Upgrade to Pro — share decks privately, control downloads, hide ads and more …

Encryption and Backdoors

Encryption and Backdoors

As part of my Introduction to Communication course, I presented on Encryption and why governments should not require companies to install backdoors into their software.

Tom Paulus

April 11, 2016
Tweet

More Decks by Tom Paulus

Other Decks in Technology

Transcript

  1. SUBTITLE TEXT TOM PAULUS ENCRYPTION & BACKDOORS By National Security

    Agency [Public domain], via Wikimedia Commons
  2. WHAT IS ENCRYPTION? By Unknown or not provided (U.S. National

    Archives and Records Administration) [Public domain], via Wikimedia Commons First 29 Navajo U.S. Marine Corps code-talker recruits being sworn in at Fort Wingate, NM.
  3. By Berthold Werner (Own work) [CC BY 3.0 (http://creativecommons.org/licenses/by/3.0)], via

    Wikimedia Commons Simple Encryption :: The Caesar Cipher One tablespoon listening
  4. By Berthold Werner (Own work) [CC BY 3.0 (http://creativecommons.org/licenses/by/3.0)], via

    Wikimedia Commons Simple Encryption :: The Caesar Cipher Bar gnoyrfcbba yvfgravat One tablespoon listening
  5. THE PROBLEM: By Victorgrigas (Own work) [CC BY-SA 3.0 (http://creativecommons.org/licenses/by-sa/3.0)],

    via Wikimedia Commons Major Tech Companies are encrypting more and more customer data, but government agencies are requesting massive amounts of user data.
  6. By Victorgrigas (Own work) [CC BY-SA 3.0 (http://creativecommons.org/licenses/by-sa/3.0)], via Wikimedia

    Commons “We have no idea what he said because those messages were encrypted. And to this day, I can’t tell you what those messages said with that terrorist 109 times the morning of that attack. That’s a big problem, and we have to grapple with it.” FBI Director James Comey speaking about a Terrorist attack in Garland, Texas at a Senate Judiciary Committee Meeting
  7. THE CAUSE: By Victorgrigas (Own work) [CC BY-SA 3.0 (http://creativecommons.org/licenses/by-sa/3.0)],

    via Wikimedia Commons An increasing amount of communication takes place via Computer-mediated communication, much of which is secured by the service.
  8. THE SOLUTION: By VGrigas (WMF) (Own work) [CC BY-SA 3.0

    (http://creativecommons.org/licenses/by-sa/3.0)], via Wikimedia Commons Personally Protect your information and let your lawmakers know how you feel!
  9. -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA512 This is my signed

    message to you! -----BEGIN PGP SIGNATURE----- Version: Keybase OpenPGP v2.0.53 Comment: https://keybase.io/crypto wsFcBAABCgAGBQJXCW1oAAoJEF+LBtSPgDJaCFcP/jaew0OB7sa5vKTea7mXMAzA OoHHbzm775acWAOnxl/N9CvmGnNxCSak+xYhJVVxW1jTYqWyj9Ag+W6TOwBYZbvy YAHqh9ojudoNffPzSm2rHxb28U9DHNh7OJgiSY5sb9tmETvmFVXJwIhkmwZR1/j7 3mV2/ITyJP56z+lijo29wkUmvp7J8UTQFuKJKkYNe0mkyHOK26RT+iDl9MsiO89h arj5miMADSeNVzqVkH/umXRmXHsyyVpB/xTrht/6kjeIRlxh7DThgnw1LINOOtpv KGM1Q8uAush6b9PchZJNHJNAhPlo23qLDvLu9TJyr+AIv6AhOk6hXoFPfO0uV1IJ HSwjjmUHvjZV/QvsDOxhiIYREfGmEW81iu1eRNJ4jZc36t+MYcxom66RBuVXc/sD 6mkzKFYbaKtM8emXyiG163OZ4wYUCv2wkZP4LGYpIARFJt48RYszIY/2PpLPhHr7 TlaBwRabE6NJmihKVUfaCgEb6nlGczS3sgRm/2gkpNHlWdqUiz/odalGB1PuZJnr uVYIy6t4NYNgZWntBVlJm5YaQTMlSoVa23nr7t7ZM6cCcA9axl5RT+pgMjL9a4A2 vjRo9azLHV2ZQjMCrrESJjvB4ZPf9xFckUvdasG545QelcuYkBj2ju6794Trmyjm PXBvPTbOwuwBsXKa3gaL =EPyf -----END PGP SIGNATURE-----