Hacker News new | past | comments | ask | show | jobs | submit login
German court forces mail provider Tutanota to insert a backdoor (heise.de)
261 points by carlesfe on Dec 7, 2020 | hide | past | favorite | 94 comments



Encryption is the only thing that forces law enforcement to use warrants, without it it's just a wild wild west of privacy abuse. I do hope we see more services crop up, and new methods for people to encrypt email outside of specific services, maybe better plugins for Thunderbird or something, hell I'd easily pay for such a plugin if someone else can communicate back and forth with me through it and it is encrypted. Maybe even some sort of forward secrecy involved in the system.


I doubt that Thunderbird would want to go back to a plugin for PGP. They just moved that support into the program with S/MIME.


It's not necessary for the Thunderbird team to do it, there are paid plugins for Thunderbird. I'd happily pay for a decent plugin if it is developed properly.


You mean they just broke the plugin without providing adequate built in support.


We generally accept that warrants are a reasonable solution when it comes to the state entering private property without permission for law enforcement purposes.

This also seems like a reasonable solution for encryption. The state here is not making or trying to make encryption illegal; and it is open about the fact that court authorisation is required to enforce a backdoor.


The reason that breaks down is that a backdoor to achieve this isn’t for that one case, it’s for everyone on the service (or easily made to be). It’s like getting permission to break every lock from a particular manufacturer, rather than permission to enter one particular home.

I know in this particular case they’ve said it’s for a singular mailbox. I’m curious how they achieve it.


This is the same as the TSA lock in newly made luggage. In order for Americans to have their luggage inspected, the Europeans have to have a backdoor into their luggage.

Fortunately in Europe you can add a layer of security on top of that by adding new locks.


I mean when you think about it in the grand scheme of things luggage isn't secure anyway, you can just cut through the fabric and other materials if you're so inclined to steal someones belongings from their luggage.


That's true, but at least you'd have some evidence of tampering. If it's your data that is breached or your privacy invaded, you have no idea.


You can also just push a pen through the zipper to open it without leaving any evidence. Simply run both locked-together sliders back over the zipper to close it.


This sounds more like the analogy breaking down than illustrating a meaningful difference in scenarios. The police already /can/ break a lock from just about any manufacturer. They just break the door down and enter regardless of the phenomenal quality of the lock itself.


That’s exactly what I meant :)


A backdoor is never a solution. It can, and will, always be abused. Furthermore, warrants are also trivially abused which I have seen done first hand.


> We generally accept that warrants are a reasonable solution

"We" accept nothing. The state can't execute warrants to get at what's inside people's minds. Computers are extensions of people's minds and I expect them to be equally inviolable.

Also, even if it does have lawful access to the system, the state is not entitled to finding usable evidence.

> it is open about the fact that court authorisation is required to enforce a backdoor

There mere possibility of a court-mandated backdoor means the entire system is already compromised and it's impossible to trust it.


> Computers are extensions of people's minds and I expect them to be equally inviolable.

This is not a statement of fact and is generally a minority opinion.


So my opinion doesn't matter just because I'm part of some minority?


If you want your opinion to be taken seriously or be seen as credible, you should probably back it up of justify in some way, rather than just stating it as if it is a fact. The thing is, I agree with you but I understand that it is not the general opinion of most people. I think it is important to explain and justify the very significant shift in thinking about what is “the mind”.


You misrepresented what I said by removing the conditional part of the sentence - that's a misquote.

>There mere possibility of a court-mandated backdoor means the entire system is already compromised and it's impossible to trust it.

So then you should trust literally no software or hardware.


> You misrepresented what I said by removing the conditional part of the sentence - that's a misquote.

That wasn't my intention. I just didn't want to reproduce the whole post in my reply.

> So then you should trust literally no software or hardware.

I give free software the benefit of the doubt. I don't trust hardware. It sucks that hardware costs billions to manufacture. Centralized resources are easily targeted by governments. Maybe someday we'll have 3D printing technology that makes it possible for hackers to create their own chips at home.


From my understanding of the article (non-native), it seems like it is only one specific mailbox that is to be monitored

> "Tutanota sieht sich nun gezwungen, bis Jahresende eine Funktion zu programmieren...dieses Postfach zu überwachen."

and that nothing else will change for the other users

> "Für die anderen Nutzer soll sich dadurch nichts ändern, ihre Mails sollen weiter standardmäßig verschlüsselt werden"

As other users have pointed out, it will only be for new emails for the specific mailbox, as the rest are already encrypted

> "betrifft die Überwachungsmaßnahme nur die neu eingehenden unverschlüsselten E-Mails"

We may have to wait until tomorrow for some more native speakers to wake up and translate.


