The Spyware That Brought Down El Chapo’s Drug Empire

For months, the FBI listened as Mexico’s infamous drug kingpin allegedly trafficked drugs and arranged assassinations. Here’s how.

Source: The Spyware That Brought Down El Chapo’s Drug Empire

Advertisements

Give Up the Ghost: A Backdoor by Another Name

We must reject GCHQ’s newest “ghost” proposal for what it is: a mandated encryption backdoor that weakens the security properties of encrypted messaging systems and fundamentally compromises user trust. By EFF’s Nate Cardozo

Source: Give Up the Ghost: A Backdoor by Another Name

Are defense contractors investing enough in quantum computing?

Quantum computing is set to make existing forms of cybersecurity obsolete, but the coming revolution has not jolted researchers and defense firms to fully invest in the technology,

Source: Are defense contractors investing enough in quantum computing?

Exceptional Access: The Devil is in the Details

Landau is trying to be both nice and say the crocodile clip method is not different than what she has consistently opposed. Encryption without ironclad sender/recipient authentication (introducing unauthorized endpoint access, necessarily unlimited by design) creates an even worse vulnerable architecture than the man in the middle method.

A response to Ian Levy and Crispin Robinson’s principles for debate on exceptional access and proposal for conducting such access.

Source: Exceptional Access: The Devil is in the Details

A Roadmap for Exceptional Access Research

Rather than continuing to politicize encryption, instead the lessons learned from the decades-long crypto policy debate should be used to inform the process of developing Exceptional Access

Source: A Roadmap for Exceptional Access Research

The Race Is On to Protect Data From the Next Leap in Computers. And China Has the Lead.

China is investing in quantum encryption that could be far tougher to crack than today’s security methods. Now the United States is trying to catch up.

Source: The Race Is On to Protect Data From the Next Leap in Computers. And China Has the Lead.

Resisting Law Enforcement’s Siren Song: A Call for Cryptographers to

The security community should its time and talents making the digital world safer rather than demolishing what trust and security still remain in our technology, our devices, and our infrastructure.

Source: Resisting Law Enforcement’s Siren Song: A Call for Cryptographers to