Why the FBI Encryption Debate Is Less Significant Than You Think
Apple recently won their case against the FBI, and the FBI cracked the iPhone in question anyway, with the help of Cellebrite, a government contractor that provides “forensic extraction” tools to investigative agencies. Their new methods in securing evidence have bordered closer to hacking, bringing the legality of them into question. The federal investigative agency has shown a pattern of reluctance to release their data acquisition methods, including refusing an order from a Federal Judge to reveal how they hacked the Tor anonymizing network during the investigation of an online child....
Related News
Tor, the (in)famous encrypted web browser, may not be strong enough to resist the next generation’s attacks on encryption. What will the next generation of encryption tools look like? Tor came to the forefront of the privacy debate through providing an encrypted web browser used by such services as the Silk Road. In the years since Edward Snowden leaked the NSA’s mass collection of metadata, the amount of Internet users interested in encryption grew dramatically. However, Tor’s encryption may not be completely trusted. In fact, 80% of user types may be de-anonymized within six months,....
Smartphone encryption has been a topic of heavy debate over the past few months, and the opinions are divided to say the least. Both users and manufacturers want to preserve encryption or even add additional layers to protect user data. But on the other hand, various government officials are proposing bills to have encryption on smartphones weakened by default. Weakening Smartphone Encryption To Fight Human Trafficking. A little while ago, one US state lawmaker proposed a new bill to weaken smartphone encryption by default, to avoid its use cases for terrorism and other illegal use cases.....
In response to the tragic terror attacks in France, intelligence agencies have launched another campaign against strong encryption, such as the type that tech companies use to create secure end-to-end communication services. Intelligence agencies are attempting to blame the encryption as an enabler for extremists to plan and follow through with terror attacks. After recent attempts to stifle encryption failed, it seems like this is an opportune time to rebuild their attacks on encryption due to this tragedy. In a strategy found in a leaked email sent by the intelligence community’s top....
Active discussions over Encryption ban take a new turn as the US Intelligence Committee Leaders released Discussion draft of Encryption bill. Bitcoin community members ring alarm bells. Encryption is not a new nor a radical discussion topic. It has been hitting the headlines even more for the last couple of months. Government officials around the world are proposing bills to have encryption weakened with the only intention to protect citizens from criminals and terrorists. A little while ago, the US state lawmakers proposed a new bill to weaken smartphone encryption by default, to avoid....
Discussions about encryption are becoming more of a norm than the exception these days, and the situation is only getting direr in certain regions. The Hungarian Parliament is in favour to ban end-to-end encryption in the not-so-distant future. Hungary Takes on End-to-End Encryption. According to local sources, the Hungarian parliament voted on an amendment which prohibits end-to-end encryption in the country. Similar to most other countries in the world taking an aggressive stance on encryption, they label this decision as part of the “ongoing war on terrorism in Hungary”. As a result of....