Encryption

× Clear Filters
56 Articles
A model of IBM Quantum shows the three chandeliers that would be a part of the System Two installation

Human Rights and Democracy in the Quantum Age

Now is the time to prepare for the second quantum revolution.
Digital generated image of data forming fingerprint icons on black background.

Biden’s Cybersecurity Executive Order and What Comes Next Under Trump

Regardless of what steps Trump takes next, Biden's cybersecurity EO reflects an important consensus on the evolving cyber threat landscape.
The episode title appears with sound waves behind it.

The Just Security Podcast: The Spread of Political Propaganda on Encrypted Messaging Apps

Messaging platforms such as have become highly influential tools for manipulating and misleading voters around the world.
In this photo illustration, the logos of social media applications, WeChat, Twitter, MeWe, Telegram, Signal, Instagram, Facebook, Messenger and WhatsApp is displayed on the screen of an iPhone on October 06, 2021 in Paris, France. Frances Haugen, a former employee of the Facebook social network created by Mark Zuckerberg, told the US Senate on October 05 that Facebook was prioritizing its profits at the expense of security and the impact of the social network on young users. To support her claims, Frances Haugen draws on her two-year experience as a product manager at Facebook and on the thousands of documents she took with her last spring, grouped together under the name of "Facebook Files ".

Political Propaganda Runs Wild on Messaging Apps – Platform Owners Can Help Counter It

Messaging platforms such as WhatsApp, Telegram, and Viber have become highly influential tools for manipulating and misleading voters.
In this photo illustration, the Telegram logo is displayed on a number of screens

Telegram’s Security Sham

Its track record and transparency practices, as well as the testimony of researchers, make it plain its claims of security are not to be trusted.

Encryption Helps Ukrainians Resist Russia’s Invasion, but a European Plan Threatens the Underlying Trust Any Tech User Needs

The intended crime-fighting proposals could force encrypted-messaging services to abandon basic confidentiality or pull out of the market.
In this photo illustration, the logos of social media applications, WeChat, Twitter, MeWe, Telegram, Signal, Instagram, Facebook, Messenger and WhatsApp is displayed on the screen of an iPhone on October 06, 2021 in Paris, France. Frances Haugen, a former employee of the Facebook social network created by Mark Zuckerberg, told the US Senate on October 05 that Facebook was prioritizing its profits at the expense of security and the impact of the social network on young users. To support her claims, Frances Haugen draws on her two-year experience as a product manager at Facebook and on the thousands of documents she took with her last spring, grouped together under the name of "Facebook Files ".

We Now Know What Information the FBI Can Obtain from Encrypted Messaging Apps

Despite its “going dark” claims, the FBI can obtain a remarkable amount of user data from secure messaging apps that collectively have several billion global users.
An Investigator holds a piece of evidence as he and others search for evidence inside the wreckage of a Police bus at the site of a bomb blast in Kabul, 17 June 2007.

What the Afghanistan Withdrawal Teaches Us About Safeguarding Human Rights Evidence

As the Taliban seized control, evidence of human rights abuses had to be destroyed, hidden, or risk capture. It didn't have to be this way.
District Attorney Cyrus R. Vance Jr. of New York County, New York; cyber security fellow Matt Tait of University of Texas at Austin, Texas; Erik Neuenschwander, Manager of User Privacy of Apple, Inc.; Jay Sullivan, Product Management Director for Privacy and Integrity in Messenger of Facebook, Inc. testify during a hearing before Senate Judiciary Committee December 10, 2019 on Capitol Hill in Washington, DC.

Client-Side Scanning: A New Front In the War on User Control of Technology

When technology has expanded to nearly every corner of our lives, how much control should users have over the devices they own?
A cylindrical cipher device.

Encryption Originalism

Encryption originalism views strong encryption as the modern reemergence of Founding Era practice of employing—often unbreakable—ciphers.
A man walks inside the Apple store in Hong Kong on October 10, 2019.

App Stores as Back-Doors for Government Regulation of End-to-End Encryption

App stores make natural chokepoints for de facto government regulation, without the long and politically expensive process of legislation. But the privacy and security implications…

Don’t Blame Privacy for Big Tech’s Monopoly on Information

As the prospect of antitrust charges against Facebook by the Federal Trade Commission (FTC) looms larger, regulators should challenge the concentration of data within Big Tech…
1-12 of 56 items

DON'T MISS A THING. Stay up to date with Just Security curated newsletters: