Skip to content

Instantly share code, notes, and snippets.

@rietta
Last active April 8, 2016 15:57
Show Gist options
  • Select an option

  • Save rietta/77bd4fe9d0496718b798219797c2da99 to your computer and use it in GitHub Desktop.

Select an option

Save rietta/77bd4fe9d0496718b798219797c2da99 to your computer and use it in GitHub Desktop.

Revisions

  1. rietta revised this gist Apr 8, 2016. 1 changed file with 2 additions and 1 deletion.
    3 changes: 2 additions & 1 deletion feinstein-burr.md
    Original file line number Diff line number Diff line change
    @@ -1,4 +1,5 @@
    The anticipated Feinstein-Burr Compliance with Court Orders Act, an anti-security bill, would

    The anticipated Feinstein-Burr *Compliance with Court Orders Act*, an anti-security bill, would
    [require the provision of data in an intelligible format to a government pursuant to a court order](https://www.scribd.com/doc/307378123/Burr-Encryption-Bill-Discussion-Draft) (scribd.com). A draft copy has appeared online though whether
    it has been submitted officially within the Senate is [not yet clear](https://motherboard.vice.com/en_ca/read/leaked-burr-feinstein-encryption-bill-is-a-threat-to-american-privacy) (vice.com).

  2. rietta revised this gist Apr 8, 2016. 1 changed file with 8 additions and 15 deletions.
    23 changes: 8 additions & 15 deletions feinstein-burr.md
    Original file line number Diff line number Diff line change
    @@ -1,22 +1,17 @@
    The anticipated Feinstein-Burr anti-security bill has been submitted within the United States Senate to
    [require the provision of data in an intelligible format to a government pursuant to a court order](https://www.scribd.com/doc/307378123/Burr-Encryption-Bill-Discussion-Draft).

    This bill essentially says you can not have any conversation or data exchange that the government can not access if it wants to. It is the legal culmination of what the FBI has been lobbying Congress for years. If Feinstein-Burr
    becomes law, it will be illegal to deploy strong encryption *without key escrow* maintained by each company,
    which is a key backup system that the great consensus of cryptographers and computer scientists assert is insecure at scale.
    The anticipated Feinstein-Burr Compliance with Court Orders Act, an anti-security bill, would
    [require the provision of data in an intelligible format to a government pursuant to a court order](https://www.scribd.com/doc/307378123/Burr-Encryption-Bill-Discussion-Draft) (scribd.com). A draft copy has appeared online though whether
    it has been submitted officially within the Senate is [not yet clear](https://motherboard.vice.com/en_ca/read/leaked-burr-feinstein-encryption-bill-is-a-threat-to-american-privacy) (vice.com).

    This bill essentially says you can not have any conversation or data exchange that the government can not access if it wants to.
    It is the legal culmination of what the FBI has been lobbying Congress for years. If Feinstein-Burr
    becomes law, it will be illegal to deploy strong encryption *without key escrow* maintained by each company. Cryptographers and computer scientists near-unanimously assert key backup systems are insecure at scale.

    <!--more-->

    The first read of the bill is chilling. It would effectively ban strong cryptography within
    the United States and prevent domestic companies from building secure software.
    The companies would be mandated to provide technical assistance. Not the kind of
    assistance that means a best effort. But actual, effectual and rapid turning over of plaintext data
    in its original format or else the company and its employees are violating the law.
    The first read of the bill is chilling. Strong cryptography within the United States would effectively be banned, preventing U.S. companies from building secure software. These companies would be mandated to provide real technical assistance. Unlike the best effort of today, they would be required to give plain-text data in it's original format or risk penalties for violating the law.

