Encryption News

Demand for Backdoors into Encryption Solutions is not the Answer

By 5th May 2015 April 25th, 2019 No Comments

Governments worldwide are demanding access to encrypted data. Both the US and UK Governments seen in the news recently, are jointly eager to ban effective cryptographic tools.

Previous aims to assist the public in securing their devices are now no longer deemed necessary by FBI. Previously published sensible FBI advice for the US public, advising public to ensure their devices are effectively secured, through encryption, in case they are ever misplaced, stolen or discarded (before being properly wiped), to protect the content and ultimately the individual, has disappeared from the FBI advice stream.

Governments want to be able to access any data without a barrier. A secure encryption solution is a hindrance to them. Thus with a backdoor they hope to retain control and access to peoples data. But what about the individuals rights to privacy and confidentiality?

Individuals who choose to secure their data, be it at rest, in transit, in the cloud or on a device, can only effectively secure their data with an encryption technology that does not have a backdoor (a created defect).

Why would anyone choose to secure him or herself with a measure that is defective-it makes no sense for the individual? A backdoor into an encryption solution defeats the purpose and leaves it unworkable. If you are to secure your data, you require a secure solution not an insecure solution (encryption with a backdoor).

Encrypting your data with a solution comprising a backdoor does not constitute security. If a backdoor exists, it will be found and will be used maliciously.

The basis of security in this age, not only our routine data and communications, is heavily dependent on cryptography. If this is to become insecure, it will have detrimental affects on many aspects of our everyday lives.

To safeguard your data, you should utilise an encryption solution without backdoor access and you should have sole access to your encryption keys. No third party should have access to your keys or your data without your permission.

The Guardian

http://www.theguardian.com/technology/2015/may/01/encryption-wont-work-if-it-has-a-back-door-only-the-good-guys-have-keys-to-#img-2