Crocodile clip software

broken image

Rather than crack or weaken the underlying cryptography, the spies want to warp the software and user interfaces wrapped around it to let them silently eavesdrop on conversations. In effect, the super-snoops are proposing that they be allowed to subvert a cornerstone of encrypted apps – public key verification – to eavesdrop on conversations, and that the companies that develop the apps turn a blind eye to it. And it would be 'no more intrusive than the virtual crocodile clips that our democratically elected representatives and judiciary authorize today in traditional voice intercept solutions and certainly doesn’t give any government power they shouldn’t have.' Such an approach would retain strong end-to-end encryption but introduce 'an extra 'end' on this particular communication,' they argue.

broken image

'The service provider usually controls the identity system and so really decides who's who and which devices are involved – they’re usually involved in introducing the parties to a chat or call.' Extra end-run 'It's relatively easy for a service provider to silently add a law enforcement participant to a group chat or call,' they argue.

broken image