Bestand wählen
Merken

WTFrance

Zitierlink des Filmsegments
Embed Code

Automatisierte Medienanalyse

Beta
Erkannte Entitäten
Sprachtranskript
tree and
and and a
a thank gets um I have the pleasure and the on the of introducing to you to persons here and why are we working at um like the what do you the full gamut a quality units milosevic architectures on enforcing and that's an organization NGO was actually working really on the rights on freedom of citizens on the internet um I understood that US is they're responsible for the coordination mainly about legal issues and that the bookie announced as well use more responsible out the technical sites and so I think you could get a bunch of volunteers are helping you around please give them a welcome applause that's the shields and you want to the so hello so
we hear here's opinion but has already be introduced as the tape presenter like other to that end up uh Agnes and am I work on the legal and political issues at a college as well select a larger than organizations that fight for fundamental rights and freedoms the area we here today to talk about the dangers lying in above that you chose especially if you're building or maintaining cryptographic cryptographic tools we here because of we think it's important to demonstrate that the worst authoritarian lows don't only comes up from plots uh on the don't only comes from far-right government that such as the Hungarian employment but mostly from the Social Democracy compatible with market economy to quota and get a medical the so all along with Germany and the United Nations and the United Kingdom but was breaks it at the UK as far as is 1 of the biggest forces within the U N difference can well yet he is 1 of the 2 0 there's a board it can obtain what it wants from its European partners it works both ways of course and uh a bit it's important because the problem is that process that only exporting its slowly and practice of law-enforcement than on the written brighter to here the to various government such as Tunisia or others uh for this no also shining for it's on the privacy lobbying as you will see later the the looks no the so the what's interesting is to think about what we can do as technicians and repulsive that means ups only got the sons of the service technology issues because the sets come from the got political and technical area and and engine that any as but also sex workers abuse woman and it is people who need to figure out and so on and so on we have to think about our and to find ways to act to fight against the threats against inscriptions the we're going to start with a quick but sadly non-existent history of flows and trying to weaken as a common cryptography in France 1 way or another we'll including everything that the talks about spyware and and Q girls because they're just reject set against the audit of cryptographic tossed and OK so let's be clear here that we are only new talk about very specific aspects of the digital rewritten low uh access to the Internet filtering censorship could probably be discussed in the talks with the same quantity of holes hindering those rights but to focus here with 2 were filming
before 1998 uh the use of cryptographic tools for the public was essentially forbidden the killings was created to 120 8 bits for the symmetric group telephony there is no authentication of communication or a for ensuring integrity of the message that declaration of business the management of for all other users especially for confidentiality uh X on their authorization from Prime-Minister was required as well the in the after
negotiation with the Internet services cryptography has been afraid in 1998 but it's regret that the system used with which 1 of those freedom mutation and the cryptographic system can be used for confidence proposes without a position also cryptographic system is a prodded by of somebody owning a master key which support his may of access to also use that made a stronger finish it income uses encryption said solution was that he was and what rights this on the use of a user and a and B and in the
in the time of the year I was 1 of the and I mean and you here we have 4 and theory and you and because of the year the and on and and the the the the
the the kind of guy you know and and and that is the the in which you have and and and on the and you know and and and and so on the the so to is get the right and the right to use so since uh since then cryptographic digitization has that really
evolved a however 1 national security all come to aloft the uh we had something like a treaty of them in the last 15 years the judiciary and repressive arsenal to world for example a police where authorized to extend to appears in the l that looks you know we truth so the 11 Don and police uh where are authorized to force AT Pearson on t to think as well uh they think are able to decrypt and we or analyze it to analyze a created content they get their hands on in the content to reasonable of 2014 and the army and that is the density of course can have to do so descriptor analysis if needed the and and the and you and the information of the user and the and the and the and look at and and the the yes can you hear it in the it also provides enough and example tests the and thanks to the state of emergency since 2015 and no made prominent in uh last October so translation nobody thought on man who on suspicions uh after the fact without any investigations the 0 a collection of any that often on site and that I give you extra months is accepted the and if I can visited can decide to attend them and vanity and it's indicative and research and without any investigative power the so to conclude this depressive state of case we need to add that cryptography is an aggravating circumstances but in a long list of crimes info is linked to uh during the link from a primary to organized crime and terrorism but also commit and he to edit procedures for example so encrypting things makes you even more suspect and guilty low and we almost all it has value of what you can do that exist and foster parties you have an obligation to provide eyes decryption key your brain takes 2 cups is actually for it and of 72 hours to comply the which means that of pressure on you and where we can apply to use your brain investigated about but it might a clash with a high tolerance silent Internet that incriminate we do not have a lot of just put on here but we recently at cases where a groups uh was was as low as being used 1 of them was requested to nature 2 . Dickinson key fallen into the chat was utterly was approaching and which have been used by people will make think mom and on the article by that excludes the on for 1 more window and 401 K is for 1 of such given about how many of them have gone unnoticed report choosing to keep that i've going and to avoid the j at J demonstrates use finds so here it's important to know that there's difference being made a between cryptographically which enforces security communication and so cryptography which enforces confidentiality In this presentation we are addressing the issue of cryptography in the concept context of confidentiality on me um to illustrate that these debates goes beyond the classic lines of left-right politics would like to display some quotes on the topic by various the minister ministers candidates anecdote representatives and swimming and political speakers the for example in
a big city he is a member of parliament from the right thing he wants to find a full 1 . 5 million Joe if they refuse to give a quick every encryption cues among other approaches things he said this is 1 taking hold for someone else the
price was a control vote either but into New York times uh against could the that Italy squared explicit state 1 foot acquisitions block justice the their attitudes about
important of uh and event the truth about the importance of privacy rights of individual and it is a part of of marginal benefit of 4 disk and fiction and is saying this board it was escorted the response junior officers the if monotone adamantly part commission often density Porteous and Hovy of that was a key for a could all of have called into of Spain I if it truly to court so in all its splendor all the so we have also
due to pass a from the a in a society we talked about before he said just before the but the attacked and to southern involved in that backdoors nt sequestrations is about idea and that he instead proposes to work on points of the text whatever arrangements it probably the stamp was transport security against confidentiality of communications the and that is then
Prime Minister not use the term ligand cryptographically interviews the officer discourse fossilized 2004 was that about cryptography was legal it the
here are the digital national concealed their chaired by you know measure v who no Secretary of State for digital issues did 0 pose the ideas of by actors n did advocate for the use and development of end-to-end encryption just before the presidential electoral race you see later why it's important the the
activity and so addictive properties right uh actually of drugs on lines of cocaine of 8 euros a common uh on images of this is due to Volvo that shows it is the answer said you can buy it doesn't get there and that's it is 0 then of interest online he also bought that of works hominid it and his his website was that it is around socially is encryption is at 40 the social regularized
and I was the Minister of Justice said she wanted uh to access computers communications and so on and and to put all suspected there aren't rates of entered and the permanent recording peel so um wall between the 1st and 2nd turn
of the last presidential elections he the upon version of the great and sent to the left of who is a member of parliament from the right thing and the information that was investigated gated upon if you send a message by with the telegram and the note was saved on cheese that as form and from during a police search and at his house data on In
our was some 60 and there was a categorization of 2 other major about as an entailment is a minister of Germany infants spectively ago your presence of security and the states that at your than between query to forces the uncooperative about all the label illegal content of to decode message during investigation however the so so
it was a joint communication that French written version of the template declaration was different that Germans on the farm and kept the part about uh how it would be so great to have by doors open and keys so I did Germany you don't want that to be the key uh toolkit for by or they had to a different strategy but unfortunately very result the the same them as yeah announced that he wanted to force taken car companies to provide the security services with hidden digital access to all devices and machines as you probably did not know that if you lowered security of car you will dramatically increase the risk of accidents among others photos this was before McCall was elected last
and it's like an actual photo it's not to photoshop and during his presidential campaign in manner that causes that we should put an end to code 2 could do that he was wasn't the biggest company to provide a different q on to give access to decoded content 13 stating that supports when David after the responsible of terror text complicity and quotes so when measure began to wear
them concerning the it and he's now Internet's Minister and he has been forced by peter down and to extend that missing we'd end 20 could do what he was out of question and that that was the 4th companies to corporate plasterers police forces he specifically emphasized the importance of cryptographic by companies is to protect trade and industrial secrets and since then and whenever dubious began the police to silent on this topic the so it seems that encryption for confidentiality is the real problem for them but would you be surprised to know that to
communicate with his political party representatives in Michael now President users to run an application regularly described by a lot of free uh of representatives as an enabling to resume tool and which are and should be banned words but ours animal farmers
back we all equal with the use of cryptography but some are more equal than the others coupled with his focus on predicting companies sacred this common and that the start of nations doesn't care about protecting citizens but only about business and powerful friends this becomes better to use when you look at my post socialist economies polices last but not least acid is if the
government put pressure on to unintelligible beautiful cops to ask you for or a few online and those including that or you be books I secure number your Twitter or Facebook account also we be in use on IRC and stuff like that that's why might is going to Fellbaum and but it it was a joke but I think we can get more current events right away to be more descriptive was that 1 cups would have to enter it into their systems to identify these meadows already annotated at some point uh this kind of legislation already exist in the UK and the US and we also government wants succeed in to put this kind of a limitation in the so as demonstrated by frost is 1 of the
very active uproar against could directly within the you in any some of other Member States did express some constant is constants and in many putting pressure Hungary tell you that idea of the scope of the country add a constant having prompted by other Member States and probably of France it's new deal is a is to reduce the use of cryptographic especially with the criminal digital art judiciary those that are coming soon for for instance France is pushing hard for inviting any obligation on end-to-end encryption In the privacy
