France moves to break encrypted messaging
Messaging App Encryption and Misconceptions
- Several comments note the article blurs important distinctions between apps:
- Telegram is not end-to-end encrypted (E2EE) by default; its “secret chats” are E2EE but clumsy (single device, both parties must be online, few people use them).
- WhatsApp is E2EE but closed source and does not encrypt metadata.
- Signal is cited as properly E2EE and open, but still depends on OS, build reproducibility, and linked-device security.
- Some argue that even open source isn’t enough without reproducible builds and hardened clients (e.g., avoiding Google blobs) and better UX for high‑risk users (politicians, activists).
Metadata vs Content
- Multiple comments stress that metadata is often more powerful than content:
- Communication patterns, timing, social graph links, and location can reveal networks and roles (espionage, terrorism, etc.).
- Intelligence agencies are said to rely heavily on this, and domestic law enforcement is expected to do more of it.
- Others find it disturbing that life‑and‑death decisions can be driven by metadata alone.
French/EU Politics, Lawmaking, and Protests
- Some are surprised that a protest‑prone country is advancing anti‑encryption measures; others respond that protests have repeatedly blocked such laws, but governments keep retrying until something passes.
- There is debate over the EU’s internal politics, the limited real power of the European Parliament, and low approval of many leaders.
- One commenter from France says the fight is ongoing, with no law passed yet, and notes the national cybersecurity agency has publicly argued against encryption backdoors.
- Another points out that a pro‑encryption amendment has passed the Senate, while a conflicting bill is stalled in the National Assembly.
Child Protection Justification
- A reported conversation with a senior French police officer describes the goal as raising the “technical barrier” for accessing child abuse material:
- Typical offenders are portrayed as non‑technical and currently use mainstream E2EE messengers by default.
- Removing easy E2EE is seen as reducing casual access, even if serious criminals move to other tools.
- Others strongly contest this framing, arguing:
- The state shows little real interest in protecting children in other policy areas.
- Such powers will mainly harm ordinary users and activists, while determined criminals adapt.
- Hashing and matching known illegal images is proposed as a targeted alternative; responses link this to broader “chat control” scanning proposals and raise concerns about mission creep and false positives.
Technical Mechanisms and Workarounds
- The “ghost user” proposal is discussed: silently adding a hidden third recipient (the state) to E2EE conversations so encryption still works but is tapped.
- Some note that apps could be compelled via software updates to exfiltrate keys or plaintext, especially if closed source; truly strong E2EE requires trustworthy clients installed from source.
- Others discuss workarounds and evasion:
- Steganography (hiding ciphertext in images or other formats).
- Sending random or structured “gibberish” data that is hard to classify.
- Using separate tools (e.g., file encryption, one‑time pads) over non‑encrypted channels.
- It is considered unclear how authorities would reliably distinguish encrypted data from benign binary formats.
Authoritarian Drift and Irreversibility Concerns
- Many see this as part of a worldwide “war on E2EE” and a broader move toward mass surveillance:
- Fears that all messages will be stored, processed by AI, and selectively read later.
- Concern that encryption users will be treated as inherently suspicious.
- Worries about future restrictions on protests and broader repression once such tools exist.
- Some argue that mistakes or abuses won’t meaningfully affect lawmakers, who will carve out exemptions for themselves, making reversal unlikely once powers are granted.