{"id":11108,"date":"2018-01-14T10:45:26","date_gmt":"2018-01-14T18:45:26","guid":{"rendered":"http:\/\/www.palada.net\/index.php\/2018\/01\/14\/news-4879\/"},"modified":"2018-01-14T10:45:26","modified_gmt":"2018-01-14T18:45:26","slug":"news-4879","status":"publish","type":"post","link":"https:\/\/www.palada.net\/index.php\/2018\/01\/14\/news-4879\/","title":{"rendered":"The &#8216;Doublespeak&#8217; of Responsible Encryption"},"content":{"rendered":"<p><img decoding=\"async\" src=\"https:\/\/media.wired.com\/photos\/5a398b56ea8d87431e1a88d0\/master\/pass\/0118-WI-APJARG-01_web.jpg\"\/><\/p>\n<p><strong>Credit to Author: Jonathon Keats| Date: Sun, 14 Jan 2018 13:00:00 +0000<\/strong><\/p>\n<p><strong><em>n<\/em>. A proposal to ensure that texts are <em>capable<\/em> of being decoded, and phones unlocked, when the government obtains a warrant.<\/strong><\/p>\n<p>Coined by US deputy attorney general Rod Rosenstein, responsible encryption is a new name for an old argument: that public agencies fighting crime and terrorism must have access to our private communications\u2014for our own good. In 2016, Apple <a href=\"https:\/\/www.wired.com\/2016\/03\/fight-fbi-apple-ditched-secrecy-openness\/\">defied a court order<\/a> to unlock an iPhone used by a shooter in an attack in San Bernardino, California. Libertarians cheered, but it was a bad look for Apple. After that, tech giants began adopting end-to-end encryption even they can\u2019t decode. (So don\u2019t ask!) In November, the FBI reported it was unable to open the phone of Texas church shooter Devin Kelley.<\/p>\n<p>Rosenstein\u2019s rebranding effort is the latest sally in a semantic battle between Washington and Silicon Valley. Techies say responsible encryption is \u201cdoublespeak\u201d that would give the feds a powerful new surveillance tool\u2014and create a \u201cback door\u201d in networks that hackers will exploit. Rosenstein says the companies\u2019 moves to \u201cgo dark\u201d are self-serving and create a \u201claw-free zone\u201d where jihadis and child molesters can operate. One thing\u2019s sure: The issue won\u2019t be resolved with euphemisms.<\/p>\n<p><em>This article appears in the January issue. <a href=\"https:\/\/subscribe.wired.com\/subscribe\/wired\/113594?source=ENDOFARTICLE_MAGSTORIES\">Subscribe now<\/a>.<\/em><\/p>\n<p class=\"related-cne-video-component__dek\">It\u2019s 2017! It\u2019s time to start using an encrypted messaging app. Why? Using end-to-end encryption means that no one can see what you\u2019re sharing back and forth.<\/p>\n<p><a href=\"https:\/\/www.wired.com\/story\/responsible-encryption-double-speak\" target=\"bwo\" >https:\/\/www.wired.com\/category\/security\/feed\/<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p><img decoding=\"async\" src=\"https:\/\/media.wired.com\/photos\/5a398b56ea8d87431e1a88d0\/master\/pass\/0118-WI-APJARG-01_web.jpg\"\/><\/p>\n<p><strong>Credit to Author: Jonathon Keats| Date: Sun, 14 Jan 2018 13:00:00 +0000<\/strong><\/p>\n<p>It&#8217;s a new name for an old argument: that public agencies fighting crime and terrorism must have access to our private communications\u2014for our own good.<\/p>\n","protected":false},"author":4,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"colormag_page_container_layout":"default_layout","colormag_page_sidebar_layout":"default_layout","footnotes":""},"categories":[10378,10607],"tags":[714],"class_list":["post-11108","post","type-post","status-publish","format-standard","hentry","category-security","category-wired","tag-security"],"_links":{"self":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/11108","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/comments?post=11108"}],"version-history":[{"count":0,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/11108\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/media?parent=11108"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/categories?post=11108"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/tags?post=11108"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}