To battle hackers, IBM wants to encrypt the world – Washington Post

There are only two types of companies, it is commonly said: those that have been hacked, and those thatjust don't know ityet.

IBM, the computing giant, wants to get rid of both. The company said Monday that it has achieved a breakthrough in security technology that will allow every business, from banks to retailers to travel-booking companies, toencrypt their customer data on a massive scale turning most, if not all, of their digital information into gibberish that is illegible to thieves with its new mainframe.

The last generation of mainframes did encryption very well and very fast, but not in bulk, Ross Mauri, general manager ofIBM's mainframe business, said in an interview. Mauri estimates that only 4 percent of data stolen since 2013 was ever encrypted.

As the number of data breaches affecting U.S. entities steadily grows resulting in theleakage every year ofmillions ofpeople'spersonal information IBM argues that universal encryption could be the answer to what has become an epidemic of hacking.

The key, according toIBM officials, is an update to the computer chipsdriving the powerful mainframe serversthat house corporate or institutional information and process millions of transactions a day worldwide, from ATM withdrawals to credit card payments to flight reservations.

Cryptography,the scienceofturning legibleinformation into coded gobbledygook, is already commonly used among certain email providers and storage services. But because of the enormous computational power needed to quickly encrypt and decrypt information as it passes from one entity to another, many businesses use encryption only selectively, if at all. A December report by the security firm Sophos found that while 3 out of 4 organizations routinely encrypt customer data or billing information, far more do not encrypt their intellectual property or HR records. Sixty percent of organizations also leave work files created by employees unencrypted, the study found.

All of these represent opportunities for digital criminals, said Austin Carson, executive director of the technology think tank TechFreedom.

One of the big problems is that way too much information is stored in clear text, he said. But universal or pervasive encryption, he added, could help ensure that even if hackers successfully broke into a company's network, any information they found there would be impossible to decode. That would be a huge step forward just in terms of protecting a much larger body of information, Carson said.

But the same technology could frustrate law enforcement, which in recent years has waged a furious battle with Silicon Valley over encryption technology and how extensively it should be used. In a high-profile dispute last year with Apple, the Justice Department argued that the companyshould help officials break into an encrypted iPhone used by one of the San Bernardino shooters. Apple refused, saying that developing tools to break encryption would undermine its customers' security, particularly if the tools were to fall into the wrong hands. Apple's concern is not theoretical: This year's WannaCry ransomware attack, which held thousands of PCs hostage, has been linked to a Windows vulnerability that was secretly discovered and exploited by the National Security Agency long before it leaked into the wild.

In its push to expand universal encryption, IBM is taking Apple's side in the debate.

IBM fully supports the need for governments to protect their citizens from evolving threats, the company said in a statement on the issue. Weakening encryption technology, however, is not the answer. Encryption is simply too prevalent and necessary in modern society.

For IBM, encryption is also a massive business opportunity. Businesses spend over $1 trillion a year making sure that their security meets government standards, according to company officials. One aspect of IBM's new approach to mainframes is the concept of automating that compliance work, using artificial intelligence to check that what's being protected passes regulatory muster in various industries. In doing so, IBM expects to turn a chunk of that annual compliance spending into revenue for itself. And that's on top of the roughly $500,000 it expects to charge new customers for using IBM's newest mainframe technology. Most businesses, said Mauri, will be upgrading from an existing setup, so the cost for those clients could be less.

For some small businesses, that may still be too expensive. Still, the history of technology suggests that with time, those prices may fall.

This is the turning point. The idea here is that you can start to encrypt all data, saidMauri. But even as IBM makes encrypting everything a priority, security experts like Mauri already have their eyes set on the next holy grail: the ability to securely edit and manipulate encrypted files without ever having to decrypt them in the first place.

Read the original:
To battle hackers, IBM wants to encrypt the world - Washington Post

Australian Leader’s Stupid Quote About Laws Trumping Math Is Encryption Fight in a Nutshell – Reason (blog)

Avalon.red/NewscomAustralia's Prime Minister Malcolm Turnbull is getting mocked by the encryption savvy for asserting that the laws of mathematics are subservient to the laws of Australia.

The Australian government is considering legislation that would require online communication companies decrypt messages on demand of law enforcement officials in order to fight crime. The problem is end-to-end encryption blocks companies from decrypting the communications. It's a safety and security measure to make it much harder for people with sinister intentionseither criminals or dangerous governmentsto access users' private data.

