Google: Today’s Encryption May Not Survive Tomorrow’s Attacks

Google: Today’s Encryption May Not Survive Tomorrow’s Attacks

It is ‘deja vu’ all over again as Google prepares for a future that seems inevitable. Like the millennium bug of the late 90s, Practical Quantum Computing looks like the next big turn in this era of internet security and encryption. Preparing for Advanced Quantum attacks. The prevailing concern is that in the near future, personal information may not be so secure as hackers could employ higher level computing procedures, otherwise known as Advanced Quantum attacks to crack current encryption techniques. Considering the potential weakness of encryption which could make it vulnerable in the....


Related News

Encryption Scapegoated in Wake of Paris Attacks

In response to the tragic terror attacks in France, intelligence agencies have launched another campaign against strong encryption, such as the type that tech companies use to create secure end-to-end communication services. Intelligence agencies are attempting to blame the encryption as an enabler for extremists to plan and follow through with terror attacks. After recent attempts to stifle encryption failed, it seems like this is an opportune time to rebuild their attacks on encryption due to this tragedy. In a strategy found in a leaked email sent by the intelligence community’s top....

France and Germany Want EU to Ban End-to-End Encryption

France and Germany are pushing for the EU to restrict the use of encryption. In a joint proposal released earlier this week, the interior ministers of the two countries attacked messaging services that offer end-to-end encryption, such as WhatsApp, Telegram, and Signal, for posing difficulties during law enforcement investigations. The proposal calls on the establishment of backdoors in encrypted services to “strengthen controls on borders outside of the EU,” “better share crucial information between member states,” and to “fully equip democracies on the question of encryption. The push....

5 Tools That May Replace Tor As Crackdown on Encryption Nears

Tor, the (in)famous encrypted web browser, may not be strong enough to resist the next generation’s attacks on encryption. What will the next generation of encryption tools look like? Tor came to the forefront of the privacy debate through providing an encrypted web browser used by such services as the Silk Road. In the years since Edward Snowden leaked the NSA’s mass collection of metadata, the amount of Internet users interested in encryption grew dramatically. However, Tor’s encryption may not be completely trusted. In fact, 80% of user types may be de-anonymized within six months,....

New California Bill Aims To Weaken Smartphone Encryption

Smartphone encryption has been a topic of heavy debate over the past few months, and the opinions are divided to say the least. Both users and manufacturers want to preserve encryption or even add additional layers to protect user data. But on the other hand, various government officials are proposing bills to have encryption on smartphones weakened by default. Weakening Smartphone Encryption To Fight Human Trafficking. A little while ago, one US state lawmaker proposed a new bill to weaken smartphone encryption by default, to avoid its use cases for terrorism and other illegal use cases.....

Hillary Clinton Sought Apple and Google’s Blessing on Her Encryption Stance

Hillary Clinton’s presidential campaign sought Apple and Google’s opinion on its position on encryption. According to the leaked emails by the Clinton camp obtained by Wikileaks, campaign operatives asked Apple and Google for their thoughts on the candidate’s comments regarding encryption. The campaign apparently sought the two tech giants’ blessing in helping Secretary Clinton craft a stance that would have a full cooperation of some of the largest tech companies. The email exchange, where Clinton operative Sara Solow reports on the results of her communications with Apple and Google,....