Welcome to DU! The truly grassroots left-of-center political community where regular people, not algorithms, drive the discussions and set the standards. Join the community: Create a free account Support DU (and get rid of ads!): Become a Star Member Latest Breaking News General Discussion The DU Lounge All Forums Issue Forums Culture Forums Alliance Forums Region Forums Support Forums Help & Search

LiberalArkie

(15,719 posts)
Mon Dec 14, 2015, 07:36 PM Dec 2015

What the government should’ve learned about backdoors from the Clipper Chip


The MYK-78 "Clipper" chip, the 1990's version of the "golden key."

In the face of a Federal Bureau of Investigation proposal requesting backdoors into encrypted communications, a noted encryption expert urged Congress not to adopt the requirements due to technical faults in the plan. The shortcomings in question would allow anyone to easily defeat the measure with little technical effort.

Please note, the testimony referenced above was delivered on May 11, 1993. However, that doesn't change its applicability today. In fact, current pressure being applied by law enforcement and intelligence officials over end-to-end encrypted communications appears eerily reminiscent of a similar battle nearly 25 years ago.

Last week, FBI Director James Comey again pushed forward arguments for law enforcement "backdoors" into encrypted communication applications. Comey claimed that the gunmen who attempted to attack a Texas anti-Muslim cartoon event used encrypted communications several times on the day of the attack to contact an overseas individual tied to terrorism. The revelation is part of a renewed lobbying effort to get technology providers to provide what Comey once described as a "golden key" to access encrypted communications. Though the FBI director reluctantly dropped his lobbying efforts for such a backdoor this summer, the attacks in Paris and San Bernardino have raised the issue again. Even President Obama recently asked for technology companies to help give the government access to communications over messaging applications and social media.

The argument against backdoors, however, has not changed since 1993. Back then, Whitfield Diffie—one of the creators of the Diffie-Hellman Protocol for secure key exchange—spoke to a congressional hearing about the "Clipper Chip," an encryption chip for digital voice communications announced by the Clinton administration. His main points remain relevant:


Snip

http://arstechnica.com/information-technology/2015/12/what-the-government-shouldve-learned-about-backdoors-from-the-clipper-chip/
1 replies = new reply since forum marked as read
Highlight: NoneDon't highlight anything 5 newestHighlight 5 most recent replies
What the government should’ve learned about backdoors from the Clipper Chip (Original Post) LiberalArkie Dec 2015 OP
Plus, the banks would never, ever support it. longship Dec 2015 #1

longship

(40,416 posts)
1. Plus, the banks would never, ever support it.
Mon Dec 14, 2015, 08:36 PM
Dec 2015

All of bank communications and transactions use strong encryption.

A back door is an invitation for hacking! More than that, it is a door wide open for hacking.

Do these idiots ever think? About fucking anything?

Latest Discussions»General Discussion»What the government shoul...