
Thursday, January 3, 2019
The Faces of Vietnam (Part 1)

The Faces of Vietnam (part 2)
Tuesday, January 1, 2019
Encryption that Makes Everyone Happy
[Editor's note: This is a compilation of several posts I made over the years which discusses a solution to the seemingly intractable disagreement between law enforcement and privacy advocates over the encryption of personal data. This has little to do with photography.]
I think I found a solution to the Apple vs. FBI stalemate that requires no back door, maintains strong privacy, and still provides for legimate law enforcement access when there is a warrant. What do you think of this idea?1st Post - February 18, 2016
As often happens with politicized topics, there is much ignorance and lies being spewed by all parties when it comes to the encryption vs. privacy vs. government access vs. security debate. I'm not advocating mass eavesdropping; rather I'm talking about legitimate law enforcement needs to solve murders and kidnappings in cases where a warrant has been issued. (Traditionally, warrants have been the mechanism to keep power-hungry government officials in check.)
If you've been following this subject at all in the media, you'll be hearing two major arguments:
1) "Strong encryption prevents the government from preventing terrorism, therefore manufacturers must install 'back doors' to the encryption that the government can use to eavesdrop". (This has been proven to be propaganda, as there are no demonstrated cases where not having access to an encrypted channel would have prevented anything.)
2) "We want to help law enforcement, however if such back doors were to be installed, hackers would be able to access it too, allowing no shortage of evil to take place. Plus, the NSA and other officials have demonstrated that they're not as concerned about due process when it comes to overstepping eavesdropping authority. It would be a public policy disaster and U.S. tech companies would lose international business as confidence in their security drops."
The above set of arguments is what's called a false dichotomy; it implies that these are the only two options available. Throughout this argument, nobody - not even encryption experts - has talked about existing encryption algorithms which can meet everyone's legitimate needs without necessitating a back door. It's called (m,n)-threshold encryption, and it works like this: Instead of having one key (that can both encrypt and decrypt), or two keys (one to encrypt and another to decrypt), you can encrypt anything using m of n keys, meaning you can have multiple keys floating around, and any 2 or 3 (or whatever combination you choose) of those keys can decrypt the contents. You can also configure it to have just one of the keys lock but two of any of the other keys will be required to unlock. It can be custom-tailored to meet specific use cases.
How would this work in the case of a smartphone?
-
So here I was, on my way back from Las Vegas, and I came across a run-down old building that has a certain "character". I pu...
-
Also in this issue: The Next Seminars Other Tidbits My New Favorite Travel Camera When it comes to travel photography, there was al...
-
Also in this issue: How I shot the video Copenhagen, Colorado, and California Seminars are happening! A65 / A77 book is out, and timel...