SlideShare a Scribd company logo
1 of 23
Download to read offline
Modern Cryptographic
Dissidence
Jason Truppi - @NotTruppi
- Supreme Court Justice William O. Douglas, 1952
The right to be let alone is indeed the beginning of all freedom.
-Whitfield Diffie, 2017
Without strong encryption, you will be spied on systematically by
lots of people.
-National Research Council
Study of US Crypto Policy, 1996
...on balance, the advantages of more widespread use of
cryptography outweigh the disadvantages.
-Senate Church Committee, 1976
...domestic intelligence activities [that] threaten to undermine our
democratic society and fundamentally alter its nature.
-Thomas Jefferson, 1791
I would rather be exposed to the inconveniences attending too
much liberty than those attending too small a degree of it.
-Louis J. Freeh, Director FBI, 1997
The looming spectre of the widespread use of robust, virtually
unbreakable encryption is one of the most difficult problems
confronting law enforcement as the next century approaches.
@NotTruppi ©2017
How Did We Get Here?
• Crypto Wars v1
• DoD’s Category XIII Munitions List
• Clipper Chip
• Netscape US-edition
• Wassenaar Arrangement
• Executive Order 13026
• Crypto reform of 2010
• App-revolution
• Going Dark
• Crypto Wars v2
@NotTruppi ©2017
What We Know?
47% Non FDE
FDE
HTTP
HTTPS
60% Non E2E
E2E
22%
@NotTruppi ©2017
What We Know?
What Are The Arguments?
• To protect and serve
• Going dark
• Lawful access to evidence
• Exceptional access to evidence
• Trusted escrow service
• LE requests are more complex
• CALEA is not modernized
Government
@NotTruppi ©2017
Going Dark?
Encryption Status of Reported Wiretaps
0
20
40
60
80
100
120
140
2012 2013 2014 2015 2016
Encryption Not Deciphered Deciphered
What Are The Arguments?
• Obligation to protect the user
• Law enforcement requests are a burden
• Government shouldn’t force software changes
• Don’t stifle innovation
• Forward secrecy is the future
Corporations
What Are The Arguments?
• Slippery slope for law enforcement methods
• Government misuse
• Backdoors will make everything unsafe
• Govt and Corp can’t grant us privacy
• Not anti-Govt
Cypherpunks
@NotTruppi ©2017
Good News Everyone…Bad News!
• Privacy is dead
• Governments are losing visibility
• State/locals will need serious help
• Backdoors to encryption don’t work
• No exceptional access policy is defined
• Big data has no legal boundaries anymore
• ”The Cloud” is advancing encryption tech
• Visual data encryption
• Internet is segmenting with data localization laws
India
China
Brazil
UK
Germany
Russia
The Future!?
@NotTruppi ©2017
What Are The Alternatives?
• Exceptional access
• Enhanced metadata collection (IoT)
• Network investigative techniques
• Better big data analytics
• HUMINT
• Better collaboration and cooperation from service providers
• Law enforcement training
• Consolidated practices for requesting data
• Reform of global legal
• Quantum computing :bwaaaahhhhh!!:
-Me
A qubit a day, keeps encryption away.
Thank you
Jason Truppi - @NotTruppi

More Related Content

What's hot

RULES OF THE GAME IN CYBERWAR
RULES OF THE GAME IN CYBERWARRULES OF THE GAME IN CYBERWAR
RULES OF THE GAME IN CYBERWARTalwant Singh
 
ICANN Contract vs National Law
ICANN Contract vs National LawICANN Contract vs National Law
ICANN Contract vs National LawBlacknight
 
Wild West or gulag: models for policing cyberspace
Wild West or gulag: models for policing cyberspaceWild West or gulag: models for policing cyberspace
Wild West or gulag: models for policing cyberspaceblogzilla
 
