I agree entirely. What surprises me is how resistant the public is to learning this lesson. I remember the clipper chips from the 90's being backdoored before they were even required to hit the market.
Leo, thanks so much for this - sadly - a necessary *reminder*. I recall during the Clinton '90s, this was a thing. Then I heard security podcasters (Steve Gibson, for one) talking about it maybe 18 years ago. And here, now. The simple question to ask any government authority who wants to do this is Would you consider putting a 'backdoor' in whatever top-level diplomatic and military encryption YOU use?? I bet the answer isn't hard to guess. And to 2nd Amendment fans - know that this issue is as important, if not more so. This is about privacy of thought, at the end of the day.
From what I understand about elliptic curve cryptography, the numbers or the curves that everyone uses are defined by the government, so it is entirely possible that they chose those specifically so that they have a backdoor, but they will never tell anyone about ever. Just using it to passively monitor what is happening. If they ever let it be known that they have a backdoor, the entire internet would crumble. This was discussed on the Computerphile videos about elliptic curve cryptography with Mike Pound.
Another example where criminals, will continue to use illegal encryption methods - because criminals break the law. When used as a noun, it's basically the very definition of a criminal. And the law-abiding will follow the law, because yes, they are law abiding. Accomplishing nothing except putting restraints on those who aren't criminals to begin with. "Idiocracy"
A very timely video. The Uk has just passed an Act (law) concerning access to material which contains the phrase "platform providers should use "accredited technology"" for access to ensure material is "not excessively illegal" (my paraphrase but it is that vague). The Government refuse to define this technology but it could (and probably will) mean that any end-to-end encryption used has to have a back door. This will mean two things :- 1) secure encryption will no longer exist for law abiding users in the UK for banking or confidential communications for instance and 2) secure encryption will continue to be used by those who are not law abiding anyway. This potentially puts the UK government in the same communication position as dictatorial states such as China, Russia and North Korea ... Now, how unlikely did you consider this to be? How long will it be before the rest of the Five Eyes of the "democratic, free world" follow suit?
Since a team of Chinese researchers did just claim they were able to break through RSA encryption with a quantum computer... To be fair, the parameters of their experiment are not yet applicable to anything in the real world, but it's progress. Scary progress.
TSA certified locks are junk. No master key is needed. If you breathe on one of those locks, it might open (well, not really). Stick just about any metal object into the keyhole, and it will probably turn enough for it to unlock.
Sadly the biggest nations in the world are trying to implement this. Will be become illegal to create and distribute encryption service wrapper over sms or other services like signal?
✅ Watch next ▶ What is End-to-End Encryption? ▶ ua-cam.com/video/5P_-SOjBE8E/v-deo.html
I agree entirely. What surprises me is how resistant the public is to learning this lesson. I remember the clipper chips from the 90's being backdoored before they were even required to hit the market.
I like that clip of the keyboard with the "Turbo" button on it. 0:44
Leo, thanks so much for this - sadly - a necessary *reminder*. I recall during the Clinton '90s, this was a thing. Then I heard security podcasters (Steve Gibson, for one) talking about it maybe 18 years ago. And here, now. The simple question to ask any government authority who wants to do this is Would you consider putting a 'backdoor' in whatever top-level diplomatic and military encryption YOU use?? I bet the answer isn't hard to guess. And to 2nd Amendment fans - know that this issue is as important, if not more so. This is about privacy of thought, at the end of the day.
From what I understand about elliptic curve cryptography, the numbers or the curves that everyone uses are defined by the government, so it is entirely possible that they chose those specifically so that they have a backdoor, but they will never tell anyone about ever. Just using it to passively monitor what is happening. If they ever let it be known that they have a backdoor, the entire internet would crumble.
This was discussed on the Computerphile videos about elliptic curve cryptography with Mike Pound.
Another example where criminals, will continue to use illegal encryption methods - because criminals break the law. When used as a noun, it's basically the very definition of a criminal. And the law-abiding will follow the law, because yes, they are law abiding. Accomplishing nothing except putting restraints on those who aren't criminals to begin with. "Idiocracy"
...Because hackers will ALWAYS find the backdoor if there is one.
A very timely video. The Uk has just passed an Act (law) concerning access to material which contains the phrase "platform providers should use "accredited technology"" for access to ensure material is "not excessively illegal" (my paraphrase but it is that vague). The Government refuse to define this technology but it could (and probably will) mean that any end-to-end encryption used has to have a back door. This will mean two things :- 1) secure encryption will no longer exist for law abiding users in the UK for banking or confidential communications for instance and 2) secure encryption will continue to be used by those who are not law abiding anyway. This potentially puts the UK government in the same communication position as dictatorial states such as China, Russia and North Korea ... Now, how unlikely did you consider this to be? How long will it be before the rest of the Five Eyes of the "democratic, free world" follow suit?
Since a team of Chinese researchers did just claim they were able to break through RSA encryption with a quantum computer...
To be fair, the parameters of their experiment are not yet applicable to anything in the real world, but it's progress. Scary progress.
That's why quantum resistant encryption is also being developed.
Wouldn’t that be an issue mathematically though ? Like I like my Keys in a pair just like my sugar in tea……only two
TSA certified locks are junk. No master key is needed. If you breathe on one of those locks, it might open (well, not really).
Stick just about any metal object into the keyhole, and it will probably turn enough for it to unlock.
Sadly the biggest nations in the world are trying to implement this. Will be become illegal to create and distribute encryption service wrapper over sms or other services like signal?
TSA stands for Transportation Security Administration.