FBI: End-to-End Encryption Is an Infectious Problem
Just in case there were any lingering doubts about U.S. law enforcement's stance on end-to-end encryption, which prevents information from being read by anyone but its intended recipient, FBI executive assistant director Amy Hess told the Wall Street Journal this week that its use "is a problem that infects law enforcement and the intelligence community more and more so every day."
The quote was published in a piece about efforts from the UK, Australia and India to undermine end-to-end encryption. All three countries have passed or proposed legislation that compels tech companies to supply certain information to government agencies. The laws vary in their specifics, including restrictions on to what information law enforcement can request access, but the gist is that they don't want any data to be completely inaccessible.
Related: FBI Chief Calls for National Talk Over Encryption vs. Safety
FBI Failed to Access 7,000 Encrypted Mobile Devices
DOJ: Strong Encryption That We Don't Have Access to is "Unreasonable"
Five Eyes Governments Get Even Tougher on Encryption
Apple Speaks Out Against Australian Anti-Encryption Law; Police Advised Not to Trigger Face ID
Australia Set to Pass Controversial Encryption Law
Split Key Cryptography is Back... Again – Why Government Back Doors Don't Work
(Score: 3, Insightful) by JoeMerchant on Wednesday February 27 2019, @10:51PM (6 children)
What they can hope for is to make your choice to use encryption a rare enough one that you stand out when you do it.
The people in this debate need to not only wrap their heads around the reality of encryption, but also steganography.
🌻🌻 [google.com]
(Score: 4, Interesting) by c0lo on Wednesday February 27 2019, @11:08PM (5 children)
Too late for that, with HTTPS everywhere and multiplayer games there's so many ways to disguise encryption comms in tunnels.
https://www.youtube.com/watch?v=aoFiw2jMy-0 https://soylentnews.org/~MichaelDavidCrawford
(Score: 2) by MostCynical on Thursday February 28 2019, @01:30AM (4 children)
You meanIwill have to become a gamer to have a private conversation?
New TLA investigation technique: play MPORGs and look for players who die very quickly.. Or who just sit and do..nothing.
"I guess once you start doubting, there's no end to it." -Batou, Ghost in the Shell: Stand Alone Complex
(Score: 2) by c0lo on Thursday February 28 2019, @02:02AM (1 child)
That's not a bug, that's a feature.
https://www.youtube.com/watch?v=aoFiw2jMy-0 https://soylentnews.org/~MichaelDavidCrawford
(Score: 2) by JoeMerchant on Thursday February 28 2019, @03:01AM
There are so many ways to communicate in a MPORG... the timing between moves can be dithered to encode binary information - even delay for 0, odd delay for 1, and the data so encoded can be encrypted so that the evens and odds are indistinguishable from white noise. You can play naturally and the encoder can just dither your moves to delay them or not to send the desired message.
🌻🌻 [google.com]
(Score: 2) by takyon on Thursday February 28 2019, @03:21AM (1 child)
https://www.cnbc.com/2015/11/16/terrorists-using-playstation-4-to-communicate.html [cnbc.com]
[SIG] 10/28/2017: Soylent Upgrade v14 [soylentnews.org]
(Score: 2, Informative) by fustakrakich on Thursday February 28 2019, @04:49AM
Very interesting...
Personally I don't believe them. It's an old trick to make people believe their communications are secure. And to encourage them to use a Playstation.
And here's a tiny bombshell from the article:
WhatsApp is also very difficult to monitor, but intelligence services are able to decrypt these communications.
Another one bites the dust... You can be sure that Facebook provided all the needed assistance
La politica e i criminali sono la stessa cosa..