Dark Web Impact on Hidden Services in the Tor-based Criminal Ecosystem Dr.
Dark Web Impact on Hidden Services in the Tor-based Criminal Ecosystem Dr.Dark Web Impact on Hidden Services in the Tor-based Criminal Ecosystem Dr.
Dark Web Impact on Hidden Services in the Tor-based Criminal Ecosystem Dr.Trend Micro
 
Hackers & hacktivism
Hackers & hacktivismHackers & hacktivism
Hackers & hacktivismBilal Ali
 
Towngas Infomation Security Week 2013 presentation
Towngas Infomation Security Week 2013 presentationTowngas Infomation Security Week 2013 presentation
Towngas Infomation Security Week 2013 presentationCharles Mok
 
Cloaking Devices, CyberPersonas, and Neutral Zones
Cloaking Devices, CyberPersonas, and Neutral ZonesCloaking Devices, CyberPersonas, and Neutral Zones
Cloaking Devices, CyberPersonas, and Neutral ZonesChris Haddad
 
Regulating The Internet
Regulating The InternetRegulating The Internet
Regulating The Internetorrenprunckun
 
Policy, Media, and Power.ppt
Policy, Media, and Power.pptPolicy, Media, and Power.ppt
Policy, Media, and Power.pptJohnny Schaefer
 
Cyber Security Agenda for 45th President
Cyber Security Agenda for 45th PresidentCyber Security Agenda for 45th President
Cyber Security Agenda for 45th PresidentInternet Law Center
 
Cybersecurity and the DarkNet
Cybersecurity and the DarkNetCybersecurity and the DarkNet
Cybersecurity and the DarkNetJames Bollen
 
Cyber Crime is around us
Cyber Crime is around usCyber Crime is around us
Cyber Crime is around uslichuyuliting
 

What's hot (20)

The dark web
The dark webThe dark web
The dark web
 
RULES OF THE GAME IN CYBERWAR
RULES OF THE GAME IN CYBERWARRULES OF THE GAME IN CYBERWAR
RULES OF THE GAME IN CYBERWAR
 
ICANN Contract vs National Law
ICANN Contract vs National LawICANN Contract vs National Law
ICANN Contract vs National Law
 
The Darknet Emerges
The Darknet EmergesThe Darknet Emerges
The Darknet Emerges
 
Wild West or gulag: models for policing cyberspace
Wild West or gulag: models for policing cyberspaceWild West or gulag: models for policing cyberspace
Wild West or gulag: models for policing cyberspace
 
Dark Web Impact on Hidden Services in the Tor-based Criminal Ecosystem Dr.
Dark Web Impact on Hidden Services in the Tor-based Criminal Ecosystem Dr.Dark Web Impact on Hidden Services in the Tor-based Criminal Ecosystem Dr.
Dark Web Impact on Hidden Services in the Tor-based Criminal Ecosystem Dr.
 
Hackers & hacktivism
Hackers & hacktivismHackers & hacktivism
Hackers & hacktivism
 
Keynote - Cindy Cohn
Keynote - Cindy CohnKeynote - Cindy Cohn
Keynote - Cindy Cohn
 
CT3- STEVENS
CT3- STEVENSCT3- STEVENS
CT3- STEVENS
 
Jillian C. York
Jillian C. YorkJillian C. York
Jillian C. York
 
302 patriot
302 patriot302 patriot
302 patriot
 
Towngas Infomation Security Week 2013 presentation
Towngas Infomation Security Week 2013 presentationTowngas Infomation Security Week 2013 presentation
Towngas Infomation Security Week 2013 presentation
 
Cloaking Devices, CyberPersonas, and Neutral Zones
Cloaking Devices, CyberPersonas, and Neutral ZonesCloaking Devices, CyberPersonas, and Neutral Zones
Cloaking Devices, CyberPersonas, and Neutral Zones
 
Regulating The Internet
Regulating The InternetRegulating The Internet
Regulating The Internet
 
Policy, Media, and Power.ppt
Policy, Media, and Power.pptPolicy, Media, and Power.ppt
Policy, Media, and Power.ppt
 
The dark web
The dark webThe dark web
The dark web
 
Internet governance
Internet governanceInternet governance
Internet governance
 
Cyber Security Agenda for 45th President
Cyber Security Agenda for 45th PresidentCyber Security Agenda for 45th President
Cyber Security Agenda for 45th President
 
Cybersecurity and the DarkNet
Cybersecurity and the DarkNetCybersecurity and the DarkNet
Cybersecurity and the DarkNet
 
Cyber Crime is around us
Cyber Crime is around usCyber Crime is around us
Cyber Crime is around us
 

Similar to Modern Cryptographic Dissidence - B Sides PDX

Cybersecurity Strategies - time for the next generation
Cybersecurity Strategies - time for the next generationCybersecurity Strategies - time for the next generation
Cybersecurity Strategies - time for the next generationHinne Hettema
 
Making sense of big data
Making sense of big dataMaking sense of big data
Making sense of big databis_foresight
 
2600 v19 n4 (winter 2002)
2600 v19 n4 (winter 2002)2600 v19 n4 (winter 2002)
2600 v19 n4 (winter 2002)Felipe Prado
 
Privacy reconsidered
Privacy reconsideredPrivacy reconsidered
Privacy reconsideredBrian Rowe
 
The Great Cryptographic Divide - Enigma 2018
The Great Cryptographic Divide - Enigma 2018The Great Cryptographic Divide - Enigma 2018
The Great Cryptographic Divide - Enigma 2018Jason Truppi
 
Reining in the Data ITAG tech360 Penn State Great Valley 2015
Reining in the Data   ITAG tech360 Penn State Great Valley 2015 Reining in the Data   ITAG tech360 Penn State Great Valley 2015
Reining in the Data ITAG tech360 Penn State Great Valley 2015 Andrew Schwabe
 
Making Better Internet Policy: An Analysis of the National Information Infras...
Making Better Internet Policy: An Analysis of the National Information Infras...Making Better Internet Policy: An Analysis of the National Information Infras...
Making Better Internet Policy: An Analysis of the National Information Infras...Jeremy Pesner
 
The Post Snowden World One Year Later: What Has Changed?
The Post Snowden World One Year Later: What Has Changed?The Post Snowden World One Year Later: What Has Changed?
The Post Snowden World One Year Later: What Has Changed?Christian Dawson
 
2600 v21 n3 (autumn 2004)
2600 v21 n3 (autumn 2004)2600 v21 n3 (autumn 2004)
2600 v21 n3 (autumn 2004)Felipe Prado
 
DCB1309 - F2_Dark_Net
DCB1309 - F2_Dark_NetDCB1309 - F2_Dark_Net
DCB1309 - F2_Dark_NetPaul Elliott
 
2600 v14 n2 (summer 1997)
2600 v14 n2 (summer 1997)2600 v14 n2 (summer 1997)
2600 v14 n2 (summer 1997)Felipe Prado
 
Privacy is an Illusion and you’re all losers! - Cryptocow - Infosecurity 2013
Privacy is an Illusion and you’re all losers! - Cryptocow - Infosecurity 2013Privacy is an Illusion and you’re all losers! - Cryptocow - Infosecurity 2013
Privacy is an Illusion and you’re all losers! - Cryptocow - Infosecurity 2013Cain Ransbottyn
 
Big Data and the Future of Money 2014
Big Data and the Future of Money 2014Big Data and the Future of Money 2014
Big Data and the Future of Money 2014Daniel Austin
 
2600 v25 n1 (spring 2008)
2600 v25 n1 (spring 2008)2600 v25 n1 (spring 2008)
2600 v25 n1 (spring 2008)Felipe Prado
 
Lofty Ideals: The Nature of Clouds and Encryption
Lofty Ideals: The Nature of Clouds and EncryptionLofty Ideals: The Nature of Clouds and Encryption
Lofty Ideals: The Nature of Clouds and EncryptionSean Whalen
 
