New Mobile Phone Service Shows We Can Have Both Privacy and Nice Things
The recent of a new introduced significant new privacy protections into the mobile phone system. This exciting new approach highlights the failure of the existing mobile phone infrastructure to protect privacy, and points the way forward for a wide variety of technologies besides mobile phones.
Today鈥檚 cellphones are generally a privacy disaster. Partly that鈥檚 the result of the two companies that control the operating system software on the vast majority of the world鈥檚 . The most common operating system, Android, is controlled by an advertising company (Google) and is about its users. Apple, which controls iOS, while in , is also becoming in monetizing its customers鈥 data, and lacks adequate controls to prevent from many forms of spying. The result is that a lot of the activity we engage in on our phones is tracked.
Today鈥檚 cellphones are generally a privacy disaster.
There are already solutions out there for the privacy problems posed by Android and iOS: privacy-focused operating systems such as and . Widespread adoption of those would be a step in the right direction. But the operating system can鈥檛 defend against another major obstacle to phone privacy: the architecture of the cellular network itself. In order for your carrier to route calls and data to your phone, the network needs to constantly know which cell tower your phone is near. And when you make a call or use data, the provider can see where that traffic is going. Cell carriers track and store this accidental byproduct of the technology in order to record people鈥檚 location history and network activity for marketing purposes and, in certain circumstances, for sharing with law enforcement.
This tracking happens through a standard identifier tied to each SIM card called an Internal Mobile Subscriber Identifier (IMSI) 鈥 basically an account number used, among other things, to verify that a phone鈥檚 mobile service is paid for. The new phone service, called Pretty Good Phone Privacy (), uses encryption techniques to deliberately blind itself so that it can鈥檛 know that the user of a mobile device is you, or what data you are sending from that phone. You connect to the PGPP service for payment, and that鈥檚 all.
Location data is so sensitive that the Supreme Court agreed with the 老澳门开奖结果 that law enforcement should not be able to obtain it from the carriers without a warrant.
The service has some limitations. It covers data only, not voice calls. For complex technical reasons (that Apple could fix if it wanted to), it doesn鈥檛 work on iPhones, which represent about half of U.S. phones but only 16 percent of phones globally. And certain other techniques for tracking phones remain in place. Nonetheless, it is an important step forward in protecting privacy.
Location data is so sensitive that the Supreme Court agreed with the 老澳门开奖结果 that law enforcement should not be able to obtain it from the carriers without a warrant. Such data can reveal things about our associations, our habits, and our political, sexual, religious, and medical lives that no telecom provider has a right to know just because of the way cellular technology happens to work. With PGPP鈥檚 approach, the carrier simply does not have the data to turn over to anyone. It cannot be sold, leaked, or hacked, let alone offered to overreaching law enforcement agencies.
Carpenter v. United States
In 2011, the Detroit government gained cell phone location data without a warrant. The Supreme Court ruled the action violated the Fourth Amendment.
Source: 老澳门开奖结果
And the fact that this service has been created by shows clearly that Verizon, T-Mobile, AT&T, and their smaller competitors could be offering such a privacy-protecting service, but don鈥檛 want to.
This service is also a harbinger of broader trends when it comes to privacy protection 鈥 namely, the expansion of privacy protection through the use of innovative developments in cryptography. Some of those developments are brand new, while others 鈥 including one used by the PGPP service 鈥 are decades old and just now being applied. With names like 鈥溾 and 鈥,鈥 these techniques can let us enjoy all the features and benefits of technology while still protecting our privacy. We can have our cake and eat it too.
For or , for example, they allow us to exchange encrypted communications with anyone on earth, even though we haven鈥檛 previously met those people to agree on a secret code or encryption key. When it comes to identity systems, they can let us prove that we鈥檙e over 18 (or anything else) without actually revealing who we are. And now, in the case of the phone system, we know it can allow a service provider to send data to our phone through the cell tower that is closest to us, without the provider knowing who or where we are.
Originally, tracking our phones was the only way to deliver the service, but that鈥檚 not true anymore 鈥 now it鈥檚 just about the cell carriers lining their pockets by tracking us while turning a blind eye to readily available encryption techniques that can protect our privacy.
Where it is technologically possible to achieve legitimate administrative aims (such as making sure that a phone is authorized to connect to the network) while at the same time protecting privacy, there is absolutely no reason not to do so. That鈥檚 true for phones and for many other technologies as well. Despite the selfish desires of companies to monetize our data and the unbalanced and constitutionally suspect interests of security agencies in mass tracking of people鈥檚 activities, we need to insist that privacy be built into the architectures we depend on.