Free Republic
Browse · Search
News/Activism
Topics · Post Article

Skip to comments.

Tech Whiplash: Obama Endorses, Then Undermines, Encryption
Slate ^ | 2/18/15 | Dan Gillmor

Posted on 02/18/2015 3:26:09 PM PST by Dalek

President Obama talked a surprising amount of common sense on his trip last week to Silicon Valley, where he spoke at a "cybersecurity" gathering at Stanford University. But he undermined some noteworthy remarks about strong encryption--we need it, he said--with the kind of fear-monger hedging that has become almost every politician's refuge from telling the hard truth....

The first was Obama's clear statement that he, personally, favors ubiquitous strong encryption. He thinks everyone should use it but hedges that by saying law enforcement needs a way to break into communications and data....

[W]e need leaders who'll tell the truth--that we cannot possibly stop every attack without turning the nation into a police state that is, in fact, even less safe; that America's founding document, the Constitution, is a deliberate trade-off in which we agree to take some risks to preserve essential liberty.

We need liberty-minded leaders who'll explain that strong encryption does create some additional risks. But they need to add, again and again until the public understands, two fundamental truths. First, securing our conversations and data from outsiders is absolutely essential for our security in all kinds of other ways. Second, those benefits outweigh law enforcement's understandable wish to be able to tap and record every conversation, and unlock every bit of data anyone might be storing on any device. In a digital world, we genuinely can't have it both ways. This is a genuinely binary question: yes or no.

Unfortunately, in suggesting that we'll be clamoring for the ability of police to break into everything, Obama is basically refusing to lead....

(Excerpt) Read more at slate.com ...


TOPICS: Government; Technical
KEYWORDS: bigbrother; encryption; privacy
"I was for it before I was against it."
1 posted on 02/18/2015 3:26:09 PM PST by Dalek
[ Post Reply | Private Reply | View Replies]

To: Dalek

Governments HATE encryption because it gives us peasants a means of communication to which they can’t ‘listen’.

What sucks for them is they can’t stop it. Say they get a back door into everything right this very minute, tomorrow some brilliant 20 year old will come up with something new they can’t penetrate.

Sucks to be them.....


2 posted on 02/18/2015 3:29:44 PM PST by KoRn (Department of Homeland Security, Certified - "Right Wing Extremist")
[ Post Reply | Private Reply | To 1 | View Replies]

To: Dalek

Government has become that pervie neighbor that sculks around spying on you through the bushes, trying to eavesdrop on your conversations and rummaging through your trash. You know the type. Not to be trusted in any way, shape or form.


3 posted on 02/18/2015 3:43:32 PM PST by Lurkina.n.Learnin (It's a shame nobama truly doesn't care about any of this. Our country, our future, he doesn't care)
[ Post Reply | Private Reply | To 1 | View Replies]

To: Dalek

El TURD.


4 posted on 02/18/2015 3:46:09 PM PST by sasquatch
[ Post Reply | Private Reply | To 1 | View Replies]

To: Lurkina.n.Learnin

Like the guy next door or a former hefty hag supervisor that would volunteer to go through anyone’s garbage.


5 posted on 02/18/2015 3:50:16 PM PST by wally_bert (There are no winners in a game of losers. I'm Tommy Joyce, welcome to the Oriental Lounge.)
[ Post Reply | Private Reply | To 3 | View Replies]

To: KoRn

Governments not only hate strong encryption, they hate weak encryption.

They have no reasonable argument against the use of weak encryption that has been proven to be breakable. Their problem is that even if everything is encrypted with an algorithm that they can break...what if the decryption takes so long that they can’t decrypt on a mass scale...oh the horror!

By too long I mean it takes them more than a few minutes to decrypt....there is no way to monitor all internet traffic if each group of packets takes a few minutes to look at.

Plus there is the likely possibility that people with a great need for security will simply double encrypt their traffic.

Most encrypted data is safe and the NSA cannot crack it. What they are concentrating on is putting back-doors into the firmware that controls computer hardware.

At the present time the best way to pass secure messages is by using an external encryption device. The device should be simple in design and powered by a cheap, low-end processor...it is unlikely that the NSA has corrupted the innards of microcontroller processors that cost less than a dollar. These types of processors can be easily decapped and scrutinized by gifted amateurs and so any tampering would become apparent. This is the only sure way to pass secure data over an untrusted network! It would matter not if every computer along the path which the data would pass was corrupt as long as a simple external encryption device is used at each end of the circuit...you could pass the data through the NSA’s own computer network and it would still be safe.

Cost to build such a device...less than $20
You could also use it to make an encrypted image of a hard drive and create disk images of a PC via USB.... there is no magic that can reach out through a USB port and corrupt a simple external device designed specifically for security.

The simplicity of such a device is its greatest asset...with great complexity comes the possibility of mischief.


6 posted on 02/18/2015 4:15:53 PM PST by Bobalu (If we live to see 2017 we will be kissing the ground)
[ Post Reply | Private Reply | To 2 | View Replies]

To: Dalek

Encryption is great so long as you give Our Glorious Leader the keys.


7 posted on 02/18/2015 4:51:47 PM PST by Bubba_Leroy (The Obamanation Continues)
[ Post Reply | Private Reply | To 1 | View Replies]

To: Bobalu
> You could also use it to make an encrypted image of a hard drive and create disk images of a PC via USB.... there is no magic that can reach out through a USB port and corrupt a simple external device designed specifically for security.

I don't think that's true. It doesn't take magic to do just about anything over USB. It's just a rather stupid serial bus protocol, after all.

Now if you assure me that your "simple external device designed specifically for security" is impenetrable and incorruptible when it is attached directly to a processor bus inside the computer, then I'll believe you when you say it remains so when attached via USB.

But I have personally watched as corrupted USB devices attacked a computer in seconds, and as a fresh, uncorrupted USB device in another USB port was turned into a similar attack weapon. I know that's not exactly what you're talking about, I'm just sayin' you can't take anything for granted, including a USB attachment.

8 posted on 02/18/2015 5:24:51 PM PST by dayglored (Listen, strange women lying in ponds distributing swords is...sounding pretty good about now.)
[ Post Reply | Private Reply | To 6 | View Replies]

To: KoRn

Bing. Encryption with a back door is a fraud... Much like Obama.


9 posted on 02/18/2015 6:00:28 PM PST by Flick Lives ("I can't believe it's not Fascism!")
[ Post Reply | Private Reply | To 2 | View Replies]

To: Dalek

The time is coming...very soon when We The People will speak on this topic.
The NSA and DC time in the sun on internet security will come to an end.


10 posted on 02/18/2015 6:00:43 PM PST by Zathras
[ Post Reply | Private Reply | To 1 | View Replies]

To: dayglored

Yep, anything that connects directly to the system bus - usb, firewire, thunderbolt - can theoretically get to the computer’s main memory and it’s game on from there.


11 posted on 02/19/2015 12:04:55 AM PST by glorgau
[ Post Reply | Private Reply | To 8 | View Replies]

Disclaimer: Opinions posted on Free Republic are those of the individual posters and do not necessarily represent the opinion of Free Republic or its management. All materials posted herein are protected by copyright law and the exemption for fair use of copyrighted works.

Free Republic
Browse · Search
News/Activism
Topics · Post Article

FreeRepublic, LLC, PO BOX 9771, FRESNO, CA 93794
FreeRepublic.com is powered by software copyright 2000-2008 John Robinson