Ed Snowden: hero or villain? And the implications for media and democracy
Ed Snowden: hero or villain? And the implications for media and democracyEd Snowden: hero or villain? And the implications for media and democracy
Ed Snowden: hero or villain? And the implications for media and democracyPOLIS LSE
 
Policy primer net303 study period 3, 2017
Policy primer net303  study period 3, 2017Policy primer net303  study period 3, 2017
Policy primer net303 study period 3, 2017Steve Mckee
 
BSidesROC 2016 Keynote - Nate Cardozo - The State Of The Law
BSidesROC 2016 Keynote - Nate Cardozo - The State Of The LawBSidesROC 2016 Keynote - Nate Cardozo - The State Of The Law
BSidesROC 2016 Keynote - Nate Cardozo - The State Of The LawBSidesROC
 

Similar to Modern Cryptographic Dissidence - B Sides PDX (20)

Cybersecurity Strategies - time for the next generation
Cybersecurity Strategies - time for the next generationCybersecurity Strategies - time for the next generation
Cybersecurity Strategies - time for the next generation
 
Making sense of big data
Making sense of big dataMaking sense of big data
Making sense of big data
 
2600 v19 n4 (winter 2002)
2600 v19 n4 (winter 2002)2600 v19 n4 (winter 2002)
2600 v19 n4 (winter 2002)
 
Privacy reconsidered
Privacy reconsideredPrivacy reconsidered
Privacy reconsidered
 
The Great Cryptographic Divide - Enigma 2018
The Great Cryptographic Divide - Enigma 2018The Great Cryptographic Divide - Enigma 2018
The Great Cryptographic Divide - Enigma 2018
 
Reining in the Data ITAG tech360 Penn State Great Valley 2015
Reining in the Data   ITAG tech360 Penn State Great Valley 2015 Reining in the Data   ITAG tech360 Penn State Great Valley 2015
Reining in the Data ITAG tech360 Penn State Great Valley 2015
 
Making Better Internet Policy: An Analysis of the National Information Infras...
Making Better Internet Policy: An Analysis of the National Information Infras...Making Better Internet Policy: An Analysis of the National Information Infras...
Making Better Internet Policy: An Analysis of the National Information Infras...
 
The Post Snowden World One Year Later: What Has Changed?
The Post Snowden World One Year Later: What Has Changed?The Post Snowden World One Year Later: What Has Changed?
The Post Snowden World One Year Later: What Has Changed?
 
Sovereignty in Cyberspace
Sovereignty in CyberspaceSovereignty in Cyberspace
Sovereignty in Cyberspace
 
2600 v21 n3 (autumn 2004)
2600 v21 n3 (autumn 2004)2600 v21 n3 (autumn 2004)
2600 v21 n3 (autumn 2004)
 
DCB1309 - F2_Dark_Net
DCB1309 - F2_Dark_NetDCB1309 - F2_Dark_Net
DCB1309 - F2_Dark_Net
 
2600 v14 n2 (summer 1997)
2600 v14 n2 (summer 1997)2600 v14 n2 (summer 1997)
2600 v14 n2 (summer 1997)
 
NS Civil Liberties & Security Supplement Sept 2014
NS Civil Liberties & Security Supplement Sept 2014NS Civil Liberties & Security Supplement Sept 2014
NS Civil Liberties & Security Supplement Sept 2014
 
Privacy is an Illusion and you’re all losers! - Cryptocow - Infosecurity 2013
Privacy is an Illusion and you’re all losers! - Cryptocow - Infosecurity 2013Privacy is an Illusion and you’re all losers! - Cryptocow - Infosecurity 2013
Privacy is an Illusion and you’re all losers! - Cryptocow - Infosecurity 2013
 
Big Data and the Future of Money 2014
Big Data and the Future of Money 2014Big Data and the Future of Money 2014
Big Data and the Future of Money 2014
 
2600 v25 n1 (spring 2008)
2600 v25 n1 (spring 2008)2600 v25 n1 (spring 2008)
2600 v25 n1 (spring 2008)
 
Lofty Ideals: The Nature of Clouds and Encryption
Lofty Ideals: The Nature of Clouds and EncryptionLofty Ideals: The Nature of Clouds and Encryption
Lofty Ideals: The Nature of Clouds and Encryption
 
Ed Snowden: hero or villain? And the implications for media and democracy
Ed Snowden: hero or villain? And the implications for media and democracyEd Snowden: hero or villain? And the implications for media and democracy
Ed Snowden: hero or villain? And the implications for media and democracy
 
Policy primer net303 study period 3, 2017
Policy primer net303  study period 3, 2017Policy primer net303  study period 3, 2017
Policy primer net303 study period 3, 2017
 
BSidesROC 2016 Keynote - Nate Cardozo - The State Of The Law
BSidesROC 2016 Keynote - Nate Cardozo - The State Of The LawBSidesROC 2016 Keynote - Nate Cardozo - The State Of The Law
BSidesROC 2016 Keynote - Nate Cardozo - The State Of The Law
 

More from Jason Truppi

Encryption Basics Everyone Should Know
Encryption Basics Everyone Should KnowEncryption Basics Everyone Should Know
Encryption Basics Everyone Should KnowJason Truppi
 
Supporting The Future of the Decentralized Workforce
Supporting The Future of the Decentralized WorkforceSupporting The Future of the Decentralized Workforce
Supporting The Future of the Decentralized WorkforceJason Truppi
 
State of Security - 2017
State of Security - 2017State of Security - 2017
State of Security - 2017Jason Truppi
 
FBI Crypto Investigations
FBI Crypto InvestigationsFBI Crypto Investigations
FBI Crypto InvestigationsJason Truppi
 
Timeline of crypto hacks and government actions
Timeline of crypto hacks and government actionsTimeline of crypto hacks and government actions
Timeline of crypto hacks and government actionsJason Truppi
 
Illusions vs Reality - BSIDES SF
Illusions vs Reality - BSIDES SFIllusions vs Reality - BSIDES SF
Illusions vs Reality - BSIDES SFJason Truppi
 

More from Jason Truppi (6)

Encryption Basics Everyone Should Know
Encryption Basics Everyone Should KnowEncryption Basics Everyone Should Know
Encryption Basics Everyone Should Know
 
Supporting The Future of the Decentralized Workforce
Supporting The Future of the Decentralized WorkforceSupporting The Future of the Decentralized Workforce
Supporting The Future of the Decentralized Workforce
 
State of Security - 2017
State of Security - 2017State of Security - 2017
State of Security - 2017
 
FBI Crypto Investigations
FBI Crypto InvestigationsFBI Crypto Investigations
FBI Crypto Investigations
 
Timeline of crypto hacks and government actions
Timeline of crypto hacks and government actionsTimeline of crypto hacks and government actions
Timeline of crypto hacks and government actions
 
Illusions vs Reality - BSIDES SF
Illusions vs Reality - BSIDES SFIllusions vs Reality - BSIDES SF
Illusions vs Reality - BSIDES SF
 

Recently uploaded

SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxNavinnSomaal
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brandgvaughan
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):comworks
 
APIForce Zurich 5 April Automation LPDG
APIForce Zurich 5 April  Automation LPDGAPIForce Zurich 5 April  Automation LPDG
APIForce Zurich 5 April Automation LPDGMarianaLemus7
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticscarlostorres15106
 
My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024The Digital Insurer
 
costume and set research powerpoint presentation
costume and set research powerpoint presentationcostume and set research powerpoint presentation
costume and set research powerpoint presentationphoebematthew05
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationSlibray Presentation
 
Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clashcharlottematthew16
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 3652toLead Limited
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsMiki Katsuragi
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii SoldatenkoFwdays
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Commit University
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyAlfredo García Lavilla
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Mattias Andersson
 

Recently uploaded (20)

SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptx
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brand
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
 
APIForce Zurich 5 April Automation LPDG
APIForce Zurich 5 April  Automation LPDGAPIForce Zurich 5 April  Automation LPDG
APIForce Zurich 5 April Automation LPDG
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
 
My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024
 
costume and set research powerpoint presentation
costume and set research powerpoint presentationcostume and set research powerpoint presentation
costume and set research powerpoint presentation
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
 
Hot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort Service
Hot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort ServiceHot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort Service
Hot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort Service
 
Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clash
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering Tips
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food Manufacturing
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easy
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
 

Modern Cryptographic Dissidence - B Sides PDX

  • 2. - Supreme Court Justice William O. Douglas, 1952 The right to be let alone is indeed the beginning of all freedom.
  • 3. -Whitfield Diffie, 2017 Without strong encryption, you will be spied on systematically by lots of people.
  • 4. -National Research Council Study of US Crypto Policy, 1996 ...on balance, the advantages of more widespread use of cryptography outweigh the disadvantages.
  • 5. -Senate Church Committee, 1976 ...domestic intelligence activities [that] threaten to undermine our democratic society and fundamentally alter its nature.
  • 6. -Thomas Jefferson, 1791 I would rather be exposed to the inconveniences attending too much liberty than those attending too small a degree of it.
  • 7. -Louis J. Freeh, Director FBI, 1997 The looming spectre of the widespread use of robust, virtually unbreakable encryption is one of the most difficult problems confronting law enforcement as the next century approaches.
  • 8. @NotTruppi ©2017 How Did We Get Here? • Crypto Wars v1 • DoD’s Category XIII Munitions List • Clipper Chip • Netscape US-edition • Wassenaar Arrangement • Executive Order 13026 • Crypto reform of 2010 • App-revolution • Going Dark • Crypto Wars v2
  • 9.
  • 10. @NotTruppi ©2017 What We Know? 47% Non FDE FDE HTTP HTTPS 60% Non E2E E2E 22%
  • 12. What Are The Arguments? • To protect and serve • Going dark • Lawful access to evidence • Exceptional access to evidence • Trusted escrow service • LE requests are more complex • CALEA is not modernized Government
  • 13. @NotTruppi ©2017 Going Dark? Encryption Status of Reported Wiretaps 0 20 40 60 80 100 120 140 2012 2013 2014 2015 2016 Encryption Not Deciphered Deciphered
  • 14.
  • 15. What Are The Arguments? • Obligation to protect the user • Law enforcement requests are a burden • Government shouldn’t force software changes • Don’t stifle innovation • Forward secrecy is the future Corporations
  • 16. What Are The Arguments? • Slippery slope for law enforcement methods • Government misuse • Backdoors will make everything unsafe • Govt and Corp can’t grant us privacy • Not anti-Govt Cypherpunks
  • 17.
  • 18. @NotTruppi ©2017 Good News Everyone…Bad News! • Privacy is dead • Governments are losing visibility • State/locals will need serious help • Backdoors to encryption don’t work • No exceptional access policy is defined • Big data has no legal boundaries anymore • ”The Cloud” is advancing encryption tech • Visual data encryption • Internet is segmenting with data localization laws
  • 21. @NotTruppi ©2017 What Are The Alternatives? • Exceptional access • Enhanced metadata collection (IoT) • Network investigative techniques • Better big data analytics • HUMINT • Better collaboration and cooperation from service providers • Law enforcement training • Consolidated practices for requesting data • Reform of global legal • Quantum computing :bwaaaahhhhh!!:
  • 22. -Me A qubit a day, keeps encryption away.
  • 23. Thank you Jason Truppi - @NotTruppi