Skip to content
rule 11 reader
  • about
    • about me
    • mailing list
    • author page
    • rss feeds
  • reading
    • technology books
    • skills books
    • fiction books
    • philosophy & culture books
    • christian books
    • papers
    • worth reading
  • categories
    • career
      • career
      • design skills
      • communication skills
      • education
      • soft skills
      • troubleshooting skills
    • coding
    • complexity
    • culture
    • ddos
    • ipv6
    • other technologies
    • research
    • reviews
    • routing
      • bgp
      • bgp security
      • eigrp
      • is-is
      • ospf
      • mpls
      • other routing
    • security
    • standards
    • worth reading
    • content type
      • long video
      • long audio
      • short video
      • written
    • other
      • governance
      • humor
    • archive
  • the hedge
  • history
  • resources
    • my goodreads
    • my feedly
    • network icons
  • photos

Worth Reading: Encryption substitutes

Policy experts have suggested that the rise of encrypted data is not the end of intelligence collection because law enforcement can look to substitutes other sources of intelligence, such as metadata that prove to be just as valuable or more valuable than decrypting encrypted data. This paper focuses on the other side of that insight: on the substitutes available for privacy-seekers beyond encryption, such as placing one’s data in a jurisdiction that is beyond the reach of law enforcement. This framework puts encryption in context: there are many ways to keep one’s data private, just as there are many ways that the government might get access to that data. While encryption is typically treated as a stand-alone computer security issue, it is a piece of a larger debate about government access to personal data. —Andrew Keane Woods @ Scirbd

Related

← Worth Reading: The economics of port breakoutWorth Reading: The IPv4 market →

It's your turn... Cancel reply

This site uses Akismet to reduce spam. Learn how your comment data is processed.

© 2023 rule 11 reader | Powered by Beaver Builder
Scroll To Top