Attempting to stifle encryption is a waste of time, suggests Status security chief

Published at: Oct. 15, 2020

Corey Petty, a chief security lead at Status messenger, told Cointelegraph that he believes there is no way to marry end-to-end encryption with the type of backdoor access law enforcement agencies continue to lobby for. He also believes that any prohibitive or restrictive measures will be fruitless as encryption is an abundant and readily available resource, unlike nuclear power:

“If you take nuclear control across the globe as an example here, and how successful that's been in terms of keeping us from destroying ourselves, we were able to do that because developing nuclear weapons is very difficult and is reliant upon advanced chemistry using limited, scarce resources on the globe. You can control that type of thing.”

He acknowledged that governments could perhaps enforce their desired policies against a centralized company within a specific jurisdiction, but stated:

“It still isn't going to stop the people who are motivated to do bad things from creating their own means based on standard technology that's open-source.”

Petty said that Status has been trying to organize itself in a way that is resilient to government pressure. Their eventual goal is to continue the project's development without the need for a core team.

From a technological perspective, Status is generally viewed as a decentralized protocol. Even so, it still relies on perceived oligopolists like Google and Apple for reaching its end users and, as we have witnessed recently with Huawei, TikTok, and WeChat, the U.S. government can pressure such companies into supporting its political agenda. The amount of power these aforementioned gatekeepers exude has led Telegram to file an antitrust complaint against Apple’s App Store with the EU.

Petty acknowledged that decentralized applications remain vulnerable to these corporate restrictions, but he said that the project is “actively looking into alternative means of distribution for software." A beta of the Status desktop application was recently released for all major operating systems. Petty disclosed that Status is also working on its own app store. He said that they hope to have a proof-of-concept, or POC, for this project available by the end of the year:

“We'll have a POC, probably by the end of the year for rudimentary app distribution for a few of our services, like the desktop and the Android mobile app that will lay the groundwork for a larger app store distribution for Status and potentially other larger distributed applications that like to go on our platform.”
Tags
Related Posts
Unstoppable Domains Launches Decentralized Chat Protocol
Unstoppable Domains, a Tim Draper-backed startup focused on blockchain-based uncensorable websites, has launched a decentralized chat protocol. The so-called “Unstoppable Chat”, or simply “dChat” aims to promote confidentiality through a peer-to-peer network and end-to-end encryption. Opposed to mainstream messengers like Facebook, dChat enables users to own, encrypt, and store their messages themselves on their own servers. Users need an Ethereum wallet private key to sign in In order to allow users to fully control their messages, dChat integrates with a user’s cryptocurrency wallet and P2P networks. In order to sign in to the chat, users need to have an Ethereum …
Decentralization / July 7, 2020
The crypto industry must do more to promote encryption, says Meltem Demirors
“I like to call myself a future, or aspiring, cult leader,” Meltem Demirors, chief strategy officer of CoinShares — a publicly listed investment firm managing around $5 billion in assets — told Cointelegraph. Demirors, who first entered the Bitcoin (BTC) space in late 2012, further mentioned that it has been “fun to see how big the crypto sector has become,” noting that people from all walks of life are now interested in the cryptocurrency space. As such, Demirors explained that “crypto cults” are bringing people together in a positive manner, especially since it gives people a sense of purpose and …
Decentralization / June 15, 2022
Zoom Will Offer End-to-End Encryption to All Users
On June 17, the popular video conference app, Zoom, officially announced that end-to-end encryption, or E2EE, has finally arrived for their software. It will be provided to both free and paid users, so long as their account has passed the company’s verification process. According to the announcement, during the beta phase that will start from July, users should verify their phone numbers via a text message. The aim of this step is to prevent the mass creation of abusive accounts. Zoom commented: “We are confident that by implementing risk-based authentication, in combination with our current mix of tools - including …
Technology / June 17, 2020
Noncustodial Technology and Security Is the Inevitable Future
In an increasingly digital world, security is a high-stakes game. The identities of customers along with their privacy and financial information are all in the hands of centralized security systems. We are reliant on these systems, and even though security plays a critical role in our lives, we rarely stop to think about the consequences of these systems failing us. Yet those who trade financial assets like cryptocurrencies think about these consequences all the time. Why? The risk of violations of our financial sovereignty coupled with the potential of theft without an option to recover are two big reasons why …
Decentralization / July 31, 2020
Tornado Cash is the latest chapter in the war against encryption
The sanctions imposed by the United States government on Tornado Cash have reignited a public debate on privacy. For many in the relatively young crypto community, such an intervention by the federal government seems groundbreaking. However, tussles between the private sector and the state on the issue of privacy are far from new and can provide compelling insights on what we might expect next for privacy in the crypto industry. In the 1990s, Phil Zimmermann released Pretty Good Privacy (PGP), one of the first openly available public-key cryptography applications that featured end-to-end (E2E) encryption. Zimmerman’s creation prompted a criminal investigation …
Technology / Sept. 21, 2022