{"id":1071,"date":"2017-11-15T02:25:15","date_gmt":"2017-11-15T02:25:15","guid":{"rendered":"http:\/\/www.dogoodsoft.com\/blog\/?p=1071"},"modified":"2024-12-23T07:44:42","modified_gmt":"2024-12-23T07:44:42","slug":"backdoors","status":"publish","type":"post","link":"https:\/\/www.dogoodsoft.com\/blog\/backdoors-1071\/","title":{"rendered":"Texas Church Shooting: More Calls for Encryption Backdoors"},"content":{"rendered":"<p><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/www.dogoodsoft.com\/blog\/wp-content\/uploads\/2017\/11\/1071-1.jpg\" alt=\"Texas Church Shooting: More Calls for Encryption Backdoors\" width=\"812\" height=\"405\" class=\"aligncenter size-full wp-image-1072\" srcset=\"https:\/\/www.dogoodsoft.com\/blog\/wp-content\/uploads\/2017\/11\/1071-1.jpg 812w, https:\/\/www.dogoodsoft.com\/blog\/wp-content\/uploads\/2017\/11\/1071-1-300x150.jpg 300w, https:\/\/www.dogoodsoft.com\/blog\/wp-content\/uploads\/2017\/11\/1071-1-768x383.jpg 768w, https:\/\/www.dogoodsoft.com\/blog\/wp-content\/uploads\/2017\/11\/1071-1-2x1.jpg 2w\" sizes=\"auto, (max-width: 812px) 100vw, 812px\" \/><\/p>\n<p>US Deputy Attorney General, Rod Rosenstein, has decided to use the recent mass shooting at a Texas church to reiterate calls for encryption backdoors to help law enforcers.<\/p>\n<p>The incident took place at the First Baptist Church in Sutherland Springs, killing at least 26 people.<\/p>\n<p>Deceased suspect Devin Kelley\u2019s mobile phone is now in the hands of investigators, but they can\u2019t access it \u2014 a similar situation to the one following the mass shooting in San Bernardino which resulted in a court room standoff between Apple and the FBI.<\/p>\n<p>It\u2019s now widely understood that there\u2019s no way for an Apple, Facebook or other tech provider to engineer backdoors in encrypted systems that would allow only police to access content in cases such as these, without putting the security of millions of law-abiding customers at risk.<\/p>\n<p>However, that hasn\u2019t prevented Rosenstein becoming the latest senior US government official to call on technology companies to implement backdoors.<\/p>\n<p>\u201cAs a matter of fact, no reasonable person questions our right to access the phone. But the company that built it claims that it purposely designed the operating system so that the company cannot open the phone even with an order from a federal judge,\u201d he told a meeting of local business leaders in Maryland.<\/p>\n<p>\u201cMaybe we eventually will find a way to access the data. But it costs a great deal of time and money. In some cases, it surely costs lives. That is a very high price to pay.\u201d<\/p>\n<p>For its part, Apple has maintained that it works closely with law enforcement every day, even providing training so that police better understand the devices and know how to quickly request information.<\/p>\n<p>However, it is standing firm on the matter of backdoors, aware that breaking its own encrypted systems for US police would likely lead to a stream of requests from other regions including China.<\/p>\n<p>It\u2019s also been suggested that cyber-criminals or nation state actors could eventually get their hands on any backdoors, which would be catastrophic for Apple and its users.<\/p>\n<p>Top10VPN.com head of research, Simon Migliano, called for cool heads on the issue.<\/p>\n<p>\u201cThe US Deputy Attorney General bemoans \u2018warrant-proof encryption\u2019 but fails to understand that there is no other type of encryption. As all privacy and security experts agree, to undermine encryption with \u2018backdoors\u2019 is to open a Pandora\u2019s Box that puts at risk the entire online \u2013 and therefore real-world &#8211; economy.<\/p>\n<p> \u201cEnd-to-end encryption secures our banking, online shopping and sensitive business activities. Any kind of \u2018backdoor\u2019 would fatally undermine security in these areas. As we learned to our cost with the leak of CIA tools earlier this year, once an exploit exists, it\u2019s only a matter of time until it leaks and cybercriminals have yet another tool at their disposal.\u201d<\/p>\n","protected":false},"excerpt":{"rendered":"<p>US Deputy Attorney General, Rod Rosenstein, has decided to use the recent mass shooting at a Texas church to reiterate calls for encryption backdoors to help law enforcers. The incident took place at the First Baptist Church in Sutherland Springs, killing at least 26 people. Deceased suspect Devin Kelley\u2019s mobile phone is now in the &hellip; <a href=\"https:\/\/www.dogoodsoft.com\/blog\/backdoors-1071\/\" class=\"more-link\">Continue reading <span class=\"screen-reader-text\">Texas Church Shooting: More Calls for Encryption Backdoors<\/span><\/a><\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[8],"tags":[60,52,315],"class_list":["post-1071","post","type-post","status-publish","format-standard","hentry","category-news","tag-apple","tag-encryption","tag-encryption-backdoors"],"_links":{"self":[{"href":"https:\/\/www.dogoodsoft.com\/blog\/wp-json\/wp\/v2\/posts\/1071","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.dogoodsoft.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.dogoodsoft.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.dogoodsoft.com\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.dogoodsoft.com\/blog\/wp-json\/wp\/v2\/comments?post=1071"}],"version-history":[{"count":1,"href":"https:\/\/www.dogoodsoft.com\/blog\/wp-json\/wp\/v2\/posts\/1071\/revisions"}],"predecessor-version":[{"id":1073,"href":"https:\/\/www.dogoodsoft.com\/blog\/wp-json\/wp\/v2\/posts\/1071\/revisions\/1073"}],"wp:attachment":[{"href":"https:\/\/www.dogoodsoft.com\/blog\/wp-json\/wp\/v2\/media?parent=1071"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.dogoodsoft.com\/blog\/wp-json\/wp\/v2\/categories?post=1071"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.dogoodsoft.com\/blog\/wp-json\/wp\/v2\/tags?post=1071"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}