    Specifically, any U.S company would be required to maintain the ability, through unspecified means,
    to retrieve the plaintext from any data "*made unintelligible by a feature, product, or service owned, controlled, created, or provided by the [company]*." And the company would then be required to turn over such data in real-time "*concurrently with its transmission*"
    to retrieve the plain-text from any data "*made unintelligible by a feature, product, or service owned, controlled, created, or provided by the [company]*." And the company would then be required to turn over such data in real-time "*concurrently with its transmission*"
    or "*expeditiously, if stored by the [company] or on a device*."

    This would appear to mean that any U.S. organization involved in the design and programming of software,
    @@ -25,8 +20,6 @@ who sells such device and software to connect to their network would all be requ
    data on short notice and provide it real-time to the government.

    This is far, far more insidious than going after [unlocking an iPhone](/blog/2016/03/16/its-not-just-one-iphone/).
    It seriously disincentives any U.S company from even attempting to create secure software and services. Far from removing the
    liability for data breaches, if this would become law, it creates new liability for every tech company.
    It mandates the creation of backdoors without prescribing the exact nature of the backdoors.
    If this becomes law, the mere existence of the means to be able to decrypt your data can be potentially exploited by any private party, not just the U.S. government. Unnecessary liabilities for data breaches will now be required for every company dealing with data digitally, no matter how private. This mandates the creation of back-doors without prescribing the exact nature of those back-doors.

    Let that sink in.
  3. rietta revised this gist Apr 8, 2016. 1 changed file with 2 additions and 2 deletions.
    4 changes: 2 additions & 2 deletions feinstein-burr.md
    Original file line number Diff line number Diff line change
    @@ -2,8 +2,8 @@ The anticipated Feinstein-Burr anti-security bill has been submitted within the
    [require the provision of data in an intelligible format to a government pursuant to a court order](https://www.scribd.com/doc/307378123/Burr-Encryption-Bill-Discussion-Draft).

    This bill essentially says you can not have any conversation or data exchange that the government can not access if it wants to. It is the legal culmination of what the FBI has been lobbying Congress for years. If Feinstein-Burr
    becomes law, it will be illegal to deploy strong encryption *without key escrow*, which is a key backup
    system that the great consensus of cryptographers and computer scientists assert is insecure at scale.
    becomes law, it will be illegal to deploy strong encryption *without key escrow* maintained by each company,
    which is a key backup system that the great consensus of cryptographers and computer scientists assert is insecure at scale.

    This bill essentially says you can not have any conversation or data exchange that the government can not access if it wants to.

  4. rietta revised this gist Apr 8, 2016. 1 changed file with 6 additions and 3 deletions.
    9 changes: 6 additions & 3 deletions feinstein-burr.md
    Original file line number Diff line number Diff line change
    @@ -1,9 +1,12 @@
    The anticipated anti-security bill has been submitted within the United States Senate to
    [require the provision of data in an intelligible format to a government pursuant to a court order](https://www.scribd.com/doc/307378123/Burr-Encryption-Bill-Discussion-Draft). This is
    the legal culmination of what the FBI has been lobbying Congress for years. If Feinstein-Burr
    The anticipated Feinstein-Burr anti-security bill has been submitted within the United States Senate to
    [require the provision of data in an intelligible format to a government pursuant to a court order](https://www.scribd.com/doc/307378123/Burr-Encryption-Bill-Discussion-Draft).

    This bill essentially says you can not have any conversation or data exchange that the government can not access if it wants to. It is the legal culmination of what the FBI has been lobbying Congress for years. If Feinstein-Burr
    becomes law, it will be illegal to deploy strong encryption *without key escrow*, which is a key backup
    system that the great consensus of cryptographers and computer scientists assert is insecure at scale.

    This bill essentially says you can not have any conversation or data exchange that the government can not access if it wants to.

    <!--more-->

    The first read of the bill is chilling. It would effectively ban strong cryptography within
  5. rietta revised this gist Apr 8, 2016. 1 changed file with 1 addition and 1 deletion.
    2 changes: 1 addition & 1 deletion feinstein-burr.md
    Original file line number Diff line number Diff line change
    @@ -13,7 +13,7 @@ assistance that means a best effort. But actual, effectual and rapid turning ove
    in its original format or else the company and its employees are violating the law.

