encryption   39977

« earlier    

Encryption Workarounds by Orin S. Kerr, Bruce Schneier :: SSRN
The widespread use of encryption has triggered a new step in many criminal investigations: The encryption workaround. We define an encryption workaround as any lawful government effort to reveal unencrypted plaintext of a target’s data that has been concealed by encryption. This Article provides an overview of encryption workarounds. It begins with a taxonomy of the different ways investigators might try to bypass encryption schemes. We classify six kinds of workarounds: find the key, guess the key, compel the key, exploit a flaw in the encryption software, access plaintext while the device is in use, and locate another plaintext copy. For each approach, we consider the practical, technological, and legal hurdles raised by its use.

The remainder of this Article develops lessons about encryption workarounds and the broader public debate about encryption in criminal investigations. First, encryption workarounds are inherently probabilistic. None work every time, and none can be categorically ruled out every time. Second, the different resources required for different workarounds will have significant distributional effects on law enforcement. Some techniques are inexpensive and can be used often by many law enforcement agencies; some are sophisticated or expensive and likely to be used rarely and only by a few. Third, the scope of legal authority to compel third-party assistance will be a continuing challenge. And fourth, the law governing encryption workarounds remains uncertain and underdeveloped. Whether encryption will be a game changer or a speed bump depends on both technological change and the resolution of important legal questions that currently remain unanswered.
encryption  cryptography 
16 hours ago by Chirael
Open Quantum Safe
Open-source software for prototyping quantum-resistant cryptography
a way to jimmy quantum computing proof crypto into openssl, in case you'd ever want such a weird thing.
post-quatum  OpenSSL  encryption  PQE  programming  algorithm  library 
21 hours ago by pjjw
Mailvelope can be installed from the Chrome Web Store.
chrome  email  encryption  gmail 
2 days ago by danesparza

« earlier    

related tags

2018  4*  administration  adoption  aidence  algorithm  amazon  analysis  android  anonymity  apache  app  apple  application  apps  arch  architecture  auth  aws  aws_security  b2  backup  backups  blog-posts  browser  certificate  chat  chrome  cipher  cli  cloud  cloudflare  collaboration  compiling_instructions  configuration  consultant  copyright  cpu  credentials  cryfs  crypto  cryptography  cyber_security  cyber_warfare  cybersecurity  data  database  datamasking  defensive_tactics  development  devops  dns  e2e  ec2  ecosystem  ed25519  education  eff  email  enclavedb  encryptpad  env  espionage  excel  exchange  extension  file  firefox  floss  forward  foss  free  gdpr  gist  git  github  gke  gmail  gnugp  gnupg  golang  gpg  guide  hardware  henry_kissinger  history  howto  http  hyperthreading  im  information  infosec  instant-messaging  intel  interesting  internet  ios  ipsec  ipv6  java  js  juliaevans  key  keymanagement  kms  kubernetes  lang:en  lang:fr  language  learning  let  lets-encrypt  letsencrypt  library  linux  localhost  longreads  luks  mac  macos  mail  management  masking  mathematics  messaging  michael_hayden  microsoft  minio  mobilemessaging  mutt  national_strategies  network  networking  node.js  northkorea  note  notepad  notes  notetaking  nsa  offensive_tactics  offsite  open-source  openbsd  opensource  openssl  operating-system  opsec  osx  password  performance  pgp  philosophy  php  pki  portables  post-quatum  postgresql  pqe  privacy  programming  python  qrcode  quantum_computing  raspberrypi  reference  riseup  rpki  russia  rust  s3  secrecy  secrets  security  security_&_intelligence  service  settings  signing  simple  software  spreadsheet  spring.crypto  spring  spy  spying  ssh  ssl  standards  starttls  steganography  storage  sync  tcp.ip  technology  tee  telegram  terminal  terraform  text  text_editor  tlb  tls  tools  tor  transparency  truecrypt  tunnel  tutorial  type:application  ubuntu  utilities  vault  veracrypt  verification  vernam  vpn  web  webcrypto  webdev  wifi  windows  wisdom  wpa2  wpa3  yubikey 

Copy this bookmark: