Tim Cook. Reuters, 2015
Jenna McLaughlin at The Intercept writes that Apple CEO Tim Cook “lashed out at the high-level delegation of Obama administration officials who came calling on tech leaders in San Jose last week.”
Cook is said to have criticized the Obama White House for a lack of leadership on the freedom to keep one's own private digital life private, as FBI and other law enforcement top brass condemn even basic forms of crypto and secure messaging as “tools of terrorists."
The Apple CEO is reported to have demanded the Obama administration to issue a strong public statement defending the use of unbreakable encryption. That's pretty undeniably awesome, and those of us who believe in the right to encrypt need the most powerful allies we can get right now.
The White House should come out and say “no backdoors,” Cook said. That would mean overruling repeated requests from FBI Director James Comey and other administration officials that tech companies build some sort of special access for law enforcement into otherwise unbreakable encryption. Technologists agree that any such measure could be exploited by others.
But Attorney General Loretta Lynch responded to Cook by speaking of the “balance” necessary between privacy and national security — a balance that continues to be debated within the administration.
The exchange was described to The Intercept by two people who were briefed on the meeting, which the White House called to discuss a variety of counterterrorism issues with representatives from Apple, Facebook, Twitter, Cloudflare, Google, Drop Box, Microsoft, and LinkedIn.
Thank you, Tim Cook. [More at The Intercept]
The video conferencing app Zoom has become suddenly ubiquitous over the past few weeks, as the coronavirus shutdown closes schools, businesses, and keeps us all indoors. Shares of Zoom dropped 9% on Monday, adding to their sharp declines in recent days, as security and privacy vulnerabilities are reported. There is also new competition from other […]
“Researchers conclude that Zoom uses non-industry-standard cryptographic techniques with identifiable weaknesses and is not suitable for sensitive communications.”
The suddenly popular videoconferencing app Zoom has issued a patch for a vulnerability in its Windows client that allowed attackers to steal the user’s Windows login credentials from malicious chat links. Hi @zoom_us & @NCSC – here is an example of exploiting the Zoom Windows client using UNC path injection to expose credentials for use […]
Yoga studios are closed nationwide. The irony is that between the anxieties of the outside world and those popping up inside your very own home with everyone trapped indoors, there’s probably never been a time where yoga’s calming zen was more vital and needed. Rather than just throwing in the yoga mat and subjecting family […]
The workers aren’t inside their physical business space anymore. So why should business technology still be under that roof either? In fact, more and more businesses have been making this migration for a while now, moving all their digital infrastructure to the world’s two largest cloud services platforms, Amazon Web Services (AWS) and Microsoft’s Azure. […]
Gather round, young and old — and hear tales of bygone days. Back in olden times, citizens would mass at a house of coffee, wherein skilled java alchemists would concoct special blends and apply artisanal wizardry to make each steaming chalice an appointment for the taste buds. Granted, said wizards, once known as baristas, were […]