Yeah german here you are correct.

> Tutanota will Beschwerde gegen den Beschluss einlegen, diese hat jedoch keine aufschiebende Wirkung

Tutanota wants to appeal in court against this, but is forced to comply (right now).

> "Tutanota sieht sich nun gezwungen, bis Jahresende eine Funktion zu programmieren...dieses Postfach zu überwachen."

Tutanota sees no other possibility than to program a function (until the end of the year) that can monitor this inbox. and that nothing else will change for the other users

> "Für die anderen Nutzer soll sich dadurch nichts ändern, ihre Mails sollen weiter standardmäßig verschlüsselt werden"

For other users nothing changes.

> "betrifft die Überwachungsmaßnahme nur die neu eingehenden unverschlüsselten E-Mails"

Only the new mails will be stored unencrypted. Already encrypted mails can't be unencrypted and it's only for this inbox.

> Für die anderen Nutzer soll sich dadurch nichts ändern, ihre Mails sollen weiter standardmäßig verschlüsselt werden. Gleichwohl sieht Tutanota eine einmalige Umgehung der Verschlüsselung als Datenschutz- und Sicherheitsrisiko für letztlich alle Kunden an.

For other users nothing changes. Tutanota sees through this "onetime" circumvention of the encryption a big risk in data protection and security for all other users.

And I agree. I won't feel good using a secure mail provider that promises to encrypt all my mails so that nobody else can read them, knowing they once had to implement a backdoor to circumvent exactly that.


I wonder how a company that uses 100% open source software would comply with an order like this.

    def decrypt_email?(email) do
      email in surveilance_order_emails()
    end


It's not decrypting mails. Right now it looks like every incoming mail is encrypted with the public key of the recipient. What they need to do is more in the line of

  def encrypt_mail(email):
    if email.user=="badperson":
      store(email)
    else:
      store(encrypt(email))
Rather stupid to be honest since it's not obvious how new mails could help the car salesman (don't know what zulieferer should be in english... supplier?) in any way shape or form. Or do they want to know if the blackmailer sends more blackmails? Don't know, don't care. I'm just always shocked how such verdicts come to be.

PS Don't know how to properly format text here


They will do what reddit did, keep "sensitive" additions to your system closed, and if you are not distributing it, you are not required to publish it. Just watch out for AGPL.


Just read the list of bad people from a config file?


You mean so that they do not leak the affected email address?


I mean if your code is open source, and you get an order to insert a backdoor of some kind, how can you put the backdoor in the open source code without violating a nondisclosure clause in the government’s order?


Law overrides contract, so if distributing those changes is prohibited, then not distributing those changes to code is not a violation of the open source licence, the relevant clauses of the licence contract can not be legally binding.

So you'd just [be required to] keep a non-open fork of that code even if the license (e.g. AGPL) would prohibit that.


I don't think a law requiring you to not distribute the changes overrides the license clauses terminating your license for not distributing them? It's not the license givers problem that you can't comply with the license, don't use it then?


Of course, not using that license and stopping the use of that code is also a completely valid (though costly) option.

If the licence giver believes that you're violating the contract, they are free to try and enforce that contact in court. A German court would almost certainly rule that the clause is unenforceable at least as it applies to that particular order-related modification (the licence requirements would still be valid for unrelated modifications). There is a nontrivial legal question whether that would imply that the requirement voids the licence as a whole or just the specific clause. Specific terms (e.g. AGPL clause 12) may suggest that it would void the whole licence, but I wouldn't be certain on how German courts would consider it given these specific circumstances; a German lawyer might have a good idea but I do not.

But in any case, contractual obligations are not an excuse for noncompliance with other legal requirements. If it does turn out that executing the order is incompatible with a particular license, then you must execute the order anyway and decide what's the best way to handle the consequences. Breaching a contract is a legally valid option as well, and in some cases that may even be the best option, if the expected liabilities/damages are less than the consequences of complying with it.


Tutanotas business is predicated on privacy, and on relying on open source. If the government requires them to disconnect from both, they are destroying the entire business. Imagine if they lost the right to use their foss systems because of this and the cost of starting a closed source replacement. Tutsnkta will already vanish overnight from every single privacy respecting app list. They could get sued for misrepresentation also. Shouldn’t the government at least be liable for compensating them for damages?

This is a death blow


This is sever-side code, so you handle this email address the same way you handle other secrets, like your database password: put them in configuration instead of hardcoding them.

