Taurus leakWhen it comes to privacy, it’s all or nothing

The German Taurus leak shows one thing very clearly: encrypted and secure communication does not work for the few. Instead, it must become the standard for everyone.

Headphones on Russia flag with audio track, symbolic photo Taurus wiretapping affair
If communication is not encrypted, others can listen in. – Alle Rechte vorbehalten IMAGO / Christian Ohde

An alarming breach of state secrecy recently rocked German newswires. On March 1, Margarita Simonjan, head of Russian TV network RT, published confidential communications between German military officials, turning strategically sensitive deliberations into public news and further polarizing an already fierce debate centered on Europe’s support for Ukraine–or lack thereof.

How did this happen? The alleged culprit was the German military’s reliance on insecure communications systems. According to official sources, one of the officials involved in the conversation joined using not sufficiently secure software or an insecure line. Software that enables encryption as an option, not as the default, will always undermine privacy eventually. Because it takes only one person forgetting to “turn on” encryption to ruin it for everyone – and just like that, to enable a breach.

This incident underscores something important: private communications only work if everyone participates. If one person or endpoint is compromised, the whole network goes with it. Which means that digital privacy and security must be embedded at the core of our digital infrastructure. As we saw with the German military, relegating privacy to the status of optional „add ons“ or institutional infrastructure for a privileged few means that they will, at some point, fail. And when they do, they will fail everyone.

Encryption is a collective endeavor

For decades, the human right to communicate privately has been a fractious proposition, with security services and law enforcement agencies frequently voicing opposition to the idea of digital privacy as the default for everyone. This oppositional position was cemented in the 1990s, as the internet moved from a hypothetical to the infrastructure of daily life. And the arguments made against privacy then are familiar today, namely that widespread encryption and the privacy it enables would facilitate criminal activities.

Of course, the same entities arguing against privacy for us were not so keen on exposing their own communications and operations. At the same time that they argued for backdoors and weak privacy for the masses, they worked to ensure that their own communications remained protected by encryption. Ultimately, their stance amounted to: „privacy for me, not for thee“.

And as we see, this stance results in “no privacy for any of us” in practice.

This truth lies at the heart of the recent German military breach. Often overlooked in discussions surrounding digital privacy and security is the fact that end-to-end-encryption is a collective endeavor and should be the default. The integrity of encrypted communication is only as strong as its weakest link. A single participant using an insecure connection can compromise the privacy of the entire network, making the widespread adoption of end-to-end-encrypted communications one of the few strategies that can mitigate against such risks.

Encryption should not be optional

This incident illuminates the inherent fallacy of perceiving encryption as an optional feature or relying solely on closed, intra-organizational tools for secure communication. The reality of our interconnected world necessitates constant communication with individuals within and outside any single organization’s bubble – be it for sharing critical intelligence, coordinating with allies, or the mundane yet essential exchanges of daily life. Further, the networks and people a given person or organization is required to communicate with changes frequently, as the exigencies and focus of their work and the world they’re situated in shifts. What does not shift is the need for these communications to remain secure and private.

Ironically, it was Stewart Baker, former head of the US National Security Agency, who articulated this dilemma in the 1990s, albeit from a perspective that opposed mass privacy. He highlighted the fact that if encryption wasn’t default, it would not be widely used. And this would thus leave even those endeavoring to apply encryption in bespoke or selective contexts (criminals, in his selective example) exposed to surveillance. Because, somewhere, somehow, they would slip up. Or, they would need to contact their father, or friends, or accountant on an unencrypted line. Thus, their “conspiracy”, in his words, would be discoverable by security services, due to the fact that only default encryption ‘for everyone’ is capable of truly protecting privacy for anyone. While he was arguing against the principle of privacy for everyone, Baker’s analogy unwittingly underscores the crux of the problem we currently face: without ubiquitous end-to-end encryption by default, every organization, be it a governmental body or otherwise, is left permanently exposed.

Encryption goes beyond technology

This also highlights the fact that to understand private communications, we cannot simply focus on technology. We must also appreciate the nature of how people communicate. Namely, that each one of us has many relationships with others around us; from our families, to our friends, to our colleagues. And that these boundaries are constantly shifting and blurred. Organizations partner with third parties routinely. Colleagues become friends. Family can be estranged. And it is frequently necessary to check in with a partner or friend about our location, our plans, and other intimate information.

If only some of these conversations are private, the rest of them provide a surface area for interception and ultimately violation of privacy. Just as Baker noted. Each of us, always, communicates across a dynamic network that extends well beyond our workplace and profession. It is this fact that makes systems where end to end encryption is an option for some communications, but not the default for all, insufficient.

The recent breach in German military communications serves as a compelling argument for the adoption of universally accessible, secure communication platforms. And this is why truly private messengers like Signal offer simple, unified messaging apps, capable of connecting with any other person using it.

Communication platforms and tools are critical infrastructure

These mass platforms and standards are not merely tools. They must be understood as critical infrastructure for the digital age, ensuring that privacy and security are not privileges but rights accessible to all. By making end-to-end encryption the default, and ensuring that this default is available to everyone not siloed within a given company or institution, we safeguard not just the communication between high-ranking officials but the human right to privacy of every individual. A right that to be honored for anyone, anywhere, must transcend organizational boundaries and national borders.

To ensure privacy for anyone, we must champion systems that provide privacy to everyone. „Privacy for me but not for thee“ is an idea that, even in the 1990s, was understood to be fatally flawed. Those of us who believe in the human right to privacy must champion options that provide this right to the masses. Because if we don’t, everything from journalism, to dissent, to the sensitive communications of high ranking German military officials will be put at risk.

Meredith Whittaker is President of the Signal Foundation. She co-founded the AI Now Institute and was a professor at New York University. Until 2018, she worked at Google, where she founded the Google Open Research department. She protested against Google’s military cooperation in connection with Project Maven and was one of the main organizers of the Google Walkout, in which employees protested against sexual harassment and discrimination within the company.

0 Ergänzungen

Wir freuen uns auf Deine Anmerkungen, Fragen, Korrekturen und inhaltlichen Ergänzungen zum Artikel. Bitte keine reinen Meinungsbeiträge! Unsere Regeln zur Veröffentlichung von Ergänzungen findest Du unter netzpolitik.org/kommentare. Deine E-Mail-Adresse wird nicht veröffentlicht.