<?xml version="1.0"?>
<oembed><version>1.0</version><provider_name>Just Security</provider_name><provider_url>https://www.justsecurity.org</provider_url><title>The High Standard of Proof in the Encryption Debate - Just Security</title><type>rich</type><width>600</width><height>338</height><html>&lt;blockquote class="wp-embedded-content" data-secret="CjfdiAIDGr"&gt;&lt;a href="https://www.justsecurity.org/29177/high-standard-proof-encryption-debate/"&gt;The High Standard of Proof in the Encryption Debate&lt;/a&gt;&lt;/blockquote&gt;&lt;iframe sandbox="allow-scripts" security="restricted" src="https://www.justsecurity.org/29177/high-standard-proof-encryption-debate/embed/#?secret=CjfdiAIDGr" width="600" height="338" title="&#x201C;The High Standard of Proof in the Encryption Debate&#x201D; &#x2014; Just Security" data-secret="CjfdiAIDGr" frameborder="0" marginwidth="0" marginheight="0" scrolling="no" class="wp-embedded-content"&gt;&lt;/iframe&gt;&lt;script type="text/javascript"&gt;
/* &lt;![CDATA[ */
/*! This file is auto-generated */
!function(d,l){"use strict";l.querySelector&amp;&amp;d.addEventListener&amp;&amp;"undefined"!=typeof URL&amp;&amp;(d.wp=d.wp||{},d.wp.receiveEmbedMessage||(d.wp.receiveEmbedMessage=function(e){var t=e.data;if((t||t.secret||t.message||t.value)&amp;&amp;!/[^a-zA-Z0-9]/.test(t.secret)){for(var s,r,n,a=l.querySelectorAll('iframe[data-secret="'+t.secret+'"]'),o=l.querySelectorAll('blockquote[data-secret="'+t.secret+'"]'),c=new RegExp("^https?:$","i"),i=0;i&lt;o.length;i++)o[i].style.display="none";for(i=0;i&lt;a.length;i++)s=a[i],e.source===s.contentWindow&amp;&amp;(s.removeAttribute("style"),"height"===t.message?(1e3&lt;(r=parseInt(t.value,10))?r=1e3:~~r&lt;200&amp;&amp;(r=200),s.height=r):"link"===t.message&amp;&amp;(r=new URL(s.getAttribute("src")),n=new URL(t.value),c.test(n.protocol))&amp;&amp;n.host===r.host&amp;&amp;l.activeElement===s&amp;&amp;(d.top.location.href=t.value))}},d.addEventListener("message",d.wp.receiveEmbedMessage,!1),l.addEventListener("DOMContentLoaded",function(){for(var e,t,s=l.querySelectorAll("iframe.wp-embedded-content"),r=0;r&lt;s.length;r++)(t=(e=s[r]).getAttribute("data-secret"))||(t=Math.random().toString(36).substring(2,12),e.src+="#?secret="+t,e.setAttribute("data-secret",t)),e.contentWindow.postMessage({message:"ready",secret:t},"*")},!1)))}(window,document);
/* ]]&gt; */
&lt;/script&gt;
</html><description>Since the November 13 terrorist attacks in Paris set off another around of debate about exceptional access, a lot of ink has been spilled on the subject of whether or not there is evidence indicating the perpetrators used encrypted devices and communications tools. This week on Lawfare, for example, Carrie Cordero argues that US and [&hellip;]</description><thumbnail_url>https://i0.wp.com/www.justsecurity.org/wp-content/uploads/2017/12/blue-logo.png?fit=178%2C60&amp;ssl=1</thumbnail_url><thumbnail_width>178</thumbnail_width><thumbnail_height>60</thumbnail_height></oembed>
