Please register to participate in our discussions with 2 million other members - it's free and quick! Some forums can only be seen by registered members. After you create your account, you'll be able to customize options and access all our 15,000 new posts/day with fewer ads.
I would presume they would integrate it into a phones hardware, TPM on PC's etc. They would never be able to stop software distribution of encryption applications but they could certainly target hardware manufacturers that make it easy to use.
End result is criminals, terrorists or others engaging in illegal activity simply use software only based solutions that are not as convenient.
i'm not sure how 100% sure how mobile device encryption works... I believed it was based purely on the PIN, but perhaps they can use the PIN as a "salt" to form a passphrase for the TPM-like hardware encryption. it sure is much easier to brute force a 6 digit PIN than 2048 bit encryption.
Anyone who wants it will find a third party app, probably foreign sourced, to encrypt their stuff. And what are they going to do about foreign based services like Telegraph?
Anyone who wants it will find a third party app, probably foreign sourced, to encrypt their stuff. And what are they going to do about foreign based services like Telegraph?
i think congress thinks that encryption is just the PIN required to access the phone. while not entirely wrong, they are incorrect to think that they automatically have unfettered access to SaaS/cloud data.
i'm not sure how 100% sure how mobile device encryption works... I believed it was based purely on the PIN, but perhaps they can use the PIN as a "salt" to form a passphrase for the TPM-like hardware encryption. it sure is much easier to brute force a 6 digit PIN than 2048 bit encryption.
You can't brute force the short password/passcode, that's the point of it.
Phone, PC, they are all pretty similar. There is tamper proof chip that will do things like check hardware to make sure nothing has been changed, e.g. new motherboard. It also holds the full encryption key used to fully encrypt the data on the storage medium. when you successfully enter password/passcode it unlocks the encryption key. The short password/passcode is possible because that chip can time bar or limit attempts. After failure it can do various things like destroy the encryption key after so many failed attempts or if it detects hardware change that can affect security. In a sense it's even safer than using encryption key alone because that requires the key is accessible, e.g. USB stick sitting on your desk. There is also a recovery key issued which you would take and store anywhere, it's only for disaster recovery.
If you want an analogy we have a safe that cannot be cracked but the key weighs 100 pounds which of course is impractical to carry around. You store the huge key in a safe that has much smaller key to open it. You prevent someone from cracking your small safe by booby trapping it for failed attempts to open it, if there is X failures it destroys the larger key.
that doesn't sound very american
sounds like something another gov't from another country would do... hmm.
It does sound like something that the CCP would do and support. So I would certainly expect you to endorse such behavior. You are promoting it through this thread. So that looks like an affirmation of that.
It does sound like something that the CCP would do and support. So I would certainly expect you to endorse such behavior. You are promoting it through this thread. So that looks like an affirmation of that.
Sorry to disappoint you, but the USA is again ahead of everybody else. China doesn't have any requirement for back doors. Moreover, I just googled - their new law (as of Jan 2020) welcomes any commercial crypto systems without any backdoors/govt keys etc.
Sorry to disappoint you, but the USA is again ahead of everybody else. China doesn't have any requirement for back doors. Moreover, I just googled - their new law (as of Jan 2020) welcomes any commercial crypto systems without any backdoors/govt keys etc.
Who is democracy now?
The countries like China don't need back doors for most criminal cases.
You can crack the encryption on most anything if you have the person with the password. Guess how?
In the US if we catch the head of a large child porn operation and they have their distribution list encrypted we can't just torture them until they give up the password. (But only because it's a criminal matter and not CIA stuff...in which case we ship them to Turkey and outsource that um...process.)
Excerpt: senate attempts to push bill that requires tech companies to add backdoor to encrypted services
Response: Nothing wrong with bells and whistles......It's a simple monitoring system.
Why not....If you are not doing anything wrong you should have nothing to worry about.
For those who do....it will make them think twice about what they say or text or search......
that doesn't sound very american
sounds like something another gov't from another country would do... hmm.
Newsflash: they're already in there.
Please register to post and access all features of our very popular forum. It is free and quick. Over $68,000 in prizes has already been given out to active posters on our forum. Additional giveaways are planned.
Detailed information about all U.S. cities, counties, and zip codes on our site: City-data.com.