00:00:00
Canada just joined the club that you do not want to be a part of.
00:00:03
These orders are trying to force Canadian tech companies like VPNs,
00:00:06
cloud providers, and app developers to build surveillance tools into their products.
00:00:10
And if you think it's just Canada, we're seeing this all around the world.
00:00:14
I've been covering privacy for about a decade now,
00:00:16
and I've never seen these attacks be so prolific and so one after the other on a global scale.
00:00:21
And so this is something we need to talk about.
00:00:23
And I want to give you all the tools that you can use to pretty much be proactive
00:00:27
and hopefully prevent any of the stuff from actually passing.
00:00:31
The domino effect is that, you know, it's easy to look at one country,
00:00:34
like in this case, Canada, who's trying to build in encryption backdoors
00:00:38
and go, oh, wow, Canada sucks.
00:00:40
But actually, we have a ton of other people who are doing this as well.
00:00:44
The UK just passed age verification requiring websites to verify the age of their users,
00:00:48
and it's a pretty big rabbit hole for us to go down in a different video, perhaps.
00:00:53
But what's more potentially relevant to this video is how the UK was trying to backdoor
00:00:59
Apple's encryption and Apple fought it.
00:01:01
And I did all the coverage for that.
00:01:02
You can find it in a different video there.
00:01:04
Australia also has wanted an encryption backdoor and literally visited the house of an encrypted
00:01:09
messenger session and forced them to leave the country.
00:01:11
And I want to talk about that because that's very important.
00:01:14
Switzerland even, who is notoriously well known for their pro-privacy stances on things,
00:01:20
have now tried to pass rules that would require VPNs and messaging apps to identify and retain
00:01:25
users' data. The US has continued to try this, and of course we have chat control in the EU that's
00:01:30
also trying to try this all around the European Union. The frustrating part about all of this is
00:01:35
that it's the same playbook everywhere. It's always public safety justifications with a ton
00:01:41
of technical ignorance. These are politicians who don't understand how encryption works. Encryption
00:01:50
anybody can access. There is no middle ground. The other frustrating thing about this is the moving
00:01:55
goalposts. 20 years ago, it was about terrorism and 9-11. Then it was child protection when terrorism
00:02:01
didn't sell as well as they thought it would. Now it's tax evasion and drug trafficking. Tomorrow,
00:02:06
it's going to be copyright infringement or misinformation or any of these other things
00:02:11
to try to justify things that are overall bad for individuals. So not only can we see this domino
00:02:16
effect globally where one country tries to do something and the other one says, that's a good
00:02:20
idea. Let me try that too. There's also this domino effect in terms of moving the goalpost and keep
00:02:24
trying to find new justifications for trying to pass the same thing. If you keep trying to pass
00:02:29
the same thing, but use different justifications for why you're doing it, then maybe those
00:02:33
justifications aren't the reason you're trying to do it. Now I want to talk a little bit about why
00:02:37
this makes me angry, but the real reason for this section is to hopefully give you some language to
00:02:42
understand some of your feelings. Some of the problems here. Laziness. I think this is objectively
00:02:48
lazy. Politicians think encryption is just a lock where you can just make a master key for the good
00:02:53
guys. They refuse to understand that this isn't the case and that cybersecurity is much more
00:02:57
complex than that. It's easier also for them to just say tech companies should fix it and they
00:03:01
need to have all the liability, not us. Their laziness can be summed up as this. It's like
00:03:06
asking an engineer to build a safe bridge that only collapses for bad people. So anytime a
00:03:13
politician is saying, we need to backdoor something, we need to do this, we need to do that,
00:03:17
you need to realize they are taking literally the laziest approach to trying to deal with a very
00:03:23
complicated problem, which is protecting people on the internet as well as keeping countries safe.
00:03:27
Backdoor encryption is the laziest solution. That's problem one. Problem two is the hypocrisy of it
00:03:34
all. Governments themselves use encryption constantly to protect their own communication.
00:03:39
Banks rely on encryption for financial transactions. Somehow, though, citizens don't deserve this,
00:03:45
and they can't be trusted with the same stuff that governments need. Governments seem to
00:03:49
understand when they need to use it, but suddenly don't understand when citizens want privacy.
