{"id":26104,"date":"2014-09-19T19:45:42","date_gmt":"2014-09-19T23:45:42","guid":{"rendered":"http:\/\/www.opensource.im\/?p=26104"},"modified":"2014-09-19T19:45:42","modified_gmt":"2014-09-19T23:45:42","slug":"tim-berners-lee-has-publicly-called-for-programmers-to-develop-better-more-user-friendly-cryptography-that-way-he","status":"publish","type":"post","link":"https:\/\/euvolution.com\/open-source-convergence\/cryptography\/tim-berners-lee-has-publicly-called-for-programmers-to-develop-better-more-user-friendly-cryptography-that-way-he.php","title":{"rendered":"Tim Berners-Lee has publicly called for programmers to develop better, more user-friendly cryptography. That way, he &#8230;"},"content":{"rendered":"<p><p>    At a time of heightened national security and privacy paranoia,    Switzerland holds all the aces. Not only does it have a culture    of keeping secrets, but it is also home to a group of    physicists who appreciate the universes predilection for    privacy.  <\/p>\n<p>    Tim Berners-Lee, the man widely credited with creating the    internet during his time working at Cern, the particle physics    facility in suburban Geneva, has publicly called for    programmers to develop better, more user-friendly cryptography.    That way, hesays, we can all get back to living private    lives again.  <\/p>\n<p>    Interestingly, it is out of Cern that the best hope for the    fulfilment of that vision may arise. A gaggle of its particle    physicists became so concerned at last years revelations of    mass surveillance by the US National Security Agency (NSA) that    they decided to do something about it. The result is    ProtonMail, an email encryption service that Forbes    describes as the only email system the NSA cant access.  <\/p>\n<p>    That inaccessibility is partly because ProtonMails servers are    in Switzerland, where the law prevents government agencies from    gaining access to them. It is also partly because the servers    wont even contain decryption keys. But mostly its because    maths shows that its not hard to conceal information if you    know what youre doing.  <\/p>\n<p>    There are ways to perform reversible mathematical operations on    data that will render it indecipherable to prying eyes. As long    as you have the key  that is, you know exactly what the    mathematical operation was  you can undo the obfuscation. If    you dont have the key, there is no way to winkle out the    original data. In many ways, it is astonishing how reluctant we    are to take advantage of this. But things do seem to be    changing.  <\/p>\n<p>    ProtonMail was quickly oversubscribed  there is a waiting list    for accounts even though the system is still in its    beta-testing phase. The company has rejected offers of    investment from venture capital firms. Instead, it raised more    than $500,000 through crowdfunding.  <\/p>\n<p>    In August, ProtonMail held a hackathon at the Massachusetts    Institute of Technology. The idea was to improve security by    allowing the experts to look for weaknesses. Now, with that    exercise complete, a more secure version will be released. The    aim is to make it open-source, so that its code can be checked    and strengthened.  <\/p>\n<p>    The laws of physics actually allow researchers to go much    further than maths-based encryption. The technology known as    quantum cryptography uses a fundamental rule, one that governs    the smallest scales of the natural world, to achieve the    ultimate freedom from eavesdropping.  <\/p>\n<p>    When natures basic particle building blocks interact,in    the right circumstances, theycan become entangled.    Information encoded on entangled particles is shared between    them. In a weird twist of nature, these particles can retain a    link even when separated physically. Its almost like a    telepathic connection: reading the information on one can    affect the other in ways that allow monitoring of any    eavesdropping activity.  <\/p>\n<p>    Physicists have exploited this to create tamper-proof seals for    information encoded on photons, the particles that make up    light. The technology is not yet perfect, but its good enough    that it is starting to be used for financial transactions and    various other sensitive communications. The market leader, ID    Quantique, was developed at a fundamental physics lab based in     you guessed it  Switzerland.  <\/p>\n<p><!-- Auto Generated --><\/p>\n<p>Read the rest here:<br \/>\n<a target=\"_blank\" href=\"http:\/\/www.newstatesman.com\/sci-tech\/2014\/09\/reprivatising-internet-how-physics-helps-you-hide-spooks\/RK=0\/RS=xA3WFKzi6dM4mcmDpVc5WywkOgk-\" title=\"Tim Berners-Lee has publicly called for programmers to develop better, more user-friendly cryptography. That way, he ...\">Tim Berners-Lee has publicly called for programmers to develop better, more user-friendly cryptography. That way, he ...<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p> At a time of heightened national security and privacy paranoia, Switzerland holds all the aces. Not only does it have a culture of keeping secrets, but it is also home to a group of physicists who appreciate the universes predilection for privacy<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1600],"tags":[],"class_list":["post-26104","post","type-post","status-publish","format-standard","hentry","category-cryptography"],"_links":{"self":[{"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/posts\/26104"}],"collection":[{"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/comments?post=26104"}],"version-history":[{"count":0,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/posts\/26104\/revisions"}],"wp:attachment":[{"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/media?parent=26104"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/categories?post=26104"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/tags?post=26104"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}