recentpopularlog in

laurakalbag : backdoors   10

NSA dreams of smartphones with “split” crypto keys protecting user data | Ars Technica
National Security Agency officials are considering a range of options to ensure their surveillance efforts aren't stymied by the growing use of encryption, particularly in smartphones. Key among the solutions, according to The Washington Post, might be a requirement that technology companies create a digital key that can open any locked device to obtain text messages or other content, but divide the key into pieces so no one group could use it without the cooperation of other parties.

"I don't want a back door," Adm. Michael S. Rogers, director of the NSA, recently said during a speech at Princeton University, at which he laid out the proposal. "I want a front door. And I want the front door to have multiple locks. Big locks."
splitkey  encryption  backdoors  frontdoors  indie  indieroundup  government  surveillance  notincluded 
april 2015 by laurakalbag
The Democratization of Cyberattack
“But here's the problem: technological capabilities cannot distinguish based on morality, nationality, or legality; if the US government is able to use a backdoor in a communications system to spy on its enemies, the Chinese government can use the same backdoor to spy on its dissidents.” By Bruce Schneier on Schneier on Security
backdoors  surveillance  government  hacking  indie  indieroundup  notincluded 
march 2015 by laurakalbag
The United States Is Angry That China Wants Crypto Backdoors, Too
“The Chinese government is about to pass a new counter terrorism law that would require tech companies operating in the country to turn over encryption keys and include specially crafted code in their software and hardware so that chinese authorities can defeat security measures at will.” By Lorenzo Franceschi-Bicchierai on Motherboard
backdoors  encryption  china  us  government  surveillance  indie  indieroundup  notincluded 
march 2015 by laurakalbag
What NSA Director Mike Rogers Doesn’t Get About Encryption
“If a “golden key” that works against an entire class of systems is cracked or compromised, the entire system is vulnerable—which makes it worthwhile for sophisticated attackers to devote enormous resources to compromising that key, far beyond what it would make sense to expend on the key for any single individual or company.”
indie  indieroundup  notincluded  encryption  goldenkeys  backdoors  nsa  surveillance  security  cryptography 
february 2015 by laurakalbag
NSA director defends plan to maintain 'backdoors' into technology companies
Mike Rogers mounts elaborate defense of Obama’s cybersecurity strategy and seeks to calm doubts about built-in access to companies’ data
nsa  backdoors  security  data  indie  indieroundup  notincluded 
february 2015 by laurakalbag

Copy this bookmark:

to read