00:03:54
Three, dishonesty. I don't think that all politicians are just ignorant of how this
00:03:59
stuff works. A lot of them still push the thing of whole backdoors for good guys only, and they are
00:04:05
told constantly by experts why that's not possible. Every expert universally agrees on this basic fact,
00:04:10
yet they still try to push client-side scanning, they still try to push this idea that we need a
00:04:15
backdoor, and they have this myth of just targeted surveillance that only seems to impact individuals
00:04:19
doing something wrong when we know that surveillance typically requires surveilling everybody just to
00:04:25
maybe catch one or two people. And the last problem is this has a chilling effect. We have services
00:04:31
that are leaving countries over this stuff, right? So Session left Australia for Switzerland, and also
00:04:38
Proton, due to Switzerland now going down the chute, is leaving Switzerland for the EU. I hope Session
00:04:45
doesn't have to move another country now, but this is causing valuable services to leave the countries
00:04:52
that they're a part of. It stifles innovation. Why would you ever build private or secure services
00:04:56
when the government will break them anyway? And also, it's self-censorship. No one wants to be on
00:05:01
an internet where they feel like the government or companies are tracking every little thing they
00:05:05
say or do. And this is why people seem to really be enjoying end-to-end encrypted services like
00:05:10
iMessage or WhatsApp pretty much all around the world. They want to feel like their conversations
00:05:15
are safe. You should know if you're using WhatsApp especially, it's a bit of an asterisk there,
00:05:19
So maybe check out my video covering WhatsApp recently.
00:05:21
So now we've covered why it's pretty overall valid
00:05:24
to be frustrated about everything going on.
00:05:26
I now want to share why I'm still optimistic
00:05:29
about what's happening.
00:05:30
First, the resistance does work.
00:05:32
Even big tech companies,
00:05:34
which we're not friends with at all back here,
00:05:37
actually pushed back against a lot of this
00:05:39
because they still see value
00:05:40
in having their customers be safe.
00:05:42
So Apple fought against the UK's encryption order
00:05:45
and they're doing pretty darn well
00:05:47
because as of the most recent coverage that we saw about a week ago, the UK is rumored to be
00:05:52
backing down on their demand for backdoor access to Apple's end-to-end encrypted iCloud. Now,
00:05:57
this was due to political pressure from the US, and we can get into the nuances of that
00:06:03
in a different video, perhaps. But there is pushback, and we even see the same thing with
00:06:08
WhatsApp, who did tell BBC it backs Apple in the legal battle with the UK over user data.
00:06:14
Now, that's resistance, but even if resistance falls, there's still some things to be optimistic about.
00:06:19
We have decentralized protocols that are becoming harder and harder to control that no government can really stop.
00:06:24
We have open source encryption. We have mathematical reality where you can't ban math.
00:06:29
And so realistically, no matter how much a country tries to ban end-to-end encryption, you're always going to be able to connect to Tor.
00:06:36
You're always going to be able to use encryption when you need it.
00:06:39
I personally think that anybody technical will always have the option to use some of these more sophisticated tools.
00:06:44
But why we don't want to get here is because we want everybody to be a part of that.
00:06:48
And if we only have encryption for just a select few people who know what they're doing, then it's not really a net good.
00:06:55
It's just leaving privacy and security for the select few who know what's going on.
00:06:58
One other really important thing for us to keep in mind is there is an economic reality here.
00:07:03
Digital economies and shopping online and all this stuff kind of depend on encryption.
00:07:07
There's also competitive disadvantage for companies that break encryption.
00:07:11
They lose tech investment and they're going to lose talent.
00:07:14
Like if Proton decides to leave Switzerland completely, and we've also seen Session leave
00:07:19
Australia, like you're losing valuable talent.
00:07:22
What if one of these big tech companies says we're going to leave the US?
00:07:25
That's going to put the US in a really crappy spot.
00:07:27
And in a similar note, there's brain drain.
00:07:29
If a country is going to start bringing in the privacy and security tech that some of
00:07:32
the brightest minds are putting together, they're going to leave for more privacy-friendly
00:07:36
jurisdictions.
00:07:36
And so as a country, they are not directly incentivized to really make enemies of these
00:07:41
organizations.
00:07:42
Put simply, there are still many reasons to be optimistic.
00:07:45
And we need to be optimistic if we're going to have something to fight for, right?
00:07:48
If we all just think, ah, it's going to happen anyway, then they've already won and there's
00:07:51
no reason to put up a fight.
00:07:52
So I encourage all of you to find something that makes you optimistic and makes you feel
00:07:56
good about what's happening.
