Our Last Chance to Stop KOSA | EFFector 36.10

1 month 3 weeks ago

EFF is chugging along, continuing to push for your rights online! We're sending out a last call for supporters to tell Congress to vote NO on the Kids Online Safety Act, exposing the flaws of the UN Cybercrime Treaty, and continuing to update Privacy Badger to protect your privacy online.

It can feel overwhelming to stay up to date, but we've got you covered with our EFFector newsletter! You can read the full issue here, or subscribe to get the next one in your inbox automatically! You can also listen to the audio version of the newsletter on the Internet Archive, or by clicking the button below:

LISTEN ON YouTube

EFFECTOR 36.10 - Our Last Chance to Stop KOSA

Since 1990 EFF has published EFFector to help keep readers on the bleeding edge of their digital rights. We know that the intersection of technology, civil liberties, human rights, and the law can be complicated, so EFFector is a great way to stay on top of things. The newsletter is chock full of links to updates, announcements, blog posts, and other stories to help keep readers—and listeners—up to date on the movement to protect online privacy and free expression. 

Thank you to the supporters around the world who make our work possible! If you're not a member yet, join EFF today to help us fight for a brighter digital future.

Christian Romero

Security Researchers and Journalists at Risk: Why You Should Hate the Proposed UN Cybercrime Treaty

1 month 3 weeks ago

The proposed UN Cybercrime Treaty puts security researchers and journalists at risk of being criminally prosecuted for their work identifying and reporting computer system vulnerabilities, work that keeps the digital ecosystem safer for everyone.

The proposed text fails to exempt security research from the expansive scope of its cybercrime prohibitions, and does not provide mandatory safeguards to protect their rights.

Instead, the draft text includes weak wording that criminalizes accessing a computer “without right.” This could allow authorities to prosecute security researchers and investigative journalists who, for example, independently find and publish information about holes in computer networks.

These vulnerabilities could be exploited to spread malware, cause data breaches, and get access to sensitive information of millions of people. This would undermine the very purpose of the draft treaty: to protect individuals and our institutions from cybercrime.

What's more, the draft treaty's overbroad scope, extensive secret surveillance provisions, and weak safeguards risk making the convention a tool for state abuse. Journalists reporting on government corruption, protests, public dissent, and other issues states don't like can and do become targets for surveillance, location tracking, and private data collection.

Without clear protections, the convention, if adopted, will deter critical activities that enhance cybersecurity and press freedom. For instance, the text does not make it mandatory to distinguish between unauthorized access and bypassing effective security measures, which would protect researchers and journalists.

By not mandating malicious or dishonest intent when accessing computers “without right,” the draft convention threatens to penalize researchers and journalists for actions that are fundamental to safeguards the digital ecosystem or reporting on issues of public interest, such as government transparency, corporate misconduct, and cybersecurity flaws.¸

For an in-depth analysis, please read further.

Karen Gullo

Academic boycotts over Gaza war jeopardise Israel’s place in Horizon Europe

1 month 3 weeks ago

"In March, the Statewatch NGO published an investigation that found multiple Israeli drone companies had received money from EU framework programmes, and that this drone technology was now potentially being used in the war in Gaza.

Asked about the investigation, a Commission spokesperson pointed out that “results of R&D projects may develop – either immediately or with adaptation – technologies with a dual-use potential, even if these R&D projects were originally intended for purely civil applications. This transition could happen beyond the lifetime of the R&D project itself.”"

Statewatch

How Sweden pushes for EU access to encrypted data

1 month 3 weeks ago

"A Swedish letter, known in EU jargon as a "non-paper", was distributed to the other 26 governments in the Council in June.

In the five-page document, published by Statewatch, a civil liberties NGO, Sweden argues for the need for a "fundamental change of perspective" in the fight against organised crime and terrorism.

The call comes after more than a year of Swedish work in the EU to facilitate access to encrypted data traffic and encrypted content on computers and phones."

Full story here and our coverage here and here.

Statewatch

[B] パリ・オリンピック 華やかなの行事の陰で進む社会監視と自由の抑圧

1 month 3 weeks ago
どのチャンネルを回してもオリンピックの使いまわしの映像しか映らない。いい加減うんざりしていたところに、おもしろいニュースが飛び込んできた。経済学者で社会活動家である小倉利丸さんが紹介するパリ・オリンピックの”もうひとつの素顔”。フランスの社会活動団体attacフランスが出したオリンピックへの抗議声明は、華やかな国上げての行事の背後行われている社会監視、自由の拘束、ジャーナリズム抑圧の状況を伝えている。(大野和興)
日刊ベリタ

Weekly Report: ISC BIND 9に複数の脆弱性

1 month 3 weeks ago
ISC BIND 9には、複数の脆弱性があります。影響を受けるバージョンは多岐にわたります。一部の脆弱性は、すでにサポートが終了したBINDでも影響を受けますが、修正バージョンはサポート対象のBINDでのみ提供されます。詳細は、開発者が提供する情報を参照してください。

Calls Mount—from Principal UN Human Rights Official, Business, and Tech Groups—To Address Dangerous Flaws in Draft UN Surveillance Treaty

1 month 3 weeks ago

As UN delegates sat down in New York this week to restart negotiations, calls are mounting from all corners—from the United Nations High Commissioner for Human Rights (OHCHR) to Big Tech—to add critical human rights protections to, and fix other major flaws in, the proposed UN surveillance treaty, which as written will jeopardize fundamental rights for people across the globe.

Six influential organizations representing the UN itself, cybersecurity companies, civil society, and internet service providers have in recent days weighed in on the flawed treaty ahead of the two-week negotiating session that began today.

The message is clear and unambiguous: the proposed UN treaty is highly flawed and dangerous and must be fixed.

The groups have raised many points EFF raised over the last two and half years, including whether the treaty is necessary at all, the risks it poses to journalists and security researchers, and an overbroad scope that criminalizes offenses beyond core cybercrimes—crimes against computer systems, data, and networks. We have summarized our concerns here.

Some delegates meeting in New York are showing enthusiasm to approve the draft treaty, despite its numerous flaws. We question whether UN Member States, including the U.S., will take the lead over the next two weeks to push for significant changes in the text. So, we applaud the six organizations cited here for speaking out at this crucial time.

“The concluding session is a pivotal moment for human rights in the digital age,” the OHCHR said in comments on the new draft. Many of its provisions fail to meet international human rights standards, the commissioner said.

“These shortcomings are particularly problematic against the backdrop of an already expansive use of existing cybercrime laws in some jurisdictions to unduly restrict freedom of expression, target dissenting voices and arbitrarily interfere with the privacy and anonymity of communications.”

The OHCHR recommends including in the draft an explicit reference to specific human rights instruments, in particular the International Covenant on Civil and Political Right, narrowing the treaty’s scope, explicitly including language that crimes covered by the treaty must be committed with “criminal intent,” and several other changes.

The proposed treaty should comprehensively integrate human rights throughout the text, OHCHR said. Without that, the convention “could jeopardize the protection of human rights of people world-wide, undermine the functionality of the internet infrastructure, create new security risks and undercut business opportunities and economic well-being.”

EFF has called on delegates to oppose the treaty if it’s not significantly improved, and we are not alone in this stance.

The Global Network Initiative (GNI), a multistakeholder organization that sets standards for responsible business conduct based on human rights, in the liability of online platforms for offenses committed by their users, raising the risk that online intermediaries could be liable when they don’t know or are unaware of such user-generated content.

“This could lead to excessively broad content moderation and removal of legitimate, protected speech by platforms, thereby negatively impacting freedom of expression,” GNI said.

“Countries committed to human rights and the rule of law must unite to demand stronger data protection and human rights safeguards. Without these they should refuse to agree to the draft Convention.”

Human Rights Watch (HRW), a close EFF ally on the convention, called out the draft’s article on offenses related to online child sexual abuse or child sexual exploitation material (CSAM), which could lead to criminal liability for service providers acting as mere conduits. Moreover, it could criminalize or risk criminalizing content and conduct that has evidentiary, scientific, or artistic value, and doesn’t sufficiently decriminalize the consensual conduct of older children in consensual relationships.

This is particularly dangerous for rights organizations that investigate child abuse and collect material depicting children subjected to torture or other abuses, including material that is sexual in nature. The draft text isn’t clear on whether legitimate use of this material is excluded from criminalization, thereby jeopardizing the safety of survivors to report CSAM activity to law enforcement or platforms.

HRW recommends adding language that excludes material manifestly artistic, among other uses, and conduct that is carried out for legitimate purposes related to documentation of human rights abuses or the administration of justice.

The Cybersecurity Tech Accord, which represents over 150 companies, raised concerns in a statement today that aspects of the draft treaty allow cooperation between states to be kept confidential or secret, without mandating any procedural legal protections.

The convention will result in more private user information being shared with more governments around the world, with no transparency or accountability. The statement provides specific examples of national security risks that could result from abuse of the convention’s powers.

The International Chamber of Commerce, a proponent of international trade for businesses in 170 countries, said the current draft would make it difficult for service providers to challenge overbroad data requests or extraterrestrial requests for data from law enforcement, potentially jeopardizing the safety and freedom of tech company employees in places where they could face arrest “as accessories to the crime for which that data is being sought.”

Further, unchecked data collection, especially from traveling employees, government officials, or government contractors, could lead to sensitive information being exposed or misused, increasing risks of security breaches or unauthorized access to critical data, the group said.

The Global Initiative Against Transnational Organized Crime, a network of law enforcement, governance, and development officials, raised concerns in a recent analysis about the draft treaty’s new title, which says the convention is against both cybercrime and, more broadly, crimes committed through the use of an information or communications technology (ICT) system.

“Through this formulation, it not only privileges Russia’s preferred terminology but also effectively redefines cybercrime,” the analysis said. With this title, the UN effectively “redefines computer systems (and the crimes committed using them)­ as ICT—a broader term with a wider remit.”

 

Karen Gullo

Certbot Is Now on 4 Million Servers, Maintaining Over 31 Million Websites

1 month 3 weeks ago

EFF’s Certbot is now installed on over 4 million web servers, where it’s used to maintain HTTPS certificates for more than 31 million websites. The recent achievement of these milestones helps show the success of the project and the important role it plays in the infrastructure of a secure and encrypted internet.

When EFF helped launch the Let’s Encrypt certificate authority and released the software that’d become Certbot in 2015, the web was a very different place. Less than 40% of websites were loaded using HTTPS, while the rest used unencrypted HTTP. This unencrypted traffic made it easy for malicious actors to eavesdrop, inject content, and take over online accounts by stealing cookies. Today, the percentage of web traffic using HTTPS is over 80% worldwide and over 93% in the United States.
https-pages-firefox-2024.png
Since Certbot’s first release, it has never stopped growing. The recent achievement of Certbot exceeding 4 million installations actively maintaining certificates with Let’s Encrypt is just our latest metric showcasing this growth. Additionally, since many servers host more than one website, these installations are responsible for more than 22 million certificates covering more than 31 million domain names. That’s more than 31 million websites that Certbot is helping to offer HTTPS. These benefits extend to every person who visits those sites.

But even these numbers are probably low, because they reflect only Certbot use with Let’s Encrypt. The ACME protocol is an open standard which allows others to create their own projects that are compatible with these tools. Since Certbot and Let’s Encrypt launched, lots of other software has been created —including other ACME certificate authorities —and the number of these is likely to increase.

Earlier this year, Google made changes to the Chrome root program that require all new certificate authorities to offer automated certificate issuance, and specifically encouraged certificate authorities to support ACME. These changes are good for the security of the internet and are likely to further encourage the adoption of ACME software like Certbot.

If you’d like to support us in our work in continuing to develop and support Certbot, especially for the millions of people who find it useful and have come to rely on it, please consider donating to EFF.

Brad Warren