{"id":63311,"date":"2019-07-04T17:00:27","date_gmt":"2019-07-04T21:00:27","guid":{"rendered":"https:\/\/newsroom.carleton.ca\/?post_type=cu_story&#038;p=63311"},"modified":"2025-08-19T09:37:28","modified_gmt":"2025-08-19T13:37:28","slug":"ghost-protocol-global-privacy","status":"publish","type":"cu_story","link":"https:\/\/carleton.ca\/news\/story\/ghost-protocol-global-privacy\/","title":{"rendered":"U.K. proposal to \u2018Bcc\u2019 law enforcement on messaging apps threatens global privacy"},"content":{"rendered":"\n<section class=\"w-screen px-6 cu-section cu-section--white ml-offset-center md:px-8 lg:px-14\">\n    <div class=\"space-y-6 cu-max-w-child-max  md:space-y-10 cu-prose-first-last\">\n\n        \n                    \n                    \n            \n    <div class=\"cu-wideimage relative flex items-center justify-center mx-auto px-8 overflow-hidden md:px-16 rounded-xl not-prose  my-6 md:my-12 first:mt-0 bg-opacity-50 bg-cover bg-cu-black-50 pt-24 pb-32 md:pt-28 md:pb-44 lg:pt-36 lg:pb-60 xl:pt-48 xl:pb-72\" style=\"background-image: url(https:\/\/carleton.ca\/news\/wp-content\/uploads\/sites\/162\/conversation-uk-proposal-bcc-law-1200w-1.jpg); background-position: 50% 50%;\">\n\n                    <div class=\"absolute top-0 w-full h-screen\" style=\"background-color:rgba(0,0,0,0.600);\"><\/div>\n        \n        <div class=\"relative z-[2] max-w-4xl w-full flex flex-col items-center gap-2 cu-wideimage-image cu-zero-first-last\">\n            <header class=\"mx-auto mb-6 text-center text-white cu-pageheader cu-component-updated cu-pageheader--center md:mb-12\">\n\n                                    <h1 class=\"cu-prose-first-last font-semibold mb-2 text-3xl md:text-4xl lg:text-5xl lg:leading-[3.5rem] cu-pageheader--center text-center mx-auto after:left-px\">\n                        U.K. proposal to \u2018Bcc\u2019 law enforcement on messaging apps threatens global privacy\n                    <\/h1>\n                \n                            <\/header>\n        <\/div>\n\n                    <svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" class=\"absolute bottom-0 w-full z-[1]\" fill=\"none\" viewbox=\"0 0 1280 312\">\n                <path fill=\"#fff\" d=\"M26.412 315.608c-.602-.268-6.655-2.412-13.524-4.769a1943.84 1943.84 0 0 1-14.682-5.144l-2.276-.858v-5.358c0-4.876.086-5.358.773-5.09 1.674.643 21.38 5.84 34.646 9.109 14.682 3.59 28.935 6.858 45.936 10.449l9.874 2.089H57.322c-16.4 0-30.31-.16-30.91-.428ZM460.019 315.233c42.974-10.074 75.602-19.88 132.443-39.867 76.16-26.791 152.063-57.709 222.385-90.663 16.7-7.823 21.336-10.074 44.262-21.273 85.004-41.688 134.719-64.193 195.291-88.413 66.55-26.577 145.2-53.584 194.27-66.765C1258.5 5.626 1281.34 0 1282.24 0c.17 0 .34 27.596.34 61.3v61.299l-2.23.375c-84.7 13.718-165.93 35.955-310.736 84.931-46.494 15.753-65.427 22.076-96.166 32.15-9.102 3-24.814 8.198-34.989 11.574-107.543 35.954-153.008 50.422-196.626 62.639l-6.74 1.876-89.126-.054c-78.135-.054-88.782-.161-85.948-.857ZM729.628 312.875c33.229-10.985 69.248-23.523 127.506-44.207 118.705-42.223 164.596-57.709 217.446-73.302 2.62-.75 8.29-2.465 12.67-3.751 56.19-16.772 126.94-33.597 184.17-43.671 5.07-.91 9.66-1.768 10.22-1.875l.94-.161v170.236l-281.28-.054H719.968l9.66-3.215ZM246.864 313.411c-65.041-2.251-143.047-12.11-208.432-26.256-18.375-3.965-41.73-9.538-42.202-10.074-.171-.214-.257-21.38-.214-47.046l.129-46.618 6.654 3.697c57.313 32.043 118.491 56.531 197.699 79.143 40.313 11.521 83.459 18.058 138.669 21.059 15.584.857 65.685.857 81.14 0 33.744-1.876 61.306-4.93 88.396-9.806 6.396-1.126 11.634-1.983 11.722-1.929.255.375-20.48 7.769-30.999 11.038-28.592 8.948-59.288 15.646-91.873 20.147-26.36 3.59-50.015 5.627-78.35 6.698-15.584.59-55.209.59-72.339-.053Z\"><\/path>\n                <path fill=\"#fff\" d=\"M-3.066 295.067 32.06 304.1v9.033H-3.066v-18.066Z\"><\/path>\n            <\/svg>\n            <\/div>\n\n    \n\n    <\/div>\n<\/section>\n\n<p>The term \u201cghost protocol\u201d might remind you of a <a href=\"https:\/\/www.imdb.com\/title\/tt1229238\/\" target=\"_blank\" rel=\"noopener noreferrer\">famous blockbuster starring Tom Cruise<\/a>, but here it applies to a <a href=\"https:\/\/www.lawfareblog.com\/principles-more-informed-exceptional-access-debate\" target=\"_blank\" rel=\"noopener noreferrer\">new proposal<\/a> by <a href=\"https:\/\/www.gchq.gov.uk\/\" target=\"_blank\" rel=\"noopener noreferrer\">the Government Communications Headquarters (GCHQ) in the United Kingdom<\/a>. <\/p>\n\n\n\n<p>The GCHQ is the British equivalent of the <a href=\"https:\/\/www.nsa.gov\/\" target=\"_blank\" rel=\"noopener noreferrer\">United States National Security Agency<\/a>, and the proposal\u2019s function is to give law enforcement power to <a href=\"https:\/\/www.theguardian.com\/uk-news\/2019\/may\/30\/apple-and-whatsapp-condemn-gchq-plans-to-eavesdrop-on-encrypted-chats\" target=\"_blank\" rel=\"noopener noreferrer\">listen in on encrypted communications<\/a> (like those on WhatsApp, for example). <\/p>\n\n\n\n<p>It\u2019s not the first time the British government has taken aim at encrypted communication: in 2017, then Home Secretary Amber Rudd called for <a href=\"https:\/\/www.businessinsider.com\/home-secretary-amber-rudd-real-people-dont-need-end-to-end-encryption-terrorists-2017-8\" target=\"_blank\" rel=\"noopener noreferrer\">end-to-end encryption to be banned, claiming \u201creal people\u201d don\u2019t need it<\/a>. Rudd\u2019s comment reflected tremendous ignorance about how modern communication works. <\/p>\n\n\n\n<p>The proposal, referred to informally as ghost protocol, is a more strategic attack on privacy, packaged in security rhetoric that hides technical, personal and societal implications. In an <a href=\"https:\/\/newamericadotorg.s3.amazonaws.com\/documents\/Coalition_Letter_to_GCHQ_on_Ghost_Proposal_-_May_22_2019.pdf\" target=\"_blank\" rel=\"noopener noreferrer\">open letter to GCHQ<\/a>, 47 signatories \u2014 including Apple, Google and WhatsApp \u2014 have urged the agency to abandon its plans.<\/p>\n\n\n\n<h2 id=\"how-end-to-end-encryption-works\" class=\"wp-block-heading\">How end-to-end encryption works<\/h2>\n\n\n\n<p><\/p>\n\n\n\n<p>The government proposal says \u201c<a href=\"https:\/\/www.lawfareblog.com\/principles-more-informed-exceptional-access-debate\" target=\"_blank\" rel=\"noopener noreferrer\">you don\u2019t even have to touch the encryption<\/a>\u201d to implement ghost protocol. <a href=\"https:\/\/www.lifewire.com\/what-is-end-to-end-encryption-4028873\" target=\"_blank\" rel=\"noopener noreferrer\">End-to-end encryption<\/a> works by generating a pair of public and private keys for each user. Text encrypted using the public key can only be decrypted using the private key, and vice versa.<\/p>\n\n\n\n<p>Hence, if Bob and Alice want to have a chat, both share their public keys and keep their private keys secret. Bob encrypts messages using Alice\u2019s public key (so only Alice can decipher them), and Alice encrypts messages using Bob\u2019s public key. <\/p>\n\n\n\n<p>In a group chat between Alice, Bob, and Jill, every message Alice sends is encrypted using Bob\u2019s public key (to Bob) and Jill\u2019s public key (to Jill). Alice is notified by the app that each message has two recipients. This means that the messaging service\u2019s servers only see public keys and encrypted text: they cannot decipher text, even at the request of law enforcement.<\/p>\n\n\n\n<figure class=\"wp-block-image align-center zoomable\"><a href=\"https:\/\/images.theconversation.com\/files\/277420\/original\/file-20190531-69071-14s2ax4.png?ixlib=rb-1.1.0&amp;q=45&amp;auto=format&amp;w=1000&amp;fit=clip\" target=\"_blank\" rel=\"noopener noreferrer\"><img decoding=\"async\" src=\"https:\/\/images.theconversation.com\/files\/277420\/original\/file-20190531-69071-14s2ax4.png?ixlib=rb-1.1.0&amp;q=45&amp;auto=format&amp;w=754&amp;fit=clip\" alt=\"\"\/><\/a><figcaption class=\"wp-element-caption\">\n              <span class=\"caption\">How end-to-end encryption works.<\/span><br>\n            <\/figcaption><\/figure>\n\n\n\n<h2 id=\"ghost-in-the-machine\" class=\"wp-block-heading\">Ghost in the machine<\/h2>\n\n\n\n<p><\/p>\n\n\n\n<p>Ghost protocol gets around this problem by proposing that law enforcement can be added as an invisible participant to a conversation. Alice, in conversation with Bob, would then encrypt every message twice, using both Bob\u2019s public key and the public key for law enforcement. Alice would be unaware of law enforcement\u2019s ability to access her conversation.<\/p>\n\n\n\n<p>Framing this as an action that could only be taken if legally approved and only in situations where there is sufficient evidence to justify it sounds reasonable, but ghost protocol completely disregards the <a href=\"https:\/\/www.lawfareblog.com\/exceptional-access-devil-details-0\" target=\"_blank\" rel=\"noopener noreferrer\">many technical implications<\/a> of modifying software to support a ghost user.<\/p>\n\n\n\n<p>It would require messaging apps to change <a href=\"https:\/\/freedom-to-tinker.com\/2016\/03\/31\/why-making-johnnys-key-management-transparent-is-so-challenging\/\" target=\"_blank\" rel=\"noopener noreferrer\">how keys are negotiated among participants<\/a>, adding complexity and therefore increasing the potential for security vulnerabilities.<\/p>\n\n\n\n<p>By requiring apps to hide participants, it would undermine authentication mechanisms, introducing new potential vulnerabilities and eroding user trust in the service.<\/p>\n\n\n\n<p>It would also effectively create <a href=\"https:\/\/www.justsecurity.org\/62114\/give-ghost-backdoor\/\" target=\"_blank\" rel=\"noopener noreferrer\">a backdoor<\/a> that could be exploited by messaging apps themselves   \u2014 for example, a company employee who wants to stalk a co-worker. This would create a single point of failure: should a malicious attacker hack into the messaging app system, they would then be able to inject themselves as a silent listener into any conversation.<\/p>\n\n\n\n<h2 id=\"social-implications\" class=\"wp-block-heading\">Social implications<\/h2>\n\n\n\n<p><\/p>\n\n\n\n<p>The personal and societal implications are even more serious. Messaging apps would need to update their software to support ghost protocol. Would this update affect all users, regardless of geographical location? Would a Canadian user be affected because a messaging app update implements U.K. law? This opens the door to any government, including dictatorships, to spy on their citizens effortlessly and covertly. <\/p>\n\n\n\n<p>Remember the <a href=\"https:\/\/mashable.com\/2014\/06\/05\/edward-snowden-revelations\/\" target=\"_blank\" rel=\"noopener noreferrer\">Edward Snowden leaks<\/a>?