Encryption

× Clear Filters
56 Articles
A phone with the icon for Telegram, a messaging app.

Telegram’s Cryptocurrency Could Have a Terrorism Problem

A look at how the release of Telegram's cryptocurrency could offer terrorists and other bad actors new options to circumvent financial regulators and potentially undo years of…
A person takes a photo of the official seal of the Federal Bureau of Investigation on their iPhone. J. Edgar Hoover headquarters February 23, 2016 in Washington, DC

The FBI and Apple Redux

It remains to be seen how this new clash will resolve itself, but the stakes have only increased for both sides.
A participant attends the 34C3 Chaos Communication Congress of the Chaos Computer Club on December 27, 2017 in Leipzig, Germany.

Why the Ghost Keys ‘Solution’ to Encryption is No Solution

The use of applications such as Signal, WhatsApp, iMessage, and Facebook Messenger for communications secured by end-to-end encryption has exploded over the past few years. Two…
Activists Luis Nolasco, Aki Rose and Josh Rabb hold placards reading "Secure Phones Saves Lives" while gathered in front of the US District Court in Riverside, California, on March 22, 2016, where the Apple v FBI trial was due to take place before its sudden postponement. A television monitor displays the messages of some 20,000 people who have signed an online petition agreeing to oppose the FBI order.

Split Over Compelled Decryption Deepens With Massachusetts Case

Encryption is as omnipresent as computers, tablets, and smartphones. Yet the Supreme Court has not provided guidance on the constitutional implications of compelling a suspect…
Aerial photograph of the Government Communications Headquarters, also known as GCHQ, Cheltenham Gloucestershire.

Give Up the Ghost: A Backdoor by Another Name

Government Communications Headquarters (GCHQ,) the UK’s counterpart to the National Security Agency (NSA), has fired the latest shot in the crypto wars. In a post to Lawfare…

Tech Pressure on Privacy: National Security Requires a Fuller View of Corporate Social Responsibility

The corporate world and the U.S. national security apparatus increasingly find themselves in conflict over technology and expertise, with implications for the effectiveness of…

How to Move the Battle Lines in the Crypto-Wars

Get ready for another round of the crypto-wars. A recent report in the New York Times indicates that the Justice Department has been quietly discussing with researchers ways to…

The EWI Encryption Report: Stop Trying to Sell Me a Shoebox

Which would you prefer: keeping your valuables in a locked safe, or keeping them in a shoebox and trusting that everyone will adhere to laws against theft and their concomitant…

Why An Encryption Backdoor for Just the “Good Guys” Won’t Work

Recently, U.S. law enforcement officials have re-energized their push for a technical means to bypass encryption. But seeking to undermine encryption only looks backward instead…
A person’s hand holds an iPhone. The screen shows a lock screen and asks to “Touch ID or Enter Passcode”

Where Does the Trump Administration Stand on Encryption?

The circumstances are familiar: a deceased criminal, a locked phone, a determined FBI and a defiant tech company. After Devin Kelley murdered 26 people at the Sutherland Springs…

Responsibility and the Encryption Debate: A Response to DAG Rosenstein

Deputy Attorney General Rod Rosenstein. Last week, Deputy Attorney General Rod Rosenstein gave a speech about encryption at the U.S. Naval Academy, solidifying the Trump administration’s…
Just Security

Feinstein-Burr 2.0: The Crypto Backdoor Bill Lives On

When it was first released back in April, a “discussion draft” of the Compliance With Court Orders Act sponsored by Sens. Dianne Feinstein (D-CA) and Richard Burr (R-NC)…
1-12 of 56 items

DON'T MISS A THING. Stay up to date with Just Security curated newsletters: