Waging crypto wars 2.0

    Date 07 Oct 2010
    Category Cryptography
    Posted By Alex
    I was drawn to security in the early 90s during the crypto battle against the U.S. government, which was trying to force companies to adopt broken encryption with built in backdoors, like the failed Clipper Chip. Fortunately, the crypto wars were won by the side of reason, not least because of activists hoarding crypto technology in offshore locations.
    Today we all enjoy strong, unbreakable, backdoor-free encryption as a result of the 90s crypto battle. That battle is about to begin again as the U.S. government proposes to introduce backdoors, by design fiat, into commercial communications security systems. They were wrong then and they are wrong now but the stakes are much higher this time.

    In the information age, communication security is paramount. It ensures the secure flow of money in electronic commerce, the free exchange of ideas and the flourishing of democracy, even in hostile regimes. Fortunately, the tools to secure communications are widely available and people around the world have access to strong encryption, unbreakable by any government. Encryption can be found in source code, with open peer-reviewed algorithms that can be implemented in any programming language, embedded in software and layered on top of any communications channel. The cat is well out of the bag. Yet, the U.S. government wants to pursue a futile effort to reverse history, putting the entire Internet in peril in pursuit of an illusion.

    The link for this article located at Network World is no longer available.

    LinuxSecurity Poll

    Are you considering making the switch to Purism's new Librem 14 Linux laptop to improve your security and privacy online?

    No answer selected. Please try again.
    Please select either existing option or enter your own, however not both.
    Please select minimum 0 answer(s) and maximum 3 answer(s).
    [{"id":"109","title":"Yes - the hardware kill switches and default ad blocking\/tracking protection sold me on it.","votes":"3","type":"x","order":"1","pct":37.5,"resources":[]},{"id":"110","title":"Not sure yet - I need to do more research.","votes":"4","type":"x","order":"2","pct":50,"resources":[]},{"id":"111","title":"No - I'm satisfied with my current laptop and have no security\/privacy concerns.","votes":"1","type":"x","order":"3","pct":12.5,"resources":[]}] ["#ff5b00","#4ac0f2","#b80028","#eef66c","#60bb22","#b96a9a","#62c2cc"] ["rgba(255,91,0,0.7)","rgba(74,192,242,0.7)","rgba(184,0,40,0.7)","rgba(238,246,108,0.7)","rgba(96,187,34,0.7)","rgba(185,106,154,0.7)","rgba(98,194,204,0.7)"] 350
    bottom 200


    Please enable / Bitte aktiviere JavaScript!
    Veuillez activer / Por favor activa el Javascript![ ? ]

    We use cookies to provide and improve our services. By using our site, you consent to our Cookie Policy.