Free Republic
Browse · Search
News/Activism
Topics · Post Article

Skip to comments.

Obama administration’s calls for backdoors into encrypted communications echo (1990s) fiasco
MacDailyNews ^ | December 14, 2015

Posted on 12/14/2015 8:52:46 PM PST by Swordmaker

Obama administration's calls for backdoors into encrypted communications echo Clinton-era key escrow fiasco

“In the face of a Federal Bureau of Investigation proposal requesting backdoors into encrypted communications, a noted encryption expert urged Congress not to adopt the requirements due to technical faults in the plan,” Sean Gallagher reports for Ars Technica. “The shortcomings in question would allow anyone to easily defeat the measure with little technical effort.”

“Please note, the testimony referenced above was delivered on May 11, 1993. However, that doesn’t change its applicability today,” Gallagher reports. “In fact, current pressure being applied by law enforcement and intelligence officials over end-to-end encrypted communications appears eerily reminiscent of a similar battle nearly 25 years ago.”

“Last week, FBI Director James Comey again pushed forward arguments for law enforcement ‘backdoors’ into encrypted communication applications… Though the FBI director reluctantly dropped his lobbying efforts for such a backdoor this summer, the attacks in Paris and San Bernardino have raised the issue again. Even President Obama recently asked for technology companies to help give the government access to communications over messaging applications and social media,” Gallagher reports. “The argument against backdoors, however, has not changed since 1993.”

Read more in the full article here.

MacDailyNews Take: As we wrote early last month: Backdoors = insecurity. Wherever backdoors exist, it's not only "authorities" exploiting them legally. Only a blooming idiot would believe in a "secure backdoor" accessible only by properly authorized "authorities."

None of us should accept that the government or a company or anybody should have access to all of our private information. This is a basic human right. We all have a right to privacy. We shouldn't give it up. We shouldn't give in to scare-mongering or to people who fundamentally don't understand the details. -- Apple CEO Tim Cook, February 27, 2015



TOPICS: Constitution/Conservatism; Culture/Society; Government; Philosophy
KEYWORDS: applepinglist; privacy; security; windowspinglist
Navigation: use the links below to view more comments.
first 1-2021-31 next last
I can't link to the original article as it is not permitted by Copyright limitations. . . but this Mac Daily News summary and commentary of what the government is asking is the next best thing. Read the entire article at the original source as to why a government sanctioned back door is not a good idea.
1 posted on 12/14/2015 8:52:46 PM PST by Swordmaker
[ Post Reply | Private Reply | View Replies]

To: dayglored; ShadowAce; ThunderSleeps; ~Kim4VRWC's~; 1234; Abundy; Action-America; acoulterfan; ...
The Obama Administration is again demanding backdoors into digital encryption despite the fact that if you provide it for them, it will be only a short, very short, time before the bad guys also have the backdoors into everyone's devices as well. -- PING!


Digital Encryption privacy and security Protection
Ping!

The latest Apple/Mac/iOS Pings can be found by searching Keyword "ApplePingList" on FreeRepublic's Search.

If you want on or off the Mac Ping List, Freepmail me

2 posted on 12/14/2015 8:56:19 PM PST by Swordmaker (This tag line is a Microsoft insult free zone... but if the insults to Mac users continue....)
[ Post Reply | Private Reply | To 1 | View Replies]

To: Swordmaker
Again with the Algore Clipper chip and/or backdoors to "protect us" ?

The same old crap without even the decency to put new lipstick on that pig.

Maybe if they worried about computers handling Secret and above messages not being in someones bathroom closet with the extra toilet paper I could take their trash as at least a decent joke.

3 posted on 12/14/2015 9:10:17 PM PST by Rashputin (Jesus Christ doesn't evacuate His troops, He leads them to victory.)
[ Post Reply | Private Reply | To 1 | View Replies]

To: Swordmaker

I have a right to privacy of communications. In other contexts government is unabashed at eavesdropping and conducting surveillance where it claims that I “don’t have a reasonable expectation of privacy.” If I take steps to encrypt my communications, I am reserving my right to communicate privately. Let them get a warrant if they want access.

Should the US government succeed in forcing companies doing business in the US to weaken their encryption, it will only give non-US companies and non-US customers an incentive to avoid buying or using any US product or service.

If there is any doubt, look at how short a time it took for someone to come out with a replacement for TrueCrypt once its weakness was documented.

