The UK's National Cyber Security Centre (NCSC), along with GCHQ, quietly removed official advice recommending the use of Apple's device encryption for protecting sensitive information. While no official explanation was given, the change coincides with the UK government's ongoing push for legislation enabling access to encrypted communications, suggesting a conflict between promoting security best practices and pursuing surveillance capabilities. This removal raises concerns about the government's commitment to strong encryption and the potential chilling effect on individuals and organizations relying on such advice for data protection.
Apple has removed its iCloud Advanced Data Protection feature, which offers end-to-end encryption for almost all iCloud data, from its beta software in the UK. This follows reported concerns from the UK's National Cyber Security Centre (NCSC) that the enhanced security measures would hinder law enforcement's ability to access data for investigations. Apple maintains that the feature will be available to UK users eventually, but hasn't provided a clear timeline for its reintroduction. While the feature remains available in other countries, this move raises questions about the balance between privacy and government access to data.
HN commenters largely agree that Apple's decision to pull its child safety features, specifically the client-side scanning of photos, is a positive outcome. Some believe Apple was pressured by the UK government's proposed changes to the Investigatory Powers Act, which would compel companies to disable security features if deemed a national security risk. Others suggest Apple abandoned the plan due to widespread criticism and technical challenges. A few express disappointment, feeling the feature had potential if implemented carefully, and worry about the implications for future child safety initiatives. The prevalence of false positives and the potential for governments to abuse the system were cited as major concerns. Some skepticism towards the UK government's motivations is also evident.
The UK government is pushing for a new law, the Investigatory Powers Act, that would compel tech companies like Apple to remove security features, including end-to-end encryption, if deemed necessary for national security investigations. This would effectively create a backdoor, allowing government access to user data without their knowledge or consent. Apple argues that this undermines user privacy and security, making everyone more vulnerable to hackers and authoritarian regimes. The law faces strong opposition from privacy advocates and tech experts who warn of its potential for abuse and chilling effects on free speech.
HN commenters express skepticism about the UK government's claims regarding the necessity of this order for national security, with several pointing out the hypocrisy of demanding backdoors while simultaneously promoting end-to-end encryption for their own communications. Some suggest this move is a dangerous precedent that could embolden other authoritarian regimes. Technical feasibility is also questioned, with some arguing that creating such a backdoor is impossible without compromising security for everyone. Others discuss the potential legal challenges Apple might pursue and the broader implications for user privacy globally. A few commenters raise concerns about the chilling effect this could have on whistleblowers and journalists.
Summary of Comments ( 160 )
https://news.ycombinator.com/item?id=43271177
HN commenters discuss the UK government's removal of advice recommending Apple's encryption, speculating on the reasons. Some suggest it's due to Apple's upcoming changes to client-side scanning (now abandoned), fearing it weakens end-to-end encryption. Others point to the Online Safety Bill, which could mandate scanning of encrypted messages, making previous recommendations untenable. A few posit the change is related to legal challenges or simply outdated advice, with Apple no longer being the sole provider of strong encryption. The overall sentiment expresses concern and distrust towards the government's motives, with many suspecting a push towards weakening encryption for surveillance purposes. Some also criticize the lack of transparency surrounding the change.
The Hacker News post titled "NCSC, GCHQ, UK Gov't expunge advice to 'use Apple encryption'" sparked a discussion with several insightful comments. Many commenters focused on the implications of the UK government's seemingly changed stance on end-to-end encryption.
Several commenters speculated on the reasons behind the removal of the advice to use Apple's encryption. Some suggested it might be related to the UK's ongoing efforts to push through legislation that could potentially weaken end-to-end encryption, like the Online Safety Bill. The idea being that promoting specific encryption methods now could complicate later arguments in favor of breaking or bypassing that encryption. Others posited that the removal was less nefarious, perhaps simply a matter of avoiding the appearance of endorsing a specific commercial product or recognizing the evolving landscape of secure messaging where other platforms offer comparable security.
A recurring theme was the inherent tension between government surveillance desires and individual privacy rights. Commenters debated the merits and drawbacks of end-to-end encryption, acknowledging its crucial role in protecting sensitive communications while also recognizing the challenges it poses for law enforcement.
Some commenters highlighted the subtle language changes in the updated guidance, noting that while the specific mention of Apple encryption was removed, the general advice to use end-to-end encrypted services remained. This led to discussions about the nuances of security advice and the difficulty of providing clear, actionable recommendations to the public without inadvertently promoting specific products or overlooking potential vulnerabilities.
A few technical comments delved into the specifics of different encryption implementations and their relative strengths and weaknesses. One commenter mentioned the potential issues related to metadata, even with end-to-end encrypted messages, and another discussed the importance of verifying the authenticity of encryption software.
Overall, the comments section reflected a nuanced understanding of the complex issues surrounding encryption, government surveillance, and online privacy. Commenters generally expressed concern over the implications of the UK government's actions while also engaging in productive discussions about the technical and societal aspects of encryption technology.