On Tuesday, Sens. Lindsey Graham (R-S.C.), Tom Cotton (R-Ark.), and Marsha Blackburn (R-Tenn.) introduced yet another bill attempting to poke holes in data encryption, called the Lawful Access To Encrypted Data Act. This bill follows previous US efforts to weaken encryption, including March's proposed EARN IT Act and demands made by US Attorney General William Barr in his 2019 keynote address at the International Conference on Cyber Security.
There are very few things that make me distrust our Law Enforcement community more than the persistent proposal that we destroy encryption. The mathematics of cryptography is subtle and really easy to screw up in unpredictable ways. It's impossible to predict, but it's entirely possible that a backdoor that lets the Government read your email could also let them write emails. The Russians and the Chinese would have a field day with this once the secret inevitably leaks - allowing them to forge incriminating emails about politicians to undermine trust in our political system or forge bogus financial transactions to wreak havoc with the economy. Among other things.
Quite frankly, this is a glaring example of why the Swamp needs to be drained.
The tl;dr version of this blog post is this:That last point is what I was talking about. This is Congress saying that "Pi should equal 3 because reasons". Yeah, well I want a unicorn that pees 87 octane into my tank - and I really want a Congress that isn't filled to the brim with fools.
"This is a full-frontal assault on encryption and on Americans' privacy and security, just when the shift to living much of our lives online from home means we can least afford it," said Riana Pfefferkorn, associate director of surveillance and cybersecurity at the Stanford Center for Internet and Society, in an email to The Register.
"The bill unambiguously contains the long-dreaded backdoor mandate for devices and online services alike, from cloud storage to email to apps, such as end-to-end encrypted messaging apps."
Hundreds of thousands of potentially sensitive files from police departments across the United States were leaked online last week. The collection, dubbed “BlueLeaks” and made searchable online, stems from a security breach at a Texas web design and hosting company that maintains a number of state law enforcement data-sharing portals.
Imagine, if you will, that I am an idiot. Then imagine that I am also a Congressman. But alas, I repeat myself.- Mark Twain