
      arrow-up
      11
      ·
      1 month ago

      They don’t care how it affects normal people’s lives or what we sacrifice to pay for their incompetent leadership.

    • ObsidianZed@lemmy.world
      link
      fedilink
      arrow-up
      1
      ·
      1 month ago

      “Never attribute to stupidity that which is adequately explained by malice.”

      or something like that…

  • wizardbeard@lemmy.dbzer0.com
    link
    fedilink
    English
    arrow-up
    29
    ·
    1 month ago

    No way this lasts or holds up to basic scrutiny. End to end encryption is a de-facto standard for so fucking much technology.

    Like fucking HTTPS.

    • A🔻atar of 🔻engeance@lemmy.mlOP
      link
      fedilink
      English
      arrow-up
      8
      arrow-down
      1
      ·
      1 month ago

      Well if they commit to this, it will never affect “e2ee” options that collaborate with feds e.g. whatsapp, imessage. If you can kill Refaat Alareer with it rest assured you will be able to keep it in your phone anytime

      • floofloof@lemmy.ca
        link
        fedilink
        arrow-up
        13
        ·
        1 month ago

        Yes, the trick is to outlaw it entirely then enforce the law selectively against those whom you find politically awkward.

  • douglasg14b@lemmy.world
    link
    fedilink
    arrow-up
    26
    ·
    1 month ago

    So literally everyone in the UK using any website that uses TLS is now a hostile actor?

    Essentially everyone’s a criminal which is a huge boon for the government. They can now get rid of anyone they want at any time, legally.

    • hector@lemmy.todayBanned from community
      link
      fedilink
      arrow-up
      1
      ·
      1 month ago

      That is longstanding, the US and the UK both have been writing laws broadly enough for them to take down anyone for them, or at least charge, we all just trust it won’t be abused, but as we’ve seen with the uk and their bad faith terror designations, that trust is misplaced, and the mask is coming off society. They aren’t pretending anymore, and cynically think “democracy” such as it is, is already dead in all but name, it’s only the citizenry that doesn’t know it yet, and or is contesting it.

      • douglasg14b@lemmy.world
        link
        fedilink
        arrow-up
        1
        ·
        1 month ago

        Do they strictly define end to end encryption in this bill?

        If not, then yes, TLS is “end to end” as the sender encrypts the message, and the receiver decrypts it. Each “end” to each “end” is encrypted, satisfying the semantics of the term.

      • Lysergid@lemmy.ml
        link
        fedilink
        arrow-up
        0
        ·
        1 month ago

        I don’t get it. E2ee is about encryption in transit not encryption at rest. TLS sounds exactly like e2ee

        • iglou@programming.dev
          link
          fedilink
          arrow-up
          0
          ·
          1 month ago

          E2E is about the sender encrypting, and only the intended receiver decrypting, with nothing in the middle able to read the data.

          TLS is not designed for that, as the server you connect to is not necessarily the intended receiver, yet it can see everything.

          With E2E, you can send data to a server, which is not the intended receiver, and it won’t be able to read it.

          • douglasg14b@lemmy.world
            link
            fedilink
            arrow-up
            0
            ·
            1 month ago

            Your explanation assumes that scope and scale are part of the definition which it is not.

            If you keep zooming in or zooming out the definition of E2E keeps changing under your statement.

            If the only knowledge a system has is between a sender and a receiver (Which satisfies even your definition of “intended recipient”) then TLS is E2E encrypted.

            • iglou@programming.dev
              link
              fedilink
              arrow-up
              0
              arrow-down
              1
              ·
              1 month ago

              The definition of E2EE has evolved since the concept surfaced. You seem to be stuck with the original meaning.

              TLS does not fit the modern definition.

              • douglasg14b@lemmy.world
                link
                fedilink
                arrow-up
                2
                ·
                1 month ago

                Yes the technical term has evolved but did the term evolve in the legislation definition of it?

                If not, then the technically correct usage doesn’t matter which is a point I’ve made in another comment as well.

                And in my previous comment, I am pointing out the logical inconsistencies. Not that I agree or disagree with the technical terminology. You seem to be conflating a logical explanation/call-out of logic holes for my opinion, which it is not

  • bobzer@lemmy.zip
    link
    fedilink
    arrow-up
    14
    ·
    1 month ago

    Was this written by a native English speaker?

    It’s hard to take seriously with so many grammatical errors

      • TheTechnician27@lemmy.world
        link
        fedilink
        English
        arrow-up
        16
        ·
        1 month ago

        No, beyond the legalese. For example, the comma placement in:

        which, unknown to them threatens,

        The comma should go after “them”, because “unknown to them” constitutes the entire aside.

        If you delete the aside in this, it reads “which national security”, whereas it should read “which threatens national security”.

        This is just the first one I found; I didn’t go hunting for them. It’s one of those grammatical mistakes that actively ruins the cadence of the sentence as you read it in your head.

        • bobzer@lemmy.zip
          link
          fedilink
          arrow-up
          4
          ·
          1 month ago

          And worse mistakes:

          where there must be at least possibility that

          I have complete sympathy for non-native speakers writing papers, but it also raises the question of whether they properly understand the source material they’re referencing.

          • TheTechnician27@lemmy.world
            link
            fedilink
            English
            arrow-up
            5
            ·
            1 month ago

            I will inform you that this excerpt is correct English. There needn’t be an article like “a” or “the” before “possibility”. It reads awkwardly in everyday language, but that really is just innocent “legalese” phrasing.

            • bobzer@lemmy.zip
              link
              fedilink
              arrow-up
              3
              ·
              1 month ago

              Thanks for the correction. Rereading it I can kind of see if they mean possibility as an abstract concept, so I’ll take the L on it.

              But I still maintain it’s a pretty fucked way of phrasing it.

  • LifeInMultipleChoice@lemmy.dbzer0.com
    link
    fedilink
    English
    arrow-up
    10
    ·
    1 month ago

    what the fuck mate. Just take a shit on your citizens and wonder why the largest empire in the world now sucks off an orange paint face micro dick to make sure people still recognize they might be someone…

    • apparia@discuss.tchncs.de
      link
      fedilink
      English
      arrow-up
      5
      ·
      1 month ago

      It’s a screenshot of this report from a review of the UK’s security and terrorism legislation, published in December.

      TechRadar article discussing the specific encryption issue here.

      I was skeptical given the grammar issues others have pointed out but it seems legitimate.

      • floofloof@lemmy.ca
        link
        fedilink
        arrow-up
        1
        ·
        edit-2
        1 month ago

        I found it:

        https://www.gov.uk/government/publications/report-of-the-independent-reviewer-of-state-threats-legislation/report-of-the-independent-reviewer-of-state-threats-legislation-accessible

        It’s an independent review of some UK laws concerning national security, and the reviewer is warning that the laws could be used against people unfairly. Note the last sentence of the section: “Serious responsibility is put on police to use the power wisely.”

        Engagement in Hostile Activity

        6.16. Under Schedule 3 a person may be engaged in hostile activity even though unaware that their activity is hostile activity[footnote 428].

        So a person could be examined on account of their wholly inadvertent and morally blameless conduct.

        Examples could include a journalist carrying confidential information whose significance to national security he did not understand, or the victim of planted material. The examining officer could act if there was no possibility that the person was aware that its dissemination might be in the interests of a foreign state, or even that they were carrying the material.

        The Code of Practice to Schedule 3 refers to the innocent dupe, who “…may believe that they are working for a legitimate business, or charity, which is in fact being utilised specifically for the purpose of espionage”[footnote 429].

        6.17. Since hostile activity does not require any knowledge or tasking by a foreign state[footnote 430], the phenomenon of double-ignorance could arise. A person may be engaged in hostile activity if they do something which, unknown to them threatens, national security and which is in the interests of another State, also entirely in the dark. For example:

        The developer of an app, whose selling point is end-to-end encryption which would make it more difficult for UK security and intelligence agencies to monitor communications. It is a reasonable assumption that this would be in the interests of a foreign state even if though the foreign state has never contemplated this potential advantage.

        The lobbyist for a foreign firm, who seeks to persuade an electronic chip manufacturer to build its factory in France rather than the UK. This would engage the UK’s economic well-being in a way relevant to national security even though France is entirely unaware of the lobbying and the lobbyist is only doing his normal day job.

        A journalist carrying information that is personally embarrassing to the Prime Minister on the eve of an important treaty negotiations affecting UK security interests.

        6.18. In each of these cases the motive of the app developer/ lobbyist/ journalist may be more sinister than first appears, so permitting an officer to examine whether the individual is a witting or unwitting agent of a foreign state might be described as necessary in the right circumstances. Serious responsibility is placed on police to use the power wisely.

  • NarrativeBear@lemmy.world
    link
    fedilink
    arrow-up
    8
    ·
    1 month ago

    If I were to send a physical letter written in code that can only be decrypted with a cipher would I now be breaking the law?

    What about radio or telephone conversations in code?

    Can I still password protect my zip files or encrypt my NAS or PC before boot?

    • hector@lemmy.todayBanned from community
      link
      fedilink
      arrow-up
      1
      ·
      1 month ago

      If so we should all start sending cryptic sounding gibberish around the world. Like from random lists send emails to foreigners with some random gibberish like product codes written in that look like encrypted messages, xg0-fs39450, or whatever, just as a form of protest.

      • mrtuttle@lemmy.sdf.org
        link
        fedilink
        arrow-up
        1
        ·
        1 month ago

        if im alone in my car, i’ll just start talking gibberish or about that time i kicked a cyber-dolphin through the moon. just in case the man is training some ai on what my phone’s microphone picks up.

  • ArmchairAce1944@discuss.online
    link
    fedilink
    arrow-up
    6
    ·
    1 month ago

    Fuck this shit. The UK is not longer a free country. And fuck Israel even more for their damned work over the decades to make this possible.

    • floofloof@lemmy.ca
      link
      fedilink
      arrow-up
      3
      ·
      1 month ago

      I remember in the 1990s when you went to download Netscape you could only use the 40-bit encryption if you were in Europe, not the 128-bit encryption people in the USA could use.

  • minorkeys@lemmy.world
    link
    fedilink
    arrow-up
    5
    ·
    1 month ago

    Does the government have the right to monitor any and all communications corporate, private or political?