Julian Assange: software developer, whistleblower … and ‘edgewalker’? – The Guardian

Man on the edge ... Julian Assange at the Ecuadorian embassy. Photograph: Kirsty Wigglesworth/AP

Name: Edgewalkers.

Age: 11.

Appearance: In this case, blond, translucent skin, in need of fresh air.

Sounds like someone we know well. Yes, its Knightsbridge embassy cleaning staff bete noire Julian Assange.

What has he done now? The WikiLeaks founder is the subject of an epic 22,000-word New Yorker profile entitled A Man Without a Country.

No country? Way to insult your Ecuadorian hosts, Jules. I suspect they will live. The article describes a 2015 conversation between Assange and the artist George Gittoes, in which Assange talks about being an edgewalker.

I presume that means someone who takes huge risks. Such as, say, leaking emails believed widely to have been stolen by Russian intelligence services, which may have helped elect Donald Trump. Er yes. Gittoes explains: Its a Julian thing he reckons that many people think they walk on the edge, living a risky life, but an edgewalker really walks on the edge, and that he is a real edgewalker.

So, is the term an Assangism? Nope. It comes from the title of a 2006 book by Judi Neal, a management expert with a focus on spirituality in the workplace.

Is her definition the same as Assanges? Neals website says edgewalkers are those who are on the cutting edge of human evolution and who are committed to making a positive difference in the world. They use all of their human potential and integrate their intellectual, emotional, physical and spiritual energy in service to something greater than themselves.

Im sure Hillary Clinton would agree that this sounds like Assange. I think he is going by his own definition of the term.

How do I get to be an edgewalker, then? You can get different levels of coaching from Neals organisation all of which cost upwards of 2,000. It also does workshops around the world.

Ah. Maybe frequent Ecuadorian embassy visitor Pamela Anderson is in fact an expensive life coach. Well,starring in Barb Wire was certainly adangerous risk.

Do say: I would like to integrate my physical andspiritual energy in service to this mountain ofdata entry.

Dont say: Julian, play Where the Streets Have No Name!

See the original post here:
Julian Assange: software developer, whistleblower ... and 'edgewalker'? - The Guardian

Behind the Portrait: Julian Assange – The New Yorker

In 2010, Phillip Toledano photographed Julian Assange, the publisher of WikiLeaks, for Raffi Khatchadourians Profile of the man, titled No Secrets . Toledanos closeup portrait shows Assange with his chin lifted slightly, peering expectantly beyond the frame. His hair is white and his skin is pale, but there is a youthful keenness in his eyes. At the time, WikiLeaks, founded in 2006, was just a few years old. Toledano recalls Assange arriving for the picture-taking alone, with a rolling carry-on bag. When Toledano asked Assange about his apparent travel plans, he replied that he hadnt made anyyet; the bag was a precaution, in case he had to take off unexpectedly.

Two years later, Assange took asylum at the Ecuadorean Embassy in London, and he has not left since. Nadav Kander recently photographed him in a small room there, for Khatchadourians second Profile of Assange, Man Without a Country , which appears in this weeks issue of the magazine. Seen side by side, Toledano and Kanders portraits illustrate the particular wear of the life Assange has lived for the past seven years. In 2010, Khatchadourian wrote that Assange can seemwith his spectral white hair, pallid skin, cool eyes, and expansive foreheadlike a rail-thin being who has rocketed to Earth to deliver humanity some hidden truth. Since then, the legal disputes, the unending political battles, and the physical isolation seem to have rounded the edge in his gaze.

Toledano remembers Assange being quiet and amenable in the studio. The man had an air of intrigue that Toledano sought to reproduce in the photograph in post-production. After the session, he pulled the portrait up on his computer screen and started re-photographing it over and over again until the digital moir we see in the final image emerged. In the degraded photograph, streaks of color run down the right side of Assanges face in a patchy pattern; even in print, he appears to be looking through a screen.

Because of Assanges current situation, Nadav Kanders session was much less flexible than Toledanos. For most shoots, Kander prepares three separate lighting scenarios and, whether photographing on Capitol Hill or in a hotel meeting room, will work with as many as three assistants for several hours to assemble each of the setups before his subject arrives. But space and time at the Embassy in London were tight. After unloading equipment into the lobby of the building, he and his assistants presented their passports, entered through an armored door, and set to work preparing in a conference room. A large wooden table that could not be removed made the usual three-stage routine impossible. Instead, they would disassemble one scenario and then build the next over the course of the shoot. They were told they would have thirty minutes.

