{"id":512,"date":"2015-09-01T01:05:55","date_gmt":"2015-09-01T01:05:55","guid":{"rendered":"http:\/\/www.dogoodsoft.com\/blog\/?p=512"},"modified":"2024-12-23T08:02:04","modified_gmt":"2024-12-23T08:02:04","slug":"when-it-comes-to-encryption-our-policy-makers-could-learn-a-thing-or-two-from-thomas-jefferson","status":"publish","type":"post","link":"https:\/\/www.dogoodsoft.com\/blog\/when-it-comes-to-encryption-our-policy-makers-could-learn-a-thing-or-two-from-thomas-jefferson-512\/","title":{"rendered":"When It Comes To Encryption, Our Policy Makers Could Learn A Thing Or Two From Thomas Jefferson"},"content":{"rendered":"<p><a href=\"https:\/\/www.dogoodsoft.com\/blog\/wp-content\/uploads\/2015\/09\/Snap.jpg\"><img loading=\"lazy\" decoding=\"async\" class=\"  aligncenter wp-image-513\" src=\"https:\/\/www.dogoodsoft.com\/blog\/wp-content\/uploads\/2015\/09\/Snap.jpg\" alt=\"When It Comes To Encryption, Our Policy Makers Could Learn A Thing Or Two From Thomas Jefferson\" width=\"572\" height=\"451\" srcset=\"https:\/\/www.dogoodsoft.com\/blog\/wp-content\/uploads\/2015\/09\/Snap.jpg 754w, https:\/\/www.dogoodsoft.com\/blog\/wp-content\/uploads\/2015\/09\/Snap-300x237.jpg 300w, https:\/\/www.dogoodsoft.com\/blog\/wp-content\/uploads\/2015\/09\/Snap-1x1.jpg 1w\" sizes=\"auto, (max-width: 572px) 100vw, 572px\" \/><\/a><\/p>\n<p>Thomas Jefferson was so interested in cryptography that he may have developed his own enciphering device after his mail was inspected by postmasters when the revolution was looming. Indeed, codes and ciphers are as American as the American Revolution itself. In fact, the revolution may not have happened if confidential correspondence, both military and otherwise, had been compromised by the British. In December 1801, Jefferson received an encrypted letter from a mathematics professor (the two both served at the American Philosophical Society) that was so inscrutable that he was never able to decode it\u2014in fact, it was not decoded until over 200 years later.<\/p>\n<p>The thread of cipher text runs through the very core of the history of this country. When James Madison penned a letter to Thomas Jefferson in 1789, letting him know that \u201ca Bill of rights, incorporated perhaps into the Constitution will be proposed, with a few alterations most called for by the opponents of the Government and least objectionable to its friends,\u201d the letter was partially enciphered, so that discussion about might run the Department of Finance, a smattering of international politics, and a bit of gossip about the French minister to the United States, the count de Moustier, and his sister-in-law, Madame de Brehan, wouldn\u2019t have fallen into the wrong hands.<\/p>\n<p>It\u2019s hard to know when the narrative shifted, moving from trying to crack your enemies\u2019 crypto and secure your own communications to working to weaken crypto for everyone. NSA director Michael Rogers, FBI director James Comey, and others in the Obama Administration have been working hard to try to convince the public that it\u2019s possible to have secure communications that the government can access, but that criminals and bad nation-state actors can\u2019t circumvent. They give lip service to the need for secure communications to fuel innovation and economic growth, while simultaneously working to dismantle the very systems that make those communications secure.<\/p>\n<p>It is not entirely clear which approach the government will take, but whether it tries to pursue legislation forcing companies to work on mandated backdoors that they don\u2019t want or even need, or simply tries to coerce them with fearmongering about the threat of terrorism, one thing is clear: the government should be embracing cryptography, as it once did, rather than fighting against it.<\/p>\n<p>It\u2019s true that end-to-end encryption could thwart investigation attempts for a small amount of crimes\u2014or maybe call for more hands-on detective work\u2014but this pales in comparison to the damage caused by government backdoors. \u201cCryptography was once a private game of shadows played by spy masters, but today it has become the critical foundation of our information infrastructure,\u201d says Ethan Heilman, Research Fellow at Boston University.<\/p>\n<p>A recent MIT paper written by a slew of experts makes it clear that giving the government backdoor access to secure communications would weaken the security of any system. \u201cThis report\u2019s analysis of law enforcement demands for exceptional access to private communications and data shows that such access will open doors through which 24 criminals and malicious nation-states can attack the very individuals law enforcement seeks to defend. The costs would be substantial, the damage to innovation severe, and the consequences to economic growth difficult to predict. The costs to developed countries\u2019 soft power and to our moral authority would also be considerable. Policy-makers need to be clear-eyed in evaluating the likely costs and benefits,\u201d it reads. (Oh, and China wants backdoors, too. So there\u2019s that.)<\/p>\n<p>This isn\u2019t the first time the government has worked to weaken encryption on purpose. It goes back as far as the 1950s, and continued in the 1970s, (\u2026NSA tried to convince IBM to reduce the length of thekey from 64-bit to 48-bit. Ultimately, they compromised on a 56-bit key,\u201d wrote Tom Johnson in Book III: Retrenchment and Reform, an official NSA book), and the 1990s. Intentionally bad cryptography led to the Logjam bug, which can \u201cbreak secure connections by tricking the browser and server to communicate using weak crypto,\u201d Cory Doctorow explained on Boing Boing\u2014and the government is to blame for these browsers and servers supporting weak crypto in the first place. Weak crypto, courtesy of the U.S. government, can be blamed for the FREAK SSL\/TSL vulnerability as well.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Thomas Jefferson was so interested in cryptography that he may have developed his own enciphering device after his mail was inspected by postmasters when the revolution was looming. Indeed, codes and ciphers are as American as the American Revolution itself. In fact, the revolution may not have happened if confidential correspondence, both military and otherwise, &hellip; <a href=\"https:\/\/www.dogoodsoft.com\/blog\/when-it-comes-to-encryption-our-policy-makers-could-learn-a-thing-or-two-from-thomas-jefferson-512\/\" class=\"more-link\">Continue reading <span class=\"screen-reader-text\">When It Comes To Encryption, Our Policy Makers Could Learn A Thing Or Two From Thomas Jefferson<\/span><\/a><\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[8],"tags":[208,52,207],"class_list":["post-512","post","type-post","status-publish","format-standard","hentry","category-news","tag-cryptography","tag-encryption","tag-thomas-jefferson"],"_links":{"self":[{"href":"https:\/\/www.dogoodsoft.com\/blog\/wp-json\/wp\/v2\/posts\/512","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.dogoodsoft.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.dogoodsoft.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.dogoodsoft.com\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.dogoodsoft.com\/blog\/wp-json\/wp\/v2\/comments?post=512"}],"version-history":[{"count":1,"href":"https:\/\/www.dogoodsoft.com\/blog\/wp-json\/wp\/v2\/posts\/512\/revisions"}],"predecessor-version":[{"id":514,"href":"https:\/\/www.dogoodsoft.com\/blog\/wp-json\/wp\/v2\/posts\/512\/revisions\/514"}],"wp:attachment":[{"href":"https:\/\/www.dogoodsoft.com\/blog\/wp-json\/wp\/v2\/media?parent=512"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.dogoodsoft.com\/blog\/wp-json\/wp\/v2\/categories?post=512"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.dogoodsoft.com\/blog\/wp-json\/wp\/v2\/tags?post=512"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}