{"id":60757,"date":"2023-04-30T08:55:04","date_gmt":"2023-04-30T08:55:04","guid":{"rendered":"https:\/\/alecmuffett.com\/?p=60757"},"modified":"2023-05-05T07:03:12","modified_gmt":"2023-05-05T07:03:12","slug":"resource-for-journalists-how-best-to-frame-your-article-criticising-elonmusk-for-adding-encryption-to-twitter-dms-questions-to-ask-resources-to-consult","status":"publish","type":"post","link":"https:\/\/alecmuffett.com\/article\/60757","title":{"rendered":"Resource for Journalists: How best to frame your article criticising @ElonMusk for adding #Encryption to @Twitter DMs. Questions to ask, resources to consult."},"content":{"rendered":"\n<p class=\"has-pale-pink-background-color has-background\"><em>Note: this is a &#8220;living&#8221; document. Check back for updates.<br \/>Last updated: 5 May 2023 around 0800h London time.<\/em><\/p>\n\n\n\n<p>Hi! Thank you for reading this!<\/p>\n\n\n\n<p>If you&#8217;re a journalist and you&#8217;re going to write something about Twitter adopting Encryption for Twitter Direct Messages, it&#8217;s really easy to adopt the frame that:<\/p>\n\n\n\n<p class=\"has-luminous-vivid-amber-background-color has-background\"><strong>&#8220;Elon is doing it, so it must be bad.&#8221;<\/strong><\/p>\n\n\n\n<p>or <\/p>\n\n\n\n<p class=\"has-luminous-vivid-amber-background-color has-background\"><strong>&#8220;Some people are saying that Encryption enables Child Abuse!<br \/>Therefore Elon is enabling Child Abuse!&#8221;<\/strong><\/p>\n\n\n\n<p>\u2026but the reality is a lot more complex than that. There are great questions you can ask, and there are assurances which you can demand from Elon and Twitter.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Why are these frames suboptimal?<\/h2>\n\n\n\n<p>Twitter is a huge platform, used by millions of people, and it primarily enables two forms of communication:<\/p>\n\n\n\n<ol class=\"wp-block-list\">\n<li>Nearly-Broadcast (Tweets)<\/li>\n\n\n\n<li>One-to-One and One-to-Several (Direct Messages)<\/li>\n<\/ol>\n\n\n\n<p>\u2026plus some other niche\/experimental mechanisms like audio chats.<\/p>\n\n\n\n<p>The encryption announcement impacts the Direct Messages feature, and it&#8217;s all about giving more privacy to all the people who use Direct Messages.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Yes, but isn&#8217;t Privacy a bad thing?<\/h2>\n\n\n\n<p>What really? Is privacy a bad thing? Certainly there exists a minority of bad people \u2014 even in the USA <a href=\"https:\/\/www.prisonpolicy.org\/blog\/2020\/01\/16\/percent-incarcerated\/\">less than 1% of the population is in prison<\/a>, so arguably there are 99% &#8220;good&#8221; people out there \u2014 and &#8220;privacy&#8221; is an <em>enabler <\/em>for everyone, including the bad people.<\/p>\n\n\n\n<p>But that doesn&#8217;t mean that we need to avoid privacy, in much the same way that we don&#8217;t need to avoid creating public infrastructure like &#8220;roads&#8221; just because they <em>might <\/em>be used by a getaway vehicle in a bank heist.<\/p>\n\n\n\n<p>A different perspective is that we need more privacy, everywhere, and <strong>in theory<\/strong> (note: <em>foreshadowing<\/em>) Elon will be providing this.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">But why does Encryption need adding to Twitter DMs? Couldn&#8217;t &#8220;they&#8221; (people who need privacy) just use Signal?<\/h2>\n\n\n\n<p>Consider: if you are fortunate enough to live in a part of the world where the entire household water supply is &#8220;drinkable&#8221; quality, how nice your life is as a result.<\/p>\n\n\n\n<p>Having a 100% drinkable water supply means that it doesn&#8217;t matter which tap you use to wash food, that if your kid gets a cut you probably don&#8217;t need to boil and cool water just to wash it out as part of the treatment, if they drink from a hosepipe (or the bathtub, ick) it&#8217;s not a huge deal, and you can largely forget about the stress and self-discipline necessary to save your family from getting sick. Of course it&#8217;s a tremendous waste of resources to use drinkable water to flush a toilet, but overall the provision is <em>an enabler of so much public health.<\/em><\/p>\n\n\n\n<p>Ditto, for end-to-end privacy.<\/p>\n\n\n\n<p>It&#8217;s utterly normal for a conversation which started trivially to become much more sensitive, for instance a discussion with your parents which suddenly includes them sending credit-card information to you. <\/p>\n\n\n\n<p>Do you want that data to be at risk of theft by hackers? No. <\/p>\n\n\n\n<p>Do you want to scold your parents for not stopping that Twitter DM conversation to use Signal to send you the sensitive stuff? No. <\/p>\n\n\n\n<p>Do you want to live your life with the stress and self-discipline necessary to stop hackers from walking off with your sensitive messages?<\/p>\n\n\n\n<p>No. Of course not. Irrespective that the 1% bad people might use that privacy to do bad things.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Shouldn&#8217;t Elon build a &#8220;back door&#8221; into the encryption to access DM content, for Law Enforcement?<\/h2>\n\n\n\n<p>So <a href=\"https:\/\/www.dw.com\/en\/twitter-hackers-saw-private-messages-of-36-accounts-including-dutch-official\/a-54271959\">here&#8217;s a story (Deutche Welle) regarding Saudi spies who worked at Twitter<\/a> and <a href=\"https:\/\/www.bbc.co.uk\/news\/world-us-canada-50324977\">who (BBC) went  trawling through the personal information<\/a> and (<a href=\"https:\/\/www.bloomberg.com\/news\/articles\/2020-08-19\/twitter-security-breach-blamed-for-saudi-dissident-arrests\">Bloomberg<\/a>, <a href=\"https:\/\/archive.is\/0NyYo\">archived<\/a>) Direct Messages of Saudi dissidents for that Government, <a href=\"https:\/\/archive.is\/0NyYo\">leading to dissidents being arrested<\/a>.<\/p>\n\n\n\n<p>Twitter (like all platforms) is not in a position to security-vet all of its employees, and even then the question would be &#8220;vetted by\/for which governments?&#8221; \u2014 so it&#8217;s overall wiser (<em>foreshadowing again<\/em>) for Twitter to cut itself entirely out of the conversations which DMs enable, so that <em>only the participants can see the content of the conversation.<\/em><\/p>\n\n\n\n<h2 class=\"wp-block-heading\">So is this \u2014 making access to DMs &#8220;participant only&#8221; \u2014 is this what End-to-End Encryption actually does?<\/h2>\n\n\n\n<p>Yes, although it&#8217;s probably better to talk about <em>&#8220;end-to-end security&#8221;<\/em> or <em>&#8220;end-to-end privacy&#8221;<\/em> because the &#8220;encryption&#8221; is merely the clockwork which enables it to happen.<\/p>\n\n\n\n<p>If you want to know more about the goals and mechanisms of end-to-end security, there&#8217;s a good white paper from Privacy International (<a href=\"https:\/\/privacyinternational.org\/report\/4949\/securing-privacy-end-end-encryption\">context blogpost<\/a>, <a href=\"https:\/\/privacyinternational.org\/sites\/default\/files\/2022-09\/SECURING%20PRIVACY%20-%20PI%20on%20End-to-End%20Encryption.pdf\">report PDF<\/a>) which helps as an explainer.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">So how do we make a story out of this?<\/h2>\n\n\n\n<p>If you want to <s><em>attack Elon<\/em><\/s> make a decent story out of this product launch, here are the questions that you should be asking:<\/p>\n\n\n\n<ol class=\"wp-block-list\">\n<li><strong>Is the Encryption credible?<\/strong> Does it use &#8220;recognised algorithms&#8221; or is it some homebrew thing which the world has never seen before and which is a cause for concern? Telegram uses weird homebrew encryption and it&#8217;s a matter of <a href=\"https:\/\/words.filippo.io\/dispatches\/telegram-ecdh\/\">concern <\/a>amongst <a href=\"https:\/\/mtpsym.github.io\">experts<\/a>.<\/li>\n\n\n\n<li><strong>Has Twitter been transparent?