<\/p>\n\n\n\n<p>If two versions of the software existed   \u2014 one for users in the U.K., one for everywhere else   \u2014 how would these inter-operate? Would a Canadian visiting the U.K. be able to use the messaging app? Probably not, without an update that incorporates ghost protocol. That update that would remain on their phone after they returned home. <\/p>\n\n\n\n<p>Law enforcement definitely needs access to information to provide security and prosecute crimes, and technology has certainly made this more challenging. But law enforcement\u2019s intelligence-gathering capabilities cannot be supported by undermining individuals\u2019 right to privacy, which is what ghost protocol proposes. It makes the many more vulnerable, so the U.K. can spy on a few.<\/p>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\"\/>\n\n\n\n<p><\/p>\n\n\n\n<p>This article is republished from <a href=\"https:\/\/theconversation.com\/institutions\/carleton-university-900\" target=\"_blank\" rel=\"noopener noreferrer\">The Conversation<\/a> under a Creative Commons license. Carleton University is a member of this unique digital journalism platform that launched in June 2017 to boost visibility of Canada\u2019s academic faculty and researchers. Interested in writing a piece? Please contact <a href=\"mailto:steven.reid3@carleton.ca\">Steven Reid<\/a> or <a href=\"https:\/\/theconversation.com\/become-an-author\" target=\"_blank\" rel=\"noopener noreferrer\">sign up to become an author<\/a>.<\/p>\n\n\n\n<p><em>All photos provided by The Conversation from various sources.<\/em><\/p>\n\n\n\n<p>&#8212;<br>\n<a href=\"https:\/\/newsroom.carleton.ca\/\">Carleton Newsroom<\/a><\/p>\n\n\n\n<figure class=\"wp-block-image\"><img decoding=\"async\" src=\"https:\/\/counter.theconversation.com\/content\/118142\/count.gif?distributor=republish-lightbox-basic\" alt=\"The Conversation\"\/><\/figure>\n\n\n\n<p><\/p>\n","protected":false},"excerpt":{"rendered":"<p>The term \u201cghost protocol\u201d might remind you of a famous blockbuster starring Tom Cruise, but here it applies to a new proposal by the Government Communications Headquarters (GCHQ) in the United Kingdom. The GCHQ is the British equivalent of the United States National Security Agency, and the proposal\u2019s function is to give law enforcement power [&hellip;]<\/p>\n","protected":false},"author":410,"featured_media":63312,"template":"","meta":{"_acf_changed":false,"footnotes":"","_links_to":"","_links_to_target":""},"cu_story_type":[1623],"cu_story_tag":[],"class_list":["post-63311","cu_story","type-cu_story","status-publish","has-post-thumbnail","hentry","cu_story_type-expert-perspectives"],"acf":{"cu_post_thumbnail":false},"_links":{"self":[{"href":"https:\/\/carleton.ca\/news\/wp-json\/wp\/v2\/cu_story\/63311","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/carleton.ca\/news\/wp-json\/wp\/v2\/cu_story"}],"about":[{"href":"https:\/\/carleton.ca\/news\/wp-json\/wp\/v2\/types\/cu_story"}],"author":[{"embeddable":true,"href":"https:\/\/carleton.ca\/news\/wp-json\/wp\/v2\/users\/410"}],"version-history":[{"count":3,"href":"https:\/\/carleton.ca\/news\/wp-json\/wp\/v2\/cu_story\/63311\/revisions"}],"predecessor-version":[{"id":63319,"href":"https:\/\/carleton.ca\/news\/wp-json\/wp\/v2\/cu_story\/63311\/revisions\/63319"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/carleton.ca\/news\/wp-json\/wp\/v2\/media\/63312"}],"wp:attachment":[{"href":"https:\/\/carleton.ca\/news\/wp-json\/wp\/v2\/media?parent=63311"}],"wp:term":[{"taxonomy":"cu_story_type","embeddable":true,"href":"https:\/\/carleton.ca\/news\/wp-json\/wp\/v2\/cu_story_type?post=63311"},{"taxonomy":"cu_story_tag","embeddable":true,"href":"https:\/\/carleton.ca\/news\/wp-json\/wp\/v2\/cu_story_tag?post=63311"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}