{"id":532,"date":"2015-09-10T01:26:23","date_gmt":"2015-09-10T01:26:23","guid":{"rendered":"http:\/\/www.dogoodsoft.com\/blog\/?p=532"},"modified":"2024-12-23T07:51:07","modified_gmt":"2024-12-23T07:51:07","slug":"encryption-and-privacy-are-priorities-for-tech-firms","status":"publish","type":"post","link":"https:\/\/www.dogoodsoft.com\/blog\/encryption-and-privacy-are-priorities-for-tech-firms-532\/","title":{"rendered":"Encryption and privacy are priorities for tech firms"},"content":{"rendered":"<p><a href=\"https:\/\/www.dogoodsoft.com\/blog\/wp-content\/uploads\/2015\/09\/encryption1.png\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-533 size-full\" src=\"https:\/\/www.dogoodsoft.com\/blog\/wp-content\/uploads\/2015\/09\/encryption1.png\" alt=\"Encryption and privacy are priorities for tech firms\" width=\"766\" height=\"449\" srcset=\"https:\/\/www.dogoodsoft.com\/blog\/wp-content\/uploads\/2015\/09\/encryption1.png 766w, https:\/\/www.dogoodsoft.com\/blog\/wp-content\/uploads\/2015\/09\/encryption1-300x176.png 300w, https:\/\/www.dogoodsoft.com\/blog\/wp-content\/uploads\/2015\/09\/encryption1-2x1.png 2w\" sizes=\"auto, (max-width: 766px) 100vw, 766px\" \/><\/a><\/p>\n<p>The Justice Department and Microsoft go head-to-head in the U.S. Second Circuit Court of Appeals in Manhattan on Wednesday. The battleground? Data privacy.<\/p>\n<p>At issue is the question of whether U.S. law enforcement can use a search warrant \u2014 in this case, in a drug investigation \u2014 to force the U.S.-based technology company to turn over emails it has stored in a data center in Ireland. Lower courts have sided with the government and held Microsoft in contempt for refusing to comply with the search warrant. Microsoft has appealed, arguing that its data center is subject to Irish and European privacy laws and outside the jurisdiction of U.S. authorities.<\/p>\n<p>Civil liberties and internet-privacy advocates are watching the case closely, as are company and law-enforcement lawyers. They&#8217;re also watching another case, also involving a drug investigation, in which Apple was served with a court order instructing it to turn over text messages between iPhone owners.<\/p>\n<p>After the Edward Snowden revelations, U.S. technology and telecom companies were criticized for allegedly letting the government spy on Americans\u2019 emails, texts and video chats.<\/p>\n<p>Many companies have been fighting back, hoping to burnish their images as protector of their client data privacy. Microsoft is fighting government access to overseas data centers. Apple has been rolling out strong \u201cend-to-end\u201d encryption, in which only the software in the sender\u2019s and receiver\u2019s devices (an iPhone or iPad) have the the requisite keys to decode the message. That means there\u2019s no &#8220;back-door key&#8221; that could unlock an email or other communication. In addition, both Apple and Google have deployed private-code locking systems that make their smartphones essentially unbreakable, except by the phone\u2019s owner, who sets the code.<\/p>\n<p>\u201cThis way, the companies don\u2019t open up the device,\u201d says Peter Swire, an expert on computer security at Georgia Tech who served on President Obama\u2019s task force on surveillance and cybersecurity. \u201cThe companies don\u2019t have access to the content between Alice and Bob.\u201d<\/p>\n<p>If the company that made the device, or is carrying the communication on its network, can\u2019t eavesdrop on users like Alice and Bob, he says, the FBI and other outside parties can\u2019t either.<\/p>\n<p>FBI director James Comey has said these new strong encryption technologies are making communications \u201cgo dark\u201d for law enforcement. He claims the companies deploying this kind of encryption are hampering law-enforcement investigations.<\/p>\n<p>But Nate Cardozo, a staff attorney at the Electronic Frontier Foundation, says law enforcement will just have to find other ways to gather information. And, he says, with so much non-encrypted information being gathered on private citizens and consumers these days (such as GPS location, purchases, social media &#8220;likes&#8221; and contacts, web browsing habits), law enforcement still has plenty of investigative tools.<\/p>\n<p>\u201cEnd-to-end encryption is coming,\u201d he says, pointing to Apple and to Facebook, which recently bought WhatsApp, a popular global messaging platform that is deploying strong encryption. \u201cIt will keep us more safe from criminals, from foreign spies, from prying eyes in general.\u201d<\/p>\n","protected":false},"excerpt":{"rendered":"<p>The Justice Department and Microsoft go head-to-head in the U.S. Second Circuit Court of Appeals in Manhattan on Wednesday. The battleground? Data privacy. At issue is the question of whether U.S. law enforcement can use a search warrant \u2014 in this case, in a drug investigation \u2014 to force the U.S.-based technology company to turn &hellip; <a href=\"https:\/\/www.dogoodsoft.com\/blog\/encryption-and-privacy-are-priorities-for-tech-firms-532\/\" class=\"more-link\">Continue reading <span class=\"screen-reader-text\">Encryption and privacy are priorities for tech firms<\/span><\/a><\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[8],"tags":[215,52,175],"class_list":["post-532","post","type-post","status-publish","format-standard","hentry","category-news","tag-data-privacy","tag-encryption","tag-iphone"],"_links":{"self":[{"href":"https:\/\/www.dogoodsoft.com\/blog\/wp-json\/wp\/v2\/posts\/532","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.dogoodsoft.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.dogoodsoft.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.dogoodsoft.com\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.dogoodsoft.com\/blog\/wp-json\/wp\/v2\/comments?post=532"}],"version-history":[{"count":1,"href":"https:\/\/www.dogoodsoft.com\/blog\/wp-json\/wp\/v2\/posts\/532\/revisions"}],"predecessor-version":[{"id":534,"href":"https:\/\/www.dogoodsoft.com\/blog\/wp-json\/wp\/v2\/posts\/532\/revisions\/534"}],"wp:attachment":[{"href":"https:\/\/www.dogoodsoft.com\/blog\/wp-json\/wp\/v2\/media?parent=532"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.dogoodsoft.com\/blog\/wp-json\/wp\/v2\/categories?post=532"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.dogoodsoft.com\/blog\/wp-json\/wp\/v2\/tags?post=532"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}