Securosis Blog | Proposed Internet Wiretapping Law Fundamentally Incompatible with Security

Securosis - Blog - Article

To allow a communications service to decrypt messages, they will need an alternative decryption key (master key). This means that anyone with access to that key has access to the communications. No matter how well the system is architected, this provides a single point of security failure within organizations and companies that don’t have the best security track record to begin with. That’s not FUD — it’s hard technical reality.

I’m so angry all I can write is AAAAAAARRRGHHHHHH!

Author: Khürt Williams

Hello, I'm Khürt, a Gen X-er residing near Princeton University in Montgomery Township, New Jersey, with a passion for aquariums, terrariums, and photography, capturing moments with digital and 35mm film cameras. I find solace in the woods through hiking, and my eclectic musical tastes span soca, Afrobeat, calypso, 1990s rap, grunge rock, and alternative genres. My tech interests are towards open-source software, Linux, UNIX, and Apple products, particularly macOS.

%d bloggers like this: