{"id":33184,"date":"2017-09-21T06:51:56","date_gmt":"2017-09-21T10:51:56","guid":{"rendered":"http:\/\/www.opensource.im\/uncategorized\/encryption-substitutes-privacy-encryption.php"},"modified":"2017-09-21T06:51:56","modified_gmt":"2017-09-21T10:51:56","slug":"encryption-substitutes-privacy-encryption","status":"publish","type":"post","link":"https:\/\/euvolution.com\/open-source-convergence\/encryption\/encryption-substitutes-privacy-encryption.php","title":{"rendered":"Encryption Substitutes | Privacy | Encryption"},"content":{"rendered":"<p><p>NationalSecurity,Technology,andLaw<\/p>\n<p>A HOOVER INSTITUTION ESSAY<\/p>\n<p>ENCRYPTION SUBSTITUTES<\/p>\n<p>ANDREW KEANE WOODS <\/p>\n<p>Aegis Paper Series No. 1705<\/p>\n<p>Introduction<\/p>\n<p>Policy experts have suggested that the rise of encrypted data is not the end of intelligence collection because law enforcement can look to substitutes<\/p>\n<\/p>\n<p>other sources of intelligence, such as metadata<\/p>\n<\/p>\n<p>that prove to be just as valuable or more valuable than decrypting encrypted data.<\/p>\n<p>1<\/p>\n<p>This paper focuses on the other side of that insight: on the substitutes available for privacy-seekers beyond encryption, such as placing ones data in a jurisdiction that is beyond the reach of law enforcement. This framework puts encryption in context: there are many ways to keep ones data private, just as there are many ways that the government might get access to that data. While encryption is typically treated as a stand-alone computer security issue, it is a piece of a larger debate about government access to personal data.<\/p>\n<p>2<\/p>\n<p>Law enforcement ofcials are, in general, agnostic about the method through which they obtain evidence<\/p>\n<\/p>\n<p>what matters is obtaining it. Privacy-seekers are similarly agnostic about how they secure their privacy<\/p>\n<\/p>\n<p>what matters is having it. This means that policymakers have a wide set of options<\/p>\n<\/p>\n<p>not only about <\/p>\n<p>whether<\/p>\n<p>to allow law enforcement to access personal data, but also <\/p>\n<p>how<\/p>\n<p>to do so. This wide set of options is not reected in the debate over encryption, which is typically framed in all-or-nothing terms. Some privacy advocates take a stance that seems to allow no room for compromise (an argument that can be boiled down to its math!<\/p>\n<p>3<\/p>\n<p>) and some government actors do the same (essentially arguing, its terrorism!<\/p>\n<p>4<\/p>\n<p>). Widening the scope of the policy discussion to include related issues<\/p>\n<\/p>\n<p>what I will call encryption substitutes<\/p>\n<\/p>\n<p>may increase the chances of compromise and may generate better policy.In this short essay, I make a few simple assumptions that bear mentioning at the outset. First, I assume that governments have good and legitimate reasons for getting access to personal data. These include things like controlling crime, ghting terrorism, and regulating territorial borders. Second, I assume that people have a right to expect privacy in their personal data. Therefore, policymakers should seek to satisfy both law enforcement and privacy concerns without unduly burdening one or the other. Of course, much of the debate over government access to data is about how to respect <\/p>\n<p><!-- Auto Generated --><\/p>\n<p>Read the rest here:<br \/>\n<a target=\"_blank\" href=\"https:\/\/www.scribd.com\/document\/354096059\/Encryption-Substitutes\" title=\"Encryption Substitutes | Privacy | Encryption\">Encryption Substitutes | Privacy | Encryption<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p> NationalSecurity,Technology,andLaw A HOOVER INSTITUTION ESSAY ENCRYPTION SUBSTITUTES ANDREW KEANE WOODS Aegis Paper Series No. 1705 Introduction Policy experts have suggested that the rise of encrypted data is not the end of intelligence collection because law enforcement can look to substitutes other sources of intelligence, such as metadata that prove to be just as valuable or more valuable than decrypting encrypted data. <\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[45],"tags":[],"class_list":["post-33184","post","type-post","status-publish","format-standard","hentry","category-encryption"],"_links":{"self":[{"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/posts\/33184"}],"collection":[{"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/comments?post=33184"}],"version-history":[{"count":0,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/posts\/33184\/revisions"}],"wp:attachment":[{"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/media?parent=33184"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/categories?post=33184"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/tags?post=33184"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}