Free Republic
Browse · Search
News/Activism
Topics · Post Article

Skip to comments.

546 Reasons Why America Should Reject Encryption 'Backdoors'
Fortune ^ | February 11, 2016 | by Robert Hackett

Posted on 02/11/2016 8:46:27 AM PST by Swordmaker

Right now policymakers are deliberating a touchy question: Should governments force tech companies to insert “backdoors,” or intentional access points into their encrypted products?

Doing so would presumably aid law enforcement officials in their criminal and counter-terrorism investigations. (Otherwise they would be shut out from reading or intercepting certain data.) Yet any “backdoor” in a consumer product could also be exploited by hackers or spies, technologists warn.

Enter Bruce Schneier. The crypto expert and best-selling author has spent the last few months bolstering an economic case for why the U.S. should reject any proposed mandates for “backdoored” encryption. In fact, Schneier counts 546 reasons.

(Excerpt) Read more at fortune.com ...


TOPICS: Business/Economy; Constitution/Conservatism; Culture/Society; Government
KEYWORDS: applepinglist; privacy; security; windowspinglist
Navigation: use the links below to view more comments.
first previous 1-2021-27 last
To: Swordmaker

Tech bkmk.


21 posted on 02/11/2016 10:25:08 AM PST by Sergio (An object at rest cannot be stopped! - The Evil Midnight Bomber What Bombs at Midnight)
[ Post Reply | Private Reply | To 1 | View Replies]

To: Swordmaker
A chain of security, is only as strong as it's weakest link, and the ethics found in that weak link.

Given the politics we have in place, where political affiliation justifies any action, including sending extremely classified through unsecured private servers, servers that are sitting in a closet in a private residence; servers that could be physically stolen, connected to the internet at another location - and the diplomat in question would never know they were missing - that is not a weak link - that is a dysfuncional, traitorous link.

Given that the Justice system, that was designed to be deaf and blind; to dispense justice EQUALLY to everyone, has been co-opted by politics, and will refuse to consider trying anyone with the proper political party affiliation credentials, to even consider a security backdoor on anything is simply foolhardy.

Forget the privacy invasion that the Gov't is eager, and already has history of abusing. Forget the Constitutional laws, that the NSA, CIA, FBI and even local police have broken to the point that the laws are meaningless, we have politicians who are not only corrupt, they are just plain stupid. By stupid, I mean short-sighted, lacking in both moral fiber and intellectual capacity, as well as incapable of critical thinking. They have sacrified intellectual pursuits for the accumulation of power.

Consider, currently the BlackBerry is used by the US Gov't for dissemination of email, texts, meetings and communications. Blackberry believes in backdoors and has them in their phones as we speak. So, it's safe to assume that the "bad guys" are already listening in on the "secure" goverment system.

Then OPM sits in befuddled amazement when all the "secure" data on Federal Employees is released by hackers. I wish I could fix stupid- I would be a very wealthy man.

22 posted on 02/11/2016 11:18:21 AM PST by Hodar (A man can fail many times, but he isn't a failure until he begins to blame somebody else.- Burroughs)
[ Post Reply | Private Reply | To 1 | View Replies]

To: Flick Lives
Encryption with a “backdoor” is a broken encryption.

Thread over. This is the most accurate summation. Read no further.

23 posted on 02/11/2016 12:46:23 PM PST by rarestia (It's time to water the Tree of Liberty.)
[ Post Reply | Private Reply | To 3 | View Replies]

To: Swordmaker; Abby4116; afraidfortherepublic; aft_lizard; AF_Blue; amigatec; AppyPappy; arnoldc1; ...
Encryption, not backdoors ... PING!

You can find all the Windows Ping list threads with FR search: just search on keyword "windowspinglist".

Thanks to Swordmaker for the ping!!

24 posted on 02/11/2016 7:14:03 PM PST by dayglored ("Listen. Strange women lying in ponds distributing swords is no basis for a system of government.")
[ Post Reply | Private Reply | To 4 | View Replies]

To: zek157

....and would ONLY ever use your data in ways that promote freedom and respect our Constitutional limits.....oh, wait....


25 posted on 02/11/2016 8:46:59 PM PST by Still Thinking (Freedom is NOT a loophole!)
[ Post Reply | Private Reply | To 17 | View Replies]

To: Swordmaker

Having just finished reading “The God’s Eye View” by Barry Eisler I have to say “NO!” to leaving wide open gates so our ever so benevolent bureaucrats can look around whenever they want. Was a good book, fiction maybe. Made me wonder how far they would go.

The God’s Eye View
http://www.amazon.com/gp/product/ref=pe_2452760_166699170_pe_ecg/?ASIN=B00XT47SOK


26 posted on 02/11/2016 10:32:06 PM PST by Lurkina.n.Learnin (It's a shame enobama truly doesn't care about any of this. Our country, our future, he doesn't care)
[ Post Reply | Private Reply | To 1 | View Replies]

To: 109ACS; aimhigh; bajabaja; Bikkuri; Bobalu; Bookwoman; Bullish; Carpe Cerevisi; DarthDilbert; ...
A well reasoned look at why intentionally weakening encryption is a bad idea. - ANDROID PING!

Android Ping!
If you want on or off the Android Ping List, Freepmail me.

My take. I agree with the author. Consider: 1) Requiring back doors into encryption would weaken US businesses providing encryption products. 2) It would place US businesses forced to use compliant encryption at severe risk of cyber attack through those back doors. 3) It wouldn't work as intended on criminals since there are encryption products available from outside the US. 4) If you don't believe #3 consider that most encryption products today come from outside the US anyway.

Kind of like gun control: expecting criminals couldn't get guns/encryption illegally and that they would respect gun control / encryption laws while breaking so many others. Anyone can get encryption products. Heck, any sophomore computer science student can research encryption algorithms and create their own.

27 posted on 02/13/2016 8:15:26 AM PST by ThunderSleeps (Stop obarma now! Stop the hussein - insane agenda!)
[ Post Reply | Private Reply | To 1 | View Replies]


Navigation: use the links below to view more comments.
first previous 1-2021-27 last

Disclaimer: Opinions posted on Free Republic are those of the individual posters and do not necessarily represent the opinion of Free Republic or its management. All materials posted herein are protected by copyright law and the exemption for fair use of copyrighted works.

Free Republic
Browse · Search
News/Activism
Topics · Post Article

FreeRepublic, LLC, PO BOX 9771, FRESNO, CA 93794
FreeRepublic.com is powered by software copyright 2000-2008 John Robinson