Turnbull's quote may make him look like an idiot, but the fundamental attitude he's expressing is shared by lawmakers and government officials in other countries, including the United States and England. These people want to deliberately jeopardize everybody's data privacy and security in order to serve the demands for information by law enforcement and the intelligence community.

Government officials have been wanting to force "back doors" into encryption so that they can get access to data in order to fight crime and terrorism. But there's no such thing as a back door that only the government can access.

Once there is a key to break encryption, it can be (and frequently has been) either discovered or reverse engineered by others. Furthermore, no single government, no matter how powerful it is, has the ability to prevent new, unheard of encryption tools from becoming available for criminals and terrorists to access. The inevitable outcome would be average users of commonly distributed communication apps having their data compromised, and actual criminals finding new ways to keep their communications secret.

In this context, Turnbull was asked whether this mathematical reality trumped government's desire to get access on demand to encrypted communication. His response:

"Well the laws of Australia prevail in Australia, I can assure you of that. The laws of mathematics are very commendable, but the only law that applies in Australia is the law of Australia."

We should actually appreciate the blunt stupidity of Turnbull's response, because it highlights how stubbornly unwilling government officials have been in recognizing the actual consequences of their proposals. We've seen it from American senators on both the left and the right like Dianne Feinstein (D-California) and Richard Burr (R-North Carolina). We've seen it from British Prime Minister Theresa May's administration.

Throughout this encryption fight we have seen government and law enforcement officials lean on their power to legally demand access to information with warrants and investigatory tools in a bid for the authority to compromise everybody's security. The quote from Turnbull vividly demonstrates their belief that the existence of a government law outweighs consideration of other consequences.

The quote should be used as a rhetorical weapon against the likes of Feinstein and May to force them (and law enforcement representatives) to deal with the dangerous consequences of the laws they propose.

Read the original post:
Australian Leader's Stupid Quote About Laws Trumping Math Is Encryption Fight in a Nutshell - Reason (blog)

Apple meeting with Australian Attorney-General to discuss proposed ban on end-to-end encryption – 9to5Mac

Australias Attorney-General has said he will be meeting with Apple as the country becomes the latest to demand that the company cease offering end-to-end encryption, reportsSky News.

Attorney-General George Brandis says he will hold talks with tech giant Apple this week in bid to get co-operation on the Turnbull governments proposed laws compelling tech companies to give police and intelligence agencies access to encrypted information messages from suspected terrorists and criminals

Australia is apparently determined to join the US and UK in the hall of fame of governments who dont understand how encryption works. Brandis said that the new laws would be directly modelled on the UKsInvestigatory Powers Act, introduced last year.

So far, there has been no clash between the British government and Apple on the subject, though a future one seems inevitable. The law requires Apple and other tech companies to hand over details of messages sent through services such as iMessage and FaceTime, but Apples use of end-to-end encryption means that it will be unable to comply.

Apple will doubtless be making the point that the only way to comply with such a law would be to cease using end-to-end encryption, compromising everyones privacy.

Brandis says that he will be seeking voluntary cooperation first, and legislating if needed.

Senator Brandis says the government will be seeking voluntary cooperation as a first preference. But we will also be legislating so that we do have that coercive power if need be if we dont get the cooperation we seek, he told Sky News On Sunday.

Apple has of course demonstrated its willingness to stand up to government attempts to force it to compromise user privacy through the San Bernardino case in the USA.

Check out 9to5Mac on YouTube for more Apple news!

View post:
Apple meeting with Australian Attorney-General to discuss proposed ban on end-to-end encryption - 9to5Mac

Government’s encryption backdoor plan flawed: SafeSwiss chief – CIO Australia

Legislating against cryptography will drive encryption underground, says Tim Gallagher

The chief executive of a Swiss digital encryption app provider has lambasted the Australian governments proposed new laws that will compel tech companies to help local security forces access encrypted messages.

Theproposed lawsare expected to be put to Parliament by the end of this year, and are expected to resemble the UKsInvestigatory Powers Act 2016. This legislation obligates messaging platform operators such as Facebook and Google to cooperate with investigators looking to access encrypted messages.

SafeSwiss CEO Tim Gallagher said on Monday that the nature of his companys free messaging service for Android, iOS and Windows devices places it beyond the legal jurisdiction of the Australian government."

Gallagher warned users who are concerned about their privacy that serious design flaws in products such as WhatsApp, Telegram Messenger and WICKR potentially make them vulnerable to government-mandated backdoors.

Banning or legislating encryption apps is not the answer, this is a true paradox of security against privacy, Gallagher said.

Legislating against cryptography will drive encryption underground. It will open the doors to malicious attacks from adversaries everywhere.

Gallagher noted that encryption also applies to banking, purchasing goods online and in keyless ignition systems.

A good preview on how backdoors operate is to look at the US transport security administration (TSA) requirement that all baggage passing or travelling within the USA must be equipped with travel sentry locks that are designed to allow anyone with a readily available master key access.

As a result, a CNN investigation found thousands of incidents of theft, he said.

Gallagher added that to consider governments to be a trusted third-party is extremely misguided.

Governments would be better placed to put resources into the source of the problem the continued brainwashing of predominantly youth under the guise of medieval religion.

We are most certainly not anti-government or anti-police. We are pro privacy, and we firmly believe that both privacy and freedom of speech are two basic fundamental human rights.

Follow CIO Australia on Twitter and Like us on FacebookTwitter: @CIO_Australia,Facebook: CIO Australia, or take part in the CIO conversation onLinkedIn: CIO Australia

Follow Byron Connolly on Twitter:@ByronConnolly

Error: Please check your email address.

Tags WhatsAppdigital encryption appTelegram MessengerWickrswissTim GallagherAustralian GovernmentUSA

More about AustraliaCNNFacebookGoogleMessengerTwitter

Go here to read the rest:
Government's encryption backdoor plan flawed: SafeSwiss chief - CIO Australia

Julian Assange: I tried to get Donald Trump Jr. to publish …

WikiLeaks publisher Julian Assange claimed he tried to persuade Donald Trump Jr. into publishing his email correspondence with British publicist Rob Goldstonebefore the eldest Trump son tweeted them out himself Tuesday morning.

Contacted Trump Jr this morning on why he should publish his emails (i.e with us). Two hours later, does it himself, Mr. Assange tweeted to his 263,000 followers Tuesday afternoon, The Hill first reported.

I argued that his enemies have it so why not the public? he wrote in a series of subsequent tweets. His enemies will just milk isolated phrases for weeks or months with their own context, spin and according to their own strategic timetable. Better to be transparent and have the full context but would have been safer for us to publish it anonymously sourced. By publishing it himself it is easier to submit as evidence.

The younger Mr. Trump on Tuesday released the entire email chainbetween himself and Mr. Goldstone that arranged a meeting with Russian lawyer Natalia Veselnitskaya, who, according to Mr. Goldstone, offered very high level and sensitive information about Hillary Clinton as part of the Russian governments support for Donald Trumps presidential campaign.

Trump Jr. said nothing came of the meeting, but the revelation ramped up allegations from Democratic lawmakers that associates of President Trump may have colluded with the Russian government to influence the U.S. election.

President Trump came to his eldest sons defense later Tuesday, saying he is a high-quality and transparent person.

View original post here:
Julian Assange: I tried to get Donald Trump Jr. to publish ...

Bitcoin Fans: Cryptocurrency Token Economy Is the Future …

Ever since Bitcoin first appeared on the scene several years ago, fans of the cryptocurrency have been searching for a way to apply the idea that might capture the public imagination and broaden the use of the technology beyond just geeks and programmers.

Now, some believe that application has appeared with the rise of the "token" economy, in which companies or startup ventures fund their operations by handing out units of cryptocurrencies. Some companies have even done what are known as "initial coin offerings" or ICOs, in which they distribute tokens instead of shares to investors.

The cryptocurrency market is seen by some as a bubble with hugely inflated prices. Some observers say bitcoin and other similar ventures are similar to Linux , an open-source alternative to Microsoft's Windows operating system that has never really achieved mainstream success.

But entrepreneur and investor Balaji Srinivasan, a partner at Silicon Valley venture capital firm Andreessen Horowitz, believes that token-based systems "may eventually create and capture more value than the last generation of Internet companies."

Get Data Sheet , Fortune s technology newsletter.

In an essay published recently on the blogging platform Medium, Srinivasan and his partner Naval Ravikant, co-founder and CEO of a popular online VC community called AngelList, said they believe the token economy has the potential to become "a Kickstarter on steroids."

The two men, both of whom have been investing in bitcoin-related technology for several years, argue that using tokens as a financing option has the potential to improve the liquidity options that companies have by several orders of magnitude, as well as increasing the size of the available audience that might want to invest in such ventures.

All of this is possible because of an explosion in the cryptocurrency market over the past few years, they argue, in which Bitcoin has survived internal strife but also given birth to alternative currency systems and platforms such as Ethereum.

Initial coin offerings or ICOs are one way of using these new currencies, Srinivasan and Ravikant say. Canadian messaging-app maker Kik recently announced that it is launching its own cryptocurrency called Kin, and plans to offer units of it to supporters through a crowdfunding campaign. The currency is based on Ethereum's blockchain technology.

Kik plans to issue 10 trillion Kin tokens to developers and users via a separate non-profit foundation called the Kin Foundation, which will ultimately hold 60% of all the Kin tokens and be run by a group of independent directors.]

Srinivasan and Ravikant warn that some uses of cryptocurrency tokens, including some ICOs, may be subject to regulation by governments if they are seen as equivalent to doing a traditional equity offering or IPO, in which investors receive shares of the company. But they argue other uses of tokens for crowdfunding could essentially be unregulated.

Token supporters say they aren't really equity but more of a digital IOU, which entitles the holder to redeem their tokens in return for access to a platform like Ethereum's.

That access has value because it can be used to generate Bitcoin-style currency through a computer-intensive process known as "mining," and those coins can in turn be exchanged for other more familiar currencies like U.S. dollars. One bitcoin is currently worth about $2,300.

Some skeptics say token-based fundraising has the potential to turn into a huge boondoggle if it is unregulated, with unwary investors being fleeced of their savings with little to show for it.

Ravikant and Srinivasan, however, argue that tokens will allow companies to raise money much more quickly for new ventures than existing systems do, and will also allow for startups to build valuable services without having to rely on advertising as their only revenue source.

Large technology companies like Google and Facebook offer "have sometimes come under fire for making billions of dollars while early adopters only receive the free service," their essay says . "After the early kinks are worked out, the token launch model will provide a technically feasible way for tech companies to spread the wealth and align their user base behind their success."

See the article here:
Bitcoin Fans: Cryptocurrency Token Economy Is the Future ...

Japan’s Cryptocurrency Business Association Plans for August 1 Guidelines – Bitcoin News (press release)

This week we reported on upcoming events that might be taking place on August 1, concerning potential interruptions connecting to the Bitcoin network. Now the Japan Cryptocurrency Business Association made up of various regional exchanges is preparing to draft service suspension directives for bitcoin users in the country for that specific date.

Also read:Mining, Merchants, and TradersThailands Got the Bitcoin Fever

Japan has had bitcoin fever over the past few months. Since this past April interest in the decentralized currency has grown quite a bit since the Japanese government legalized bitcoin as a form of payment. Now as the country continues to progress in adoption a possible blockchain split may happen in two weeks, and Japanese bitcoin businesses want to be prepared.

According to the Nikkei Asian Review, the Japan Cryptocurrency Business Association (JCBA) is currently deliberating guidelines for a one day to one week freeze on bitcoin transactions. The JCBA organization says it aims to actively investigate and research necessary information, consolidate knowledge and exchange opinions, and aim for sound industry development in Japan. As far as August 1 is concerned, the association made up of fourteen regional cryptocurrency exchanges says it wants to protect customer assets.

The publication also details the trading platform Bitflyer is still undecided on its decision but will release an announcement next week. The Japanese exchanges Bitbank and Tech Bureau has detailed trading will be allowed, but deposits and withdrawals will be suspended until the possibility of a fork is resolved.

The statement from the JCBA and a few Japanese exchanges follows the announcement from the GDAX exchange on July 13. The exchange announced the suspension of deposits and withdrawals on August 1 and the possibility of halting trades as well. GDAX executive Adam White says the decision was based on technical risks and the possibility of network instability.

Masayuki Tashiro, a data analyst at the Japanese trading platform Fisco, says the chance of instability could make some transaction records inaccurate.

If there really is a fork, some transaction records could disappear

Theres still a possibility that nothing happens on August 1 and the industry is just playing it safe as they did this past March. This weekend the code for Segwit2x will be delivered and Segwit activation could happen, which might stop the potential August 1 fork. The JCBA is just following protocol, and other exchanges will likely do so leading up to the next two weeks in order to protect their businesses from legal repercussions.

What do you think about Japan Cryptocurrency Business Association drafting August 1 guidelines? Let us know in the comments below.