    Specifically, any U.S company would be required to maintain the ability, through unspecified means,
    to retrieve the plaintext from any data "**made unintelligible by a feature, product, or service owned, controlled, created, or provided by the [company]**." And the company would then be required to turn over such data in real-time "*concurrently with its transmission*"
    to retrieve the plaintext from any data "*made unintelligible by a feature, product, or service owned, controlled, created, or provided by the [company]*." And the company would then be required to turn over such data in real-time "*concurrently with its transmission*"
    or "*expeditiously, if stored by the [company] or on a device*."

    This would appear to mean that any U.S. organization involved in the design and programming of software,
  6. rietta revised this gist Apr 8, 2016. 1 changed file with 2 additions and 2 deletions.
    4 changes: 2 additions & 2 deletions feinstein-burr.md
    Original file line number Diff line number Diff line change
    @@ -13,8 +13,8 @@ assistance that means a best effort. But actual, effectual and rapid turning ove
    in its original format or else the company and its employees are violating the law.

    Specifically, any U.S company would be required to maintain the ability, through unspecified means,
    to retrieve the plaintext from any data "**made unintelligible by a feature, product, or service owned, controlled, created, or provided by the [company]**." And the company would then be required to turn over such data in real-time "**concurrently with its transmission**"
    or "**expeditiously, if stored by the [company] or on a device**."
    to retrieve the plaintext from any data "**made unintelligible by a feature, product, or service owned, controlled, created, or provided by the [company]**." And the company would then be required to turn over such data in real-time "*concurrently with its transmission*"
    or "*expeditiously, if stored by the [company] or on a device*."

    This would appear to mean that any U.S. organization involved in the design and programming of software,
    the packing of the software, the creation of any device that runs such software, and any service provider
  7. rietta created this gist Apr 8, 2016.
    29 changes: 29 additions & 0 deletions feinstein-burr.md
    Original file line number Diff line number Diff line change
    @@ -0,0 +1,29 @@
    The anticipated anti-security bill has been submitted within the United States Senate to
    [require the provision of data in an intelligible format to a government pursuant to a court order](https://www.scribd.com/doc/307378123/Burr-Encryption-Bill-Discussion-Draft). This is
    the legal culmination of what the FBI has been lobbying Congress for years. If Feinstein-Burr
    becomes law, it will be illegal to deploy strong encryption *without key escrow*, which is a key backup
    system that the great consensus of cryptographers and computer scientists assert is insecure at scale.

    <!--more-->

    The first read of the bill is chilling. It would effectively ban strong cryptography within
    the United States and prevent domestic companies from building secure software.
    The companies would be mandated to provide technical assistance. Not the kind of
    assistance that means a best effort. But actual, effectual and rapid turning over of plaintext data
    in its original format or else the company and its employees are violating the law.

    Specifically, any U.S company would be required to maintain the ability, through unspecified means,
    to retrieve the plaintext from any data "**made unintelligible by a feature, product, or service owned, controlled, created, or provided by the [company]**." And the company would then be required to turn over such data in real-time "**concurrently with its transmission**"
    or "**expeditiously, if stored by the [company] or on a device**."

    This would appear to mean that any U.S. organization involved in the design and programming of software,
    the packing of the software, the creation of any device that runs such software, and any service provider
    who sells such device and software to connect to their network would all be required by law to decrypt your
    data on short notice and provide it real-time to the government.

    This is far, far more insidious than going after [unlocking an iPhone](/blog/2016/03/16/its-not-just-one-iphone/).
    It seriously disincentives any U.S company from even attempting to create secure software and services. Far from removing the
    liability for data breaches, if this would become law, it creates new liability for every tech company.
    It mandates the creation of backdoors without prescribing the exact nature of the backdoors.

    Let that sink in.