{"id":986,"date":"2016-07-27T01:53:42","date_gmt":"2016-07-27T01:53:42","guid":{"rendered":"http:\/\/www.dogoodsoft.com\/blog\/?p=986"},"modified":"2024-12-23T07:45:37","modified_gmt":"2024-12-23T07:45:37","slug":"do-anti-encryption-democrats-see-the-importance-of-encryption-now","status":"publish","type":"post","link":"https:\/\/www.dogoodsoft.com\/blog\/do-anti-encryption-democrats-see-the-importance-of-encryption-now-986\/","title":{"rendered":"Do anti-encryption Democrats see the importance of encryption now?"},"content":{"rendered":"<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-987 size-full\" src=\"https:\/\/www.dogoodsoft.com\/blog\/wp-content\/uploads\/2016\/07\/anti-encryption.jpeg\" alt=\"Do anti-encryption Democrats see the importance of encryption now?\" width=\"600\" height=\"448\" srcset=\"https:\/\/www.dogoodsoft.com\/blog\/wp-content\/uploads\/2016\/07\/anti-encryption.jpeg 600w, https:\/\/www.dogoodsoft.com\/blog\/wp-content\/uploads\/2016\/07\/anti-encryption-300x224.jpeg 300w, https:\/\/www.dogoodsoft.com\/blog\/wp-content\/uploads\/2016\/07\/anti-encryption-1x1.jpeg 1w\" sizes=\"auto, (max-width: 600px) 100vw, 600px\" \/><\/p>\n<p>One would certainly hope so after the turmoil that has followed the release of thousands of DNC emails by Wikileaks. But Democratic lawmakers in the past have worked to weaken encryption standards, demanding backdoors that they say can be used by law enforcement authorities to track terrorists, but also leave computers vulnerable to hackers.<br \/>\nConsider CISA, a bill introduced to the Senate by California Democrat Dianne Feinstein. Despite near-unanimous expert testimony opposing the bill, along with a vocal public outcry, 30 Democratic senators voted in favor of passing the bill last year. This year, Feinstein coauthored the \u201cCompliance with Court Orders Act of 2016\u201d with Republican Senator Richard Burr, in the name of protecting America from terrorism following the FBI\u2019s battle with Apple over decrypting the San Bernardino shooter\u2019s iPhone.<\/p>\n<p>As encryption expert Jonathan Zdziarski wrote following the announcement of the Feinstein-Burr bill, \u201cThe reality is that there is no possible way to comply with it without intentionally backdooring the encryption in every product that may be used in the United States.\u201d While it\u2019s still unclear how, exactly, hackers got into the DNC\u2019s servers, Democrats now know, in the most personal way, the kinds of embarrassments that can result from encryption vulnerabilities.<\/p>\n<p>The Democrats can blame Russia all they want. The fact of the matter is that stronger encryption, like the end-to-end encryption now standard in everything from iMessage to Whatsapp, continues to be the best defense against hackers.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>One would certainly hope so after the turmoil that has followed the release of thousands of DNC emails by Wikileaks. But Democratic lawmakers in the past have worked to weaken encryption standards, demanding backdoors that they say can be used by law enforcement authorities to track terrorists, but also leave computers vulnerable to hackers. Consider &hellip; <a href=\"https:\/\/www.dogoodsoft.com\/blog\/do-anti-encryption-democrats-see-the-importance-of-encryption-now-986\/\" class=\"more-link\">Continue reading <span class=\"screen-reader-text\">Do anti-encryption Democrats see the importance of encryption now?<\/span><\/a><\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[8],"tags":[371,52],"class_list":["post-986","post","type-post","status-publish","format-standard","hentry","category-news","tag-democrats","tag-encryption"],"_links":{"self":[{"href":"https:\/\/www.dogoodsoft.com\/blog\/wp-json\/wp\/v2\/posts\/986","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.dogoodsoft.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.dogoodsoft.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.dogoodsoft.com\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.dogoodsoft.com\/blog\/wp-json\/wp\/v2\/comments?post=986"}],"version-history":[{"count":1,"href":"https:\/\/www.dogoodsoft.com\/blog\/wp-json\/wp\/v2\/posts\/986\/revisions"}],"predecessor-version":[{"id":988,"href":"https:\/\/www.dogoodsoft.com\/blog\/wp-json\/wp\/v2\/posts\/986\/revisions\/988"}],"wp:attachment":[{"href":"https:\/\/www.dogoodsoft.com\/blog\/wp-json\/wp\/v2\/media?parent=986"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.dogoodsoft.com\/blog\/wp-json\/wp\/v2\/categories?post=986"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.dogoodsoft.com\/blog\/wp-json\/wp\/v2\/tags?post=986"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}