Images via Pixabay, Bitcoin.com, Japan Cryptocurrency Business Association.

Do you want to vote on important Bitcoin issues? Bitcoin.com has acquired Bitcoinocracy, and rebranded the project to Vote.bitcoin.com. Users simply sign a statement with a non-empty Bitcoin address and express their opinions. The project focuses on determining truth backed by monetary value and transparency.

Read the original:
Japan's Cryptocurrency Business Association Plans for August 1 Guidelines - Bitcoin News (press release)

WikiLeaks founder Julian Assange supports Twitter lawsuit against Trump – Washington Examiner

WikiLeaks founder Julian Assange said Saturday that he supports the lawsuit filed this week arguing that President Trump and members of his communications staff should not be blocking users from his Twitter account.

"I support this suit against Trump. It a constitutional violation for a state official to block political comments," Assange wrote on Twitter. He added that the "only exception" would be "if the user makes the same comment endlessly which would have the effect of denying others space to speak."

The lawsuit was filed by the Knight First Amendment Institute on Tuesday, which argues that Trump and his communications team are violating the Constitution through their use of Twitter. The institute, a project created by Columbia University and the John S. and James L. Knight Foundation, took issue with Trump blocking various Twitter users from viewing his tweets. The suit requests that the court force Trump to remove his Twitter ban on seven users seeking to view his profile.

The suit was filed in the Southern District of New York and follows a letter that the institute sent to Trump last month threatening legal action if he didn't make changes to his account.

Go here to read the rest:
WikiLeaks founder Julian Assange supports Twitter lawsuit against Trump - Washington Examiner

Australia wants FB, other tech firms to give access to encrypted messages – Blasting News

Australia #Prime Minister Malcolm Turnbull wants to have access to encrypted messages of tech companies such as Apple, Facebook and others to assist the rule of law even as he warned that encrypted messaging apps could be used by terrorists and criminals, the BBC reported.

Mr. Turnbull made a recent pitch to reporters about his interest in prying into encrypted messages but he seems instead to be reviving the alleged spy leaks by Edward Snowden, who is still in asylum in Russia after facing espionage charges in 2013 by the U.S. government. Lancaster Online reported this week that "#Edward Snowden's leaks still has NSA in damage-control mode."

Encrypted messages are considered secure online messages that could not be easily intercepted by hackers, terrorists, and criminals.

The encrypted messages cannot be handed over by messaging companies as they do not receive a legible copy.

WhatsApp, for one, uses end-to-end encryption, and its encrypted messages if ever they are intercepted are unreadable. Mr. Turnbull wanted for these encrypted messages be accessed by government spies, an action which could not possibly have any headway without earning a backlash on its citizens freedom of privacy.

There are fears from Australian authorities that this type of messaging has been used by terrorists and criminals.

Mr. Turnbull told journalists that he is not seeking a backdoor by the government into the systems of the tech companies but only wanted the encrypted messages to be accessed and understood like information processed offline.

He said that the access to encrypted messages would assist the rule of the law but tech experts are saying that giving into this would mean that criminals and terrorists could also use the same.

Turnbull's "backdoor" talks have revived government spy talks after Snowden exposed the U.S. governments snooping activities while tech experts and legal communities favoring privacy are again bracing for repercussions as the Australian government presses to have access to encrypted messages.

Snowden, a former contractor for the CIA, leaked to the media the extensive surveillance activities by American intelligence in internet and phone companies in the U.S. in June early June 2013.

He exposed that the U.S. National Security Agency (NSA) was collecting telephone records of tens of millions of U.S. citizens. #The Guardian newspaper published a secret court order favoring NSA for the telecommunications company Verizon to provide it with its telephone data on a daily basis.

Subsequent exposes of the Washington Post and the Guardian bared that the NSA tapped directly into the servers of nine internet companies such as Facebook, Microsoft, Yahoo, and Google, like a backbone to monitor communications via a surveillance program named Prism.

But Prism was also cracked by a British electronic eavesdropping company named GCHQ. Snowden was later uncovered to be the one behind the leak. There was a widespread search for him until he was found to be already in Russia, where he was granted asylum.

See original here:
Australia wants FB, other tech firms to give access to encrypted messages - Blasting News

Everything You Should Know About The Government’s New Encryption Laws – Junkee

The people were most worried about will circumvent it and the ones who most need it are the ones who are going to lose their privacy.

