Encryption and Backdoors

Encryption and Backdoors

As part of my Introduction to Communication course, I presented on Encryption and why governments should not require companies to install backdoors into their software.

21c0a7a7034a6b11140bf7a44e162055?s=128

Tom Paulus

April 11, 2016
Tweet

Transcript

  1. SUBTITLE TEXT By Nickelodeon [All Rights Reserved], via Encyclopedia SpongeBob

  2. SUBTITLE TEXT TOM PAULUS ENCRYPTION & BACKDOORS By National Security

    Agency [Public domain], via Wikimedia Commons
  3. WHAT IS ENCRYPTION? By Unknown or not provided (U.S. National

    Archives and Records Administration) [Public domain], via Wikimedia Commons First 29 Navajo U.S. Marine Corps code-talker recruits being sworn in at Fort Wingate, NM.
  4. By Berthold Werner (Own work) [CC BY 3.0 (http://creativecommons.org/licenses/by/3.0)], via

    Wikimedia Commons Simple Encryption :: The Caesar Cipher
  5. By Berthold Werner (Own work) [CC BY 3.0 (http://creativecommons.org/licenses/by/3.0)], via

    Wikimedia Commons Simple Encryption :: The Caesar Cipher One tablespoon listening
  6. By Berthold Werner (Own work) [CC BY 3.0 (http://creativecommons.org/licenses/by/3.0)], via

    Wikimedia Commons Simple Encryption :: The Caesar Cipher Bar gnoyrfcbba yvfgravat One tablespoon listening
  7. THE PROBLEM: By Victorgrigas (Own work) [CC BY-SA 3.0 (http://creativecommons.org/licenses/by-sa/3.0)],

    via Wikimedia Commons Major Tech Companies are encrypting more and more customer data, but government agencies are requesting massive amounts of user data.
  8. By Victorgrigas (Own work) [CC BY-SA 3.0 (http://creativecommons.org/licenses/by-sa/3.0)], via Wikimedia

    Commons “We have no idea what he said because those messages were encrypted. And to this day, I can’t tell you what those messages said with that terrorist 109 times the morning of that attack. That’s a big problem, and we have to grapple with it.” FBI Director James Comey speaking about a Terrorist attack in Garland, Texas at a Senate Judiciary Committee Meeting
  9. THE CAUSE: By Victorgrigas (Own work) [CC BY-SA 3.0 (http://creativecommons.org/licenses/by-sa/3.0)],

    via Wikimedia Commons An increasing amount of communication takes place via Computer-mediated communication, much of which is secured by the service.
  10. THE SOLUTION: By VGrigas (WMF) (Own work) [CC BY-SA 3.0

    (http://creativecommons.org/licenses/by-sa/3.0)], via Wikimedia Commons Personally Protect your information and let your lawmakers know how you feel!
  11. -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA512 This is my signed

    message to you! -----BEGIN PGP SIGNATURE----- Version: Keybase OpenPGP v2.0.53 Comment: https://keybase.io/crypto wsFcBAABCgAGBQJXCW1oAAoJEF+LBtSPgDJaCFcP/jaew0OB7sa5vKTea7mXMAzA OoHHbzm775acWAOnxl/N9CvmGnNxCSak+xYhJVVxW1jTYqWyj9Ag+W6TOwBYZbvy YAHqh9ojudoNffPzSm2rHxb28U9DHNh7OJgiSY5sb9tmETvmFVXJwIhkmwZR1/j7 3mV2/ITyJP56z+lijo29wkUmvp7J8UTQFuKJKkYNe0mkyHOK26RT+iDl9MsiO89h arj5miMADSeNVzqVkH/umXRmXHsyyVpB/xTrht/6kjeIRlxh7DThgnw1LINOOtpv KGM1Q8uAush6b9PchZJNHJNAhPlo23qLDvLu9TJyr+AIv6AhOk6hXoFPfO0uV1IJ HSwjjmUHvjZV/QvsDOxhiIYREfGmEW81iu1eRNJ4jZc36t+MYcxom66RBuVXc/sD 6mkzKFYbaKtM8emXyiG163OZ4wYUCv2wkZP4LGYpIARFJt48RYszIY/2PpLPhHr7 TlaBwRabE6NJmihKVUfaCgEb6nlGczS3sgRm/2gkpNHlWdqUiz/odalGB1PuZJnr uVYIy6t4NYNgZWntBVlJm5YaQTMlSoVa23nr7t7ZM6cCcA9axl5RT+pgMjL9a4A2 vjRo9azLHV2ZQjMCrrESJjvB4ZPf9xFckUvdasG545QelcuYkBj2ju6794Trmyjm PXBvPTbOwuwBsXKa3gaL =EPyf -----END PGP SIGNATURE-----
  12. By Paulo Barcellos Jr. [CC BY-SA 2.0 (http://creativecommons.org/licenses/by-sa/2.0)], via Wikimedia

    Commons THANK YOU! Got Questions?
 Feel free to email me: presentations@tompaulus.com