The Lawful Access to Encrypted Data Act shows that politicians still don’t understand encryption

Three Senators, including the Chairman of the Senate Judiciary Committee, have introduced a new anti-encryption bill called the Lawful Access to Encrypted Data Act. The bill was introduced by Senate Judiciary Committee Chairman Senator Graham along with Senators Cotton and Blackburn – all longtime anti-encryption stance holders. The Lawful Access to Encrypted Data Act would … Continue reading “The Lawful Access to Encrypted Data Act shows that politicians still don’t understand encryption”

2

  • Jun 5, 2020
  • Glyn Moody
  • News, Open Source, Privacy, Programming, Security,

Time to embrace federated analytics – it’s no privacy panacea, but probably the closest we will get to one for many situations

A couple of weeks ago, a post on this blog explained how the OpenSAFELY project allowed trusted analysts to run large-scale computation across live pseudonymized patient records inside the data centre of the electronic health records software company. At a time when the world is grappling with the coronavirus pandemic, that’s a hugely important task, … Continue reading “Time to embrace federated analytics – it’s no privacy panacea, but probably the closest we will get to one for many situations”

0

  • Apr 8, 2020
  • Glyn Moody
  • Governments, Networking, News, Privacy, Security,

OK Zoomer: avoiding a privacy disaster in the post-coronavirus world

It would be an understatement to say that Covid-19 has affected practically every aspect of our lives, given the scale of the transformation. Its impact on privacy, too, is evident. Last week, this blog wrote about a rush by governments around the world to use smartphones to help enforce quarantines and carry out contact tracing. … Continue reading “OK Zoomer: avoiding a privacy disaster in the post-coronavirus world”

0

  • Jul 24, 2019
  • Caleb Chen
  • Governments, News, Security,

US Attorney General demands encryption backdoors at all costs and for you to just accept it

President Trump’s Attorney General, William Barr, has demanded the tech industry create encryption backdoors because he views encryption as a security risk. Barr made his illogical thoughts on encryption known to the world while speaking at an event at Fordham University earlier this morning. He decried warrant proof encryption and cited the many phones and … Continue reading “US Attorney General demands encryption backdoors at all costs and for you to just accept it”

0

  • Mar 20, 2019
  • Derek Zimmer
  • Privacy, Security, Tutorials,

Preparing for Travel – Properly Backing Up Your Android Cell Phone

When I prepare for travel, I take some steps to make sure that my protected data will not be read or otherwise mishandled by customs. I then follow-up with rigorous steps to ensure that my information and devices maintain their integrity and that I can trust them with the same degree that I did before … Continue reading “Preparing for Travel – Properly Backing Up Your Android Cell Phone”

0

  • Mar 16, 2019
  • Glyn Moody
  • Governments, News, Privacy,

Don’t be fooled: the main beneficiary of Mark Zuckerberg’s apparent embrace of privacy is Facebook, not you

Last week, you could have been forgiven for thinking that privacy had finally arrived. Mark Zuckerberg published a 3000-word essay entitled “A Privacy-Focused Vision for Social Networking“, and wrote: As I think about the future of the internet, I believe a privacy-focused communications platform will become even more important than today’s open platforms. Privacy gives … Continue reading “Don’t be fooled: the main beneficiary of Mark Zuckerberg’s apparent embrace of privacy is Facebook, not you”

0

NIST Round 2 and Post-Quantum Cryptography (part 1)

The National Institute for Standards and Technology (NIST) has announced the round 2 candidates for post-quantum cryptography. What is post quantum cryptography? Post Quantum Cryptography is encryption that can resist cracking by quantum computers. There has been a slow advance in the development of quantum computers, which are particularly good at the math that protects … Continue reading “NIST Round 2 and Post-Quantum Cryptography (part 1)”

0

  • Jan 19, 2019
  • Glyn Moody
  • News, Privacy, Programming, Security,

Deep fakes: how immutable blockchain-based life logs could combat them, and the implications for privacy

The idea of deep fakes – AI-assisted fake videos – first entered the mainstream around a year ago. After an initial burst of interest, people stopped searching for the term, although the technology behind the idea certainly hasn’t gone away. A couple of weeks ago, a video was circulating that appeared to show President Trump … Continue reading “Deep fakes: how immutable blockchain-based life logs could combat them, and the implications for privacy”

0

  • Dec 5, 2018
  • Sean Doyle
  • Encryption, General Privacy and Security, Online Activity, Tutorials,

Why Using HTTPS is so Important for Your Website

What is HTTPS? Hypertext Transfer Protocol Secure (HTTPS) is the secure version of the standard Hypertext Transfer Protocol (HTTP) originally created in 1994 for the Netscape Navigator web browser. HTTPS is extensively used to secure connection over the internet. It protects data between a website and a visitor. HTTPS is secured by a Transport Layer … Continue reading “Why Using HTTPS is so Important for Your Website”

0

Quantum Computing – Is the World of a Secure Internet Over?

The short answer: No. The long answer: Noooooooooooo. If you haven’t had a primer on what a quantum computer is or does, Kurzgesagt has a fantastic crash course introduction here: https://www.youtube.com/watch?v=JhHMJCUmq28 For over a decade now, cryptographers, security experts, and researchers have been talking about Quantum Computing and how it will impact internet security. Quantum … Continue reading “Quantum Computing – Is the World of a Secure Internet Over?”

0

  • Aug 25, 2018
  • Glyn Moody
  • Governments, News, Privacy,

Beyond the GDPR: here comes the EU’s ePrivacy regulation – but not yet

The General Data Protection Regulation (GDPR) is the most important – and controversial – privacy law passed in recent years. Despite its origin in the EU, its reach is truly global, since it affects anyone storing the personal data of EU citizens, no matter where the organization is located. In part because of a flurry … Continue reading “Beyond the GDPR: here comes the EU’s ePrivacy regulation – but not yet”

0

Coalition calls on Australia’s government to reject plans to undermine encryption

Today, a global coalition led by civil society and technology experts sent a letter asking the government of Australia to abandon plans to introduce legislation that would undermine strong encryption. The letter calls on government officials to become proponents of digital security and work collaboratively to help law enforcement adapt to the digital era. In … Continue reading “Coalition calls on Australia’s government to reject plans to undermine encryption”

0