ProtonBlog(new window)
An illustration of Kazakhstan government surveillance

Kazakhstan’s aggressive mass surveillance technique explained

Share this page

Aug. 7, 2019 update: The government has reversed its surveillance strategy, claiming the whole program was a “test” that is now complete, according to Reuters(new window). If you installed a government root certificate on your device, you may now uninstall it without consequence. We have provided instructions in this article below for how to do so safely on Mac, Windows, Android, and iOS.

Governments around the world have fought against encryption, but Kazakhstan’s aggressive mass surveillance policy sets an alarming new precedent that may spread to other countries. We’re taking a look at how the recent online surveillance measures have affected Kazakhs, how to stay safe there, and how to defend your data from government spying anywhere.

On July 17, the government of Kazakhstan began coercing its citizens to install a root certificate on their devices that would allow the authorities to monitor everything they do online. The surveillance affects anyone trying to access certain websites, including Gmail, Facebook, Twitter, and YouTube. Once the certificate is installed, the government could access emails, read private messages, log browsing activity, and store login credentials.

The government calls these “security certificates” and insists installation is voluntary. “The introduction of a security certificate will help in the protection of information systems and data,” the Ministry of Digital Development said in an announcement to Kazakh Internet service providers(new window) (ISPs). But in reality, installing a fake root certificate only places personal data in jeopardy by exposing it to third parties.

Of course, few believe security is the government’s objective. In Kazakhstan, elections are few and unfair(new window), and surveillance and state censorship are common(new window). In fact, Proton Mail is one of the many online services, social media, and news portals that are blocked by the regime.

Back in 2015, the Kazakh government first tried to implement the root certificate attack but gave up under pressure from companies. We hope they fail a second time. In the meantime, Proton Mail will continue to provide technological tools to defeat censorship and protect individuals’ right to privacy. Read below for instructions to remove the Kazakh root certificate if you installed it, how to access VPN and Tor, and how to send secure emails no matter where you are.

Kazakhstan’s man-in-the-middle attack

When you access a website and establish a secure connection, your device knows it can trust the site’s server because of its certificate. These are typically issued by a trusted certificate authority and can’t be manipulated. In a man-in-the-middle attack, a third party inserts itself between the website’s server and the user’s device. They then decrypt, read, re-encrypt, and pass along the victim’s data to the real server without anyone knowing the attack took place. 

This is exactly what the Kazakh government is doing, except they’re doing it by coercion. When users install the government’s root certificate on their browsers, it tells the browsers to trust government-issued TLS certificates. The government can then decrypt users’ HTTPS traffic. Users will still see the green lock in their browser’s URL bar, falsely indicating that their traffic is safely encrypted. This is a government-sanctioned man-in-the-middle attack. 

The attack, first described(new window) by researchers at Censored Planet, affects users trying to reach some of the most popular websites in the world, including several Google and Facebook services. Those who try to access the Internet without the government-issued root certificate are being redirected to landing pages(new window) with instructions on how to install it.

“This list of domains suggests that the actual intention is instead to surveil users on social networking and communication sites,” Censored Planet said in its report.

Why Kazakhstan’s mass surveillance is particularly bad

HTTPS is a bedrock of what makes the Internet functional. When you log in to your bank account or buy something online, your credentials and credit card number are safe because of HTTPS. And trusted certificates are the bedrock of HTTPS. If we can’t trust certificates, then we can’t trust the Internet. 

In the past, certificate authorities have been accused of(new window), or have admitted to(new window), selling fake root certificates to private entities for surveillance. It is conceivable that a certificate authority could be compelled or persuaded to sell one to a government. And there are plenty of governments that would be interested.

Just recently, the Chinese government made foreigners visiting the Xinjiang region install a malware app(new window) on their smartphone. The app, named BXAQ(new window), collects all the calendar entries, contacts, call logs, and text messages stored on the phone and sends them to a government server. It even searches the device for specific files, like documents referring to the Dalai Lama or songs about Taiwan’s independence. If the malware detects these files, it notifies the Chinese authorities. 

The US and Australia have also sought to weaken encryption, to the extent that has been possible under a democracy. Australia’s anti-encryption law(new window) lets the government force companies to infect their customers’ devices with malware designed to crack open private communications. And in the United States, Attorney General William Barr recently demanded(new window) companies create an encryption backdoor(new window). So far, however, there have been no concerted efforts to do so.

There is no such thing as a back door (or in this case, online surveillance tool) that can only be used by the good guys. The Shadow Brokers hack and the resulting WannaCry attack(new window) show what can happen when hackers get their hands on such tools. By forcing all Kazakh citizens to use the same certificate, the government is introducing a significant vulnerability. If hackers were able to get control of the certificate, they would have the same access to personal data as the government.

How to protect your data if you are in Kazakhstan

Once you install a compromised root certificate on your device, there is very little you can do to protect your data. Large organizations including Google, Microsoft, and Mozilla are debating whether they should block Kazakhstan’s malicious certificate(new window), but so far they have not taken action.

The good news is that prevention is possible. Kazakh citizens should not install the root certificate. The government has said the certificate is not mandatory, no matter how persistently the ISPs push their users to download it. Any Kazakh citizen that has already installed the certificate should remove it from their device. 

Below we have instructions that explain how to remove the Kazakhstan government certificate from Android, iOS, macOS, and Windows devices.

