Free Republic
Browse · Search
News/Activism
Topics · Post Article

Skip to comments.

Security Experts Oppose Government Access to Encrypted Communication (excerpt)
NY Times ^ | 7 July 2015 | Nicole Perlroth

Posted on 07/08/2015 8:57:30 AM PDT by Eric Pode of Croydon

SAN FRANCISCO — An elite group of security technologists has concluded that the American and British governments cannot demand special access to encrypted communications without putting the world’s most confidential data and critical infrastructure in danger.

A new paper from the group, made up of 14 of the world’s pre-eminent cryptographers and computer scientists, is a formidable salvo in a skirmish between intelligence and law enforcement leaders, and technologists and privacy advocates. After Edward J. Snowden’s revelations — with security breaches and awareness of nation-state surveillance at a record high and data moving online at breakneck speeds — encryption has emerged as a major issue in the debate over privacy rights.

That has put Silicon Valley at the center of a tug of war. Technology companies including Apple, Microsoft and Google have been moving to encrypt more of their corporate and customer data after learning that the National Security Agency and its counterparts were siphoning off digital communications and hacking into corporate data centers.

Yet law enforcement and intelligence agency leaders argue that such efforts thwart their ability to monitor kidnappers, terrorists and other adversaries. In Britain, Prime Minister David Cameron threatened to ban encrypted messages altogether. In the United States, Michael S. Rogers, the director of the N.S.A., proposed that technology companies be required to create a digital key to unlock encrypted data, but to divide the key into pieces and secure it so that no one person or government agency could use it alone..........

(Excerpt) Read more at nytimes.com ...


TOPICS: Business/Economy; Crime/Corruption; Government; Technical
KEYWORDS: computing; crypto; cybersecurity
Of course, criminals would never be able to take advantage of something like this. Neither would the Chinese, or the Russians, or Iran....

When the Thompson submachine gun came out it was advertised as giving the advantage to the police because criminals would not be able to get hold of it. Of course the "trench broom" rapidly became the choice of discerning mobsters everywhere.

Once the ultra-secret decryption keys to the unhackable software have appeared on the dark net websites, it's lights out for everybody.

1 posted on 07/08/2015 8:57:30 AM PDT by Eric Pode of Croydon
[ Post Reply | Private Reply | View Replies]

To: Eric Pode of Croydon

If government enjoyed even a little bit of trust then maybe some would consider allowing govt to have keys.

But there is not even a little trust. Most (including me) think that govt having the key doesn’t make us safer and maybe even makes us less safe.


2 posted on 07/08/2015 9:02:05 AM PDT by Principled (...the Supreme Court of the United States favors some laws over others...)
[ Post Reply | Private Reply | To 1 | View Replies]

To: Eric Pode of Croydon

Then too, there is the nagging issue of unauthorized, back channel recipients of the NSA, CIA and FBI intel products. The problem with crony capitalism is that it’s only a pillow mint away from crony government. Does the term “revolving door” mean anything to anyone? I’m not sure I’d want Halliburton or Wackenhut or Booz Allen Hamilton or Northbridge or Aegis, et al, to know my travel plans or who I like to hang out with. Crony capitalism is monopoly capitalism is fascism is Nazism. Any questions?


3 posted on 07/08/2015 9:12:30 AM PDT by Yollopoliuhqui
[ Post Reply | Private Reply | To 1 | View Replies]

To: Eric Pode of Croydon
FYI - today's digest of the Forum on Risks to the Public in Computers and Related Systems also has a discussion on this topic: http://catless.ncl.ac.uk/Risks/28.75.html.
4 posted on 07/08/2015 9:16:45 AM PDT by ken in texas
[ Post Reply | Private Reply | To 1 | View Replies]

To: Eric Pode of Croydon
Once the ultra-secret decryption keys to the unhackable software have appeared on the dark net websites, it's lights out for everybody.

Not only that, but the "safeguards" are stupid and designed to circumvented with ease.

Let's say alphabet agency ABC (who we've already determined is not truestworthy enough to hold the keys themselves) gets a judge with his rubber stamp to agree to retrieve a "split" key as a part of an ongoing investigation. So, ABC contacts keyholder1, KH2, and KH3 to provide their key parts. It uses that key to decrypt whatever it is that they want to decrypt. Now, all the "key" is, is really just a very long prime number. So, the ABC agency now has posession of this number. How will we be able to validate that after it's use in this particular instance, that the ABC agency no longer has the "key"? Remember, we've already determined ahead of time that we don't trust the agency, which is why we have to safeguard the key in the first place.

Does anyone believe that the key will not be squirreled away for future use? If you do, I have a bridge I want to sell you.

5 posted on 07/08/2015 9:48:58 AM PDT by zeugma (The best defense against a bad guy with a gun is a good guy with a gun)
[ Post Reply | Private Reply | To 1 | View Replies]

To: Eric Pode of Croydon

Government = Cosa Nostra


6 posted on 07/08/2015 10:01:29 AM PDT by The Duke (Azealia Banks)
[ Post Reply | Private Reply | To 1 | View Replies]

Disclaimer: Opinions posted on Free Republic are those of the individual posters and do not necessarily represent the opinion of Free Republic or its management. All materials posted herein are protected by copyright law and the exemption for fair use of copyrighted works.

Free Republic
Browse · Search
News/Activism
Topics · Post Article

FreeRepublic, LLC, PO BOX 9771, FRESNO, CA 93794
FreeRepublic.com is powered by software copyright 2000-2008 John Robinson