CRYPTO DEBATE BIBLIOGRAPHY in Reverse Chronological Order Major

CRYPTO DEBATE BIBLIOGRAPHY in Reverse Chronological Order Major

CRYPTO DEBATE BIBLIOGRAPHY in reverse chronological order Major Announcements, Statements, General News Coverage Microsoft will encrypt Bing search traffic by default James Vincent, The Verge, June 16, 2015 ​ ​ http://www.theverge.com/2015/6/16/8788373/encrypted­search­microsoft­bing Wikipedia Is Now Using HTTPS By Default To Prevent Snooping And Censorship Kate Vinton, Forbes, June 12, 2015 ​ ​ http://www.forbes.com/sites/katevinton/2015/06/12/wikipedia­is­now­using­https­by­default­to­prevent­snoop ing­and­censorship/ If the FBI has a backdoor to Facebook or Apple encryption, we are less safe Trevor Timm, The Guardian, June 9, 2015 ​ ​ http://www.theguardian.com/commentisfree/2015/jun/09/fbi­facebook­backdoor­apple­encryption­less­safe­p rivacy With Islamic State using instant messaging apps, FBI seeks access to data Brian Bennett, The LA Times, June 8, 2015 ​ ​ http://www.latimes.com/world/middleeast/la­fg­terror­messaging­20150608­story.html#page=1 Congress on verge of major cuts to key cryptography agency Drew Mitnick, Access, June 5, 2015 ​ ​ https://www.accessnow.org/blog/2015/06/05/congress­on­verge­of­major­cuts­to­key­cryptography­agency FBI anti­terror official calls on tech firms to 'prevent encryption above all else' Alex Hern, The Guardian, June 5, 2015 ​ ​ http://www.theguardian.com/technology/2015/jun/05/fbi­anti­terror­tech­firms­encryption?CMP=twt_gu Microsoft Gives Details About Its Controversial Disk Encryption Micah Lee, The Intercept, June 4, 2015 ​ ​ https://firstlook.org/theintercept/2015/06/04/microsoft­disk­encryption/ Facebook introduces PGP encryption for sensitive emails Alex Hern, The Guardian, June 1, 2015 ​ ​ http://www.theguardian.com/technology/2015/jun/01/facebook­introduces­pgp­encryption­for­sensitive­email s Lawmakers urge FBI to stand down on decryption push Ellen Nakashima, The Washington Post, June 1, 2015 ​ ​ http://www.washingtonpost.com/blogs/post­politics/wp/2015/06/01/lawmakers­urge­fbi­to­stand­down­on­dec ryption­push/ The man behind Yahoo’s plan to become the most ‘trustworthy’ tech company Andrea Peterson, The Washington Post, May 29, 2015 ​ ​ 1 http://www.washingtonpost.com/blogs/the­switch/wp/2015/05/29/the­man­behind­yahoos­plan­to­become­th e­most­trustworthy­tech­company/ U.N. Special Rapporteur: Governments Must Not “Backdoor” Encryption For Spying Ryan Gallagher, The Intercept, May 28, 2015 ​ ​ https://firstlook.org/theintercept/2015/05/28/united­nations­encryption­anonymity­surveillance/ Today’s Internet users are still being hurt by ’90s­era U.S. encryption policies Andrea Peterson, The Washington Post, May 28, 2015 ​ ​ http://www.washingtonpost.com/blogs/the­switch/wp/2015/05/28/todays­internet­users­are­still­being­hurt­by ­90s­era­u­s­encryption­policies/ U.N. report: Encryption is important to human rights — and backdoors undermine it Andrea Peterson, The Washington Post, May 28, 2015 ​ ​ http://www.washingtonpost.com/blogs/the­switch/wp/2015/05/28/un­report­encryption­is­important­to­human ­rights­and­backdoors­undermine­it/ NSA chief: Encryption isn't bad, it's the future Steve Ranger, ZDNet, May 28, 2015 ​ ​ http://www.zdnet.com/article/nsa­chief­encryption­isnt­bad­its­the­future/ Loretta Lynch Joins Obama Administration Fearmongering Over Encryption Sam Sacks, The Intercept, May 27, 2015 ​ ​ https://firstlook.org/theintercept/2015/05/27/loretta­lynch­joins­obama­administration­fearmongering­encrypti