FBI Director James Comey, 2014. [REUTERS]
Despite zero indication the people responsible for recent terrorist attacks in Paris and San Bernardino used encryption, the FBI is launching an all-out PR war on crypto.
Now, FBI director James Comey is making tech firms that offer end-to-end encryption tools an offer they can't refuse: they should reconsider “their business model,” he said today, and instead adopt encryption techniques that let them intercept communications, and hand them over to law enforcement when asked.
From The Intercept:
End-to-end encryption, which is the state of the art in providing secure communications on the internet, has become increasingly common and desirable in the wake of NSA whistleblower Edward Snowden’s revelations about mass surveillance by the government.
Comey had previously argued that tech companies could somehow come up with a “solution” that allowed for government access but didn’t weaken security. Tech experts called this a “magic pony” and mocked him for his naivete.
Now, Comey said at a Senate Judiciary Committee hearing Wednesday morning, extensive conversations with tech companies have persuaded him that “it’s not a technical issue.”
“It is a business model question,” he said. “The question we have to ask is: Should they change their business model?
Also on Wednesday, Sen. Dianne Feinstein (D-Calif.) echoed the call to mandate backdoors in crypto.
“If there is a conspiracy going on” among terrorists who use crypto, “that encryption ought to be able to be pierced,” said Feinstein, vice chairman of the Senate Intelligence Committee.
Again, there is no evidence and no indication at this time that any of the people responsible for recent Islamic State-inspired attacks in the United States or Paris used crypto.
Comey Calls on Tech Companies Offering End-to-End Encryption to Reconsider “Their Business Model” [The Intercept]
Investigative tech journalist Joseph Menn's (previously) next book is a history of the Cult of the Dead Cow (previously) the legendary hacker/prankster group that is considered to be "America's oldest hacking group."
Using software-defined radios, researchers from Trend Micro were able to reverse-engineer the commands used to control massive industrial machines, including cranes, excavators and scrapers; most of these commands were unencrypted, but even the encrypted systems were vulnerable to "replay attacks" that allowed the researchers to bypass the encryption.
"Letterlocking" is a term coined by MIT Libraries conservator Jana Dambrogio after she discovered a trove of letters while spelunking in the conservation lab of the Vatican Secret Archives; the letters had been ingeniously folded and sealed so that they couldn't be opened and re-closed without revealing that they had been read. Some even contained […]
Seems like drones are doing a lot of jobs these days, from reconnaissance to delivery. Now, we can add “keeping the Death Star safe” to that list. Whether you’re a drone enthusiast or a Star Wars fan, these Star Wars Propel Drones are undeniably the coolest toy around. Yes, that’s a fully functional drone replica […]
It’s spring clearance time for the Boing Boing Store, when some of the best deals from the holidays return even cheaper than before. From top-rated apps to educational software to the cutest record player of all time, they’re all back with a little extra incentive. Shop your heart out before tax season wraps up! Use […]
Big companies want automation on a big scale. Doing that means diving into the tricky world of machine learning and data science. And no matter what platform you’ll be implementing it on, you can learn how with the Machine Learning & Data Science Certification Training Bundle. In 48 hours and through eight courses, this bundle […]