|
Encryption
Fetch Headings.ExtraData
Below are groups and resources (books, articles, websites, etc.) related to this topic. Click on an item’s title to go its resource page with author, publisher, description/abstract and other details, a link to the full text if available, as well as links to related topics in the Subject Index. You can also browse the Title, Author, Subject, Chronological, Dewey, LoC, and Format indexes, or use the Search box. Connexions LibraryThe Big Secret That Makes the FBI's Anti-Encryption Campaign a Big Lie McLaughlin, Jenna Article 2015 McLaughlin discusses how hacking techniques and their increasing use are justified in a prevalent way by the American government. FBI director wants access to encrypt Apple, Google users' data, demands law 'fix' Article 2014 The FBI director has slammed Apple and Google for offering their customers encryption technology that protects users’ privacy. "Deeply concerned" James Comey wants to push on Congress to "fix" laws to... The FBI Director's Evidence Against Encryption Is Pathetic Froomkin, Dan; Vargas-Cooper, Natasha Article 2014 FBI Director James Comey gave a speech Thursday about how cell-phone encryption could lead law enforcement to a “very dark place” where it “misses out” on crucial evidence to nail criminals. To make h... The Great SIM Heist: How Spies Stole the Keys to the Encryption Castle Scahill, Jeremy; Begley, Josh Article 2015 American and British spies hacked into the internal computer network of the largest manufacturer of SIM cards in the world, stealing encryption keys used to protect the privacy of cellphone communicat... Sending encrypted emails using Thunderbird and PGP Article 2013 There are easy ways to ensure your Internet activities remain confidential. Surveillance Self-Defense Website 2018 Modern technology has given those in power new abilities to eavesdrop and collect data on innocent people. Surveillance Self-Defense is EFF's guide to defending yourself and your friends from surveill... Ten Steps You Can Take Right Now Against Internet Surveillance O'Brien, Danny Article 2013 One of the trends we've seen is how, as the word of the NSA's spying has spread, more and more ordinary people want to know how (or if) they can defend themselves from surveillance online. With a few ... U.N. Report Asserts Encryption as a Human Right in the Digital Age Froomkin, Dan Article 2015 Encryption is not the refuge of scoundrels, as Obama administration law-enforcement officials loudly proclaim – it is an essential tool needed to protect the right of freedom of opinion and expression... Sources LibraryGoogle's upcoming Allo messaging app is 'dangerous', Edward Snowden claims Altalebi, Lamees 2016 Using Google's upcoming messaging app is "dangerous", according to Edward Snowden. In a tweet, the whistleblower advised against using Allo, the search giant’s latest app, saying: "Google's decision t... The hubris of investigators Buttar, Shahid 2016 A now-vacated hearing over whether to require Apple to undermine the security of its users prompted an ongoing controversy over government access to encrypted devices. While the court in San Bernardin... The use of encryption tools and the protection of anonymity online as safeguards for freedom of the press Kaye, David 2015 David Kaye is the UN Special Rapporteur on the promotion and protection of the right to freedom of expression. In his latest report, he stressed that governments are obligated to protect encryption to... Will Full Encryption Sideline Google's Targeted Ads? Miners, Zach 2014 Mining personal data to deliver targeted ads is the lifeblood of Google’s business—and of many other online firms. But what if that data dries up at the source? |