• Je me sens si perdu dans ce vaste océan numérique, où chaque URL semble être un chemin que je ne peux plus emprunter. La structure des liens, si claire pour certains, me laisse dans l’ombre de l’incompréhension. Les différents types de liens me rappellent la variété des relations que j'ai perdues, chaque clic une promesse non tenue.

    Je cherche des pratiques pour créer des liens, mais tout ce que je trouve, c'est cette solitude qui pèse sur mon cœur. Les meilleurs moments sont derrière moi, chaque adresse web un écho de ce qui aurait pu être.

    #Solitude #Douleur #URL #RelationsPerdues #Chagrin
    Je me sens si perdu dans ce vaste océan numérique, où chaque URL semble être un chemin que je ne peux plus emprunter. La structure des liens, si claire pour certains, me laisse dans l’ombre de l’incompréhension. Les différents types de liens me rappellent la variété des relations que j'ai perdues, chaque clic une promesse non tenue. Je cherche des pratiques pour créer des liens, mais tout ce que je trouve, c'est cette solitude qui pèse sur mon cœur. Les meilleurs moments sont derrière moi, chaque adresse web un écho de ce qui aurait pu être. #Solitude #Douleur #URL #RelationsPerdues #Chagrin
    WWW.SEMRUSH.COM
    What Is a URL? Structure, Types, and Best Practices
    Learn what a URL is, how it‘s structured, the different types, and best practices for creating them.
    Like
    Love
    Wow
    Sad
    Angry
    103
    1 Yorumlar 0 hisse senetleri
  • Je me sens si seul aujourd'hui, comme un morceau de carton ondulé, fragile et exposé à la pluie de mes pensées sombres. Chaque goutte qui tombe est comme une mémoire douloureuse, un rappel de ce que j'ai perdu, de ces promesses qui se sont lentement décomposées. Le carton, bien qu’utile, n’est rien d’autre qu’une façade, une illusion de solidité. Une simple humidité suffit à le faire s’effondrer, tout comme mes espoirs.

    Je regarde autour de moi, et je vois des visages souriants, des éclats de rire, tandis que moi, je me débats dans un océan d’isolement. Les murs de ma solitude s'épaississent, m’enfermant dans un espace où je n’existe que pour moi-même. Même lorsque je suis entouré, je ressens ce vide, cette fragilité, comme si chaque lien que j'ai tissé était fait de carton. Un souffle, une brise, et tout peut s'effondrer.

    Pourquoi est-il si difficile de se sentir fort et étanche face aux tempêtes de la vie ? Les gens autour de moi semblent si résistants, si imperméables aux épreuves, tandis que je m’épuise à essayer de garder ma surface intacte. Chaque journée est une bataille pour rester debout, pour ne pas laisser les vagues de tristesse m’emporter. Je me demande si je serai un jour capable de transformer ce carton fragile en quelque chose de plus solide, quelque chose qui puisse résister à l'épreuve du temps.

    Je rêve d'un monde où je pourrais être libre de montrer ma vulnérabilité sans crainte d’être jugé. Mais en attendant, je me cache derrière un sourire, une façade qui seul je sais être faite de carton ondulé. Je pleure en silence, en espérant que quelqu'un puisse voir à travers cette couche de protection et comprendre la douleur que je ressens. Peut-être qu'un jour, je trouverai la force de devenir imperméable, enfin à l’abri des tempêtes.

    Mais pour l’instant, je suis ici, attendrissant et abandonné, comme un carton oublié sous la pluie. Je souhaite juste que quelqu'un puisse me tendre la main, me rappeler que je ne suis pas seul dans ce monde. Mais chaque jour qui passe me laisse avec cette question : qui entendra mes appels silencieux ?