With end-to-end encryption, where encryption happens in an open source client, this conflict would be more interesting.


Unless you can prove your running copy is the same as the provided code (which is pretty hard for server software), you can always keep a private forked copy with the backdoor and run that


Probably they could make the code open and just leave the specific accounts targeted to be set as an environment variable.


Not a lawyer and I am just speculating but in the US I believe it would likely result in the court compelling the maintainer of the libraries in question to comply with the original order, or issue new orders to compel the parties in question given the new information.


With most licenses couldn’t you use a fork?


Forks are generally required to maintain the original licensing of the originating source. That would be like taking part of the Windows source code and "forking" it with the only change being the licensing. Just because you forked it and changed the license doesn't make it true.


^ this

Also: what would forking have to do with anything? If youre compelled to put a backdoor in code to be able to intercept messages from a particular person, a better argument would be to just say "lol idk how 2 do codez" as opposed to "lol im gonna fork, fuck off"


German native here. Your translation is mostly correct.

The court seems to have forced Tutanota to store new incoming non-encrypted emails in plaintext for a specific mailbox that was used to blackmail an automotive supplier.

But the article is not entirely clear on whether that is for that specific mailbox only. At one point, the article mentions that storing emails in plain text could be used on "specific mailboxes" (plural).

> Ein Urteil des Landgerichts Köln zwingt das hannoversche Unternehmen nun jedoch zum Einbau einer Funktion, mit der Ermittler einzelne Postfächer überwachen und Mails im Klartext lesen können.


IANAL, but if I am not mistaken, German law requires telecommunication providers (above a certain threshold) to provide law enforcement with a way to look into customer communication via the provider. Meaning here, they need to implement a way for law enforcement to look into any mailbox they can come up with a warrant for.


Correct but from the article

> So hatte im Sommer das Landgericht Hannover entschieden, dass Tutanota im rechtlichen Sinn keine „Telekommunikationsdienste“ erbringt oder daran mitwirkt – und deshalb auch nicht zur Telekommunikationsüberwachung verpflichtet werden kann

In the summer the Landgericht Hannover judged that Tutanota isn't a "Telekommunikationsdienste" (telecommunication providers) and they also don't take part in one. That is why Tutanota calls bullshit.

> Das Kölner Gericht sieht Tutanota dennoch als „Mitwirkenden“ bei der Erbringung von Telekommunikationsdiensten. Folglich müsse das Unternehmen die Überwachung ermöglichen.

Cologne now says the opposite and says they "take part" in providing telecommunication without clarification.


>The court seems to have forced Tutanota to store new incoming non-encrypted emails in plaintext

This makes sense as AFAIK Tutanota messages between users are encrypted on the client side, not the server side. I guess they could try to backdoor that too but I'd think someone would be able to sniff that in the network traffic?


> Für die anderen Nutzer soll sich dadurch nichts ändern, ihre Mails sollen weiter standardmäßig verschlüsselt werden.

They seem to suggest that it really only applies to this one specific inbox


You are missing the entire point of why this is a horrible thing to begin with! They have to develop new encryption circumvention technology for this one surveillance which weakens encryption for everyone using the encryption technology.

Its exactly like if you were to force the creator of PGP to build a backdoored version of PGP with the right windows signatures or something. You could just say, "it will only be for new emails for the specific mailbox, as the rest are already encrypted", but then you are missing the point entirely.

BTW germany is currently in the process of shoving a new law though the EU which will effectively destroy all encrypted services in europe (by means of forcing backdoors/secondary keys). Just for context.


My German is extremely rusty, but the whole dispute here seems to stem from the discussion wether or not the company has to comply with what we normally call 'lawfull-intercept' as part of telecom regulations. They contest the notion that they are a telecom provider.


It’s not so late here in Europe yet. At least not for hackers :) And there ought to be some German-speaking persons over the pond as well. We’ll see :)


Yes furthermore it's a decision of a local court which is not in line with decisions of other courts in similar cases.

So it's likely to be overruled but until then the courts decision is valid, hopefully it gets overruled before the charges are deployed.


I worked in the telecom industry, and knowing how much surveillance related regulations was there, I can't believe true e2e encryption is a thing on the internet.

I'm surprised how so many people in tech believe that a messaging application like WhatsApp is allowed to have real e2e encryption. It's impossible for regulators to ignore a platform with substantial traffic.


You are right, and yet I always asked myself if all the regulations ever made sense.

