Security vs Privacy: Encryption Technology After the Paris Attack

Security vs Privacy: Encryption Technology After the Paris Attack

In the wake of the Paris attack, a healthy discussion about security and privacy has been revisited and the discussion is centered on encryption technology. So what is “Encryption”? Encryption is the process of encoding a message so that only the sender and the intended recipient or recipients can read it.

Law enforcement and Intelligence officials claim, terrorist are taking advantage of the “end-to-end” encryption communication technology on iPhones and Android-based phones as well as apps like WhatsApp and iMessage to name a few. Now they are asking Silicon Valley to weaken its encryption or provide a backdoor so they can better monitor malicious activities.

The problem is, let’s say law enforcement were to provide a search warrant to Apple so they can access your email. Apple would reply stating, “Sorry, we can’t help you, we do not have access to the data, you will have to get the key from the person of interest. They are the only one that can access the information”.

They push for this level of privacy started in 2013 due to Edward Snowden revelations on how the National Security Agency (NSA) were spying and collection our information. Since then the newer operating systems on phones made by Apple and Google can’t be unlocked without the user passcode, not even by the companies themselves.

Law enforcement see this as a potential danger and are looking for legislation to change the current practices, but security and privacy professional state, even if Apple and Google could be convinced to cooperate, tech executives say there are dozens of other encrypted communication systems. Most encryption techniques are publicly known and terror organizations could build their own alternatives. Furthermore, many privacy advocates fear backdoors and encryption escrow keys can allow other countries and hackers with a vector to crack the code if it is not totally secure.

Before the Paris attack, it was nearly impossible for law enforcement and intelligence officials to talk about weaken decryption for surveillance matter due to Snowden revelations, but since then, there is a serious and open dialog about this matter.

ISIS ranking of encryption apps.

tumblr_ny16j33kyb1rm6m4mo1_500

 

 

 

 

 

 

What is your opinion? Should we give up some of our privacy in hope for better security or should we keep our privacy and maybe compromise our security?  Let me know.

2 replies

Trackbacks & Pingbacks

  1. […] Nov 22, 2015 0 2 var td_screen_width = document.body.clientWidth; if ( td_screen_width >= 1200 ) { /* large monitors */ document.write(''); (adsbygoogle = window.adsbygoogle || []).push({}); } if ( td_screen_width >= 1019 && td_screen_width < 1200 ) { /* landscape tablets */ document.write(''); (adsbygoogle = window.adsbygoogle || []).push({}); } if ( td_screen_width >= 768 && td_screen_width < 1019 ) { /* portrait tablets */ document.write(''); (adsbygoogle = window.adsbygoogle || []).push({}); } if ( td_screen_width < 768 ) { /* Phones */ document.write(''); (adsbygoogle = window.adsbygoogle || []).push({}); } This post was originally published here: post […]

  2. […] Nov 22, 2015 0 2 var td_screen_width = document.body.clientWidth; if ( td_screen_width >= 1200 ) { /* large monitors */ document.write(''); (adsbygoogle = window.adsbygoogle || []).push({}); } if ( td_screen_width >= 1019 && td_screen_width < 1200 ) { /* landscape tablets */ document.write(''); (adsbygoogle = window.adsbygoogle || []).push({}); } if ( td_screen_width >= 768 && td_screen_width < 1019 ) { /* portrait tablets */ document.write(''); (adsbygoogle = window.adsbygoogle || []).push({}); } if ( td_screen_width < 768 ) { /* Phones */ document.write(''); (adsbygoogle = window.adsbygoogle || []).push({}); } This post was originally published here: post […]

Leave a Reply

Want to join the discussion?
Feel free to contribute!

Leave a Reply

Your email address will not be published. Required fields are marked *

This site uses Akismet to reduce spam. Learn how your comment data is processed.