Any surveillance system invites both criminal appropriation and government abuse. Function creep is the most obvious abuse: New police powers, enacted to fight terrorism, are already used in situations of conventional nonterrorist crime. Internet surveillance and control will be no different.
Tag: Internet
Securosis Blog | Proposed Internet Wiretapping Law Fundamentally Incompatible with Security
To allow a communications service to decrypt messages, they will need an alternative decryption key (master key). This means that anyone with access to that key has access to the communications. No matter how well the system is architected, this provides a single point of security failure within organizations and companies that don’t have the best security track record to begin with. That’s not FUD — it’s hard technical reality.
I’m so angry all I can write is AAAAAAARRRGHHHHHH!
An Open Letter From Internet Engineers to the Senate Judiciary Committee
We can’t have a free and open Internet without a global domain name system that sits above the political concerns and objectives of any one government or industry.EFF