In Kanders portrait, we see Assange in a gray shirt buttoned to the top. His white hair is tamed save for a few loose strands; stubble is coming in on his lip and chin. In his eyes, which look directly at the camera, there are small marks of light. In the 2010 Profile, Khatchadourian describes the low-grade fever of paranoia that hangs over Assange and his colleagues. That fever has since mixed with the conditions of confinement and an expanded, altered international reputation. The sureness we see in Toledanos portrait seems to have been replaced by something less solid.

The more I pare it down, the more you really see the condition of people, Kander says, when describing his approach. His portraits rarely include environmental contexthe aims to make pictures that focus on a persons corporeal structure, his skin and bones. Hes interested in the physical facts that have been etched on the face, which he describes as the truth about that person. On set at the Embassy, he sensed that Assange, who can be particular about how his likeness is disseminated, felt safe. The allotted thirty minutes turned into two hours. If people are very controlling of their image, Kander said, you get very few frames where they drop it. But when they do, for that second . . . you can really see it.

Read more:
Behind the Portrait: Julian Assange - The New Yorker

Total Crypto Market Cap Is Greater Than Money Stored in 64 Countries Combined – The Merkle

The value of all Bitcoins in circulation has grown by quite a margin these past few years. Going from a worthless cryptocurrency to a disruptive financial force has been a powerfulexperience for everyone who has followed Bitcoin since the early days. Moreover, we have seen other popular currencies emerge as well. Amazingly, the current overall cryptocurrency market cap is greaterthan the sum of broad money in the 64 poorest countries in the world. In other words, all of cryptocurrency is worth more than one-third of the countries on this planet combined.

The people who ignored cryptocurrency over the past few years will receive a wake-up call very soon. In fact, the value of all cryptocurrencies combined has taken on such proportions that it is difficultto remember none of these currencies had any value a decadeago. In fact, most of the cryptocurrencies in circulation today did not even exist a few years ago. A lot has changed in the world of money, to say the least.

At the time of writing, the total cryptocurrency market capitalizationis nearly US$139 billion. Earlier this year, that numberwas hovering well below the US$60 billion mark. A lot of money has been poured into cryptocurrencies these past few months, and it looks like the overall bullish trend will not berelenting anytime soon. There is still a lot of volatility incryptocurrencies, but things are slowly falling into place on a global scale.

Bitcoin is still the clear market leader. Its own market cap is nearly half that of the overall cryptocurrency market at themoment, and no competitor has even come close. This also goes to show that without all of thoseother currencies, the cryptocurrency market cap would be half of what it is right now. There is a clearly defined relationship between Bitcoin and all of the alternative cryptocurrencies in existence. So far, this system seems to be working quite well, despite the challenges encountered along the way.

Looking at the bigger picture, the total cryptocurrency market cap is larger than the sum of the stock of broad money in 64 countries aroundthe world. That may not saymuch to the average person, but it means all cryptocurrencies combined are worth more than one-third of all of the countries combined right now. This is quite a milestone for this fake internet money some people so readily dismiss to this very day.

This list of 64 countries includes regions with which manyreadersmay not be familiar. There is a lot of poverty in the world today and the graphic aboveillustrates that point perfectly. Most of the countries on this list are located in Africa and Middle America, which comes as no real surprise. It also includes nationssuch as Kyrgyzstan, the Maldives, Belize, Georgia, and Barbados. These are not the biggest countries in the world, but they suffer nonetheless fromthe same old problems caused by the current financial ecosystem which need to be addressed.

As ofAugust 14, Bitcoin has surpassed the US$4,150 mark for the first time, yet this may very well be only the beginning of its full growth potential over the next few years. Other currencies such as Ethereum, Dash, Monero, and Litecoin are only just starting to shine as well. In a few years from now, we could be talking about multi-trillion dollar cryptocurrency market caps. If that were to happen, cryptocurrencies combined would easily surpass the sum of the stock of broad money in over 50% of the worlds countries, if not two-thirds.

All of this goes to show cryptocurrency should not be ignored. Even though not everyone will invest in Bitcoin or altcoins nor should theyif they havent first done their research it is a good time to start paying attention to this industry. Cryptocurrencies may not displace traditional currencies anytime soon, but they are certainly making a lot of waves right now. It will be interesting to see how this situation evolves over the comingyears.

View original post here:
Total Crypto Market Cap Is Greater Than Money Stored in 64 Countries Combined - The Merkle

US Law Labels Cryptocurrency Illicit Finance Trend – The Merkle

Cryptocurrency has always been intriguingto governments aroundthe world. This is not for their own gain, but mainly because crypto is oftenperceived as a majorthreat to theireconomic and political power. A new foreign sanctions billsigned by President Trump could spella very difficult future for cryptocurrency as a whole. Under the law, specific foreign governments are asked to monitor cryptocurrency circulation to combat terrorism and illicit financial trends.

Every time a new piece of legislation is signed and turned into law,there is reason for concern. This has beenespecially true in the world of Bitcoin and cryptocurrency as of late. The so-calledCountering Americas Adversaries Through Sanctions Actmay bring a lot of problems to the cryptocurrency world in the near future. Among other things, the law coversanti-terrorist financing and combating illicit finance trends. It also touches oncryptocurrency in its current form, which is considered an illicit finance trend.

As a result of the new law recently signed by President Trump, severalforeign governments are requiredto take actionby monitoring cryptocurrency circulation within their borders. The countries affected by this directiveare Russia, North Korea, and Iran. Two out of those three would not seem to becausing significantproblems for cryptocurrency, as neither Iran nor North Korea is particularlyactive in the Bitcoin industry.

The exception is Russia, a country which has finally shown some appreciation for cryptocurrency in recent months. With thenew lawin place, the Russian government would effectively have to crack down on cryptocurrency usage once again. Although the U.S.proposal was designed to help counter terrorist financing, there has never been any evidence of cryptocurrency beingused to successfully fund such operations. For some unknown reason, governments are still eager to connect the two topics.

It is certainly true that cryptocurrencies have created new money flows which remain largely unregulated. That is a problem for any government, even though it has become clear that regulating cryptocurrency isa futile effort. The onlything governments can do is go after the companies who facilitate such transactions, including exchanges and brokers. Even then, cryptocurrencies can still be traced in a peer-to-peer fashion without relying on centralized platforms subject to governance.

The recently passed law callsfordiscussion of trends in illicit finance including forms of value transfer such as cryptocurrencies. Additionally, it requires the collection ofdata regarding cybercrime or other threats that may be identified by the U.S. government in the future. Thisis not the first time we have seen such adirective, as a similar proposal was made by the U.S. Department of Homeland Security in May 2017.

All of this goes to show that the U.S. government is willing to attackcryptocurrency as a whole. Specifically, the countrycontinues to impose its vision onother nationswhere Bitcoin can make a big difference, such as Iran, Russia, and North Korea. Having a global currency that could remove the need for the dollar is understandably a significantconcern for the U.S. It will be interesting to see how this lawimpacts cryptocurrency in the future if at all.

See the article here:
US Law Labels Cryptocurrency Illicit Finance Trend - The Merkle

Russian cryptocurrency legislation faces delays amid Bitcoin price … – FinanceFeeds (blog)

The working group on crypto currencies at Russias State Duma monitors Bitcoin price moves and still has to establish a common stance for all parties involved in the legislative process.

There has been some serious speculation about Russias plans to legalize Bitcoin and its likes. This has been due to a large extent to comments like those made by Russias Deputy Finance Minister Alexey Moiseev, who said in April this year that Russia may recognize bitcoin and other cryptocurrencies as legal in 2018. His comments were followed by more moderate statements, including ones by the Maxim Grigoriev, Chief of the Centre for Financial Technologies at the Bank of Russia, who said it was too early to talkof legalization of crypto currencies in Russia.

The latest news concerning the coming cryptocurrency legislation in Russia are in tune with the more sceptic stance on the matter.

In an interview with online news source Invest-Foresight, Elina Sidorenko, who heads the working group on cryptocurrencies at the State Duma, the lower chamber of the Russian parliament, said the bill for regulating Bitcoin and its likes is about to get delayed.

Ms Sidorenko explained that the bill, which was originally set to be ready in October, will be ready in the winter at the earliest. She mentioned several factors for the delay the need to establish a common position for all institutions involved in the process, as well as the recent Bitcoin price fluctuations, which raise additional questions about the vulnerability of crypto currencies.

Ms Sidorenko said that at present there are discussions on whether cryptocurrencies need a new law altogether or should an existing law (or laws) be amended to cover Bitcoin and its likes. In case of the latter, there has to be consensus on which law(s) should be amended.

Another important discussion topic is the nature of crypto currencies. There is disagreement on whether they should be treated as means of payment, derivatives, digital assets, etc.

Ms Sidorenko concluded that there is a chance that the cryptocurrency legislation will be passed into a law in 2018, but added that the timing depends on market developments.

In July this year, Russias Internet ombudsman Dmitry Marinichevalso commented on the coming cryptocurrency legislation in Russia, saying that it will partially resemble that of Japan, and will also have elements of the New York DFS licensing system.

Regarding Bitcoin trading, however, he was rather sceptic, and said that although the long-term perspectives for cryptocurrencies are good, he would not recommend to Russians to participate in Bitcoin trading in the near future, as the risk of loss is too high.

Link:
Russian cryptocurrency legislation faces delays amid Bitcoin price ... - FinanceFeeds (blog)

A DNA Portrait Artist Imagined New Identities for Chelsea Manning – VICE


VICE
A DNA Portrait Artist Imagined New Identities for Chelsea Manning
VICE
What does it mean to remake one's appearance after years in the digital wilderness? Few are better placed to answer than Chelsea Elizabeth Manning, whose collaboration with DNA portraitist Heather Dewey-Hagborg mines the politics of the personal.

Follow this link:
A DNA Portrait Artist Imagined New Identities for Chelsea Manning - VICE

‘Edward is a Non-Public Person’: Why Snowden Turned Down a Russian Journalist – Sputnik International

Life

15:47 15.08.2017(updated 17:14 15.08.2017) Get short URL

World-renown NSA whistleblower Edward Snowden, who now resides in Russia, refused to let prominent Russian journalist Vladimir Pozner interview him; his lawyer Anatoly Kucherena explains why.

Earlier, Vladimir Posner told the Latvian radio station Baltkom that he'd asked Snowden foran interview butwas refused.

Lawyer Anatoly Kucherena, inan interview with RIA Novosti, explained why Edward Snowden refused the proposal.

We talked withVladimir [Pozner], he applied forthe interview several times. But Edward has a strong position onthe issue, he does not grant interviews toanybody anywhere; the Russian media is no exception, Kucherena said.

Kucherena added that Snowden respects Pozner and all Russian journalists butEdward himself is a quiet person unlikemany others inthe public spotlight.

He is non-public person, Kucherena told RIA Novosti.

REUTERS/ Svein Ove Ekornesvaag/NTB Scanpix

He [Snowden] always personally makes decision regarding giving comments. He receives a lot ofinterview proposals fromRussian and foreign journalists. But asyou may notice, he rarely gives interviews, Kucherena added.

Read the original here:
'Edward is a Non-Public Person': Why Snowden Turned Down a Russian Journalist - Sputnik International

End-to-End Encryption Isn’t Enough Security for Real People – Scientific American

The following essay is reprinted with permission fromThe Conversation, an online publication covering the latest research.

Government officials continue to seek technology companies help fighting terrorism and crime. But the most commonly proposed solution would severely limit regular peoples ability to communicate securely online. And it ignores the fact that governments have other ways to keep an electronic eye on targets of investigations.

In June, government intelligence officials from the Five Eyes Alliance nations held a meeting in Ottawa, Canada, to talk about how to convince tech companies to thwart the encryption of terrorist messaging. In July, Australian Prime Minister Malcolm Turnbull called on technology companies to voluntarily ban all systems that totally encrypt messages in transit from sender to recipient, an approach known as end-to-end encryption. British Home Secretary Amber Rudd made global headlines with her July 31 newspaper opinion piece arguing that real people dont need end-to-end encryption.

These claims completely ignore the one billion real people who already use secure messaging apps like Signal and WhatsApp. And it leaves no room for people who may decide they want that security in the future. Yet some technology companies look like they might be considering removing end-to-end encryption and others installed backdoors for government access years ago. Its been two decades since the Clipper chip was in the news, but now a revival of the government-business-consumer crypto-wars of the 1990s threatens.

One thing is very clear to computer scientists like me: We real people should work on improving security where we are most vulnerable on our own devices.

For the moment at least, we do have good, easy-to-use solutions for secure communication between computers, including end-to-end encryption of our messages. End-to-end encryption means that a message is encrypted by the sender, and decrypted by the recipient, and no third party is able to decrypt the message.

End-to-end is important, but security experts have warned for years that the most vulnerable place for your data is not during transit from place to place, but rather when its stored or displayed at one end or the other on a screen, on a disk, in memory or on some device in the cloud.

As the WikiLeaks release of CIA hacking tools highlighted, if someone can gain control of a device, they can read the messages without needing to decrypt them. And compromising endpoints both smartphones and personal computers is getting easier all the time.

Why are we most vulnerable at the endpoint? Because we dont like to be inconvenienced, and because adding more protection makes our devices harder to use, the same way putting multiple locks on a door makes it harder to get in, for both the homeowner and the burglar. Inventing new ways to protect our digital endpoints without reducing their usefulness is very challenging, but some new technologies just over the horizon might help.

Suppose a criminal organization or bad government, EvilRegime, wants to spy on you and everyone you communicate with. To protect yourself, youve installed an end-to-end encryption tool, such as Signal, for messaging. This makes eavesdropping even with a courts permission that much more difficult for EvilRegime.

But what if EvilRegime tricks you into installing spyware on your device? For example, they could swap out a legitimate upgrade of your favorite game, ClashBirds, with a compromised version. Or, EvilRegime could use a malware network investigative technique as a backdoor into your machine. With control of your endpoint, EvilRegime can read your messages as you type them, even before they are encrypted.

To guard against either type of EvilRegimes trickery, we need to improve our endpoint security game in a few key ways, making sure that:

In addition, it would be ideal if users could control their apps security themselves, rather than having to rely on app store security provided by yet another vulnerable corporation.

Computer security experts are excited about the idea that blockchain technology might be able to help us secure our own endpoints. Blockchain, the technology that underpins Bitcoin and other cryptocurrencies, creates a verifiable, unchangeable public record of information.

What this means for endpoint security is that computer scientists might be able to create blockchain-based tools to help us verify the origin of our apps. We could also use blockchains to confirm our data havent been tampered with, and to ensure our privacy. And as long as the source code for these programs is also free for us to inspect as Signal is today the security community will be able to verify that there are no secret backdoors.

As with any new technology, there is an enormous amount of hype and misinformation around blockchain and what it can do. It will take time to sift through all these ideas and develop secure tools that are easy to use. In the meantime, we all need to continue to use end-to-end encryption apps whenever possible. We should also stay vigilant about password hygiene and about what apps we install on our machines. Finally, we must demand that real people always have access to the best security mechanisms available, so we can decide for ourselves how and when to resist surveillance.

This article was originally published onThe Conversation. Read the original article.

Go here to read the rest:
End-to-End Encryption Isn't Enough Security for Real People - Scientific American

Encryption and Mindset: 2 Keys to Securing Modern Communications – No Jitter

Encryption and Mindset: 2 Keys to Securing Modern Communications As omnichannel contact centers become more pervasive, ensuring the security of these connections is extremely important.

As omnichannel contact centers become more pervasive, ensuring the security of these connections is extremely important.

You don't have to look far for proof that technology rules our society today. Just a few decades ago, for example, an organization's greatest fear may have been physical theft or robbery, but today a cybersecurity breach tops the list of the C-suite's worst nightmares -- in just about any organization in the world.

Consider the following scenario: a national credit union uses an omnichannel contact center solution for connecting with customers. As a result, it relies on this system to securely collect and store the payment card industry (PCI) data for millions of consumers. One day, cyberattackers break into the system, and the private data of millions of consumers becomes vulnerable. Clearly, today's security concerns have not only shifted in method, but also magnified in scale.

According to the Identity Theft Resource Center's (ITRC) 2016 Data Breach Report, the U.S. hit a record high for data breaches last year, with the number soaring to 1,093 -- a 40% increase from 2015. As omnichannel contact centers become more pervasive, ensuring the security of these connections is extremely important.

Keys to securing communications, especially for contact centers, are the use of network encryption and a shift in cultural mindset on what the application of communications security means.

Securing Enterprise Communications Creating an encrypted network is the first step in securing enterprise communications and contact center channels. Network encryption refers to the process of encrypting or encoding data and messages transmitted or communicated over a computer network. With modern communications solutions spreading in both popularity and usage across all industries today, organizations must prioritize efforts to make sure systems are encrypted at all levels. A deeper level of encryption is becoming necessary for all communications modalities -- whether email, video, or chat -- as well.

As both the threat and skill of hackers continue to escalate, end-to-end encryption of all data is now the new standard in enterprise communications. Evidence of this threat, and further reinforcement of the need for end-to-end encryption, is PwC's recent finding that 32% of companies surveyed have been victims of cybercrime in 2016.

Unfortunately, according to the SANS IT Security Spending Trends 2016 survey, organizations allocated only 63% of total security spending to protecting sensitive data.

Adding to the lack of spending on security, organizations continue to implement BYOD policies to increase the level of engagement for employees and consumers across organizations. However, these policies can lead to more security breaches if they are not properly supported by the network. According to the 2016 BYOD & Mobile Security Spotlight Report from Skycure (a Symantec company), 21% of organizations have traced a data breach to their BYOD programs. Even worse, another 24% have found that employee-owned devices have been connected to malicious Wi-Fi hotspots -- putting the information stored on those devices in direct harm.

Why Cultural Mindset Matters In conjunction with increasing end-to-end encryption for the rising number of connected devices today, an organization's culture (specifically surrounding contact center use) needs to center around security at every point of the interaction. As a result, a culture that places importance on security is the other key to locking up communications security. Possessing, and championing, a security-conscious cultural mindset means creating a set of shared practices when using connected devices in any organization. This becomes increasingly important as millennials make up increasing proportions of the workplace today (and in contact centers specifically).

According to data from the Bureau of Labor Statistics, millennials (those between the ages of 20 and 35) make up a good portion of the workforce in call centers, accounting for about 40%. This has led to a subsequent increase in personal device use, which in turn has translated into a surging security issue.

For example, a 2014 TrackVia survey found that 70% of millennials admitted to bringing outside applications into an enterprise setting, even in violation of IT policies. Additionally, 60% of those employees weren't concerned about the corporate security ramifications of using personal apps instead of corporate apps -- pointing to a disconnect in industry best practices and those carried out internally as the result of an organization's cultural attitude toward security and employee mindset about their impact on it.

If organizations create a cultural mindset that places security front and center, and focus more time and investment on network encryption, the future of enterprise communications will only continue to grow. Omnichannel communications is the way of the future for contact centers, and ensuring its stability and growth benefits all organizations around the globe.

Read the original post:
Encryption and Mindset: 2 Keys to Securing Modern Communications - No Jitter

Ex-MI5 Leader Advocates for Strong Encryption to Stave Off Cybersecurity Attacks – Security Intelligence (blog)

Encryption may make terrorist activity more difficult to track, but the trade-offs in improved cybersecurity protection are worth it, according to the former head of Britains MI5 service.

In a recent interview with BBC Radio 4, Jonathan Evans said that recent attacks by militants in the U.K. are not a reason to increase risks by weakening encryption systems. As cybercriminals use more sophisticated techniques to penetrate government and private sector organizations, he argued, its important to remember the variety of threats facing the public and use whatever measures necessary to ward them off. Evans was chief of the British spy operations for six years and spent 33 years with the organization before he left in 2013.

As Business Insider reported, Evans has no illusions about the dangers technology can introduce. He said that the Dark Web, where online activity is more private, has allowed child abuse, leaks of sensitive government information and other criminal activity to take place more easily. Evans also predicted that cybersecurity attacks will continue to come from a variety of places including the Internet of Things (IoT), which he suggested needs greater protection.

To some extent, The Guardian suggested, Evans comments may be in reaction to British Home Secretary Amber Rudd. She has been criticizing encryption in messaging apps as a tool to hide militant activity.

But as Reuters pointed out, Evans is not the only one who is concerned about the impact of weakened encryption on cybersecurity threats. A senior official with the U.K.s intelligence agency GCHQ, for example, suggested that law enforcement officials could work more collaboratively with technology firms who maintain communication systems. That way, officials would be able to intercept communications by malicious actors, rather than reduce the strength of the underlying systems.

In any case, Evans believes that foiling militants will take at least 30 years which means that weakening encryption could be a short-term and premature move.

See the original post:
Ex-MI5 Leader Advocates for Strong Encryption to Stave Off Cybersecurity Attacks - Security Intelligence (blog)