regulation they're explicitly asked to get access to 80 communication omitted that upon the at which is why it is written here in French sorry we didn't from city the government also pushes to obtain a you on encryption which would mean that transcription of course and the government intends to then to use at this said you the decision for justifying its position did created this proposal at the at the 1st best place and the next long z e the discussions on the fence will start that you the label as well they would probably be a lot of talk about cryptography endemics counter to respect expected in 2 thousand and 18 so counter-terrorism is always a good way for the government to make comparisions to enhance security and to lower the rights and freedoms at this rate and the parliament to be responsible of the next attack and Member of parliament's put anything just because they don't want to be that responsible the so
as to cation what can we do with our political perspective what we think we should all about communication and cluster to and systems in a good constraint noise it is important to breed and detector whatever cricket communication systems that breaks the linking between your online communications and you making those tools available to that inevitably can method of by them is a critical opinion issued if the jury of such to grow as agism system might block access to high-quality privacy-preserving encryption tools of point sources of erotic whales due to the user and the form and obtain a certificate from them to Joseph on the unseeable external auditors and although it is bound to the equator or because if you encrypted communication relies on a goes on to arise and to other ID identifying piece of information such as for instance of 1 number of us there is no such as an ANSI catches come get your phone number for the point you were apps for instance and then guess what your account is and then the go to from the but also the can ask to deploy pro-aquino grows and the spyware under forms uh this and those taking all those security based on your phone number at a time when more and more governments want to indoor encryption and circuit of communication it is critical to have access to communication system that only to the most decentralized and distributed to the widest audience possible many cues of many years and to think about way to push the stores everywhere the it is also
so important to the political buttons we need more available at the start of this attack at a national and European level as we need to get out of the security discourses and 2 but existing between encryption and security forces state I and to candles are guided undertake people committing crimes and to use greater message we need a positive discourse about creativity I which as people of was that they realize I which improves versatile I would put his identity of as I which EVs abuse women to seek an end to escape their all I would and about a positive change in the society as mentioned often come from activities not approved by the society if you want more corporate state and ways to interact with calculating a support complaints so you recognize just as there are 2 books but like what the net on after the Q and a because with some time left so you can go make some years at was so I knew the and building and have some tea and chat with us thank you all
for listening and you will be question as it was time and the was word
questions um people the out there may be on the internet goes I don't see you know some people here ofquestions produced it's lovely organization well I have a question and need to give us some advice regarding um using avatars so alter egos that's 1 1 thing there you know what I what happens I'm teaching as well and my colleagues teachers even in that kind of digital age that we live in are always wondering when using several Avatara several devices is that is that it's not that it seems like it's not accepted the action because they're looking at your like are you a criminal what would you do wrong did you get that kind of questions from your audience on yes we got that a lot of this thing is that of people commit crimes using them we name and ideas and stuff like that most of the people asking people online for instance do not used to doing most account of system either that they want to be known as RC peoples and stuff like that so it's like we need to get out of this kind of discourse on the air and do whatever I want with my online identities it's not your business and if I'm doing something wrong you have to pull it back with due process of law once afraid of a k a k a k a c there is a Gaussian raising your Mike from number 2 and what counts and practices import and export of photography in if I'm in france and ITER download Open SSL do I have to say that the and as a site for more than 1 not for all the necessary because it's not a diversity knowledge that article that no have a goal to provide a profit Treaty of communication which is and encryption and so look GPG or yet gptd aquellos are supposed to have an important cadences and a sings evidence and for individuals were for organizations as the Organization which provides user access to the to goes the supposed wear that uploaded to Microsoft on the other hand we understood but I think the dentist the fields of the summit of people working do Linux is solutions should do it and so far good so I'm going to you're going from 1 making so much for the top of I really want to hear a little bit more about the very crunchy that that's about encryption policy in France now might not be the right time on by billion for the last question of what kinds of laws the policy around taking encryption technology outside of France like across a border what for exporting picomolar which technology it there is a vast agreements uh signed by several countries and it's uh so I don't know by heart everything in the in their beds for all the uh which is about a little below and the evidence good use systems and for example a system that can use of forewarning and for forwarded you I and use in an then you have my it's it's forbidden odds and you have to declare that you're exporting such tools at a Toronto for exporting you have this must not agreement as and if if ever there is still I think there is nothing else if it's not a double use system I knew would take 1 last question at least there exists a tree it's seems to me that all of these laws were mostly falling under national security or the any laws we challenge uses the European level also on the European level this wonderful direct Data Protection Directive all the stuff from my understanding is that all these directives not the thinking can opt out of them for national security reasons to is anything that can be done on any level without invoking a national security exception I while all other than average that data protection regulation and police is body you label and especially the the rate of the TTP the to but the prediction of regulation and has a specific on provisions that enable Member States to say OK it doesn't apply because it's the national security issue and right now what I said that I showed here what there is that in that the privacy regulation which is currently under negotiation at the you label the EU parliament has already adopted and of position which uh promotes encryption as well as the it's possible to have an end-to-end encryption and that's why the french government is trying to push it away uh there will be a negotiation between the comes here that the European Parliament the and the European Commission the considered represents all Member States so there will be a negotiation with all the other institutions beginning in December probably are just after the summer but maybe a little bit before uh um and then the French government is going to try to push it away so to try and as as as we show in the in the document which I just we we we show in in French and the government is trying to
0 uh get to get access
to all communications and that are uh we it's
very clear in the French the communication and
we we showed uh I may make a
suggestion that they have some task the
house you have to continue this discussion later on there with a cup of
tea and some massage maybe uh um I have 1 last call for you both you know and the audience and the medieval or sigh says that's slowly 108 and the rule ss just
as in my mind
theft
which to
Einheit <Mathematik>
Selbst organisierendes System
Rechter Winkel
Kryptologie
Computerarchitektur
Farbverwaltungssystem
Koordinaten
Internetworking
Telekommunikation
Bit
Subtraktion
Prozess <Physik>
Selbst organisierendes System
Kombinatorische Gruppentheorie
Whiteboard
Internetworking
Authentifikation
Kryptologie
Autorisierung
Existenzsatz
Kontrollstruktur
Spyware
Autorisierung
Fundamentalsatz der Algebra
Datenmissbrauch
Kryptologie
Gebäude <Mathematik>
Magnetbandlaufwerk
Plot <Graphische Darstellung>
Datenfluss
Integral
Dienst <Informatik>
Forcing
Flächeninhalt
Menge
Rechter Winkel
Symmetrische Gruppe
Deklarative Programmiersprache
Authentifikation
Ultraviolett-Photoelektronenspektroskopie
Message-Passing
Chiffrierung
Physikalisches System
Chiffrierung
Ortsoperator
Kryptosystem
Bereichsschätzung
Rechter Winkel
Kryptologie
Autorisierung
Physikalisches System
Registrierung <Bildverarbeitung>
Schlüsselverwaltung
Physikalische Theorie
Service provider
Telekommunikation
Subtraktion
Selbst organisierendes System
Natürliche Zahl
Selbstrepräsentation
Gruppenkeim
Aggregatzustand
Kombinatorische Gruppentheorie
Service provider
Internetworking
Kryptologie
Bildschirmfenster
Computersicherheit
Translation <Mathematik>
Indexberechnung
Inhalt <Mathematik>
Gerade
Metropolitan area network
Analysis
Leistung <Physik>
Software Development Kit
Softwaretest
