To listen to this podcast, download the mp3 now.
Month: February 2016
In the blog post Smartphone Encryption is a Red Herring, I pointed out the folly of requiring an encryption backdoor for the Good Guys to use. So the question arises- “What can be done? If we don’t want a global encryption backdoor that can be used by anyone, can we still track the Bad Guys?”
The answer is yes. There are plenty of options that don’t require a global backdoor. I’m not passing judgment on whether these are inherently good or bad options, just that they are available when there is a reason to track a Bad Guy.
Continue reading If Smartphone Encryption Is A Red Herring, How Do We Track The Bad Guys?