Apple Opens Fire In Encryption Battle

So far, the debate over encryption has been vague and broadly drawn. On one side, Silicon Valley, arguing that weakening encryption puts normal people's privacy and security at risk (and threatens their relationships with customers). On the other, the security services, police and governments, arguing (sometimes without much firm proof) that encryption helps terrorists and makes the loss of life more likely.

The problem has been so far that much of this talk has been hypothetical. Governments haven't actually detailed how they would like to see encryption changed to help them. So technology companies' responses have been equally hazy. This is why Apple's intervention is important. It is a specific response to a specific piece of legislation. Granted, that legislation - the Government's Investigatory Powers Bill or so-called "Snoopers' Charter" - is still vague.

The Government has publicly said that it doesn't want to weaken encryption - the Home Secretary even repeated this when she introduced the bill in Parliament. But the bill could force companies to hand over data 'in the clear' - a pre-existing power which has, as far as we know, never been demanded and certainly never tested in court.

Apple gives that notion both barrels writing that, "this bill will put law abiding citizens at risk, not the criminals, hackers and terrorists.
"The fact is to comply with the Government's proposal, the personal data of millions of law abiding citizens would be less secure."

That's not too different from the broad-stroke objections we've heard so far. But in the rest of its submission, Apple goes through specific clauses of the bill, explaining why it objects to them and, crucially, suggesting how they could be improved.

This is a new stage of the debate. So much depends on the nitty-gritty of how laws are written. After much high-minded rhetoric from both sides, Apple is actually getting stuck in.
Sky: http://bit.ly/1Z1U2jg

 

« NSA Helped UK Spies Find Juniper's Security Holes
Islamic State Aims to Launch Cyberattacks on US »

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

iXsystems

iXsystems

iXsystems is a leader in Open-Source enterprise server and storage solutions including Backup & Recovery to protect critical data.

CircleCI

CircleCI

CircleCI’s platform allows developers to rapidly release code (for web and mobile apps) they trust by automating the build, test, and deploy process.

NowSecure

NowSecure

NowSecure are the experts in mobile app security testing software and services.

Inter-American Cooperation Portal on Cyber-Crime

Inter-American Cooperation Portal on Cyber-Crime

The Inter-American Cooperation Portal on Cyber-Crime was created to facilitate and streamline cooperation and information exchange among government experts from OAS member states.

Hardenite

Hardenite

Hardenite solution helps R&D, DevOps and IT teams to continuously manage security risks and hardening efforts of any Linux OS – based product, throughout the product life cycle.

Microchip Technology

Microchip Technology

Microchip Technology Inc. is a leading provider of smart, connected and secure embedded control solutions.

SecureTech360

SecureTech360

SecureTech360 is a cybersecurity and IT consulting firm whose principals have extensive experience in Cybersecurity and Information Technology.

Telsy

Telsy

Telsy is a security partner for ICT solutions and services. We help you implement effective security solutions that increase your risk mitigation ability and your responsiveness.

Xiarch Solutions

Xiarch Solutions

Xiarch Security is an global security firm that educates clients, identifies security risks, informs intelligent business decisions, and enables you to reduce your attack surface.

Red Goat Cyber Security

Red Goat Cyber Security

Red Goat Cyber Security have created excellent, informative and interactive Social Engineering Awareness training which is suitable for all levels of staff.

Dimension Data

Dimension Data

Dimension Data is a leading African born technology provider operating in the Middle East and Africa, offering a portfolio of services including intelligent security solutions.

Yarix

Yarix

Yarix is the leading company in Var Group’s Digital Security division and one of the most recognised, innovative and authoritative Italian companies in the IT security sector.

Beaming

Beaming

Beaming is an established Internet Service Provider for businesses across the UK. We deliver reliable voice, data and managed services, including cybersecurity.

System360

System360

System360 is one of Houston's top suppliers of network administration, design, security, and support services.

Slide

Slide

Slide is a modern, security-first Business Continuity & Disaster Recovery (BCDR) company built exclusively for Managed Service Providers.

RedSense

RedSense

RedSense provides industry-leading threat intelligence services, adversary space interaction & monitoring, net flow monitoring and interpretation for our clients.