Stories
Slash Boxes
Comments

SoylentNews is people

SoylentNews is powered by your submissions, so send in your scoop. Only 15 submissions in the queue.
posted by cmn32480 on Sunday August 07 2016, @02:46AM   Printer-friendly
from the sour-grapes dept.

Submitted via IRC for Runaway1956

The FBI's director says the agency is collecting data that he will present next year in hopes of sparking a national conversation about law enforcement's increasing inability to access encrypted electronic devices.

Speaking on Friday at the American Bar Association conference in San Francisco, James Comey says the agency was unable to access 650 of 5,000 electronic devices investigators attempted to search over the last 10 months.

Comey says encryption technology makes it impossible in a growing number of cases to search electronic devices. He says it's up to U.S. citizens to decide whether to modify the technology.

Source: http://www.nbcnews.com/news/us-news/fbi-chief-calls-national-talk-over-encryption-vs-safety-n624101


Original Submission

 
This discussion has been archived. No new comments can be posted.
Display Options Threshold/Breakthrough Mark All as Read Mark All as Unread
The Fine Print: The following comments are owned by whoever posted them. We are not responsible for them in any way.
  • (Score: 2) by Snotnose on Monday August 08 2016, @01:24AM

    by Snotnose (1623) on Monday August 08 2016, @01:24AM (#385114)

    There is probably some size of encryption key such that the (okay, a) government can brute force it, but a standard bad actor cannot.

    That's not my understanding. Using the right algorithm with the right key makes your stuff pretty much unbreakable. The main point is "right key", it needs to be A) Long (40+ characters); B) Non-obvious (duh); and C) use all the ascii characters 0-0x7f, and 0-0xff if your system can handle it.

    Although I was a math major I never studied encryption. I don't understand encryption. I rely on the experts to judge how secure I am. If Bruce Schneier says "this is good", I tend to think this is good. If some random web page says "this is good", I tend to think "hmmm, has the NSA funnelled any money to this guy recently?"

    I understand the NSA was caught tweaking encryption algorithms, providing magic numbers that turned out to be not so magic. It's my understanding that, even though the NSA knows how un-magic those numbers are, using a good key can mean the NSA will take a decade or two to decrypt your message.

    That, of course, is if the NSA thinks your message is worth spending the resources on. If you typically use AES with a good key then A) the NSA has to notice you; and B) decide which of your messages they want to try to crack.

    --
    When the dust settled America realized it was saved by a porn star.
    Starting Score:    1  point
    Karma-Bonus Modifier   +1  

    Total Score:   2  
  • (Score: 2) by Capt. Obvious on Tuesday August 09 2016, @07:40AM

    by Capt. Obvious (6089) on Tuesday August 09 2016, @07:40AM (#385673)

    It's true that there are (probably) algorithms and keys that are safe from the NSA. What I said was different. I said there is probably an algorithm/key combo , such that the NSA can brute force it in a timely manner (or MI6 or similar), but traditionally baddies cannot.