<\/strong> Are they publishing the code\/algorithms they use? Is there a white paper describing operation?<\/li>\n\n\n\n<li><strong>Aside:<\/strong> There&#8217;s this thing in security called <a href=\"https:\/\/en.wikipedia.org\/wiki\/Kerckhoffs%27s_principle\"><strong>Kerckhoffs&#8217;s Principle<\/strong><\/a> which means that if they say something like <em>&#8220;We can&#8217;t tell you how it works for security reasons,&#8221;<\/em> they are fibbing and you can burn them<\/li>\n\n\n\n<li><strong>Is the Encryption truly end-to-end secure?<\/strong> Are the conversations truly participant-only? Are Twitter employees entirely incapable of retrieving message content? Is there an e2e-breaking mechanism which enables non-participants (including: law enforcement) to ever access, filter, or block message content? <em>Do <a href=\"https:\/\/cwe.mitre.org\/data\/definitions\/532.html\">bits of messages leak into logfiles and then get sent back to Twitter<\/a>, even by accident?<\/em><\/li>\n\n\n\n<li><strong>Is the Encryption on by default?<\/strong> If not, why not? Are there plans to address this? <strong>The problem of non-default encryption<\/strong> afflicts both <a href=\"https:\/\/www.wired.com\/story\/telegram-encryption-whatsapp-settings\/\">Telegram<\/a> and Facebook Messenger, but at least <a href=\"https:\/\/www.bbc.co.uk\/news\/technology-60055270\">Facebook has plans to address this.<\/a><\/li>\n\n\n\n<li><strong>Are there good abuse-reporting mechanisms?<\/strong> If you&#8217;re using a tool to message someone, there should at least be a convenient mechanism to block them, and (ideally) a means to credibly report their (alleged) abuse to authorities. Happily, this can entirely be done by <a href=\"https:\/\/journal-home.s3.ap-northeast-2.amazonaws.com\/site\/icisc2021\/presentation\/paper_25.pdf\">means which preserve the end-to-end privacy of communication<\/a>. <\/li>\n<\/ol>\n\n\n\n<p>These are all good questions to ask, and they need to be asked of any solution.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Who can I trust to act as a resource?<\/h2>\n\n\n\n<p>I would recommend following \/ asking the following people for quotes; they have somewhat more public bandwidth than I do:<\/p>\n\n\n\n<ol class=\"wp-block-list\">\n<li>Security &amp; Safety, Journalism Perspective: <a href=\"https:\/\/twitter.com\/runasand\">Runa Sandvik<\/a> at <a href=\"https:\/\/twitter.com\/GranittHQ\">Granitt<\/a><\/li>\n\n\n\n<li>Cryptography: Professor <a href=\"https:\/\/twitter.com\/matthew_d_green\">Matt Green<\/a> at <a href=\"https:\/\/isi.jhu.edu\/~mgreen\/\">Johns Hopkins<\/a>; Matt writes pithy, critical but overall sane and exceptionally well-informed stuff, although he does have a habit of speculating about worst-case scenarios, which technically is fair but may cause confusion<\/li>\n\n\n\n<li><a href=\"https:\/\/twitter.com\/mjg59\">Matthew Garrett<\/a> seems to be doing a solid job of reverse-engineering the Twitter Encrypted DM functionality on his Twitter timeline, and is frank about the limits of his\/our understanding \u2014 an important aspect to consider when reporting. It&#8217;s a work-in-progress, so follow him for details<\/li>\n\n\n\n<li><a href=\"https:\/\/twitter.com\/privacyint\">Privacy International<\/a> (Global)<\/li>\n\n\n\n<li><a href=\"https:\/\/twitter.com\/EFF\">Electronic Frontier Foundation<\/a> (US)<\/li>\n\n\n\n<li><a href=\"https:\/\/twitter.com\/OpenRightsGroup\">Open Rights Group<\/a> (UK)<\/li>\n\n\n\n<li>&#8230;more to come<\/li>\n<\/ol>\n\n\n\n<h2 class=\"wp-block-heading\">What if I want to read more?<\/h2>\n\n\n\n<p>Some good resources on End-to-End Security; the first two links from Privacy International are heavily based around the (third link) primer which I wrote on the topic.<\/p>\n\n\n\n<ol class=\"wp-block-list\">\n<li><a href=\"https:\/\/privacyinternational.org\/report\/4949\/securing-privacy-end-end-encryption\">https:\/\/privacyinternational.org\/report\/4949\/securing-privacy-end-end-encryption<\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/privacyinternational.org\/sites\/default\/files\/2022-09\/SECURING%20PRIVACY%20-%20PI%20on%20End-to-End%20Encryption.pdf\">https:\/\/privacyinternational.org\/sites\/default\/files\/2022-09\/SECURING%20PRIVACY%20-%20PI%20on%20End-to-End%20Encryption.pdf<\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/alecmuffett.com\/alecm\/e2e-primer\/\">https:\/\/alecmuffett.com\/alecm\/e2e-primer\/<\/a><\/li>\n\n\n\n<li>&#8230;more to come<\/li>\n<\/ol>\n\n\n\n<h2 class=\"wp-block-heading\">But don&#8217;t Twitter hand over data to the US Government? Wouldn&#8217;t this be included?<\/h2>\n\n\n\n<p>You&#8217;re actually asking two questions here; one is about how each of the world&#8217;s governments handles the issue of requesting content \u2014 under warrant \u2014 from the world&#8217;s various platforms, and I have previously written <a href=\"https:\/\/medium.com\/@alecmuffett\/how-to-talk-about-prism-and-not-get-entirely-blown-off-if-youre-an-activist-e2a79d2cd2ad\">an article at Medium on how that works for the US Government.<\/a><\/p>\n\n\n\n<p>The second is &#8220;wouldn&#8217;t Twitter still be able to share message content with Governments if end-to-end security is being used?&#8221; \u2014 and the answer is: no, not if it&#8217;s done properly (i.e.: see the questions above)<\/p>\n\n\n\n<p>The next question is &#8220;wouldn&#8217;t that make Governments rather angry?&#8221; and the answer to that is &#8220;<a href=\"https:\/\/www.bbc.co.uk\/news\/technology-49919464\">assuredly yes<\/a>, but it&#8217;s not illegal to give people privacy\u2026 yet. And <a href=\"https:\/\/techcrunch.com\/2022\/03\/01\/instagram-rolls-out-encrypted-direct-messaging-in-ukraine-and-russia\/\">sometimes it&#8217;s absolutely necessary.<\/a>&#8220;<\/p>\n\n\n\n<p>It would be a strange world where only people who lived in conflict zones were &#8220;permitted&#8221; by &#8220;authorities&#8221; to have strong privacy.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">But isn&#8217;t it &#8220;notable&#8221; that Twitter will have Encryption?<\/h2>\n\n\n\n<p>Certainly it&#8217;s a change, and arguably (see above) a change for the better; but this just means that Twitter DMs are joining an ecosystem which includes:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>WhatsApp (with more than 2 billion users exchanging encrypted messages)<\/li>\n\n\n\n<li>iMessage from Apple (billions of users)<\/li>\n\n\n\n<li>Signal (millions of users)<\/li>\n\n\n\n<li>(some) Facebook Messenger (millions from billions?)<\/li>\n\n\n\n<li>(some) Telegram (some from millions)<\/li>\n\n\n\n<li>Threema (millions)<\/li>\n\n\n\n<li>Wire <\/li>\n\n\n\n<li>Viber<\/li>\n\n\n\n<li>Element \/ Matrix<\/li>\n\n\n\n<li>(some) Instagram<\/li>\n\n\n\n<li>(images) Snapchat<\/li>\n<\/ul>\n\n\n\n<p>So what is important here is not <em>&#8220;wow! encryption!&#8221;<\/em> but instead:<\/p>\n\n\n\n<p class=\"has-pale-cyan-blue-background-color has-background\"><em>&#8220;\u2026is Twitter&#8217;s Encrypted DM offering actually credible, when set against the competition?&#8221;<\/em><\/p>\n\n\n\n<p>\u2014 for which Signal and WhatsApp are arguably the gold standards of purity and mass-deployment, respectively.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">What if Twitter will be able to see &#8220;metadata?&#8221; Will that be a problem?<\/h2>\n\n\n\n<p>Not necessarily; some people would even call that a &#8220;feature&#8221;, but it&#8217;s a matter of taste. End-to-end security means that message access is restricted to chat participants, but it&#8217;s an entirely different ball game to (attempt to) prevent other people seeing <em>which<\/em> people are talking amongst themselves. <\/p>\n\n\n\n<p>For more on this, see the <a href=\"https:\/\/privacyinternational.org\/sites\/default\/files\/2022-09\/SECURING%20PRIVACY%20-%20PI%20on%20End-to-End%20Encryption.pdf\">Privacy International paper linked above<\/a> (section: <em>&#8220;Metadata Analysis&#8221;<\/em>) and likewise <a href=\"https:\/\/alecmuffett.com\/alecm\/e2e-primer\/e2e-primer-print.html#e2e-and-platform-behavioural-metadata-analysis\">the Primer linked above<\/a>. See also <a href=\"https:\/\/alecmuffett.com\/article\/14860\">this blogpost which covers some of these comparative aspects<\/a>, including the difference between &#8220;scanning metadata&#8221; vs: &#8220;scanning content.&#8221;<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Why would &#8220;Law Enforcement Access&#8221; mean it&#8217;s not end-to-end secure?<\/h2>\n\n\n\n<p>I&#8217;ve written <a href=\"https:\/\/alecmuffett.com\/alecm\/e2e-primer\/\">an entire primer on this definition of end-to-end security<\/a> (summary: &#8220;Law Enforcement are not an explicit participant&#8221;) but for brevity regarding this question, the bigger issue is: <em>which Government&#8217;s Law Enforcement do you mean?<\/em><\/p>\n\n\n\n<p>Not all governments are benign; see the Saudi examples above, and look also at the <a href=\"https:\/\/alecmuffett.com\/article\/59341\">trajectory of illiberality<\/a> in the <a href=\"https:\/\/www.vice.com\/en\/article\/n7zevd\/this-is-the-data-facebook-gave-police-to-prosecute-a-teenager-for-abortion\">rest of the world<\/a>.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Does Twitter Direct Messaging have to implement &#8220;Disappearing Messages&#8221; in order to be end-to-end secure?<\/h2>\n\n\n\n<p>Strictly, no, but I would say that <a href=\"https:\/\/www.newsweek.com\/video-shows-russian-police-allegedly-stopping-people-screen-phones-1685502\">disappearing messages are a very desirable feature<\/a>.<\/p>\n\n\n\n<p><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Note: this is a &#8220;living&#8221; document. Check back for updates.Last updated: 5 May 2023 around 0800h London time. Hi! Thank you for reading this! If you&#8217;re a journalist and you&#8217;re going to write something about Twitter adopting Encryption for Twitter Direct Messages, it&#8217;s really easy to adopt the frame that: &#8220;Elon is doing it, so [&hellip;]<\/p>\n","protected":false},"author":2,"featured_media":60777,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_jetpack_memberships_contains_paid_content":false,"activitypub_content_warning":"","activitypub_content_visibility":"","activitypub_max_image_attachments":3,"activitypub_interaction_policy_quote":"anyone","activitypub_status":"","footnotes":""},"categories":[1],"tags":[1055,410,426],"class_list":["post-60757","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-uncategorised","tag-elon-musk","tag-end-to-end-encryption","tag-twitter"],"jetpack_featured_media_url":"https:\/\/alecmuffett.com\/wp-content\/uploads\/2023\/04\/Screenshot-2023-04-30-at-10.07.16.png","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/alecmuffett.com\/wp-json\/wp\/v2\/posts\/60757","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/alecmuffett.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/alecmuffett.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/alecmuffett.com\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/alecmuffett.com\/wp-json\/wp\/v2\/comments?post=60757"}],"version-history":[{"count":56,"href":"https:\/\/alecmuffett.com\/wp-json\/wp\/v2\/posts\/60757\/revisions"}],"predecessor-version":[{"id":62857,"href":"https:\/\/alecmuffett.com\/wp-json\/wp\/v2\/posts\/60757\/revisions\/62857"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/alecmuffett.com\/wp-json\/wp\/v2\/media\/60777"}],"wp:attachment":[{"href":"https:\/\/alecmuffett.com\/wp-json\/wp\/v2\/media?parent=60757"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/alecmuffett.com\/wp-json\/wp\/v2\/categories?post=60757"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/alecmuffett.com\/wp-json\/wp\/v2\/tags?post=60757"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}