Free Republic
Browse · Search
News/Activism
Topics · Post Article


1 posted on 02/11/2016 8:46:28 AM PST by Swordmaker
[ Post Reply | Private Reply | View Replies ]


To: Swordmaker; rdb3; Calvinist_Dark_Lord; JosephW; Only1choice____Freedom; amigatec; ...

2 posted on 02/11/2016 8:47:04 AM PST by ShadowAce (Linux - The Ultimate Windows Service Pack)
[ Post Reply | Private Reply | To 1 | View Replies ]

To: Swordmaker

Encryption with a “backdoor” is a broken encryption.


3 posted on 02/11/2016 8:48:57 AM PST by Flick Lives (One should not attend even the end of the world without a good breakfast. -- Heinlein)
[ Post Reply | Private Reply | To 1 | View Replies ]

To: dayglored; ShadowAce; ThunderSleeps; ~Kim4VRWC's~; 1234; Abundy; Action-America; acoulterfan; ...
546 Reasons Why America Should Reject Encryption 'Backdoors' -- PING!


Apple Encryption Security & Privacy
Ping!

The latest Apple/Mac/iOS Pings can be found by searching Keyword "ApplePingList" on FreeRepublic's Search.

If you want on or off the Mac Ping List, Freepmail me

4 posted on 02/11/2016 8:50:03 AM PST by Swordmaker (This tag line is a Microsoft insult free zone... but if the insults to Mac users continue....)
[ Post Reply | Private Reply | To 1 | View Replies ]

To: Swordmaker

A backdoor only means that Americans are unprotected from our Gov.
Real terrorists have ways around the problem.


5 posted on 02/11/2016 8:51:29 AM PST by Zathras
[ Post Reply | Private Reply | To 1 | View Replies ]

To: Swordmaker

Government access to your data alone is enough reason for me to reject a backdoor. Seems a clear avenue for 4th amendment violations to me. The only way to keep the government from even further violations of the Bill of Rights is to ensure that they cannot physically do it, because the government absolutely does not pay any attention to its constitutional limitations.


6 posted on 02/11/2016 8:52:18 AM PST by from occupied ga (Your government is your most dangerous enemy)
[ Post Reply | Private Reply | To 1 | View Replies ]

To: Swordmaker

Lots of other countries would refuse to do so, and their products would kick are arse in world markets. That’s pretty much the reason.


7 posted on 02/11/2016 8:54:41 AM PST by Buckeye McFrog
[ Post Reply | Private Reply | To 1 | View Replies ]

To: Swordmaker

Instead of calling it a “backdoor”, a term programmers understand but the public may not, let’s just call it by a clearer name: “unlocked doors”.

That’s what we are talking about here. Do we really want the government forcing us to install an “unlocked door” in our SECURITY software? This would be equivalent to the government telling safe manufacturers that they had to add a second door to all their safes that has NO LOCKS on it!


8 posted on 02/11/2016 8:55:37 AM PST by Boogieman
[ Post Reply | Private Reply | To 1 | View Replies ]

To: Swordmaker
The original programmer puts in a back door so he can jump in and debug the code with out having to run through the whole thing from the beginning. If they couldn't do that, software would take a LONG time to develop.

I sometimes doubt if they would always take them out when the program is finished.

9 posted on 02/11/2016 9:00:00 AM PST by capt. norm (If you can't make them see the light, let them feel the heat!)
[ Post Reply | Private Reply | To 1 | View Replies ]

To: Swordmaker

“Encryption” has been considered a “weapon” and restricted by law.

Something those advocating for weapon (gun) control to consider.


10 posted on 02/11/2016 9:00:27 AM PST by a fool in paradise (Obama is more supportive of Iran's right to defend its territorial borders than he is of the USA's.)
[ Post Reply | Private Reply | To 1 | View Replies ]

To: Swordmaker

It needs to be called what it is: encryption for you, cleartext for the government. In other words, a false promise. Seeing how little government agents are held to the law/ethical standards, you can assume that your data is not safe.


11 posted on 02/11/2016 9:04:20 AM PST by I want the USA back (The further a society drifts from the truth, the more it will hate those who speak it. Orwell.)
[ Post Reply | Private Reply | To 1 | View Replies ]

To: Swordmaker
Right now policymakers are deliberating a touchy question: Should governments even have the ABILITY to force tech companies to insert “backdoors,” or intentional access points into their encrypted products?
12 posted on 02/11/2016 9:06:36 AM PST by Still Thinking (Freedom is NOT a loophole!)
[ Post Reply | Private Reply | To 1 | View Replies ]

To: Swordmaker

For government workers responsible for a data breech, there appears little to motivate them to do better. Their names are rarely exposed to the public and their punishment, if any, appears to be minimal.

They are not arrested, spend no time in jail and no time incarcerated. They receive a hand slap at worst.


15 posted on 02/11/2016 9:21:45 AM PST by upchuck (Killary is the poster girl for everything wrong with our government. h/t Mister Da)
[ Post Reply | Private Reply | To 1 | View Replies ]

To: Swordmaker

Al Gore was pushing for this back in the 90s when he was VP. Remember the Clipper Chip?


16 posted on 02/11/2016 9:26:03 AM PST by CJinVA
[ Post Reply | Private Reply | To 1 | View Replies ]

To: Swordmaker

Reason # 1.....

The FBI and the other co-opted and corrupted alphabet agencies cannot be trusted to NOT turn on the American people.

After seeing the likes of Eric Holder and Loretta Lynch, do we really want to give these cretins a backdoor to our private data?


18 posted on 02/11/2016 9:48:20 AM PST by july4thfreedomfoundation (Politicians and diapers must be changed often and for the same reason.....Mark Twain)
[ Post Reply | Private Reply | To 1 | View Replies ]

To: Swordmaker

Excellent timely post!
Privacy Ping!


19 posted on 02/11/2016 9:52:44 AM PST by MarchonDC09122009 (When is our next march on DC? When have we had enough?)
[ Post Reply | Private Reply | To 1 | View Replies ]

To: Swordmaker

Tech bkmk.


21 posted on 02/11/2016 10:25:08 AM PST by Sergio (An object at rest cannot be stopped! - The Evil Midnight Bomber What Bombs at Midnight)
[ Post Reply | Private Reply | To 1 | View Replies ]

To: Swordmaker
A chain of security, is only as strong as it's weakest link, and the ethics found in that weak link.

Given the politics we have in place, where political affiliation justifies any action, including sending extremely classified through unsecured private servers, servers that are sitting in a closet in a private residence; servers that could be physically stolen, connected to the internet at another location - and the diplomat in question would never know they were missing - that is not a weak link - that is a dysfuncional, traitorous link.

Given that the Justice system, that was designed to be deaf and blind; to dispense justice EQUALLY to everyone, has been co-opted by politics, and will refuse to consider trying anyone with the proper political party affiliation credentials, to even consider a security backdoor on anything is simply foolhardy.

Forget the privacy invasion that the Gov't is eager, and already has history of abusing. Forget the Constitutional laws, that the NSA, CIA, FBI and even local police have broken to the point that the laws are meaningless, we have politicians who are not only corrupt, they are just plain stupid. By stupid, I mean short-sighted, lacking in both moral fiber and intellectual capacity, as well as incapable of critical thinking. They have sacrified intellectual pursuits for the accumulation of power.

Consider, currently the BlackBerry is used by the US Gov't for dissemination of email, texts, meetings and communications. Blackberry believes in backdoors and has them in their phones as we speak. So, it's safe to assume that the "bad guys" are already listening in on the "secure" goverment system.

Then OPM sits in befuddled amazement when all the "secure" data on Federal Employees is released by hackers. I wish I could fix stupid- I would be a very wealthy man.

22 posted on 02/11/2016 11:18:21 AM PST by Hodar (A man can fail many times, but he isn't a failure until he begins to blame somebody else.- Burroughs)
[ Post Reply | Private Reply | To 1 | View Replies ]

To: Swordmaker

Having just finished reading “The God’s Eye View” by Barry Eisler I have to say “NO!” to leaving wide open gates so our ever so benevolent bureaucrats can look around whenever they want. Was a good book, fiction maybe. Made me wonder how far they would go.

The God’s Eye View
http://www.amazon.com/gp/product/ref=pe_2452760_166699170_pe_ecg/?ASIN=B00XT47SOK


26 posted on 02/11/2016 10:32:06 PM PST by Lurkina.n.Learnin (It's a shame enobama truly doesn't care about any of this. Our country, our future, he doesn't care)
[ Post Reply | Private Reply | To 1 | View Replies ]

To: 109ACS; aimhigh; bajabaja; Bikkuri; Bobalu; Bookwoman; Bullish; Carpe Cerevisi; DarthDilbert; ...
A well reasoned look at why intentionally weakening encryption is a bad idea. - ANDROID PING!

Android Ping!
If you want on or off the Android Ping List, Freepmail me.

My take. I agree with the author. Consider: 1) Requiring back doors into encryption would weaken US businesses providing encryption products. 2) It would place US businesses forced to use compliant encryption at severe risk of cyber attack through those back doors. 3) It wouldn't work as intended on criminals since there are encryption products available from outside the US. 4) If you don't believe #3 consider that most encryption products today come from outside the US anyway.

Kind of like gun control: expecting criminals couldn't get guns/encryption illegally and that they would respect gun control / encryption laws while breaking so many others. Anyone can get encryption products. Heck, any sophomore computer science student can research encryption algorithms and create their own.

27 posted on 02/13/2016 8:15:26 AM PST by ThunderSleeps (Stop obarma now! Stop the hussein - insane agenda!)
[ Post Reply | Private Reply | To 1 | View Replies ]

Free Republic
Browse · Search
News/Activism
Topics · Post Article


FreeRepublic, LLC, PO BOX 9771, FRESNO, CA 93794
FreeRepublic.com is powered by software copyright 2000-2008 John Robinson