Travelling-salesman-Problem
Computersicherheit
Klassische Physik
Mailing-Liste
Binder <Informatik>
Kontextbezogenes System
Ranking
Algorithmische Programmiersprache
Kreisbogen
Dichte <Physik>
Druckverlauf
Chiffrierung
Forcing
Rechter Winkel
Digitalisierer
Universal product code
Information
Verkehrsinformation
Aggregatzustand
Chiffrierung
Abstimmung <Frequenz>
Chiffrierung
Schlüsselverwaltung
Gamecontroller
Hill-Differentialgleichung
p-Block
p-Block
Aggregatzustand
Randverteilung
Telekommunikation
Datenmissbrauch
Punkt
Computersicherheit
Hintertür <Informatik>
Rang <Mathematik>
Datenmissbrauch
Regulator <Mathematik>
Whiteboard
Ereignishorizont
Dichte <Physik>
Chiffrierung
Rechter Winkel
Mini-Disc
Fokalpunkt
Endogene Variable
Mereologie
Punkt
Mini-Disc
Schlüsselverwaltung
Chiffrierung
Kryptologie
Digitalisierer
Kryptologie
Primideal
Softwareentwickler
Term
Einflussgröße
Aggregatzustand
Office-Paket
Datensatz
Web Site
Chiffrierung
Datennetz
Datenverarbeitungssystem
Kategorie <Mathematik>
Permanente
Bitrate
Gerade
Bildgebendes Verfahren
Kategorizität
Computersicherheit
Versionsverwaltung
Content <Internet>
Abfrage
Nichtlinearer Operator
Bildschirmmaske
Message-Passing
Forcing
Information
Decodierung
Inhalt <Mathematik>
Message-Passing
Aggregatzustand
Virtuelle Maschine
Telekommunikation
Dienst <Informatik>
Digitale Photographie
Offene Menge
Computersicherheit
Digitalisierer
Deklarative Programmiersprache
Mereologie
Strategisches Spiel
Versionsverwaltung
Inhalt <Mathematik>
Schlüsselverwaltung
Einflussgröße
Chiffrierung
Forcing
Kryptologie
Selbstrepräsentation
Kartesische Koordinaten
Wort <Informatik>
Internetworking
Tabelle <Informatik>
Facebook
Druckverlauf
Punkt
Twitter <Softwareplattform>
Kryptologie
Atomarität <Informatik>
Inverser Limes
Zahlenbereich
Physikalisches System
Fokalpunkt
Ereignishorizont
Leistung <Physik>
Telekommunikation
Domain <Netzwerk>
Datenmissbrauch
Ortsoperator
Computersicherheit
Kryptologie
Telekommunikation
Paarvergleich
Bitrate
Gesetz <Physik>
Entscheidungstheorie
Druckverlauf
Chiffrierung
Gruppentheorie
Rechter Winkel
Kryptologie
Zellularer Automat
Digitalisierer
Ganze Funktion
Computersicherheit
Regulator <Mathematik>
Modallogik
Instantiierung
Aggregatzustand
Nebenbedingung
Telekommunikation
Punkt
Ortsoperator
Kommunikationssystem
Mathematisierung
Geräusch
Zahlenbereich
Übergang
Bildschirmmaske
Perspektive
Computersicherheit
Spyware
Speicher <Informatik>
App <Programm>
Digitales Zertifikat
Computersicherheit
Kryptologie
Güte der Anpassung
Gebäude <Mathematik>
Quellcode
Physikalisches System
Chiffrierung
Forcing
Chatten <Kommunikation>
Digitaltechnik
Information
Message-Passing
Aggregatzustand
Instantiierung
Telekommunikation
Bit
Web Site
Prozess <Physik>
Ortsoperator
Selbst organisierendes System
Zahlenbereich
Zählen
Gesetz <Physik>
Richtung
Übergang
Internetworking
Netzwerktopologie
Prognoseverfahren
Gewicht <Mathematik>
Nichtunterscheidbarkeit
Delisches Problem
Regulator <Mathematik>
Avatar <Informatik>
Umwandlungsenthalpie
Datenmissbrauch
Computersicherheit
Güte der Anpassung
Ausnahmebehandlung
Physikalisches System
Bitrate
Chiffrierung
Datenfeld
Offene Menge
Digitalisierer
Ablöseblase
Verbandstheorie
Wort <Informatik>
Brennen <Datenverarbeitung>
Aggregatzustand
Instantiierung
Telekommunikation
Schlüsselverwaltung
Kryptologie
Mathematisierung
Systemaufruf
Content <Internet>
Schlussregel
Nichtlinearer Operator
Task
Chiffrierung
Physikalisches System
Message-Passing
Gewicht <Mathematik>
Datenverarbeitungssystem
Autorisierung
Fokalpunkt
Verbandstheorie
Punkt
Registrierung <Bildverarbeitung>
Hypermedia
Medianwert
Systemprogrammierung

Metadaten

Formale Metadaten

Titel WTFrance
Untertitel Decrypting French encryption law
Serientitel 34th Chaos Communication Congress
Autor Agnes
Okhin
Lizenz CC-Namensnennung 4.0 International:
Sie dürfen das Werk bzw. den Inhalt zu jedem legalen Zweck nutzen, verändern und in unveränderter oder veränderter Form vervielfältigen, verbreiten und öffentlich zugänglich machen, sofern Sie den Namen des Autors/Rechteinhabers in der von ihm festgelegten Weise nennen.
DOI 10.5446/34807
Herausgeber Chaos Computer Club e.V.
Erscheinungsjahr 2017
Sprache Englisch

Inhaltliche Metadaten

Fachgebiet Informatik
Abstract France is part of the top countries trying to destroy encryption, especially through backdoor obligations, global interceptions, and effort to get access to master keys. French law already criminalises the use of encryption, imposing heavier penalties on people using it or regarding them as general suspects. How can we oppose this trend? What political role for developers?
Schlagwörter Ethics, Society & Politics

Zugehöriges Material

Video wird in der folgenden Ressource zitiert

Ähnliche Filme

Loading...
Feedback