Post reply

Name:
Email:
Subject:
Message icon:

Verification:
Type the letters shown in the picture
Listen to the letters / Request another image

Type the letters shown in the picture:
Second Anti-Bot trap, type or simply copy-paste below (only the red letters):www.scforum.info:

shortcuts: hit alt+s to submit/post or alt+p to preview


Topic Summary

Posted by: Samker
« on: 13. June 2015., 11:07:28 »

Posted by: A41202813GMAIL
« on: 08. June 2015., 07:43:47 »

Why Is My Country On That Map ?

How Difficult Is It To Do Some Basic Research ?

When You Cry Wolf, Do Not Expect People To Take You Seriously Anymore, Period.

See Ya.
Posted by: Samker
« on: 06. June 2015., 10:01:10 »



Apple and Google are helping terrorism by offering users encrypted communications, a senior FBI official has told the House Homeland Security Committee in Congress, and US law enforcement needs to stop them from doing it.

Michael Steinbach, assistant director in the FBI's Counterterrorism Division, told Congress that ISIS and other terrorist groups are using commercially available encryption technology to mask their activities, leading law enforcement surveillance to "go dark": http://www.fbi.gov/news/testimony/terrorism-gone-viral-the-attack-in-garland-texas-and-beyond

As far as the FBI is concerned, private companies must "build technological solutions to prevent encryption above all else," the Washington Post reports Steinbach as saying: http://www.washingtonpost.com/blogs/the-switch/wp/2015/06/04/fbi-official-companies-should-help-us-prevent-encryption-above-all-else/

That's a pretty sharp reverse ferret from the FBI, which four years ago was recommending encryption as a basic security measure. But Steinbach said evildoers are hiding behind US-made technology to mask their actions.

Encryption appears to be a big problem for law enforcement, both foreign and domestic. Ever since encrypted communications was offered as an option, and later a default setting, by technology manufacturers, the FBI has been complaining that we are all less safe as a result.

Steinbach told the committee that encrypted communications were the bane of the agency's efforts to keep the American public safe from terror. But the FBI wasn't insisting on back door access to encryption; rather, it wants companies to work directly with law enforcement where necessary.

"Privacy above all other things, including safety and freedom from terrorism, is not where we want to go," Steinbach said. "We're not looking at going through a back door or being nefarious."

Instead the FBI wants a front door; a system to allow it to break encryption created by US companies: http://www.washingtonpost.com/world/national-security/as-encryption-spreads-us-worries-about-access-to-data-for-investigations/2015/04/10/7c1c7518-d401-11e4-a62f-ee745911a4ff_story.html
Understandably, US tech firms aren't that keen on the idea, since "we have borked encryption" isn’t much of a selling point.

The idea of law enforcement getting access to encrypted communications isn't a new one; the IT industry spent years fighting against it in the 1990s. But the intelligence community is wedded to the idea that it should be easy to build an encryption system that's both secure and has a breakable access code.

The problem is that the best minds in the field say doing so is mathematically impossible, and even if it were possible, you'd be painting a target on your back by telling the world there's a hack available and daring them to find it: http://www.theregister.co.uk/2015/04/28/us_politicians_complain_that_silicon_valley_cant_create_encryption_unicorn/

(ElReg)
Enter your email address to receive daily email with 'SCforum.info - Samker's Computer Forum' newest content:

Terms of Use | Privacy Policy | Advertising