00:07:58
Otherwise, you're not going to be spending any time or energy to do anything about it.
00:08:01
On this note, what can we actually do?
00:08:05
I want to start by saying the easiest thing you can do. Individual actions that anybody can start
00:08:09
right now. Use encrypted services. The more of you out there who are using it and encouraging other
00:08:15
people to use these services, the more normalized they're going to be, the more that other people
00:08:21
will be using them, and the more that countries will go, oh yeah, there's nothing illegal about
00:08:25
using this. Get a VPN. Get a DNS service. Get an end-to-end encrypted messenger. Use these services.
00:08:31
It really makes a difference, and you're also giving them your support.
00:08:35
So if you do use any of these services, consider supporting them with your wallet,
00:08:38
especially if it's in place of a big tech service that doesn't have privacy or security.
00:08:42
You're directly supporting those private alternatives that should ideally be the defaults.
00:08:47
This is all on our website, by the way.
00:08:49
You can check it out.
00:08:50
And also, if you go down to digital rights at the bottom,
00:08:53
it's going to go to the next thing that I want to talk about,
00:08:55
which is support organizations who are fighting especially the legal battle.
00:08:58
all of these orgs here do some kind of legal advocacy.
00:09:03
And that's a really important area for us to also be targeting.
00:09:06
And lots of us, including myself, don't have the skill set and time and patience to fight
00:09:11
the legal fight, but these people do.
00:09:13
And or you can contact representatives and tell them how you feel about some of the stuff
00:09:17
they're passing.
00:09:18
And again, don't forget to support some of these privacy-friendly businesses because
00:09:22
they're the ones who are actually building the next reality.
00:09:24
And again, make sure to maintain long-term optimism.
00:09:26
Remember that there's generational change.
00:09:28
A lot of people who are older might not understand this stuff, but some of the younger people
00:09:32
might actually come into office and be a bit more passionate about this.
00:09:36
Remember, there's international competition, and these companies also need homes, and a
00:09:40
lot of countries want these companies in their homes.
00:09:43
And remember that there's technical innovation as well.
00:09:46
These tools are going to get better.
00:09:47
Decentralized protocols are going to get better.
00:09:50
And a lot of this tech is going to become harder and harder to stop as these services
00:09:53
ideally become more resilient to things like encryption backdoor requests. And if we zoom
00:09:58
out for the bigger picture, why this matters beyond just privacy. One of my favorite articles
00:10:04
online is actually this really old Tor site. I wish they updated this, but it pretty much just talks
00:10:09
about all the people who use Tor. It talks about normal people using Tor, journalists, law enforcement,
00:10:16
activists, whistleblowers, high and low profile people, business executives, bloggers, militaries,
00:10:21
IT professionals. Literally everybody has some kind of use case for Tor, and it's not always
00:10:27
just privacy. Remember that this is important for journalists protecting sources, which is important
00:10:32
for maintaining democracy. We need activists. We need dissidents who are communicating freely and
00:10:37
aren't under pressure from administrations. Remember that the slippery slope actually can
00:10:41
be real. A lot of the surveillance tech that's being pushed on us was originally for terrorism.
00:10:44
Then it was protecting kids. Now it's really looking like tax enforcement more than anything.
00:10:49
And also remember that a lot of the surveillance technology is part of the authoritarian playbook.
00:10:54
So democracies that adopt authoritarian tools to spy on their citizens are not doing them a long-term service.
00:11:00
So don't despair and look at the news and go, oh no, another country.
00:11:05
Get active.
00:11:06
In the last five years, these attempts keep coming forward and not all of them actually succeed.
00:11:11
A lot of them have enough pushback where they don't happen or they keep delaying it or they have to water down the amount of surveillance.
00:11:18
So keep in mind that you being active and actually getting involved is a big difference.
00:11:22
And this is a fight that we can win, but only if we engage.
00:11:26
Make sure you're supporting the correct organizations, companies, and also channels and people that
00:11:30
you look up to to fight for this kind of stuff.
00:11:32
And the future of privacy, again, depends on what you're doing now, as well as just digital
00:11:37
rights as a whole.
00:11:38
A lot of people are waking up to this, but not everybody.
00:11:40
And you can be a part of the solution and getting those last few people up to speed.
00:11:44
And that really is some of the biggest impact you can make.
00:11:47
Thanks for watching, and I'll see you next time on Techlore.