The statement is an effort by the intelligence alliance to show support for a new Australian proposal on lawful access to encrypted devices. But it ignores technical realities—and certain important signatures are missing.
Latest in Encryption
What’s Involved in Vetting a Security Protocol: Why Ray Ozzie’s Proposal for Exceptional Access Does Not Pass Muster
Ray Ozzie’s proposal for exceptional access has the virtue of being simple. But security can be subtle, and simple solutions often miss critical aspects. This one has.
Building on Sand Isn’t Stable: Correcting a Misunderstanding of the National Academies Report on Encryption
The National Academies’ report on “Decrypting the Encryption Debate” says some computer-security experts have ideas for implementing secure exceptional access to encrypted systems—but that’s a far cry from saying they’re “trying to build” them.
Apple’s legal obligations under CALEA challenge the argument that Apple could be doing more to help law enforcement.
FaceTime and iMessage have a cryptographic architecture that enables prospective wiretapping, but there is reason to believe that Apple not is fully complying with lawful pen-register and trap-and-trace court orders.
Sometimes we are reminded that the "noise" of policy drowns out important practical news. Today is one of those days. While we sit around worrying about Harvey Weinstein and Trump's latest tweet, it turns out that the encryption protocol at the core over almost all WiFi is vulnerable to attack.
Remarks of Rod Rosenstein, the deputy attorney general, about encryption at the U.S. Naval Academy on Tuesday.
Upgrades in Apple's forthcoming operating system update will complicate electronic search efforts at the border.
Just as law enforcement can pursue a number of different alternatives to mandating encryption backdoors, so too can privacy advocates take steps beyond encrypting their data to ensure their privacy.
According to published news reports, the Australian government plans to “introduce draft legislation that will attempt to force technology companies to break into end-to-end encrypted messages.”