Those that really want to coordinate any kind of illicit activity, do they use Whatsapp thinking it is secure, or would they be smart enough to set up their own infrastructure? How many threats were stopped due to police/Three-Letter-Agencies being able to tap into the largest services vs going to the deep web and infiltrating/investigating the group "in person"?

In any case, my feeling is that all these regulations do is push privacy-conscious people into running their own infra. I was even on the point of running my own email, Matrix and even a SIP server at home, but then I realized that whoever I will be communicating with would not be doing the same so the whole thing is at best an exercise in my sysadmin skills.


My thing is that it doesn’t seem to make me safer. So I give up my privacy without (what seems to me) much benefit. I don’t like the trade-off...

Are organised dangerous criminals really using and relying on platforms for this stuff?



Where do you work, if you don't mind my asking? The Telecom Industry is really all-encompassing these days.


This kind of encryption makes the difference between targeted surveillance and mass surveillance.

In Germany mass surveillance is not accepted as easily as it is in many other countries.


(I used Google translate to some quotes might not be 100% correct)

> "We therefore had to start developing the monitoring function"

Ouch, pretty hard to recommend a service that has admitted to building tools for LE.

> This should not change anything for other users; their emails should continue to be encrypted by default. Nevertheless, Tutanota sees a one-time bypassing of encryption as a data protection and security risk for all customers.

> As Tutanota emphasized, the surveillance measure only affects newly incoming unencrypted e-mails. The company cannot decrypt already encrypted data or end-to-end encrypted e-mails in Tutanota.

It's a bit unclear here if it only means plaintext, incoming emails are effected while in transit or if all new plaintext emails are/could be saved without encryption.


> pretty hard to recommend a service that has admitted to building tools for LE

As opposed to the ones that build and won't admit/can't admit?


True. Not much has really changed beyond more confirmation that anything plain text can be and will be fall into the hands of third party actor/government. Although certain jurisdictions at least in theory have barriers to this e.g Germany vs Switzerland.


Just a friendly reminder that 99% of the time when the EU says privacy they mean from private parties never from governments.


"Nothing is so permanent as a temporary government program."

Oh the court says you can do it in 1 exception? That same rulling will be used to allow it to happen to everyone.


german here:

Tutanota is a german email provider which encrypts incoming email after those were received. The court ordered tutanota to provide incoming emails to a single email account to law enforcement. This is "lawful interception" as you know it, as "service-side encryption" is useless against lawful interception laws.

- md


Clickbait verging on the fake news - they took piece of information completely out of the context and baked a "sensation". No, Tutanova does NOT install "backdoor" be it a court order or not. Government or else can only read contents of non-encrypted mails and only metadata of the encrypted mails, it has been so ever since and this is the way the email works. Clarification in plain English here https://www.reddit.com/r/tutanota/comments/k3sfs5/in_englisc...


Both the article's title and its contents line up with what you're saying. I'm not seeing any clickbait here, save for perhaps the HN title.


I almost got Tutanota, I went with runbox. It is based off Norway, hopefully this ruling will not applicable for other email companies with EU.


Fun fact: Norway is not a member of the EU.


They aren't, but they are in the EEA (European Economic Area). So in trade they mostly follow EU rules without participating in the political process.

I don't how much of the lawful interception stuff is governed by EU directives. Even less whether that would affect EEA countries.


> Fun fact: Norway is not a member of the EU.

Which I think is a shame. Sweden and Norway together would have a net positive influence on modernizing law across the EU.

(I'm saying that as a German)


Sweden already is part of the EU.


I'm just saying that Sweden, Norway and Finland together would make an awesome couple; given how they overcame legislative issues and how they modernized their countries against all odds (with all that happened after 1808).

From a political perspective they're quick to adapt to a changing landscape.


Sweden and Finland are both in the EU but AFAIK there's not much policy alignment between them with regards to EU legislation.


Norway is also a member of NATO which could subject it to additional pressures (same applies to other member states).



I suppose the employees at Tutanota can do what the employees at Apple did: they could threaten to quit if they are instructed to work on this.


FWIW, Apple has backdoored iMessage's end-to-end encryption via iCloud Backup plaintext/key escrow, automatically on by default, so if people did quit or threaten to quit, it didn't actually stop or change anything.

Apparently Apple was going to fix this glaring hole in their cryptosystem, but Apple Legal killed it as a favor to the FBI.

https://www.reuters.com/article/us-apple-fbi-icloud-exclusiv...


Would there be some way of wording a contractual agreement with a company such that all of their customers contracts would irrevocably end if such a backdoor were installed. Tutanota should consider ceasing trading in response to this. Surely the court won’t force them to not just stop supplying email services to everyone.


A relevant machine-translated paragraph appears to indicate that they are only required to implement monitoring of a single mailbox:

> This is about a blackmail that had been sent to an automotive supplier from a Tutanota mailbox. Tutanota is now forced to program a function by the end of the year that allows the State Criminal Police Office of North Rhine-Westphalia to monitor this mailbox.

Lacking the ability to read this without translation, I cannot determine conclusively whether or not they're also required to preemptively retain plaintext emails for other mailboxes in order to support any future wiretapping requests.


No, you got that right. It's about a single mailbox and only for new mails. As they can't decrypt old mails themselves without a backdoor.

Still, once they have this function, all it takes is a court order to start collecting for other mailboxes.

Tutanota will take this to the next higher court but as it says in the article, they have to start implementing the backdoor right away.


There's a clear distinction between "We are mandated by the court to maintain plaintext for all accounts for all time" and "We are mandated by the court to have the capability to maintain plaintext for one account when ordered so by subpoena-or-equivalent". This is the latter.

Arguments can be had about the relevance of that distinction, but relevant or not, the distinction does exist. Thanks for clarifying!

(I'm not participating in the "Is this distinction relevant?" discussion today, sorry, just trying to understand what was passed. See other threads for pro/con arguments.)


It only affects new incoming mails as they cannot decrypt the old ones.

My understanding of the German wiretapping law is also that they can only record messages from the point of the wiretapping court order so no older messages can be accessed by it.


It sets an extremely dangerous precedent whether it's just a single mailbox or not.


My understanding is that they are only required to monitor a single specific mailbox (for which a court order has been issued) - so no preemptive collection.


The following (machine-translated) paragraph clears that up:

This should not change anything for the other users, their mails should continue to be encrypted by default. Nevertheless, Tutanota considers a one-time circumvention of the encryption to be a data protection and security risk for all customers.

[Update, 30.11., 12 o'clock] As Tutanota emphasized, the monitoring measure only affects newly incoming unencrypted e-mails. Already encrypted data as well as end-to-end encrypted e-mails in Tutanota cannot be decrypted by the company. [Update]


Be aware that the local courts decisions is not in line with the decisions done by other German courts.

It's likely that the courts decisions will be overruled or even be found to be unconstitutional.


And just like that tutanota loses trust. Sad, it's a great service


To this topic there is a more recent statement from tutanota on a german scene site.

https://tarnkappe.info/tutanota-will-beschwerde-vor-dem-bgh-...

A recent interview with Tutanota can also be found there. https://tarnkappe.info/tutanota-der-deutsche-e-mail-dienst-i...


The article says criminal police had a problem with an extortion email. If the victim is willing to collaborate what's the problem with getting the plaintext?

Anyway, I wonder how it's going to be implemented for the case where encryption is done on the client side with open-source tools (not sure if that's the case for Tutanota).


I wonder if publicizing this was a good idea. Now whoever was blackmailing can simply stop, or will find other means.

It's like setting up a trap for smugglers or whoever and hanging a big blinking "TRAP HERE" sign on it.


Perhaps that's the intent, similar to a warrant canary. It's fortunate that they're even allowed to talk about being forced to comply.


I was planning to migrate to Tutanota, I guess I will not be doing so after all


Realistically speaking, is there jurisdiction where this isn't a threat? Most governments allow for wiretaps (basically what this "backdoor" is) when there's a warrant, so I'm not sure what the alternative is. Not even self-hosting works because they can seize your server/ip/domain name and install a backdoor there.


Doing this without being noticed will be somewhat difficult to do though.

Passive sniffing is likely not going to be enough since opportunistic TLS usage is on the rise..


Unless if your server has full drive encryption


That does nothing for mail delivered after the warrant has been issued, which is what's being discussed in this post.


This vulnerability exists for all email hosts. There is no way for a provider to prove to you they didn't silently escrow your plaintext.


If I read Tutanota's explanation of encryption correctly, messages sent between users are encrypted on the client side. While it would be obvious in network traffic if they sent back plain text to their server, it is possible to encrypt txt with multiple keys, ie their key as well as the intended recipient's. Would something like that be able to be detected on the client side, in particular for one user? I'm guessing yes but it would require verifying the js everytime you used their service, right? (asking)

(added 'correctly')


I don’t know what people expected from a service like this hosted in Germany... Germany is a very bad place for personal freedoms when compared to most of the west




Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: