One Article Review

Accueil - L'article:
Source ErrataRob.webp Errata Security
Identifiant 417673
Date de publication 2017-10-11 15:09:52 (vue: 2017-10-11 15:09:52)
Titre "Responsible encryption" fallacies
Texte Deputy Attorney General Rod Rosenstein gave a speech recently calling for "Responsible Encryption" (aka. "Crypto Backdoors"). It's full of dangerous ideas that need to be debunked.The importance of law enforcementThe first third of the speech talks about the importance of law enforcement, as if it's the only thing standing between us and chaos. It cites the 2016 Mirai attacks as an example of the chaos that will only get worse without stricter law enforcement.But the Mira case demonstrated the opposite, how law enforcement is not needed. They made no arrests in the case. A year later, they still haven't a clue who did it.Conversely, we technologists have fixed the major infrastructure issues. Specifically, those affected by the DNS outage have moved to multiple DNS providers, including a high-capacity DNS provider like Google and Amazon who can handle such large attacks easily.In other words, we the people fixed the major Mirai problem, and law-enforcement didn't.Moreover, instead being a solution to cyber threats, law enforcement has become a threat itself. The DNC didn't have the FBI investigate the attacks from Russia likely because they didn't want the FBI reading all their files, finding wrongdoing by the DNC. It's not that they did anything actually wrong, but it's more like that famous quote from Richelieu "Give me six words written by the most honest of men and I'll find something to hang him by". Give all your internal emails over to the FBI and I'm certain they'll find something to hang you by, if they want.Or consider the case of Andrew Auernheimer. He found AT&T's website made public user accounts of the first iPad, so he copied some down and posted them to a news site. AT&T had denied the problem, so making the problem public was the only want to force them to fix it. Such access to the website was legal, because AT&T had made the data public. However, prosecutors disagreed. In order to protect the powerful, they twisted and perverted the law to put Auernheimer in jail.It's not that law enforcement is bad, it's that it's not the unalloyed good Rosenstein imagines. When law enforcement becomes the thing Rosenstein describes, it means we live in a police state.Where law enforcement can't goRosenstein repeats the frequent claim in the encryption debate:Our society has never had a system where evidence of criminal wrongdoing was totally impervious to detectionOf course our society has places "impervious to detection", protected by both legal and natural barriers.An example of a legal barrier is how spouses can't be forced to testify against each other. This barrier is impervious.A better example, though, is how so much of government, intelligence, the military, and law enforcement itself is impervious. If prosecutors could gather evidence everywhere, then why isn't Rosenstein prosecuting those guilty of CIA torture?Oh, you say, government is a special exception. If that were the case, then why did Rosenstein dedicate a precious third of his speech discussing the "rule of law" and how it applies to everyone, "protecting people from abuse by the government". It obviously doesn't, there's one rule of government and a different rule for the people, and the rule for government means there's lots of places law enforcement can't go to gather evidence.Likewise, the crypto backdoor Rosenstein is demanding for citizens doesn't apply to the President, Congress, the NSA, the Army, or Rosenstein himself.Then there are the natural barriers. The police can't read your mind. They can only get the evidence that is there, like partial fingerprints, which are far less reliable than full fingerpri
Envoyé Oui
Condensat  he  let  obliged  rosenstein  we 0day 1980s 1984 1984 should 1990s 1st 2001 2016 2nd 3rd 4th 5th :no abduction able about above absolute abuse abuses access accommodations according accountable accounts acquiesce act action actions activists activities actually add additional address admitting affected again against age agents agrees alarmingly albeit alexa alexa/siri/okgoogle all along already also alternate always amazon ambiguity amendment american among ancient andrew android another any anybody anything app appeal apple applies apply are areas aren argue argument argument:companies arguments army arrests at&t attacks attorney auernheimer authority automated avoid away back backdoor backdoored backdoors backed backward backwards bad balance bald barrier barriers base beat because because:of become becomes becoming been been:they before behind being believe believes better between beyond biblical bill bodies bogus both breaking bring british browsers build bunk bureaucrats buried business but buy buying buys cache calea call calling calls camera cameras can cannot capabilities capacity capitalism captured card carpenter cars case cases category cause cell censorship centuries certain change chaos character child china chip cia cites citizens civil claim claims clearly clichéd clipper cloud clue col comes committed communicate communications companies company compared comparison computer concepts concerns conclusionrosenstein conclusive condescending conferencing confronted congress connections connotation consider considered constant constitution constitutional consumers context continues conversely convict conviction convince convincing cop copied copious corrupt corrupted could country course court courts crack crapping creates credit crime crimes criminal criminals criteria criticizes crypto current custom customers cyber dangerous dark dark” data dead death debasing debate debate:our debating debunked decide decision declare dedicate defeats defend defends defense definition deluge demand demanding demands democracy democratic demonstrably demonstrated denied deputy describes despotism detection detectionof developed device devices dictator did didn died different differently digital disable disagreed disbarred discuss discussing disk dnc dns does doesn doing doj don done door doubt down download drive drunk duty dystopic each easily eavesdrop edicts effect effectively effects either electronic elevating else email email: emails embrace emotional emotions enable encryption encryption/security end endanger endangers enforce enforcement enforcementthe ennobles enough enumerated equally escrow escrow/backup essentially even every everyone everywhere evidence exact exactly exaggerated example exception exceptional exchanging excuse exist exists explicit explicitly exploiting exploits extension extra face facebook faced facetime facial fact facts factually fails fair fall fallacies false famous far fat favor fbi fear feature feed feel feet fewer files find finding fine fingerprints fired first fix fixed focuses force forced forces forcing foreign form forth found free freedoms french frequent from fulfilling fulfills full functions furniture further gather gathering gave general geographic get gets give gives giving global gmail going golden good google gorosenstein got government gps grab guilty guns hack hackers had hand handle hang happened happening happens hard harder has have haven having held help helping helps here hidden high hike him himself his homes honest honestly honor honorable hot hotel houses how how it however idea ideas identical ignore ignored illegitimate imagined imagines impact impervious importance impose imposition impunity includes including incorrect increasingly indeed individuals infrastructure innocent insistence insisting install instead integrity intelligence intentions internal internet investigate ipad isn issue issues itself jail jessup job judge jury just justified justify key killing knight know knows lack laptop large last la
Tags Guideline
Stories
Notes
Move


L'article ne semble pas avoir été repris aprés sa publication.


L'article ne semble pas avoir été repris sur un précédent.
My email: