2015
DOI: 10.1093/cybsec/tyv009
|View full text |Cite
|
Sign up to set email alerts
|

Keys under doormats: mandating insecurity by requiring government access to all data and communications

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
75
0
4

Year Published

2016
2016
2024
2024

Publication Types

Select...
5
4

Relationship

0
9

Authors

Journals

citations
Cited by 91 publications
(79 citation statements)
references
References 4 publications
0
75
0
4
Order By: Relevance
“…The technical community, for example, has strenuously sought to make the case that common approaches to ensuring national security in a digital world may actually undermine the security of computer networks and the data that resides on them (Abelson et al 2015). Perhaps the most important point is that no actor will get all of what it wants, for the simple reason that achieving some ends (and attaining some values) can only be done at the expense of others.…”
Section: Cyber Futures and Value Tradeoffsmentioning
confidence: 99%
“…The technical community, for example, has strenuously sought to make the case that common approaches to ensuring national security in a digital world may actually undermine the security of computer networks and the data that resides on them (Abelson et al 2015). Perhaps the most important point is that no actor will get all of what it wants, for the simple reason that achieving some ends (and attaining some values) can only be done at the expense of others.…”
Section: Cyber Futures and Value Tradeoffsmentioning
confidence: 99%
“…Policymakers in general favor strong encryption with exceptional, warrant-based access while the tech community replies that the mathematics either support secure encryption without government backdoors or exceptional access with significantly less security. The combination of both secure cryptography and governmental access represents wishful thinking or the search for a magic pony solution (Abelson et al, 2015).…”
Section: Differencesmentioning
confidence: 99%
“…Studies on the crypto-wars debate tend to be either technical (see Abelson et al, 2015;Dam & Lin, 1996) or historical (Kehl et al, 2015). Empirical securitization studies, which focus on digital technologies, tend to ignore the potential material impact of discourses, as Dunn Cavelty argues (Dunn Cavelty, 2015).…”
Section: Introductionmentioning
confidence: 99%
“…Beyond these and other technical vulnerabilities, the prospect of globally-deployed exceptional access systems raises difficult problems about how such an environment would be governed and how to ensure that such systems would respect human rights and the rule of law. (Abelson et al 2015) One of the key aims of internet governance should therefore be to strengthen the technology upon which the internet depends. Governments cannot seek to create backdoors to access data if doing so would make the internet less secure.…”
Section: The Cybersecurity Negligence Of Open Societiesmentioning
confidence: 99%