Like other politicians and government officials, President Trump's nominee for the position of Attorney General, Jeff Sessions, wants to have it both ways when it comes to encryption:
At his confirmation hearing, Sessions was largely non-committal. But in his written responses to questions posed by Sen. Patrick Leahy, however, he took a much clearer position:
Question: Do you agree with NSA Director Rogers, Secretary of Defense Carter, and other national security experts that strong encryption helps protect this country from cyberattack and is beneficial to the American people's' digital security?
Response: Encryption serves many valuable and important purposes. It is also critical, however, that national security and criminal investigators be able to overcome encryption, under lawful authority, when necessary to the furtherance of national-security and criminal investigations.
Despite Sessions' "on the one hand, on the other" phrasing, this answer is a clear endorsement of backdooring the security we all rely on. It's simply not feasible for encryption to serve what Sessions concedes are its "many valuable and important purposes" and still be "overcome" when the government wants access to plaintext. As we saw last year with Sens. Burr and Feinstein's draft Compliance with Court Orders Act, the only way to give the government this kind of access is to break the Internet and outlaw industry best practices, and even then it would only reach the minority of encryption products made in the USA.
Related: Presidential Candidates' Tech Stances: Not Great
(Score: 2) by urza9814 on Friday January 27 2017, @01:22AM
You've already got a problem. You can't re-encrypt to make the data more secure, because someone may already have a copy of the data that used the old encryption keys. Or you might just forget to re-encrypt an old copy that's sitting on your backup server. You can't assume that the criminal is only trying to break into live data. They'll take the data and sit on it for a few months or even years, and until they crack it, you may not even know it's been stolen (and even then you still might not know). In fact, *they already do this*. Thankfully, most encryption schemes are designed to last quite a few years, and hopefully the data they protect is useless by the time they can be cracked...but yeah, that's another scheme that just makes things easier for the criminals.
Any encryption scheme designed to be broken is, well, broken.