on/ Microsoft’s Top Lawyer Says Company Must Weigh Encryption Limits Danny Yadron, The Wall Street Journal, May 27, 2015 ​ ​ http://blogs.wsj.com/digits/2015/05/27/brad­smith­suggests­microsoft­might­obey­law­that­limits­encryption/ Encryption innovator leaves US over surveillance Elise Viebeck, The Hill, May 26, 2015 ​ ​ http://thehill.com/policy/cybersecurity/243101­encryption­innovator­leaves­us­over­surveillance Is This the NSA’s Secret to Cracking Secure Comms? Nicholas Weaver, The Daily Beast, May 21, 2015 ​ ​ http://www.thedailybeast.com/articles/2015/05/21/is­this­the­nsa­s­secret­to­cracking­secure­comms.html Encryption, But With Backdoors? The FBI Has Business Running In Circles Tim Sparapani, Forbes, May 21, 2015 ​ ​ http://www.forbes.com/sites/timsparapani/2015/05/21/encryption­but­with­backdoors­the­fbi­has­business­ru nning­in­circles/ Anatomy of a LOGJAM ­ another TLS vulnerability, and what to do about it Paul Ducklin, Naked Security, May 21, 2015 ​ ​ https://nakedsecurity.sophos.com/2015/05/21/anatomy­of­a­logjam­another­tls­vulnerability­and­what­to­do­ about­it/ 2 Transcript: Comey Says Authors of Encryption Letter Are Uninformed or Not Fair­Minded Megan Graham, Just Security, May 20, 2015 ​ ​ http://justsecurity.org/23120/transcript­comey­authors­encryption­letter­uniformed­fair­minded/ FBI head found Silicon Valley encryption letter 'depressing' Corey Bennett, The Hill, May 20, 2015 ​ ​ http://thehill.com/policy/cybersecurity/242666­fbi­head­found­silicon­valley­encryption­letter­depressing HTTPS­crippling attack threatens tens of thousands of Web and mail servers Dan Goodin, ArsTechnica, May 20, 2015 ​ ​ http://arstechnica.com/security/2015/05/https­crippling­attack­threatens­tens­of­thousands­of­web­and­mail­ servers/ What You Need to Know About the New LogJam Bug Jennifer Valentino­Devries, The Wall Street Journal, May 20, 2015 ​ ​ http://blogs.wsj.com/digits/2015/05/20/what­you­need­to­know­about­the­new­logjam­bug/ Tech Giants Urge Obama to Reject Policies That Weaken Encryption Nicole Perlroth, The New York Times, May 19, 2015 ​ ​ http://www.nytimes.com/2015/05/20/technology/tech­giants­urge­obama­to­reject­policies­that­weaken­encr yption­technology.html?ref=technology&_r=0 Tech giants don’t want Obama to give police access to encrypted phone data Ellen Nakashima, The Washington Post, May 19, 2015 ​ ​ http://www.washingtonpost.com/world/national­security/as­encryption­spreads­us­worries­about­access­to­d ata­for­investigations/2015/04/10/7c1c7518­d401­11e4­a62f­ee745911a4ff_story.html Apple and Google sign letter urging Obama to support encryption Alex Hern, The Guardian, May 19, 2015 ​ ​ http://www.theguardian.com/technology/2015/may/19/apple­google­letter­president­obama­encryption­fbi­su rveillance Pretty Much Anyone With Any Understanding Of Crypto Tells President Obama That Backdooring Crypto Is Monumentally Stupid Mike Masnick, Tech Dirt, May 19, 2015 ​ ​ https://www.techdirt.com/articles/20150518/21180031044/pretty­much­anyone­with­any­understanding­crypt o­tells­president­obama­that­backdooring­crypto­is­monumentally­stupid.shtml “We Support Strong Encryption” Jonathan Mayer, Web Policy, May 12, 2015 ​ ​ http://webpolicy.org/2015/05/12/we­support­strong­encryption/ Bill would prohibit government­ordered tech ‘back doors’ Elise Viebeck, The Hill, May 5, 2015 ​ ​ http://thehill.com/policy/cybersecurity/241130­bill­would­prohibit­government­ordered­tech­back­doors Internet godfather warns about plans for technology ‘back doors’ 3 Julian Hattem, The Hill, May 4, 2015 ​ ​ http://thehill.com/policy/technology/240965­internet­godfather­warns­about­plans­for­technology­back­doors Increased encryption a double­edged sword Maria Korolov, CSO Online, May 4, 2015 ​ ​ http://www.csoonline.com/article/2917210/network­security/increased­encryption­a­double­edged­sword.htm The FBI wants us to have computer security so strong that only they can break in… John Naughton, The Guardian, May 3, 2015 ​ ​ http://www.theguardian.com/commentisfree/2015/may/03/fbi­computer­security­strong­break­in Encryption won't work if it has a back door only the 'good guys' have keys to Cory Doctorow, The Guardian, May 1, 2015 ​ ​ http://www.theguardian.com/technology/2015/may/01/encryption­wont­work­if­it­has­a­back­door­only­the­go od­guys­have­keys­to­ Mozilla goes all out for Web encryption Elise Viebeck, The Hill, May 1, 2015 ​ ​ http://thehill.com/policy/cybersecurity/240777­mozilla­goes­all­out­for­web­encryption Irate Congressman gives cops easy rule: “just follow the damn Constitution” Cyrus Farivar, Ars Technica, April 30, 2015 ​ ​ http://arstechnica.com/tech­policy/2015/04/irate­congressman­gives­cops­easy­rule­just­follow­the­damn­co nstitution/ InfoSec pros reject DHS criticisms of encryption Maria Korolov, CSO Online, April 30, 2015 ​ ​ http://www.csoonline.com/article/2916820/data­protection/infosec­pros­reject­dhs­criticisms­of­encryption.ht ml Feds are using fear, not facts, in anti­encryption crusade Joshua Kopstein, Al Jazeera America, April 30, 2015 ​ ​ http://america.aljazeera.com/opinions/2015/4/feds­are­using­fear­not­facts­in­anti­encryption­crusade.html Congressman with computer science degree: Encryption back­doors are ‘technologically stupid’ Andrea Peterson, The Washington Post, April 30, 2915 ​ ​ http://www.washingtonpost.com/blogs/the­switch/wp/2015/04/30/congressman­with­computer­science­degre e­encryption­back­doors­are­technologically­stupid/ Lawmakers Challenge FBI On Surveillance Backdoors, Encryption Hamza Shaban, Buzzfeed News, April 30, 2015 ​ ​ http://www.buzzfeed.com/hamzashaban/lawmakers­challenge­fbi­on­surveillance­backdoors­encryption#.qe 1aQ1xv6M Both sides of data encryption debate face off in Congress Joe Uchill, The Christian Science Monitor, April 30, 2015 ​ ​ http://www.csmonitor.com/World/Passcode/2015/0430/Both­sides­of­data­encryption­debate­face­off­in­Con gress 4 Lawmakers skeptical of FBI's encryption warnings Cory Bennet, The Hill, April 29, 2015 ​ ​ http://thehill.com/policy/cybersecurity/240553­lawmakers­skeptical­of­fbis­encryption­breaking­request Representatives question FBI and point out fallacies

View Full Text

Details

  • File Type
    pdf
  • Upload Time
    -
  • Content Languages
    English
  • Upload User
    Anonymous/Not logged-in
  • File Pages
    17 Page
  • File Size
    -

Download

Channel Download Status
Express Download Enable

Copyright

We respect the copyrights and intellectual property rights of all users. All uploaded documents are either original works of the uploader or authorized works of the rightful owners.

  • Not to be reproduced or distributed without explicit permission.
  • Not used for commercial purposes outside of approved use cases.
  • Not used to infringe on the rights of the original creators.
  • If you believe any content infringes your copyright, please contact us immediately.

Support

For help with questions, suggestions, or problems, please contact us