To listen to this podcast, download the mp3 now.
Month: February 2016
How do you format and organize your code? I’m here to tell you that your way is wrong and my way is right 🙂
In the blog post Smartphone Encryption is a Red Herring, I pointed out the folly of requiring an encryption backdoor for the Good Guys to use. So the question arises- “What can be done? If we don’t want a global encryption backdoor that can be used by anyone, can we still track the Bad Guys?”
The answer is yes. There are plenty of options that don’t require a global backdoor. I’m not passing judgment on whether these are inherently good or bad options, just that they are available when there is a reason to track a Bad Guy.