Chinese and Russian eavesdropping on President Trump’s calls on his personal smartphone points out the need for securing communications.
Latest in Encryption
How should a court rule when the subject of an order to compel decryption of a device pleads the Fifth Amendment?
The statement is an effort by the intelligence alliance to show support for a new Australian proposal on lawful access to encrypted devices. But it ignores technical realities—and certain important signatures are missing.
Policymakers could make progress on the problem of law-enforcement access to encrypted data with more research and a better relationship between the government and the tech community. Congress can help on both fronts.
The Washington Post reports that the FBI has repeatedly overstated the number of devices it can’t unlock.
What’s Involved in Vetting a Security Protocol: Why Ray Ozzie’s Proposal for Exceptional Access Does Not Pass Muster
Ray Ozzie’s proposal for exceptional access has the virtue of being simple. But security can be subtle, and simple solutions often miss critical aspects. This one has.
Building on Sand Isn’t Stable: Correcting a Misunderstanding of the National Academies Report on Encryption
The National Academies’ report on “Decrypting the Encryption Debate” says some computer-security experts have ideas for implementing secure exceptional access to encrypted systems—but that’s a far cry from saying they’re “trying to build” them.
A framework to help advance the discussion of whether extraordinary access can be justified.
The government should frame encryption as a law enforcement issue, not a national security issue.
Revelations on the FBI’s Unlocking of the San Bernardino iPhone: Maybe the Future Isn't Going Dark After All
The FBI could have tried harder to open the San Bernardino phone before it resorted to the courts.