Note: Be careful. Removing root certificates can cause serious issues for your device. You should back up your data before doing so. Only remove the Qaznet Trust Network root certificate.

Mac

  1. Open Utilities (Shortcut: Shift + Command + U) 
  2. Double-click on KeyChain Access, select System Roots
  3. Find the Qaznet Trust Network root certificate and double-click on it. In the window that pops up, under “Trust,” select “When using this certificate” and choose “never trust.”

Windows

  1. Open the Microsoft Management Console by pressing Windows button + R and typing “MMC
  2. Click File, then Add/Remove Snap-In
  3. Click Certificates, then Add
  4. Click Computer Account, then select Local Computer. Click OK.
  5. Click the arrow next to Certificates (Local Computer) to show all certificates (if nothing is listed, your device does not have the certificate)
  6. Select the arrow beside the Qaznet Trust Network root certificate
  7. Now click the Certificates folder
  8. Find the Qaznet Trust Network certificate, right-click it, and select Properties
  9. Select Disable all purposes for this certificate, then click Apply
  10. Restart your device

Android

  1. Go to Settings
  2. Tap Security
  3. Tap Trusted Credentials
  4. Find the Qaznet Trust Network root certificate
  5. Slide the toggle switch over so that the certificate is disabled

iOS

  1. Go to Settings, then tap General
  2. Tap Profile (if there are no profiles, your device does not have the certificate)
  3. Select the Qaznet Trust Network Profile
  4. Tap Delete
  5. Enter your iOS passcode to confirm

How to prevent Internet censorship and surveillance

For those in Kazakhstan or anywhere subject to Internet censorship and surveillance, there are a few techniques you can use to try to bypass blocks and protect your data.

Use a VPN service like Proton VPN

A virtual private network (VPN) works by encrypting your Internet traffic between your device and the VPN server, which can be located in another country. Proton Mail provides a free VPN(new window) service that also shields DNS requests(new window). In this way, the government cannot block websites at the ISP or DNS level. Unfortunately, the VPN servers themselves can be blocked. If that happens, there are other options.

Use different DNS servers

The Domain Name System allows you to enter a domain like proton.me and reach a Proton Mail server. Governments can censor websites by blocking them on local DNS servers. If this happens, you can try using free alternative DNS servers(new window). Using any of those should allow the DNS block to be bypassed. Guides for setting a custom DNS for your operating system can be found below:

Windows(new window)   ||   MacOS(new window)   ||   Android(new window)   ||   iOS(new window)   ||   Linux(new window)

The Tor network

Tor(new window) is another tool that encrypts your Internet traffic, helps overcome censorship, and makes you harder to spy on. When connected to Tor using the Tor browser(new window) or Tails(new window), your Internet traffic bounces through a series of random servers around the world, concealing your original IP address and making you extremely hard to track. 

Service providers can also provide Tor hidden services(new window) that are harder to block. Proton Mail offers a Tor hidden service at protonirockerxow.onion. If Proton Mail is blocked, you can try accessing our onion site while connected to the Tor network. Proton VPN also offers one-click Tor over VPN(new window) access.

How to send encrypted email

End-to-end encryption(new window) is the best way to ensure no one but you and your recipient can read your emails. Proton Mail makes this simple by automatically encrypting and decrypting messages between Proton Mail users on their devices. This ensures that even if an attacker or government intercepts the message, they cannot decrypt it. Follow the link to create a free encrypted email account.

Privacy is crucial to the healthy functioning of any democracy. The ability to share ideas and form opinions away from prying eyes is critical to free discourse, which is why authoritarian governments are always so eager to expand the surveillance state. As more and more of society has transitioned online, these autocratic governments are now trying to break encryption so that they can monitor everything there as well. We remain committed to our mission of creating a more private and secure Internet. Thank you for supporting our movement.

Best Regards,
The Proton Mail Team

Protect your privacy with Proton
Create a free account

Share this page

Richie Koch(new window)

Prior to joining Proton, Richie spent several years working on tech solutions in the developing world. He joined the Proton team to advance the rights of online privacy and freedom.

Related articles

Apple’s marketing team has built a powerful association between the iPhone and privacy. The company’s ad campaigns claim that “what happens on your iPhone, stays on your iPhone.” And, “Privacy. That’s iPhone.” But Apple’s lawyers are telling a diffe
A cyberattack on national public employment service France Travail has exposed the personal data of as many as 43 million people.  The latest breach is the second major cybersecurity attack to happen in France in the past month, raising concerns abo
If I share a folder in Google Drive, can anybody see my other folders
Google Drive makes it easy to share files and folders, but you may have wondered at some point whether the people you’ve shared a folder with can see your other folders. We answer this question below and also share some tips for truly secure link sha
In 2014, Proton Mail was introduced as a web app, revolutionizing how we think about email privacy. Today, we’re excited to broaden the horizons of secure communication by launching the Proton Mail desktop app. Anyone can now use the new Proton Mail
what is a digital footprint
What you do online isn’t private. Everything you do leaves behind some kind of mark. This trail is often referred to as a digital footprint, and it’s used to track you in many different ways. In this article, we go over what a digital footprint is, h
In February 2024, media reported that Indian authorities may decide to block Proton Mail. Proton Mail is still available in India despite any reports suggesting otherwise.  In response to hoax bomb threats that were sent through Proton Mail, some me