FBI: End-to-End Encryption Is an Infectious Problem
Just in case there were any lingering doubts about U.S. law enforcement's stance on end-to-end encryption, which prevents information from being read by anyone but its intended recipient, FBI executive assistant director Amy Hess told the Wall Street Journal this week that its use "is a problem that infects law enforcement and the intelligence community more and more so every day."
The quote was published in a piece about efforts from the UK, Australia and India to undermine end-to-end encryption. All three countries have passed or proposed legislation that compels tech companies to supply certain information to government agencies. The laws vary in their specifics, including restrictions on to what information law enforcement can request access, but the gist is that they don't want any data to be completely inaccessible.
Related: FBI Chief Calls for National Talk Over Encryption vs. Safety
FBI Failed to Access 7,000 Encrypted Mobile Devices
DOJ: Strong Encryption That We Don't Have Access to is "Unreasonable"
Five Eyes Governments Get Even Tougher on Encryption
Apple Speaks Out Against Australian Anti-Encryption Law; Police Advised Not to Trigger Face ID
Australia Set to Pass Controversial Encryption Law
Split Key Cryptography is Back... Again – Why Government Back Doors Don't Work
(Score: 2) by Fnord666 on Friday March 01 2019, @01:56AM
I agree. There's nothing that says anyone has to provide me with strong crypto. What I oppose is when they say I'm not allowed to have strong crypto from end to end if I want it. If they've got a legitimate subpoena to see a particular conversation then I can show it to them. Until that time though thing stay locked up, just like the papers in my safe.
As for "nobody is ever going to stop that in a practical sense", you're just looking at the wrong dictatorship. If the TLAs have their way they would allow just enough encryption that they can break easily and lock you up as a terrorist for using anything stronger.