When strong encryption is outlawed, only outlaws will have strong encryption.


4 posted on 12/14/2015 9:13:56 PM PST by theBuckwheat
[ Post Reply | Private Reply | To 1 | View Replies]

To: Swordmaker

It is useful to think of “The Government” as the stranger in the car next to you at a stoplight.

Would you let that stranger look through your phone, your finances, your texts to your wife?

You wouldn’t.

And you’d be tempted to let the SOB have it if you caught him doing it.


5 posted on 12/14/2015 9:18:34 PM PST by IncPen (Not one single patriot in Washington, DC.)
[ Post Reply | Private Reply | To 1 | View Replies]

To: Swordmaker; Abby4116; afraidfortherepublic; aft_lizard; AF_Blue; Alas Babylon!; amigatec; ...
Freakin' Democrats playing Big Brother yet again ... PING!

You can find all the Windows Ping list threads with FR search: just search on keyword "windowspinglist".

Thanks to Swordmaker for the ping!!

6 posted on 12/14/2015 9:23:43 PM PST by dayglored ("Listen. Strange women lying in ponds distributing swords is no basis for a system of government.")
[ Post Reply | Private Reply | To 2 | View Replies]

To: Swordmaker
Ultimately, the government's calls for backdoors into strong encryption are bullsh!t.

They can always resort to traditional means of decryption:

  1. "Black-bag" decryption" -- being sneaky and using subterfuge rather than high-tech to gain the password.

  2. "Rubber-hose decryption" -- beating the crap out of people until they give up the password.

The ONLY reason they want backdoors is they are LAZY SOBs. Let 'em work for it.

All hail (and all credit to) XKCD.COM.

7 posted on 12/14/2015 9:30:51 PM PST by dayglored ("Listen. Strange women lying in ponds distributing swords is no basis for a system of government.")
[ Post Reply | Private Reply | To 1 | View Replies]

To: Swordmaker

This from the same government that goes to extreme lengths to deny our legitimate inquiries into what it has been doing in our name. IRS, Fast and Furious, Bengazi and the list goes on.


8 posted on 12/14/2015 9:34:37 PM PST by Lurkina.n.Learnin (It's a shame enobama truly doesn't care about any of this. Our country, our future, he doesn't care)
[ Post Reply | Private Reply | To 1 | View Replies]

To: dayglored
All hail (and all credit to) XKCD.COM.

Love the cartoon. . . The truth is, even the million dollar cluster would be a cluster F waste of money to attempt such a crack. Rubber-hose and water-boarding, much quicker and far more effective.

9 posted on 12/14/2015 9:34:59 PM PST by Swordmaker (This tag line is a Microsoft insult free zone... but if the insults to Mac users continue....)
[ Post Reply | Private Reply | To 7 | View Replies]

To: dayglored
Freakin' Democrats playing Big Brother yet again ... PING!

Problem: many of those "freakin' Democrats" are wearing GOPe clothes!

10 posted on 12/14/2015 9:38:16 PM PST by Swordmaker (This tag line is a Microsoft insult free zone... but if the insults to Mac users continue....)
[ Post Reply | Private Reply | To 6 | View Replies]

To: Swordmaker
> Problem: many of those "freakin' Democrats" are wearing GOPe clothes!

Oh, I didn't mean that ONLY Democrats do it -- just that it's them doing it THIS time...

All those power-hungry sock-cuckin' UniParty politicians are the same....

11 posted on 12/14/2015 9:41:09 PM PST by dayglored ("Listen. Strange women lying in ponds distributing swords is no basis for a system of government.")
[ Post Reply | Private Reply | To 10 | View Replies]

To: Swordmaker
> Love the cartoon. .

One of my all time favorites. Another is this one -- off topic for this thread, but what they heck, it's a beautiful thing:


12 posted on 12/14/2015 9:43:33 PM PST by dayglored ("Listen. Strange women lying in ponds distributing swords is no basis for a system of government.")
[ Post Reply | Private Reply | To 9 | View Replies]

To: Swordmaker

If two parties were to agree in advance that target1=tartet3 and target3=target2 and that every message starting with the letters ‘a’, ‘I’ or ‘m’ should be ignored then all the decryption in the world would not help.


13 posted on 12/14/2015 9:45:11 PM PST by The Duke ( Azealia Banks)
[ Post Reply | Private Reply | To 1 | View Replies]

An honest man uses the front door.


14 posted on 12/14/2015 9:53:01 PM PST by Gene Eric (Don't be a statist!)
[ Post Reply | Private Reply | To 1 | View Replies]

To: The Duke
If two parties were to agree in advance that target1=tartet3 and target3=target2 and that every message starting with the letters ‘a’, ‘I’ or ‘m’ should be ignored then all the decryption in the world would not help.

There are several ways to make completely unbreakable ciphers. The best way is the public code book method. You and the target agree to communicate with a preset variable code which uses a common public book with a large number of pages that has in it all letters and numbers symbols, etc. ideally, every one of these should occur on multiple pages throughout the book. In advance you and your partner setup a schedule of directions. I.e. Odd days start from the bottom of the beginning page. Even from the top. Monday's, Wednesday's, Friday's count pages from the starting page toward the front, Tuesday's, Thursday's, and Saturday, toward the back. Sunday's messages stay on the start page and ignore first set of numbers. Set similar rules for line count direction and letter count directions.

Sender sends start page, move to page, line number, word number, letter count for each character in his message. If the letter count takes one to a space or punctuation mark, that's it.

This can all be automated in computers that both have a digital copy of the book downloaded. . . or it can be done tediously by hand. Both encryption and decryption can be computerized and since you NEVER use the same code sequence for the same letter, without knowing the book, the rules, and the days, it's unbreakable.

15 posted on 12/14/2015 10:14:36 PM PST by Swordmaker (This tag line is a Microsoft insult free zone... but if the insults to Mac users continue....)
[ Post Reply | Private Reply | To 13 | View Replies]

To: Swordmaker

Here is my question.

Why does a government that has a terrible track record in spying on foreigners insist on spying on it’s own citizens in the name of keeping out foreigners ?


16 posted on 12/14/2015 10:34:55 PM PST by UCANSEE2 (Lost my tagline on Flight MH370. Sorry for the inconvenience.)
[ Post Reply | Private Reply | To 1 | View Replies]

To: Swordmaker
Both encryption and decryption can be computerized and since you NEVER use the same code sequence for the same letter, without knowing the book, the rules, and the days, it's unbreakable.

Not if you've got...


17 posted on 12/14/2015 10:38:07 PM PST by UCANSEE2 (Lost my tagline on Flight MH370. Sorry for the inconvenience.)
[ Post Reply | Private Reply | To 15 | View Replies]

To: Swordmaker

Sounds like a variation of the one-time pad. One affect all this does have is bringing back the days of having to use human agents to transport keys/code books around.


18 posted on 12/15/2015 1:55:53 AM PST by The Duke ( Azealia Banks)
[ Post Reply | Private Reply | To 15 | View Replies]

To: Swordmaker

i’m sorry... but if they wish a backdoor, they must receive approval from each person they wish to eavesdrop on.

freedom of speech - Right to say what you want
freedom of association - Right to be with who you want

combined - Right to say what you want only to those you wish to associate with.

otherwise known as a RIGHT TO PRIVACY


19 posted on 12/15/2015 3:05:46 AM PST by sten (fighting tyranny never goes out of style)
[ Post Reply | Private Reply | To 1 | View Replies]

To: dayglored

The ONLY TRUE ENEMY Obama, Hillary and Jeh recognize and care about is conservative traditional Americans.

When Trump’s President he’ll expose the truth... how much money and effort was wasted going after Republicans rather than radical Muslims... and how choice put Americans at risk.

It will be an outrage.


20 posted on 12/15/2015 7:28:23 AM PST by GOPJ (The enemy? (UWEE) Unified Washington Establishment Elites (UWEE -sounds similar to a pig call.)
[ Post Reply | Private Reply | To 6 | View Replies]


Navigation: use the links below to view more comments.
first 1-2021-31 next last

Disclaimer: Opinions posted on Free Republic are those of the individual posters and do not necessarily represent the opinion of Free Republic or its management. All materials posted herein are protected by copyright law and the exemption for fair use of copyrighted works.

Free Republic
Browse · Search
News/Activism
Topics · Post Article

FreeRepublic, LLC, PO BOX 9771, FRESNO, CA 93794
FreeRepublic.com is powered by software copyright 2000-2008 John Robinson