Backdoors into encryption technology, "That's just stupid."

In summary, during a hearing with the FBI, the bureau's executive assistant director for science and technology expressed concerns about the use of encryption in criminal investigations. However, some politicians argued that creating a backdoor for law enforcement would be technologically unwise and that companies like Apple and Google should not be forced to weaken their encryption policies. The debate also touched on issues such as upskirt photos, child pornography, and the Boston Marathon bomber case. Overall, the hearing highlighted the ongoing controversy surrounding encryption and its effects on privacy and safety.
  • #1
nsaspook
Science Advisor
1,350
3,597
Today's hearing with the FBI.
 
Computer science news on Phys.org
  • #3
Greg Bernhardt said:
This is a 2 hour video. Got cliff notes for us :biggrin:

Sure.
Amy Hess, the FBI's executive assistant director for science and technology, reiterated to the House Committee on Oversight & Government Reform the bureau’s decades-old fear of “going dark” because encryption will make criminal investigations more difficult.
...
“We’re certainly not going to go dark,” Rep. Jason Chaffetz (R-Utah) responded. “And in many ways we’ve never been brighter.”

"Creating a technological backdoor just for good guys is technologically stupid," said Rep. Ted Lieu (D-Calif.), a Stanford University computer science graduate. "That's just stupid."
...
Conley cited upskirt photos, child pornography, and even the Boston Marathon bomber criminal case as reasons to forbid encryption without a backdoor, though he didn’t provide support in his brief remarks.

Conley also said Apple and Google are "protecting those who rape, assault, and kill" with their encryption policies. Both companies encrypt their mobile operating systems by default.

Leiu took exception to those remarks and said he was offended by Conley's assertions. Conley then proposed that a backdoor be implemented on personal devices but corporate networks be allowed to keep strong encryption with no "golden keys."
http://www.dailydot.com/politics/second-crypto-war-hearing-washington/
 
  • Like
Likes Greg Bernhardt

Related to Backdoors into encryption technology, "That's just stupid."

1. What is a backdoor in encryption technology?

A backdoor in encryption technology refers to a secret method for bypassing the security of a system or software. It allows unauthorized access to encrypted data, essentially creating a vulnerability that can be exploited by hackers or government agencies.

2. Why would anyone want to create backdoors in encryption technology?

The main reason for creating backdoors in encryption technology is for law enforcement or government agencies to obtain access to encrypted data for investigations or surveillance purposes. However, this also poses a risk of unauthorized access by malicious actors, compromising the security and privacy of individuals and businesses.

3. Is it possible to create a backdoor that only authorized parties can access?

In theory, it may be possible to create a backdoor that can only be accessed by authorized parties. However, in reality, it is difficult to guarantee that the backdoor will not be discovered or exploited by other individuals or organizations. This makes backdoors a controversial and risky solution for accessing encrypted data.

4. Can backdoors be added to encryption technology without compromising its security?

No, adding a backdoor to encryption technology inherently weakens its security. Encryption relies on complex algorithms and keys to protect data, and any intentional vulnerabilities, such as a backdoor, can be exploited by hackers to access sensitive information.

5. Is it ethical to create backdoors into encryption technology?

This is a highly debated topic, with arguments on both sides. Some believe that it is necessary for law enforcement to have access to encrypted data for the sake of national security and public safety. However, others argue that it violates the right to privacy and sets a dangerous precedent for government overreach and potential abuse of power.

Similar threads

  • Computing and Technology
Replies
27
Views
1K
  • General Discussion
Replies
2
Views
577
  • Computing and Technology
Replies
4
Views
2K
  • Programming and Computer Science
Replies
14
Views
1K
  • Computing and Technology
Replies
13
Views
2K
  • Computing and Technology
Replies
1
Views
809
  • Computing and Technology
2
Replies
41
Views
4K
Replies
7
Views
2K
  • Computing and Technology
Replies
9
Views
1K
  • Computing and Technology
Replies
12
Views
4K
Back
Top