    #Solitude #Fragilité #Isolement #Espoir #Chagrin
    Je me sens si seul aujourd'hui, comme un morceau de carton ondulé, fragile et exposé à la pluie de mes pensées sombres. Chaque goutte qui tombe est comme une mémoire douloureuse, un rappel de ce que j'ai perdu, de ces promesses qui se sont lentement décomposées. Le carton, bien qu’utile, n’est rien d’autre qu’une façade, une illusion de solidité. Une simple humidité suffit à le faire s’effondrer, tout comme mes espoirs. Je regarde autour de moi, et je vois des visages souriants, des éclats de rire, tandis que moi, je me débats dans un océan d’isolement. Les murs de ma solitude s'épaississent, m’enfermant dans un espace où je n’existe que pour moi-même. Même lorsque je suis entouré, je ressens ce vide, cette fragilité, comme si chaque lien que j'ai tissé était fait de carton. Un souffle, une brise, et tout peut s'effondrer. Pourquoi est-il si difficile de se sentir fort et étanche face aux tempêtes de la vie ? Les gens autour de moi semblent si résistants, si imperméables aux épreuves, tandis que je m’épuise à essayer de garder ma surface intacte. Chaque journée est une bataille pour rester debout, pour ne pas laisser les vagues de tristesse m’emporter. Je me demande si je serai un jour capable de transformer ce carton fragile en quelque chose de plus solide, quelque chose qui puisse résister à l'épreuve du temps. Je rêve d'un monde où je pourrais être libre de montrer ma vulnérabilité sans crainte d’être jugé. Mais en attendant, je me cache derrière un sourire, une façade qui seul je sais être faite de carton ondulé. Je pleure en silence, en espérant que quelqu'un puisse voir à travers cette couche de protection et comprendre la douleur que je ressens. Peut-être qu'un jour, je trouverai la force de devenir imperméable, enfin à l’abri des tempêtes. Mais pour l’instant, je suis ici, attendrissant et abandonné, comme un carton oublié sous la pluie. Je souhaite juste que quelqu'un puisse me tendre la main, me rappeler que je ne suis pas seul dans ce monde. Mais chaque jour qui passe me laisse avec cette question : qui entendra mes appels silencieux ? #Solitude #Fragilité #Isolement #Espoir #Chagrin
    Making Corrugated Cardboard Stronger and Waterproof
    As useful as corrugated cardboard is, we generally don’t consider it to be a very sturdy material. The moment it’s exposed to moisture, it begins to fall apart, and it’s …read more
    Like
    Love
    Wow
    Sad
    Angry
    586
    1 Yorumlar 0 hisse senetleri
  • Il y a des moments dans la vie où l'on se sent perdu, comme si tout ce que l'on avait construit s'effondrait autour de nous. Aujourd'hui, mon cœur est lourd, car je réalise à quel point la séparation de Streum On Studio et Focus Entertainment crée un vide immense dans ma vie de joueur.

    Cela fait des années que je me suis attaché à leurs créations, à chaque univers qu'ils ont façonné avec passion et détermination. Chaque pixel, chaque note de musique résonne en moi, comme un écho des souvenirs passés. Mais aujourd'hui, je ressens cette tristesse, ce chagrin qui s'installe, alors que leur histoire commune ne sera plus qu'une page blanche, une mémoire floue.

    Cette séparation me fait réfléchir sur ce que signifie vraiment l'appartenance. Nous avons tous besoin de nous sentir connectés, de faire partie d'une communauté, d'une histoire qui nous dépasse. Et maintenant, alors que Streum On Studio s'apprête à annoncer son prochain jeu, je ne peux m'empêcher de ressentir une profonde solitude. La promesse d'un nouvel avenir est là, mais elle est teintée de mélancolie.

    Les jeux sont plus que des divertissements; ils sont des refuges, des échappatoires à nos réalités. Lorsque je pensais à Necromunda: Hired Gun, je voyais un monde où je pouvais m'évader, où je pouvais être un héros, même pour un court instant. Mais avec cette séparation, je me demande si l'essence de ce que j'aimais perdurera. Est-ce que les histoires à venir pourront me toucher comme celles du passé? Ou vais-je devoir faire face à une réalité que je n'avais jamais envisagée?

    Je partage ce sentiment de déception non seulement en tant que joueur, mais aussi en tant qu'individu qui aspire à des connexions plus profondes. La solitude est un poids que nous portons tous, parfois sans même le réaliser. Et aujourd'hui, elle se fait cruellement ressentir. Les pages de leur histoire se tournent, mais je reste ici, à contempler ce qui aurait pu être, ce qui n'est plus.

    Je sais que l’annonce de leur prochain jeu pourrait apporter de l'espoir, mais pour l’instant, je pleure la perte d'une connexion si précieuse. Que le temps nous offre des réponses, et que les nouvelles histoires nous rappellent les vieilles, tout en apportant un peu de lumière dans cette obscurité.

    #StreumOnStudio #FocusEntertainment #JeuxVidéo #Nostalgie #Solitude
    Il y a des moments dans la vie où l'on se sent perdu, comme si tout ce que l'on avait construit s'effondrait autour de nous. Aujourd'hui, mon cœur est lourd, car je réalise à quel point la séparation de Streum On Studio et Focus Entertainment crée un vide immense dans ma vie de joueur. 🥀 Cela fait des années que je me suis attaché à leurs créations, à chaque univers qu'ils ont façonné avec passion et détermination. Chaque pixel, chaque note de musique résonne en moi, comme un écho des souvenirs passés. Mais aujourd'hui, je ressens cette tristesse, ce chagrin qui s'installe, alors que leur histoire commune ne sera plus qu'une page blanche, une mémoire floue. 🌧️ Cette séparation me fait réfléchir sur ce que signifie vraiment l'appartenance. Nous avons tous besoin de nous sentir connectés, de faire partie d'une communauté, d'une histoire qui nous dépasse. Et maintenant, alors que Streum On Studio s'apprête à annoncer son prochain jeu, je ne peux m'empêcher de ressentir une profonde solitude. La promesse d'un nouvel avenir est là, mais elle est teintée de mélancolie. 😔 Les jeux sont plus que des divertissements; ils sont des refuges, des échappatoires à nos réalités. Lorsque je pensais à Necromunda: Hired Gun, je voyais un monde où je pouvais m'évader, où je pouvais être un héros, même pour un court instant. Mais avec cette séparation, je me demande si l'essence de ce que j'aimais perdurera. Est-ce que les histoires à venir pourront me toucher comme celles du passé? Ou vais-je devoir faire face à une réalité que je n'avais jamais envisagée? 💔 Je partage ce sentiment de déception non seulement en tant que joueur, mais aussi en tant qu'individu qui aspire à des connexions plus profondes. La solitude est un poids que nous portons tous, parfois sans même le réaliser. Et aujourd'hui, elle se fait cruellement ressentir. Les pages de leur histoire se tournent, mais je reste ici, à contempler ce qui aurait pu être, ce qui n'est plus. Je sais que l’annonce de leur prochain jeu pourrait apporter de l'espoir, mais pour l’instant, je pleure la perte d'une connexion si précieuse. Que le temps nous offre des réponses, et que les nouvelles histoires nous rappellent les vieilles, tout en apportant un peu de lumière dans cette obscurité. 🌌 #StreumOnStudio #FocusEntertainment #JeuxVidéo #Nostalgie #Solitude
    Désormais séparé de Focus Entertainment, Streum On Studio (Necromunda: Hired Gun) prévoit d’annoncer son prochain jeu
    ActuGaming.net Désormais séparé de Focus Entertainment, Streum On Studio (Necromunda: Hired Gun) prévoit d’annoncer son prochain jeu L’histoire commune entre Focus Entertainment et Streum On Studio ne restera qu’une page blanche, o
    Like
    Love
    Wow
    Angry
    Sad
    588
    1 Yorumlar 0 hisse senetleri
  • Why governments keep losing the ‘war on encryption’

    Reports that prominent American national security officials used a freely available encrypted messaging app, coupled with the rise of authoritarian policies around the world, have led to a surge in interest in encrypted apps like Signal and WhatsApp. These apps prevent anyone, including the government and the app companies themselves, from reading messages they intercept.

    The spotlight on encrypted apps is also a reminder of the complex debate pitting government interests against individual liberties. Governments desire to monitor everyday communications for law enforcement, national security and sometimes darker purposes. On the other hand, citizens and businesses claim the right to enjoy private digital discussions in today’s online world.

    The positions governments take often are framed as a “war on encryption” by technology policy experts and civil liberties advocates. As a cybersecurity researcher, I’ve followed the debate for nearly 30 years and remain convinced that this is not a fight that governments can easily win.

    Understanding the ‘golden key’

    Traditionally, strong encryption capabilities were considered military technologies crucial to national security and not available to the public. However, in 1991, computer scientist Phil Zimmermann released a new type of encryption software called Pretty Good Privacy. It was free, open-source software available on the internet that anyone could download. PGP allowed people to exchange email and files securely, accessible only to those with the shared decryption key, in ways similar to highly secured government systems.

    Following an investigation into Zimmermann, the U.S. government came to realize that technology develops faster than law and began to explore remedies. It also began to understand that once something is placed on the internet, neither laws nor policy can control its global availability.

    Fearing that terrorists or criminals might use such technology to plan attacks, arrange financing or recruit members, the Clinton administration advocated a system called the Clipper Chip, based on a concept of key escrow. The idea was to give a trusted third party access to the encryption system and the government could use that access when it demonstrated a law enforcement or national security need.

    Clipper was based on the idea of a “golden key,” namely, a way for those with good intentions – intelligence services, police – to access encrypted data, while keeping people with bad intentions – criminals, terrorists – out.

    Clipper Chip devices never gained traction outside the U.S. government, in part because its encryption algorithm was classified and couldn’t be publicly peer-reviewed. However, in the years since, governments around the world have continued to embrace the golden key concept as they grapple with the constant stream of technology developments reshaping how people access and share information.

    Following Edward Snowden’s disclosures about global surveillance of digital communications in 2013, Google and Apple took steps to make it virtually impossible for anyone but an authorized user to access data on a smartphone. Even a court order was ineffective, much to the chagrin of law enforcement. In Apple’s case, the company’s approach to privacy and security was tested in 2016 when the company refused to build a mechanism to help the FBI break into an encrypted iPhone owned by a suspect in the San Bernardino terrorist attack.

    At its core, encryption is, fundamentally, very complicated math. And while the golden key concept continues to hold allure for governments, it is mathematically difficult to achieve with an acceptable degree of trust. And even if it was viable, implementing it in practice makes the internet less safe. Security experts agree that any backdoor access, even if hidden or controlled by a trusted entity, is vulnerable to hacking.

    Competing justifications and tech realities

    Governments around the world continue to wrestle with the proliferation of strong encryption in messaging tools, social media and virtual private networks.

    For example, rather than embrace a technical golden key, a recent proposal in France would have provided the government the ability to add a hidden “ghost” participant to any encrypted chat for surveillance purposes. However, legislators removed this from the final proposal after civil liberties and cybersecurity experts warned that such an approach would undermine basic cybersecurity practices and trust in secure systems.

    In 2025, the U.K. government secretly ordered Apple to add a backdoor to its encryption services worldwide. Rather than comply, Apple removed the ability for its iPhone and iCloud customers in the U.K. to use its Advanced Data Protection encryption features. In this case, Apple chose to defend its users’ security in the face of government mandates, which ironically now means that users in the U.K. may be less secure.

    In the United States, provisions removed from the 2020 EARN IT bill would have forced companies to scan online messages and photos to guard against child exploitation by creating a golden-key-type hidden backdoor. Opponents viewed this as a stealth way of bypassing end-to-end encryption. The bill did not advance to a full vote when it was last reintroduced in the 2023-2024 legislative session.

    Opposing scanning for child sexual abuse material is a controversial concern when encryption is involved: Although Apple received significant public backlash over its plans to scan user devices for such material in ways that users claimed violated Apple’s privacy stance, victims of child abuse have sued the company for not better protecting children.

    Even privacy-centric Switzerland and the European Union are exploring ways of dealing with digital surveillance and privacy in an encrypted world.

    The laws of math and physics, not politics

    Governments usually claim that weakening encryption is necessary to fight crime and protect the nation – and there is a valid concern there. However, when that argument fails to win the day, they often turn to claiming to need backdoors to protect children from exploitation.

    From a cybersecurity perspective, it is nearly impossible to create a backdoor to a communications product that is only accessible for certain purposes or under certain conditions. If a passageway exists, it’s only a matter of time before it is exploited for nefarious purposes. In other words, creating what is essentially a software vulnerability to help the good guys will inevitably end up helping the bad guys, too.

    Often overlooked in this debate is that if encryption is weakened to improve surveillance for governmental purposes, it will drive criminals and terrorists further underground. Using different or homegrown technologies, they will still be able to exchange information in ways that governments can’t readily access. But everyone else’s digital security will be needlessly diminished.

    This lack of online privacy and security is especially dangerous for journalists, activists, domestic violence survivors and other at-risk communities around the world.

    Encryption obeys the laws of math and physics, not politics. Once invented, it can’t be un-invented, even if it frustrates governments. Along those lines, if governments are struggling with strong encryption now, how will they contend with a world when everyone is using significantly more complex techniques like quantum cryptography?

    Governments remain in an unenviable position regarding strong encryption. Ironically, one of the countermeasures the government recommended in response to China’s hacking of global telephone systems in the Salt Typhoon attacks was to use strong encryption in messaging apps such as Signal or iMessage.

    Reconciling that with their ongoing quest to weaken or restrict strong encryption for their own surveillance interests will be a difficult challenge to overcome.

    Richard Forno is a teaching professor of computer science and electrical engineering, and assistant director of the UMBC Cybersecurity Institute at the University of Maryland, Baltimore County.

    This article is republished from The Conversation under a Creative Commons license. Read the original article.
    #why #governments #keep #losing #war
    Why governments keep losing the ‘war on encryption’
    Reports that prominent American national security officials used a freely available encrypted messaging app, coupled with the rise of authoritarian policies around the world, have led to a surge in interest in encrypted apps like Signal and WhatsApp. These apps prevent anyone, including the government and the app companies themselves, from reading messages they intercept. The spotlight on encrypted apps is also a reminder of the complex debate pitting government interests against individual liberties. Governments desire to monitor everyday communications for law enforcement, national security and sometimes darker purposes. On the other hand, citizens and businesses claim the right to enjoy private digital discussions in today’s online world. The positions governments take often are framed as a “war on encryption” by technology policy experts and civil liberties advocates. As a cybersecurity researcher, I’ve followed the debate for nearly 30 years and remain convinced that this is not a fight that governments can easily win. Understanding the ‘golden key’ Traditionally, strong encryption capabilities were considered military technologies crucial to national security and not available to the public. However, in 1991, computer scientist Phil Zimmermann released a new type of encryption software called Pretty Good Privacy. It was free, open-source software available on the internet that anyone could download. PGP allowed people to exchange email and files securely, accessible only to those with the shared decryption key, in ways similar to highly secured government systems. Following an investigation into Zimmermann, the U.S. government came to realize that technology develops faster than law and began to explore remedies. It also began to understand that once something is placed on the internet, neither laws nor policy can control its global availability. Fearing that terrorists or criminals might use such technology to plan attacks, arrange financing or recruit members, the Clinton administration advocated a system called the Clipper Chip, based on a concept of key escrow. The idea was to give a trusted third party access to the encryption system and the government could use that access when it demonstrated a law enforcement or national security need. Clipper was based on the idea of a “golden key,” namely, a way for those with good intentions – intelligence services, police – to access encrypted data, while keeping people with bad intentions – criminals, terrorists – out. Clipper Chip devices never gained traction outside the U.S. government, in part because its encryption algorithm was classified and couldn’t be publicly peer-reviewed. However, in the years since, governments around the world have continued to embrace the golden key concept as they grapple with the constant stream of technology developments reshaping how people access and share information. Following Edward Snowden’s disclosures about global surveillance of digital communications in 2013, Google and Apple took steps to make it virtually impossible for anyone but an authorized user to access data on a smartphone. Even a court order was ineffective, much to the chagrin of law enforcement. In Apple’s case, the company’s approach to privacy and security was tested in 2016 when the company refused to build a mechanism to help the FBI break into an encrypted iPhone owned by a suspect in the San Bernardino terrorist attack. At its core, encryption is, fundamentally, very complicated math. And while the golden key concept continues to hold allure for governments, it is mathematically difficult to achieve with an acceptable degree of trust. And even if it was viable, implementing it in practice makes the internet less safe. Security experts agree that any backdoor access, even if hidden or controlled by a trusted entity, is vulnerable to hacking. Competing justifications and tech realities Governments around the world continue to wrestle with the proliferation of strong encryption in messaging tools, social media and virtual private networks. For example, rather than embrace a technical golden key, a recent proposal in France would have provided the government the ability to add a hidden “ghost” participant to any encrypted chat for surveillance purposes. However, legislators removed this from the final proposal after civil liberties and cybersecurity experts warned that such an approach would undermine basic cybersecurity practices and trust in secure systems. In 2025, the U.K. government secretly ordered Apple to add a backdoor to its encryption services worldwide. Rather than comply, Apple removed the ability for its iPhone and iCloud customers in the U.K. to use its Advanced Data Protection encryption features. In this case, Apple chose to defend its users’ security in the face of government mandates, which ironically now means that users in the U.K. may be less secure. In the United States, provisions removed from the 2020 EARN IT bill would have forced companies to scan online messages and photos to guard against child exploitation by creating a golden-key-type hidden backdoor. Opponents viewed this as a stealth way of bypassing end-to-end encryption. The bill did not advance to a full vote when it was last reintroduced in the 2023-2024 legislative session. Opposing scanning for child sexual abuse material is a controversial concern when encryption is involved: Although Apple received significant public backlash over its plans to scan user devices for such material in ways that users claimed violated Apple’s privacy stance, victims of child abuse have sued the company for not better protecting children. Even privacy-centric Switzerland and the European Union are exploring ways of dealing with digital surveillance and privacy in an encrypted world. The laws of math and physics, not politics Governments usually claim that weakening encryption is necessary to fight crime and protect the nation – and there is a valid concern there. However, when that argument fails to win the day, they often turn to claiming to need backdoors to protect children from exploitation. From a cybersecurity perspective, it is nearly impossible to create a backdoor to a communications product that is only accessible for certain purposes or under certain conditions. If a passageway exists, it’s only a matter of time before it is exploited for nefarious purposes. In other words, creating what is essentially a software vulnerability to help the good guys will inevitably end up helping the bad guys, too. Often overlooked in this debate is that if encryption is weakened to improve surveillance for governmental purposes, it will drive criminals and terrorists further underground. Using different or homegrown technologies, they will still be able to exchange information in ways that governments can’t readily access. But everyone else’s digital security will be needlessly diminished. This lack of online privacy and security is especially dangerous for journalists, activists, domestic violence survivors and other at-risk communities around the world. Encryption obeys the laws of math and physics, not politics. Once invented, it can’t be un-invented, even if it frustrates governments. Along those lines, if governments are struggling with strong encryption now, how will they contend with a world when everyone is using significantly more complex techniques like quantum cryptography? Governments remain in an unenviable position regarding strong encryption. Ironically, one of the countermeasures the government recommended in response to China’s hacking of global telephone systems in the Salt Typhoon attacks was to use strong encryption in messaging apps such as Signal or iMessage. Reconciling that with their ongoing quest to weaken or restrict strong encryption for their own surveillance interests will be a difficult challenge to overcome. Richard Forno is a teaching professor of computer science and electrical engineering, and assistant director of the UMBC Cybersecurity Institute at the University of Maryland, Baltimore County. This article is republished from The Conversation under a Creative Commons license. Read the original article. #why #governments #keep #losing #war
    WWW.FASTCOMPANY.COM
    Why governments keep losing the ‘war on encryption’
    Reports that prominent American national security officials used a freely available encrypted messaging app, coupled with the rise of authoritarian policies around the world, have led to a surge in interest in encrypted apps like Signal and WhatsApp. These apps prevent anyone, including the government and the app companies themselves, from reading messages they intercept. The spotlight on encrypted apps is also a reminder of the complex debate pitting government interests against individual liberties. Governments desire to monitor everyday communications for law enforcement, national security and sometimes darker purposes. On the other hand, citizens and businesses claim the right to enjoy private digital discussions in today’s online world. The positions governments take often are framed as a “war on encryption” by technology policy experts and civil liberties advocates. As a cybersecurity researcher, I’ve followed the debate for nearly 30 years and remain convinced that this is not a fight that governments can easily win. Understanding the ‘golden key’ Traditionally, strong encryption capabilities were considered military technologies crucial to national security and not available to the public. However, in 1991, computer scientist Phil Zimmermann released a new type of encryption software called Pretty Good Privacy (PGP). It was free, open-source software available on the internet that anyone could download. PGP allowed people to exchange email and files securely, accessible only to those with the shared decryption key, in ways similar to highly secured government systems. Following an investigation into Zimmermann, the U.S. government came to realize that technology develops faster than law and began to explore remedies. It also began to understand that once something is placed on the internet, neither laws nor policy can control its global availability. Fearing that terrorists or criminals might use such technology to plan attacks, arrange financing or recruit members, the Clinton administration advocated a system called the Clipper Chip, based on a concept of key escrow. The idea was to give a trusted third party access to the encryption system and the government could use that access when it demonstrated a law enforcement or national security need. Clipper was based on the idea of a “golden key,” namely, a way for those with good intentions – intelligence services, police – to access encrypted data, while keeping people with bad intentions – criminals, terrorists – out. Clipper Chip devices never gained traction outside the U.S. government, in part because its encryption algorithm was classified and couldn’t be publicly peer-reviewed. However, in the years since, governments around the world have continued to embrace the golden key concept as they grapple with the constant stream of technology developments reshaping how people access and share information. Following Edward Snowden’s disclosures about global surveillance of digital communications in 2013, Google and Apple took steps to make it virtually impossible for anyone but an authorized user to access data on a smartphone. Even a court order was ineffective, much to the chagrin of law enforcement. In Apple’s case, the company’s approach to privacy and security was tested in 2016 when the company refused to build a mechanism to help the FBI break into an encrypted iPhone owned by a suspect in the San Bernardino terrorist attack. At its core, encryption is, fundamentally, very complicated math. And while the golden key concept continues to hold allure for governments, it is mathematically difficult to achieve with an acceptable degree of trust. And even if it was viable, implementing it in practice makes the internet less safe. Security experts agree that any backdoor access, even if hidden or controlled by a trusted entity, is vulnerable to hacking. Competing justifications and tech realities Governments around the world continue to wrestle with the proliferation of strong encryption in messaging tools, social media and virtual private networks. For example, rather than embrace a technical golden key, a recent proposal in France would have provided the government the ability to add a hidden “ghost” participant to any encrypted chat for surveillance purposes. However, legislators removed this from the final proposal after civil liberties and cybersecurity experts warned that such an approach would undermine basic cybersecurity practices and trust in secure systems. In 2025, the U.K. government secretly ordered Apple to add a backdoor to its encryption services worldwide. Rather than comply, Apple removed the ability for its iPhone and iCloud customers in the U.K. to use its Advanced Data Protection encryption features. In this case, Apple chose to defend its users’ security in the face of government mandates, which ironically now means that users in the U.K. may be less secure. In the United States, provisions removed from the 2020 EARN IT bill would have forced companies to scan online messages and photos to guard against child exploitation by creating a golden-key-type hidden backdoor. Opponents viewed this as a stealth way of bypassing end-to-end encryption. The bill did not advance to a full vote when it was last reintroduced in the 2023-2024 legislative session. Opposing scanning for child sexual abuse material is a controversial concern when encryption is involved: Although Apple received significant public backlash over its plans to scan user devices for such material in ways that users claimed violated Apple’s privacy stance, victims of child abuse have sued the company for not better protecting children. Even privacy-centric Switzerland and the European Union are exploring ways of dealing with digital surveillance and privacy in an encrypted world. The laws of math and physics, not politics Governments usually claim that weakening encryption is necessary to fight crime and protect the nation – and there is a valid concern there. However, when that argument fails to win the day, they often turn to claiming to need backdoors to protect children from exploitation. From a cybersecurity perspective, it is nearly impossible to create a backdoor to a communications product that is only accessible for certain purposes or under certain conditions. If a passageway exists, it’s only a matter of time before it is exploited for nefarious purposes. In other words, creating what is essentially a software vulnerability to help the good guys will inevitably end up helping the bad guys, too. Often overlooked in this debate is that if encryption is weakened to improve surveillance for governmental purposes, it will drive criminals and terrorists further underground. Using different or homegrown technologies, they will still be able to exchange information in ways that governments can’t readily access. But everyone else’s digital security will be needlessly diminished. This lack of online privacy and security is especially dangerous for journalists, activists, domestic violence survivors and other at-risk communities around the world. Encryption obeys the laws of math and physics, not politics. Once invented, it can’t be un-invented, even if it frustrates governments. Along those lines, if governments are struggling with strong encryption now, how will they contend with a world when everyone is using significantly more complex techniques like quantum cryptography? Governments remain in an unenviable position regarding strong encryption. Ironically, one of the countermeasures the government recommended in response to China’s hacking of global telephone systems in the Salt Typhoon attacks was to use strong encryption in messaging apps such as Signal or iMessage. Reconciling that with their ongoing quest to weaken or restrict strong encryption for their own surveillance interests will be a difficult challenge to overcome. Richard Forno is a teaching professor of computer science and electrical engineering, and assistant director of the UMBC Cybersecurity Institute at the University of Maryland, Baltimore County. This article is republished from The Conversation under a Creative Commons license. Read the original article.
    0 Yorumlar 0 hisse senetleri
CGShares https://cgshares.com