FBI Director James Comey, 2014. [REUTERS]
Despite zero indication the people responsible for recent terrorist attacks in Paris and San Bernardino used encryption, the FBI is launching an all-out PR war on crypto.
Now, FBI director James Comey is making tech firms that offer end-to-end encryption tools an offer they can't refuse: they should reconsider “their business model,” he said today, and instead adopt encryption techniques that let them intercept communications, and hand them over to law enforcement when asked.
From The Intercept:
End-to-end encryption, which is the state of the art in providing secure communications on the internet, has become increasingly common and desirable in the wake of NSA whistleblower Edward Snowden’s revelations about mass surveillance by the government.
Comey had previously argued that tech companies could somehow come up with a “solution” that allowed for government access but didn’t weaken security. Tech experts called this a “magic pony” and mocked him for his naivete.
Now, Comey said at a Senate Judiciary Committee hearing Wednesday morning, extensive conversations with tech companies have persuaded him that “it’s not a technical issue.”
“It is a business model question,” he said. “The question we have to ask is: Should they change their business model?
Also on Wednesday, Sen. Dianne Feinstein (D-Calif.) echoed the call to mandate backdoors in crypto.
“If there is a conspiracy going on” among terrorists who use crypto, “that encryption ought to be able to be pierced,” said Feinstein, vice chairman of the Senate Intelligence Committee.
Again, there is no evidence and no indication at this time that any of the people responsible for recent Islamic State-inspired attacks in the United States or Paris used crypto.
Comey Calls on Tech Companies Offering End-to-End Encryption to Reconsider “Their Business Model” [The Intercept]
Battling Against Demeaning & Abusive Selfie Sharing (AKA the Badass Army) is an activist group founded by revenge porn survivor Katelyn Bowden to offer self-defense training against the tactics of traffickers in "involuntary pornography," particularly the loathsome denizens of Anon-IB.
Israeli security research firm CTS-Labs has published a white paper detailing nine flaws in AMD processors that they claim leave users open to devastating attacks with no mitigation strategies; these attacks include a range of manufacturer-installed backdoors.
Machine learning models use statistical analysis of historical data to predict future events: whether you are a good candidate for a loan, whether you will violate parole, or whether the thing in the road ahead is a stop sign or a moose.
The Nintendo Switch is king when it comes to gaming on the go, but it’s tough to lose yourself in Zelda: Breath of the Wild or Skyrim if your battery dies out. That’s where this Nintendo Switch Battery Charger Case comes into play. Built exclusively for Nintendo Switch, this pack allows for uninterrupted charging while you play, […]
Creative designers play a pivotal role in engaging target audiences and customers, and while companies are eager to bring more of these professionals on board, you’ll have a hard time getting your foot in the door if you’re not using the industry’s best tools. From Adobe to Maya, the eduCBA Design & Multimedia Lifetime Subscription Bundle […]
As more companies aim to reel in costs and boost productivity, project managers are becoming an essential part of many operations, and they’re paid handsomely for their expertise. But, while demand is high, you’ll have a hard time getting your foot in the door if you’re not toting the right certifications. The Official Lean Six Sigma […]