![]() This analogy is a rhetorical device designed to normalize the idea of a secret listener-in. ![]() In this third post of a four-part series on the GCHQ “Ghost User” proposal, I address a technological assertion that the authors make in their essay: the idea that adding a secret listener to a conversation is just like attaching “ crocodile clips” to a phone wire. It is hard enough to build secure tools it is impossible to build technology that is impenetrable for everyone except the “right people.” As multiple computer scientists and security experts-including Seth Schoen, Susan Landau, Matt Green, and Bruce Schneier - have explained, the “ghost user” encryption back door won’t work as promised. The GCHQ authors insist that the proposal does not “break encryption.” They’re wrong. ![]() The latest intelligence community proposal for circumventing encryption suggests a scheme that would enable surveillance on otherwise securely encrypted communications by secretly adding an extra user - the government - to a conversation. Note: This is part three of a four-part series where security expert Jon Callas breaks down the fatal flaws of a recent proposal to add a secret user - the government - to our encrypted conversations.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |