PC Magazine - USA (2019-11)

(Antfer) #1
In addition to being encrypted in transit, data
should also be encrypted “at rest,” meaning that
it’s secured while sitting on your device or on the
server that’s storing the data. In an ideal world,
the company providing the service handles the
encryption keys in such a way that it can’t decrypt
the data. Worth noting is that Apple checks all
these boxes with its Messages platform, making it
a paragon of privacy.

This annoys law enforcement, because it blocks
the easiest route to accessing this information. If
they intercept it, they can’t read it. If they seize
the server it’s on, they can’t read it. If they
subpoena the company for the keys and
encrypted data, they still can’t read it. Which is
exactly how it’s supposed to work.

Law enforcement has long wailed about a future
in which encrypted communications are so
common they prevent the good guys from
stopping the bad guys. This is called “going dark,”
and while the PCMag style guide does not allow
for sarcastic air quotes, I sincerely hope you read
them that way.

In Barr’s defense, he’s not the only dummkopf in
government or law enforcement to believe that
encryption is dangerous. Former FBI Director
James Comey espoused the same foolish stance
while he was in charge of the nation’s highest law-
enforcement organization. The current Director,
Christopher Wray, shares that position, as did
former Attorney General Loretta Lynch. And
WKHVHDUHMXVWWKHSHRSOH,FDQWKLQNRIR̆WKHWRS
of my head.

M

a

x

E

d

d

y

@wmaxeddy
Free download pdf