{"id":28716,"date":"2015-01-21T22:41:17","date_gmt":"2015-01-22T03:41:17","guid":{"rendered":"http:\/\/www.opensource.im\/uncategorized\/encryption-privacy-national-security-and-dr-seuss.php"},"modified":"2015-01-21T22:41:17","modified_gmt":"2015-01-22T03:41:17","slug":"encryption-privacy-national-security-and-dr-seuss","status":"publish","type":"post","link":"https:\/\/euvolution.com\/open-source-convergence\/encryption\/encryption-privacy-national-security-and-dr-seuss.php","title":{"rendered":"Encryption, Privacy, National Security, and Dr. Seuss"},"content":{"rendered":"<p><p>    Last week, U.S.President Barack Obama, standing with    British Prime Minister David Cameron, said that If we find    evidence of a terrorist plotand despite having a phone number,    despite having a social media address or e-mail address, we    cant penetrate that;thats a problem.     According to the Wall Street Journal, he then    indicated that he believes Silicon Valley companies want to    solve this problem, because Theyre patriots.  <\/p>\n<p>    An interesting statement, given that just a few months ago,    Silicon Valley companies were being criticized by U.S.    government agencies for     adding automatic encryption to smart phonesa move the    government sees as not so patriotic. The latest software    released for Android and Apple phones and pads automatically    encrypts user data, and the companies said they are not keeping    a master key, so they cant help the government get into user    data, even if they want to. Other communications and    social networking apps,     like WhatsApp, have also been rolling out automatic    encryption.  <\/p>\n<p>    So whats the story? Is Silicon Valley determined to protect    user privacy, or is it ready and willing to turn over data to    the government when asked.  <\/p>\n<p>    You could see it as a delicate dance, or as walking a fine    line. Or, you could be a little more cynical, and view it    through the eyes of the Dr. Seuss classic, The    Sneetches.  <\/p>\n<p>    I was introduced to this parable back in the 90s. The book is    typically used to teach lessons about discrimination. But    Silicon Valley venture capitalist Tim Draper had a different    interpretation in mind when he gave a copy of the book to my    husband. The intent, Draper noted, was to help my husband    understand Microsofts moves at the time. Since    then,The Sneetcheshas beena story    that I think about regularly when I watch the goings on in    business and technology today.  <\/p>\n<p>    Short synoposis: two sets of creaturesstar-bellied Sneetches    and plain-bellied Sneetcheslive in a world in which the    star-bellied Sneetches are top dogs. An entrepreneur named    Sylvester McMonkey McBean comes in with new technologyhe can    add stars to plain-bellied Sneetches, for a fee. The    plain-bellied crew all signs up, and now nobody can tell the    two groups apart. The original elite arent happy, so McBean    offers a new tech fix,at a higher fee:star removal.    This goes back and forth until the Sneetches are brokeand    McBean drives off with all the money. Only then do the two    sides work out their differences.  <\/p>\n<p>    So McBean provides the technology that givesand the    technology that takes awaysort of like a tech industry that    gives privacy protection, yet is, apparently    alsointerested in working with the government to get    around privacy protection.  <\/p>\n<p>    You can see an animated version    of the Sneetches here (or read the     text here) and think about whether its a good or bad thing    that Silicon Valley is in the position of brokering our    privacy.  <\/p>\n<p>      Advertisement    <\/p>\n<p>      IEEE Spectrums blog featuring the people, places,      and passions of the world of technologists in Silicon Valley      and its environs.      Contact us:t.perry@ieee.org    <\/p>\n<p><!-- Auto Generated --><\/p>\n<p>View original post here:<br \/>\n<a target=\"_blank\" href=\"http:\/\/spectrum.ieee.org\/view-from-the-valley\/telecom\/security\/encryption-privacy-national-security-and-dr-seuss\/RK=0\/RS=CQm.a_BJIOx6lmOjSixBDTVDihE-\" title=\"Encryption, Privacy, National Security, and Dr. Seuss\">Encryption, Privacy, National Security, and Dr. Seuss<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p> Last week, U.S.President Barack Obama, standing with British Prime Minister David Cameron, said that If we find evidence of a terrorist plotand despite having a phone number, despite having a social media address or e-mail address, we cant penetrate that;thats a problem. <\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[45],"tags":[],"class_list":["post-28716","post","type-post","status-publish","format-standard","hentry","category-encryption"],"_links":{"self":[{"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/posts\/28716"}],"collection":[{"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/comments?post=28716"}],"version-history":[{"count":0,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/posts\/28716\/revisions"}],"wp:attachment":[{"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/media?parent=28716"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/categories?post=28716"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/tags?post=28716"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}