Bugs in our pockets: the risks of client-side scanning

Author:

Abelson Harold1,Anderson Ross23,Bellovin Steven M4,Benaloh Josh5,Blaze Matt6,Callas Jon7,Diffie Whitfield8,Landau Susan9,Neumann Peter G10,Rivest Ronald L1,Schiller Jeffrey I1,Schneier Bruce1112,Teague Vanessa13,Troncoso Carmela14

Affiliation:

1. Computer Science & Artificial Intelligence Lab, Massachusetts Institute of Technology , 77 Massachusetts Avenue, Cambridge, MA 02139 , United States

2. Computer Laboratory, University of Cambridge , JJ Thomson Avenue, Cambridge CB3 0FD , United Kingdom

3. School of Informatics, University of Edinburgh , 10 Crichton Street, Edinburgh EH8 9AB , United Kingdom

4. Department of Computer Science and affiliate faculty, Law School, Columbia University , MC 0401, New York, NY 10027 , United States

5. Microsoft Research, One Microsoft Way , Redmond, WA 98052 , United States

6. Department of Computer Science and Law School, Georgetown University , 3700 O St NW, Washington, DC 20057 , United States

7. The Electronic Frontier Foundation , 815 Eddy Street, San Francisco, CA 94109 , United States

8. Gonville and Caius College, Cambridge University , United Kingdom

9. The Fletcher School and School of Engineering, Department of Computer Science Tufts University , 160 Packard Ave, Medford, MA 02155 , United States

10. Computer Science Lab, SRI International , 333 Ravenswood Ave, Menlo Park, CA 94025 , United States

11. Harvard Kennedy School and The Berkman Klein Center for Internet & Society, Harvard University , 79 John F. Kennedy Street, Cambridge, MA 02138 , United States

12. Inrupt, Inc. , Boston, MA 02138 , United States

13. College of Engineering and Computer Science, Australian National University , Canberra, ACT 2600 , Australia

14. SPRING Lab, Ecole Polytechnique Federale de Lausanne, Rte Cantonale , 1015 Lausanne , Switzerland

Abstract

Abstract Our increasing reliance on digital technology for personal, economic, and government affairs has made it essential to secure the communications and devices of private citizens, businesses, and governments. This has led to pervasive use of cryptography across society. Despite its evident advantages, law enforcement and national security agencies have argued that the spread of cryptography has hindered access to evidence and intelligence. Some in industry and government now advocate a new technology to access targeted data: client-side scanning (CSS). Instead of weakening encryption or providing law enforcement with backdoor keys to decrypt communications, CSS would enable on-device analysis of data in the clear. If targeted information were detected, its existence and, potentially, its source would be revealed to the agencies; otherwise, little or no information would leave the client device. Its proponents claim that CSS is a solution to the encryption versus public safety debate: it offers privacy—in the sense of unimpeded end-to-end encryption—and the ability to successfully investigate serious crime. In this paper, we argue that CSS neither guarantees efficacious crime prevention nor prevents surveillance. Indeed, the effect is the opposite. CSS by its nature creates serious security and privacy risks for all society, while the assistance it can provide for law enforcement is at best problematic. There are multiple ways in which CSS can fail, can be evaded, and can be abused.

Funder

National Science Foundation

Publisher

Oxford University Press (OUP)

Reference73 articles.

1. Keys under doormats: mandating insecurity by requiring government access to all data and communications;Abelson;J Cybersecur,2015

2. The risks of key recovery, key escrow, and trusted third-party encryption. A report by an ad hoc group of cryptographers and computer scientists;Abelson,1997

3. Moving the encryption policy conversation forward;Carnegie Endowment for International Peace,2019

4. The law and policy of client-side scanning;Rosenzweig;Lawfare,2020

Cited by 2 articles. 订阅此论文施引文献 订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献

1. The Encryption Debate: An Enduring Struggle;Proceedings of the Fourteenth ACM Conference on Data and Application Security and Privacy;2024-06-19

2. Private Hierarchical Governance for Encrypted Messaging;2024 IEEE Symposium on Security and Privacy (SP);2024-05-19

同舟云学术

1.学者识别学者识别

2.学术分析学术分析

3.人才评估人才评估

"同舟云学术"是以全球学者为主线,采集、加工和组织学术论文而形成的新型学术文献查询和分析系统,可以对全球学者进行文献检索和人才价值评估。用户可以通过关注某些学科领域的顶尖人物而持续追踪该领域的学科进展和研究前沿。经过近期的数据扩容,当前同舟云学术共收录了国内外主流学术期刊6万余种,收集的期刊论文及会议论文总量共计约1.5亿篇,并以每天添加12000余篇中外论文的速度递增。我们也可以为用户提供个性化、定制化的学者数据。欢迎来电咨询!咨询电话:010-8811{复制后删除}0370

www.globalauthorid.com

TOP

Copyright © 2019-2024 北京同舟云网络信息技术有限公司
京公网安备11010802033243号  京ICP备18003416号-3