Back to Search Start Over

Bugs in our Pockets: The Risks of Client-Side Scanning

Authors :
Abelson, Hal
Anderson, Ross
Bellovin, Steven M.
Benaloh, Josh
Blaze, Matt
Callas, Jon
Diffie, Whitfield
Landau, Susan
Neumann, Peter G.
Rivest, Ronald L.
Schiller, Jeffrey I.
Schneier, Bruce
Teague, Vanessa
Troncoso, Carmela
Source :
Journal of Cybersecurity, 10(1), 2024
Publication Year :
2021

Abstract

Our increasing reliance on digital technology for personal, economic, and government affairs has made it essential to secure the communications and devices of private citizens, businesses, and governments. This has led to pervasive use of cryptography across society. Despite its evident advantages, law enforcement and national security agencies have argued that the spread of cryptography has hindered access to evidence and intelligence. Some in industry and government now advocate a new technology to access targeted data: client-side scanning (CSS). Instead of weakening encryption or providing law enforcement with backdoor keys to decrypt communications, CSS would enable on-device analysis of data in the clear. If targeted information were detected, its existence and, potentially, its source, would be revealed to the agencies; otherwise, little or no information would leave the client device. Its proponents claim that CSS is a solution to the encryption versus public safety debate: it offers privacy -- in the sense of unimpeded end-to-end encryption -- and the ability to successfully investigate serious crime. In this report, we argue that CSS neither guarantees efficacious crime prevention nor prevents surveillance. Indeed, the effect is the opposite. CSS by its nature creates serious security and privacy risks for all society while the assistance it can provide for law enforcement is at best problematic. There are multiple ways in which client-side scanning can fail, can be evaded, and can be abused.<br />Comment: 46 pages, 3 figures

Details

Database :
arXiv
Journal :
Journal of Cybersecurity, 10(1), 2024
Publication Type :
Report
Accession number :
edsarx.2110.07450
Document Type :
Working Paper
Full Text :
https://doi.org/10.1093/cybsec/tyad020