{"id":901,"date":"2016-05-04T08:29:49","date_gmt":"2016-05-04T08:29:49","guid":{"rendered":"http:\/\/www.dogoodsoft.com\/blog\/?p=901"},"modified":"2024-12-23T07:45:56","modified_gmt":"2024-12-23T07:45:56","slug":"on-encryption-there-are-no-locks-only-angels-can-open","status":"publish","type":"post","link":"https:\/\/www.dogoodsoft.com\/blog\/on-encryption-there-are-no-locks-only-angels-can-open-901\/","title":{"rendered":"ON ENCRYPTION: THERE ARE NO LOCKS ONLY &#8220;ANGELS&#8221; CAN OPEN"},"content":{"rendered":"<p>Despite the FBI dropping its case against Apple over whether or not the tech giant should supply the government agency with the ability to hack into the San Bernardino shooter\u2019s iPhone, the argument over how our devices \u2014 especially our phones \u2014 should be encrypted continues to rage on. And regardless of how you feel about the issue, almost everybody agrees that the debate can be pretty murky, as privacy vs. protection debates usually are. To make the whole argument a lot easier to digest however, we have one of the web\u2019s best educators and entertainers, CGP Grey, who has broken it all down in one clear five-minute video.<\/p>\n<p>The video, posted above, parallels physical locks with digital \u201clocks\u201d (encryption), noting how they relate and how they differ in order to help us better understand the encryption debate. And one of the most important points that Grey makes about digital locks is that they need to work not only against local threats, but threats from across the globe \u2014 threats coming from \u201cinternet burglars\u201d and their \u201cburglar bots.\u201d<\/p>\n<p>Grey touches on the scenario in which a bad guy with an armed bomb dies, leaving behind only an encrypted phone with the code to stop the bomb. In this particular case \u2014 a parallel to the San Bernardino shooter case, as there may have been information regarding further threats on his encrypted phone \u2014 Grey points out that this may be a time when we\u2019d want the police to have access, or a \u201cbackdoor,\u201d to the phone. But if companies were forced to build backdoors into their products so government agencies could use them for situations like these, could we trust authorities not to abuse their powers? Could we trust that \u201cdemons\u201d (people with bad intentions) wouldn\u2019t hijack the backdoors?<\/p>\n<p>Grey argues that we couldn\u2019t, saying that \u201cthere\u2019s no way to build a digital lock that only angels can open and demons cannot.\u201d<\/p>\n<p>There\u2019s also a bonus \u201cfootnote\u201d video (below) in which Grey discusses just how intimate the data on our phones has become (do you remember where you were on April 8th at 6:02AM? No? Your phone does).<\/p>\n<p>What do you think about CGP Grey\u2019s breakdown of the encryption debate?<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Despite the FBI dropping its case against Apple over whether or not the tech giant should supply the government agency with the ability to hack into the San Bernardino shooter\u2019s iPhone, the argument over how our devices \u2014 especially our phones \u2014 should be encrypted continues to rage on. And regardless of how you feel &hellip; <a href=\"https:\/\/www.dogoodsoft.com\/blog\/on-encryption-there-are-no-locks-only-angels-can-open-901\/\" class=\"more-link\">Continue reading <span class=\"screen-reader-text\">ON ENCRYPTION: THERE ARE NO LOCKS ONLY &#8220;ANGELS&#8221; CAN OPEN<\/span><\/a><\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[8],"tags":[348,52,349],"class_list":["post-901","post","type-post","status-publish","format-standard","hentry","category-news","tag-angels","tag-encryption","tag-locks"],"_links":{"self":[{"href":"https:\/\/www.dogoodsoft.com\/blog\/wp-json\/wp\/v2\/posts\/901","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.dogoodsoft.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.dogoodsoft.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.dogoodsoft.com\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.dogoodsoft.com\/blog\/wp-json\/wp\/v2\/comments?post=901"}],"version-history":[{"count":1,"href":"https:\/\/www.dogoodsoft.com\/blog\/wp-json\/wp\/v2\/posts\/901\/revisions"}],"predecessor-version":[{"id":902,"href":"https:\/\/www.dogoodsoft.com\/blog\/wp-json\/wp\/v2\/posts\/901\/revisions\/902"}],"wp:attachment":[{"href":"https:\/\/www.dogoodsoft.com\/blog\/wp-json\/wp\/v2\/media?parent=901"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.dogoodsoft.com\/blog\/wp-json\/wp\/v2\/categories?post=901"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.dogoodsoft.com\/blog\/wp-json\/wp\/v2\/tags?post=901"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}