Jon Millican's Avatar

Jon Millican

@jonmillican.bsky.social

Applied privacy engineer in the UK. Previously helping to lead end-to-end encryption for Messenger at Meta. he/him I'm on Germ DM πŸ”‘ https://ger.mx/A2IiVcRU_V5l57lcsczbhm75N_nWCGBjYu7uRp9MpDX5#did:plc:jdtpr2uwhhouv6vhgntgpn3b

364 Followers  |  66 Following  |  14 Posts  |  Joined: 30.04.2023  |  1.648

Latest posts by jonmillican.bsky.social on Bluesky


FYI, Labour just made every Apple product in the UK less secure. All so that the state can snoop at leisure on anyone they like.

(Apple refused to install a back door to let government snoops in and got rid of enhanced security instead. Like binning a door instead of cutting a skeleton key for it.)

22.02.2025 11:04 β€” πŸ‘ 73    πŸ” 35    πŸ’¬ 10    πŸ“Œ 0

it shouldn't be illegal to not have access to your customers' data

22.02.2025 11:15 β€” πŸ‘ 13    πŸ” 5    πŸ’¬ 4    πŸ“Œ 0
The following can be attributed to Dr. Joseph Lorenzo Hall, Distinguished Technologist at the Internet Society:

The Internet Society is saddened at the news that Apple has removed access to its cloud end-to-end encryption, known as Advanced Data Protection, for its UK users as a result of pressure by the UK government. This move will make British Apple users less safe, and make their cloud data more susceptible to criminals and other attackers. It is clear that the UK government continued to pressure Apple to weaken the security of its service despite global outcry from cybersecurity experts, civil society, private industry, and foreign politicians. 

In choosing to remove the feature rather than building a backdoor into its Advanced Data Protection, Apple ensured that at least its global users would continue to benefit from the security and privacy of end-to-end encryption. However, for UK users, their government ensured that their security and privacy is worse than before.

The following can be attributed to Dr. Joseph Lorenzo Hall, Distinguished Technologist at the Internet Society: The Internet Society is saddened at the news that Apple has removed access to its cloud end-to-end encryption, known as Advanced Data Protection, for its UK users as a result of pressure by the UK government. This move will make British Apple users less safe, and make their cloud data more susceptible to criminals and other attackers. It is clear that the UK government continued to pressure Apple to weaken the security of its service despite global outcry from cybersecurity experts, civil society, private industry, and foreign politicians. In choosing to remove the feature rather than building a backdoor into its Advanced Data Protection, Apple ensured that at least its global users would continue to benefit from the security and privacy of end-to-end encryption. However, for UK users, their government ensured that their security and privacy is worse than before.

We at the Internet Society are deeply disappointed that Apple has had to stop offering end-to-end encryption in the UK. The following can be attributed to Dr. Joseph Lorenzo Hall, Distinguished Technologist at the Internet Society: 1/

21.02.2025 16:42 β€” πŸ‘ 199    πŸ” 111    πŸ’¬ 6    πŸ“Œ 13
Preview
European Parliament urges lawmakers to only use encrypted messages after China hacks 13 Feb 2025 - Pro Article - By Max Griera, Ellen O'Regan

Maybe there's something important about end-to-end encryption?! European Parliament is now recommending members use E2EE messaging because of the implications of Salt Typhoon. ht @komadori.bsky.social

13.02.2025 16:45 β€” πŸ‘ 13    πŸ” 3    πŸ’¬ 0    πŸ“Œ 1
Preview
U.K. orders Apple to let it spy on users’ encrypted accounts Secret order requires blanket access to protected cloud backups around the world, which if implemented would undermine Apple’s privacy pledge to its users.

"The British government’s undisclosed order, issued last month, requires blanket capability to view fully encrypted material, not merely assistance in cracking a specific account, and has no known precedent in major democracies."

07.02.2025 11:42 β€” πŸ‘ 187    πŸ” 99    πŸ’¬ 16    πŸ“Œ 14

I do think this is a bit different though. E.g. you can also lose a physical driving license - and there's a pretty well standardised reissuance process for them, involving no permanent data loss.

Not to say that there aren't issues with the proposal. But I'm not sure recoverability is one of them.

22.01.2025 12:35 β€” πŸ‘ 0    πŸ” 0    πŸ’¬ 0    πŸ“Œ 0

Thanks! Definitely understand why you'd build it incrementally rather than going straight to E2EE; and just having Bluesky DMs will already be great!

But yeah - if there were a single architectural choice that has the biggest impact on ease of transition, message history would have to be it!

13.05.2024 22:32 β€” πŸ‘ 8    πŸ” 0    πŸ’¬ 1    πŸ“Œ 0

Of course, by "we" here I mean Meta. I don't know what tradeoffs Bluesky will be making. But as they plan a progression from non-E2EE to E2EE messaging, I hope they're able to design to constraints like this tradeoff, to simplify their transition later on.

13.05.2024 21:55 β€” πŸ‘ 15    πŸ” 1    πŸ’¬ 0    πŸ“Œ 0

However in our case, per the Labyrinth Protocol whitepaper, we ended up choosing to keep 1 & 2. This means you can log in to use Facebook and Messenger as before, and won’t be blocked if you don’t restore your history. Just in that situation, you won’t have earlier messages.

13.05.2024 21:53 β€” πŸ‘ 8    πŸ” 0    πŸ’¬ 1    πŸ“Œ 0

It’s obviously tough moving from a world where you can have all 3 for a product - as is the case for non-E2EE messages - to a world in which one of them is not guaranteed. None of them are ideal to give up.

13.05.2024 21:53 β€” πŸ‘ 5    πŸ” 0    πŸ’¬ 1    πŸ“Œ 0

Third, it might be particularly important to people to always have their historical E2EE data to hand when using the E2EE component. In our case, this would mean that you can only even use messaging at all in situations where all message history is available.

13.05.2024 21:53 β€” πŸ‘ 11    πŸ” 0    πŸ’¬ 1    πŸ“Œ 0

Second, somebody in that state may still be actively using the E2EE component. In our case, that’s sending and receiving new messages. For some use cases, this will be all somebody needs; and others it will be good enough.

13.05.2024 21:52 β€” πŸ‘ 9    πŸ” 0    πŸ’¬ 1    πŸ“Œ 0

In our case, Facebook is a platform with many features, of which Messenger is just one. Someone might not recover their E2EE history when logging in for various reasons, and if they don’t need message history for what they’re doing, we don’t need to block them from other things.

13.05.2024 21:52 β€” πŸ‘ 11    πŸ” 0    πŸ’¬ 1    πŸ“Œ 0

First up, you don’t want somebody who has temporarily lost access to some key material to have to completely reset their account to log in. It’d be drastic and painful! Maybe they were logging in to use a different function of the service; or only care about new data?

13.05.2024 21:51 β€” πŸ‘ 14    πŸ” 0    πŸ’¬ 1    πŸ“Œ 0
A pick-two triangle, with corners titled "Message history is available whenever messaging works", "User can log in without cryptographic key material" and "Messaging functions whenever the user is logged in".

A pick-two triangle, with corners titled "Message history is available whenever messaging works", "User can log in without cryptographic key material" and "Messaging functions whenever the user is logged in".

Specifically, there are three desirable properties, of which you must pick two:

1. User can log in without cryptographic key material.
2. E2EE component functions whenever the user is logged in.
3. All stored data is available whenever the E2EE component works.

13.05.2024 21:51 β€” πŸ‘ 23    πŸ” 5    πŸ’¬ 1    πŸ“Œ 0

The challenge arises when a larger platform includes a component that is end-to-end encrypted; such as Facebook and now Messenger. As the platform cannot give access to the plaintext E2EE content, there’s a choice to make around authentication, data recovery and functionality.

13.05.2024 21:49 β€” πŸ‘ 16    πŸ” 0    πŸ’¬ 1    πŸ“Œ 0

Given that E2EE messaging is coming to Bluesky, now seems a good time to cross-post a thread of mine from Threads, briefly discussing one of the interesting non-obvious tradeoffs that we had to consider around message history.

13.05.2024 21:49 β€” πŸ‘ 73    πŸ” 6    πŸ’¬ 2    πŸ“Œ 2

Hey there, this is exciting to hear! I'm Jon, from Meta's team who built E2EE for Messenger. If it would be at all helpful to talk over any considerations in the initial system design that might make the E2EE transition easier/harder in future, I'd be very happy to chat over some of our learnings!

08.05.2024 11:38 β€” πŸ‘ 10    πŸ” 0    πŸ’¬ 1    πŸ“Œ 0
Post image

Emma Connor and I have been ratcheting the ratchets up to 5! drive.google.com/file/d/1Wr-8...

01.04.2024 12:35 β€” πŸ‘ 12    πŸ” 1    πŸ’¬ 0    πŸ“Œ 1

@jonmillican is following 20 prominent accounts