UK Home Secretary Amber Rudd has demanded that online services stop using working cryptography in their products, and instead leave all your communications vulnerable to interception by criminals, governments, businesses and spies.
Her argument is that "normal people" don't use Whatsapp because it is secure, but rather, because it is convenient, and thus the only people who value security are abnormal and presumably up to no good.
Here's a brief history of the rhetoric of the backdoor wars:
* "No one wants crypto, you can tell because none of the platforms are deploying it. If crypto was something normal people cared about, you'd see it in everyone's products. You crypto advocates are weird and out-of-step." (Clipper Chip - San Bernardino)
* "Companies are all using crypto. They are being irresponsible. Sure, everyone wants crypto and adding it to a product helps you sell it, but that's just profiteering while reducing our common security." (San Bernardino - This week)
* "Companies are all using crypto. But no one wants it. The fact that every major platform has rolled out working, end-to-end cryptography tells us nothing about the preferences of their customers. They're wasting their shareholders' money on working security that no one wants, while reducing our common security." (Last week - ??)
Next: some company will cave to Rudd and lose all their business to a competitor with working crypto. Then Rudd will say:
* "Sure, everyone wants working crypto, but you can't always get what you want. Look at Sellout.com, plc: they caved to our demands to eliminate security and got destroyed in the market. We must defend the good corporate stewardship of Sellout.com, plc by punishing their competitors for not joining them in the race to the bottom."
UK home secretary Amber Rudd says 'real people' don't need end-to-end encryption
[Rob Price/Business Insider]
(Image: Emojione, CC-BY-SA; Chris McAndrew, CC-BY;
Fingerprint locks are catastrophically awful, part LXVII: the software security on the crowdfunded Tapplock "is basically nonexistent" -- the lock broadcasts its own unlock code over Bluetooth, and if you send it back to the lock, it pops open.
A team of computer scientists, psychologists and neuroscientists used eye-tracking and fMRI to measure how users perceived security warnings, such as warnings about app permissions and browser warnings about insecure pages and plugin installations.
Konrad Rieck has data-mined the nine top security conferences, compiling a decade-by-decade list of the papers most often cited in the presentations delivered at these events: top of the pile is Random Oracles are Practical: A Paradigm for Designing Efficient Protocols (Sci-Hub mirror), from the 1993 ACM Conference on Computer and Communications Security. Rieck has […]
The cybersecurity landscape is changing, and now one of the most effective ways to counter hacking threats is to employ another hacker against them. Commonly referred to as ethical hackers, these professionals use a cybercriminal’s tools against them, checking networks for vulnerabilities and patching them up before they can be exploited. The Certified Ethical Hacker Bootcamp […]
The human eye is a powerful thing, but it’s not so great at seeing in the dark or around tight spaces, which is partially why most of us struggle with unplugging drains, cleaning under the fridge, and other hard-to-reach jobs. This 1080p HD Waterproof WiFi Wireless Endoscopic Camera, however, gives you the flexibility necessary to get […]
Macs are undeniably some of the most versatile computers on the market, but they can do so much more than what their stock apps allow. For those looking to get the most out of their Mac hardware, the Pay What You Want 2018 Super Mac Bundle features 10 of the industry’s top apps, including photo editors and […]