Encryption
56 Articles

The Encryption Debate: All Quiet on the Western Front?
The US war on encryption has quieted down recently. The San Bernardino and Brooklyn court cases concerning encrypted iPhones both ended this spring not with a bang, but with a…

Feinstein-Burr: The Bill That Bans Your Browser
Last week, I criticized the confused rhetorical framework that the Feinstein-Burr encryption backdoor proposal tries to impose on the ongoing Crypto Wars 2.0 debate. In this…

Congress’s Embarrassingly Empty (National Security) Record
This week, we learned the United States will send 250 special operations troops to the war in Syria, bringing the publicly known total number of American troops operating in the…

Feinstein-Burr, Encryption, and “The Rule of Law”
There’s a lot to say about the substance of the misguided anti-encryption legislation sponsored by Sens. Dianne Feinstein and Richard Burr, which was recently released as a “discussion…

Here’s What the Burr-Feinstein Anti-Crypto Bill Gets Wrong
The latest Crypto War is being fought on multiple fronts: behind closed doors, in the courts, and now in Congress. On April 13, Sens. Richard Burr (R-NC) and Dianne Feinstein (D-Calif.),…

FBI Discovers It Can Access That iPhone After All
Update: The FBI is now explicitly denying that the method described in this post is the one they’re planning to employ — so apparently my suspicion was mistaken and they…

Strong Intelligence Oversight Can Happen Within the Executive Branch
That the American public is divided on the current showdown between Silicon Valley and the national security state is to be expected. What is more striking, at least at first blush,…

Apple vs. FBI: “Just This Once”?
I wrote about the FBI’s attempt to force Apple to write an iPhone hacking tool for the bureau over at Time last week — and go read that if you’re getting caught up on the…

Security and the Internet of Things
On Tuesday, the Obama administration announced a program to better secure the “Internet of Things” and also highlighted the opportunities networked devices provide for the…

When the NSA Merges Its Offense and Defense, Encryption Loses
How do you create strong encryption standards when the organization tasked to build them finds itself absorbed into an organization that dedicates huge quantities of resources…

The High Standard of Proof in the Encryption Debate
Since the November 13 terrorist attacks in Paris set off another around of debate about exceptional access, a lot of ink has been spilled on the subject of whether or not there…

Cryptopanic and James Comey’s Xanatos Gambit
For the past year or so I’ve been part of a cybersecurity working group at Harvard’s Berkman Center that on Monday released its first public report, Don’t Panic: Making Progress…