Remarks of Rod Rosenstein, the deputy attorney general, about encryption at the U.S. Naval Academy on Tuesday.
Latest in Encryption
Upgrades in Apple's forthcoming operating system update will complicate electronic search efforts at the border.
Just as law enforcement can pursue a number of different alternatives to mandating encryption backdoors, so too can privacy advocates take steps beyond encrypting their data to ensure their privacy.
Ending The Endless Crypto Debate: Three Things We Should Be Arguing About Instead of Encryption Backdoors
Recently I participated in a fascinating conference at Georgia Tech entitled “Surveillance, Privacy, and Data Across Borders: Trans-Atlantic Perspectives.” A range of experts grappled with the international aspects of an increasingly pressing question: how can we ensure that law enforcement is able to obtain enough information to do its job in the twenty-first century, while also ensuring that digital security and human rights are protected?
Last week, co-authors Michèle Flournoy, Richard Fontaine, and I released a Center for a New American Security report on the future of surveillance policy. This post will examine what our approach can offer the new administration, given what its incoming members have said about surveillance issues and the commitments that the President-elect himself has made on the campaign trail.
If we fear abuse of law-enforcement powers under a Trump administration, that is reason to move towards the technically constrainable and enforceable transparency of split-key exceptional access mechanisms rather than towards the alternative of unconstrained, non-transparent capabilities such as device hacking.
Events over the last weeks have convinced me that securing communications without exceptional access for law enforcement is crucial for preserving our democracy.
The Manhattan District Attorney's Office has released a new version of its white paper on "Smartphone Encryption and Public Safety."
What happens when a "golden key" is not secure ...
Recent scholarship on the Vulnerabilities Equities Process provokes interesting question about the ultimate goals of equities balancing reform and the best vehicle to accomplish those aims.