Encryption
56 Articles

Telegram’s Cryptocurrency Could Have a Terrorism Problem
A look at how the release of Telegram's cryptocurrency could offer terrorists and other bad actors new options to circumvent financial regulators and potentially undo years of…

The FBI and Apple Redux
It remains to be seen how this new clash will resolve itself, but the stakes have only increased for both sides.

Why the Ghost Keys ‘Solution’ to Encryption is No Solution
The use of applications such as Signal, WhatsApp, iMessage, and Facebook Messenger for communications secured by end-to-end encryption has exploded over the past few years. Two…

Split Over Compelled Decryption Deepens With Massachusetts Case
Encryption is as omnipresent as computers, tablets, and smartphones. Yet the Supreme Court has not provided guidance on the constitutional implications of compelling a suspect…

Give Up the Ghost: A Backdoor by Another Name
Government Communications Headquarters (GCHQ,) the UK’s counterpart to the National Security Agency (NSA), has fired the latest shot in the crypto wars. In a post to Lawfare…

Tech Pressure on Privacy: National Security Requires a Fuller View of Corporate Social Responsibility
The corporate world and the U.S. national security apparatus increasingly find themselves in conflict over technology and expertise, with implications for the effectiveness of…

How to Move the Battle Lines in the Crypto-Wars
Get ready for another round of the crypto-wars. A recent report in the New York Times indicates that the Justice Department has been quietly discussing with researchers ways to…

The EWI Encryption Report: Stop Trying to Sell Me a Shoebox
Which would you prefer: keeping your valuables in a locked safe, or keeping them in a shoebox and trusting that everyone will adhere to laws against theft and their concomitant…

Why An Encryption Backdoor for Just the “Good Guys” Won’t Work
Recently, U.S. law enforcement officials have re-energized their push for a technical means to bypass encryption. But seeking to undermine encryption only looks backward instead…

Where Does the Trump Administration Stand on Encryption?
The circumstances are familiar: a deceased criminal, a locked phone, a determined FBI and a defiant tech company. After Devin Kelley murdered 26 people at the Sutherland Springs…

Responsibility and the Encryption Debate: A Response to DAG Rosenstein
Deputy Attorney General Rod Rosenstein. Last week, Deputy Attorney General Rod Rosenstein gave a speech about encryption at the U.S. Naval Academy, solidifying the Trump administration’s…

Feinstein-Burr 2.0: The Crypto Backdoor Bill Lives On
When it was first released back in April, a “discussion draft” of the Compliance With Court Orders Act sponsored by Sens. Dianne Feinstein (D-CA) and Richard Burr (R-NC)…