In a press conference this FridayPrime Minister Malcolm Turnbull announced the Governments intention to introduce new encryption laws that would compel tech companies to provide Australian security agencies with access to encrypted messages. The laws are intended to make it easier for law enforcement to access the messages of suspected terrorists and criminals.

Unfortunately, Turnbull also used the press conference to demonstrate a deep misunderstanding of how encryption works. Specifically, he said that the laws of mathematics are very commendable but do not apply in Australia. This did not inspire confidence.

Given the importance of encryption for security and privacy, and the enormous potential consequences of inserting so called backdoors in software, people are understandably pretty freaked out. The UK laws the Australian laws are supposedly based on have also been roundly criticised as an invasion of privacy, and have been nicknamed the Snoopers Charter for that reason.

For the time being, though, its not totally clear exactly what the Australian laws will entail, whether theyll work, and whether theyll be much of a threat. Heres what you need to know at the moment:

Apart from that the laws of mathematics dont apply down under? Not much.

Basically, Turnbull said the government is concerned about making sure the rule of law applies online as well as offline so that the internet is not used as a dark place for bad people to hide their criminal activities from the law.

Attorney-General George Brandis emphasised that the new laws are not changing any existing legal principle. It has always been accepted that in appropriate cases, under warrant, there can be lawful surveillance of private communications. He characterised the new laws as bringing these up to date with technology.

As far as how the government plans to ensure this, we got vague mixed messages. Turnbull insisted that the legislation will require [tech companies] to provide assistance, except not through backdoors, but legitimately, appropriately.

The problem? Its not clear what this means, or whether its possible.

End-to-end encryption, which is used by messaging applications like WhatsApp, works by scrambling a message as its transmitted such that it can only be unscrambled by the intended recipient. The Guardian has an excellent explainer on how encryption works here, but the basic takeaway you need is this: the service provider (i.e. WhatsApp), cannot unscramble the message.

This is the point on which the governments vague press conference doesnt make a lot of sense. The law may compel companies like WhatsApp to provide assistance, but theres not a lot that WhatsApp can do. In the words of independent cybersecurity researcher Troy Hunt, you cant break the mathematics in that way, its just not how it works.

This brings us to the question of backdoors. A backdoor is a method of bypassing security or encryption, which can end up in a program by design or by mistake. One way that the government could hypothetically obtain encrypted messages is if they were able to compel an encrypted messaging provider to remove encryption, or to implement some kind of backdoor allowing messages to be retrieved from a device.

The problem with inserting backdoors, as Troy Hunt puts it, is that you cant ensure theyll only be used by legitimate forces. Once there is a way of exploiting devices, sooner or later it tends to fall into the hands of people its not meant to, he told Junkee.

The global WannaCry ransomware attacks several months ago, for example, were the result of a backdoor in Windows operating systems being exploited by malicious hackers. When security is compromised through backdoors or the removal of encryption, everybody loses.

Of course, Turnbull was adamant that no backdoors would be used. But given that he was cagey on how exactly the laws would work, people are a bit worried.

Troy Hunt told Junkee what the laws might actually mean in practice.

He thinks that rather than trying to compel services like WhatsApp to remove their encryption, were more likely to see the government proactively pursue intercepting messages at the end points, for example by using exploits to gain access to it on phones of suspects, which makes a lot more sense technically than what some of the headlines say at the moment.

This would entail trying to work with companies like Apple and Samsung to break into their devices something that has received huge pushback from such companies in past. Given that in the past tech companies have stood their ground, and ultimately it took the FBI paying about a million bucks to get some exploit tool to get in, Troy isnt particularly worried about the Australian governments use of backdoors becoming particularly widespread in practice, even if thats their tool of choice.

While it might be unlikely that the government manages to force tech companies to bypass encryption, Troy cautions that it wouldnt be great for most of us if they did.

If they managed to do that, we still have all of these mechanisms of encryption that are outside the scope of any one company or service we still have things like PGP mail. And all of these channels will still exist for people who want to use them and keep their messages private.

The people were most worried about will circumvent it and the ones who most need it are the ones who are going to lose their privacy.

Basically, at the moment what the governments proposing is pretty unclear, and sounds a bitdodgy, but nothings actually been finalised. The takeaway for now is that this is one to watch further details of the actual laws will emerge as the bills themselves are drafted.

Sam Langford is Junkees Staff Writer. She tweets at@_slangers.

Originally posted here:
Everything You Should Know About The Government's New Encryption Laws - Junkee