Sometimes we are reminded that the "noise" of policy drowns out important practical news. Today is one of those days. While we sit around worrying about Harvey Weinstein and Trump's latest tweet, it turns out that the encryption protocol at the core over almost all WiFi is vulnerable to attack.
Latest in Encryption
Remarks of Rod Rosenstein, the deputy attorney general, about encryption at the U.S. Naval Academy on Tuesday.
Upgrades in Apple's forthcoming operating system update will complicate electronic search efforts at the border.
Just as law enforcement can pursue a number of different alternatives to mandating encryption backdoors, so too can privacy advocates take steps beyond encrypting their data to ensure their privacy.
According to published news reports, the Australian government plans to “introduce draft legislation that will attempt to force technology companies to break into end-to-end encrypted messages.”
Ending The Endless Crypto Debate: Three Things We Should Be Arguing About Instead of Encryption Backdoors
Recently I participated in a fascinating conference at Georgia Tech entitled “Surveillance, Privacy, and Data Across Borders: Trans-Atlantic Perspectives.” A range of experts grappled with the international aspects of an increasingly pressing question: how can we ensure that law enforcement is able to obtain enough information to do its job in the twenty-first century, while also ensuring that digital security and human rights are protected?
Alan Z. Rozenshtein on Digital Communications and Data Storage Companies as "Surveillance Intermediaries"
Alan Z. Rozenshtein, a former contributor to Lawfare who now works at DOJ, has a new article forthcoming in Stanford Law Review, "Surveillance Intermediaries," analyzing the role of corporate actors such as Apple, Google, Facebook, and others, that dominate digital communications and data storage, situated between government and targets of surveillance.
This Aegis Series paper reviews the most recent encryption-related legislation in France, the United Kingdom, the Netherlands, Hungary, and Poland.
The public debate over encryption and Going Dark insufficiently addresses the issue of child sexual exploitation.
Jennifer Daskal examines the potential international side effects of the policies proposed in the encryption debate and highlights the need to proceed with care, and for centralized, executive-level review and monitoring of sought-after decryption orders, so as to better account for these effects.