Apple Opens Fire In Encryption Battle

So far, the debate over encryption has been vague and broadly drawn. On one side, Silicon Valley, arguing that weakening encryption puts normal people's privacy and security at risk (and threatens their relationships with customers). On the other, the security services, police and governments, arguing (sometimes without much firm proof) that encryption helps terrorists and makes the loss of life more likely.

The problem has been so far that much of this talk has been hypothetical. Governments haven't actually detailed how they would like to see encryption changed to help them. So technology companies' responses have been equally hazy. This is why Apple's intervention is important. It is a specific response to a specific piece of legislation. Granted, that legislation - the Government's Investigatory Powers Bill or so-called "Snoopers' Charter" - is still vague.

The Government has publicly said that it doesn't want to weaken encryption - the Home Secretary even repeated this when she introduced the bill in Parliament. But the bill could force companies to hand over data 'in the clear' - a pre-existing power which has, as far as we know, never been demanded and certainly never tested in court.

Apple gives that notion both barrels writing that, "this bill will put law abiding citizens at risk, not the criminals, hackers and terrorists.
"The fact is to comply with the Government's proposal, the personal data of millions of law abiding citizens would be less secure."

That's not too different from the broad-stroke objections we've heard so far. But in the rest of its submission, Apple goes through specific clauses of the bill, explaining why it objects to them and, crucially, suggesting how they could be improved.

This is a new stage of the debate. So much depends on the nitty-gritty of how laws are written. After much high-minded rhetoric from both sides, Apple is actually getting stuck in.
Sky: http://bit.ly/1Z1U2jg

 

« NSA Helped UK Spies Find Juniper's Security Holes
Islamic State Aims to Launch Cyberattacks on US »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

WEBINAR: 2024 and Beyond: Top Six Cloud Security Trends

WEBINAR: 2024 and Beyond: Top Six Cloud Security Trends

April 4, 2024 | 11:00 AM PT: Join this webinar to find out about six emerging trends dominating the cloud cybersecurity landscape.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

Perimeter 81 / How to Select the Right ZTNA Solution

Perimeter 81 / How to Select the Right ZTNA Solution

Gartner insights into How to Select the Right ZTNA offering. Download this FREE report for a limited time only.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

CSIRT.CZ

CSIRT.CZ

CSIRT.CZ is the National Computer Security Incident Response Team of the Czech Republic.

QASymphony

QASymphony

QASymphony software testing and QA tools help companies create better software by improving speed, efficiency and collaboration during the testing lifecycle.

StoneFly

StoneFly

StoneFly offers High Availability, high performance cluster and scale out storage, and backup and disaster recovery appliances.

Aptive Consulting

Aptive Consulting

Aptive is a cyber security consultancy providing Penetration Testing and Vulnerability Assessment services.

Kenna Security

Kenna Security

Kenna Security is a risk intelligence & vulnerability management platform that helps prioritize and remediate vulnerabilities.

iONLINE

iONLINE

iONLINE delivers high quality IT services and solutions to businesses in Azerbaijan.

R2S Technologies

R2S Technologies

R2S can help you implement a cyber security framework to ensure your business is more resilient towards the growing threat of cyber crime. We provide Web and Mobile Application Security Assessment..

Scythe

Scythe

SCYTHE is a next generation red team platform for continuous and realistic enterprise risk assessments.

N8 Identity

N8 Identity

N8 Identity helps organizations realize the vision of Autonomous Identity Governance™ with AI-driven Identity solutions.

Armo

Armo

Armo technology enhances any Kubernetes deployment with security, visibility, and control from the CI/CD pipeline through production.

Raiven Capital

Raiven Capital

Raiven Capital is a global early-stage technology venture capital fund. We focus on founder-led, driven companies on the leading edge of disruption.

PointWire

PointWire

PointWire offers a range of cybersecurity solutions and services including Penetration Testing on various levels, as well as Intrusion Detection and Prevention Systems.

Archer Technologies

Archer Technologies

Archer helps organizations manage risk in the digital era—uniting stakeholders, integrating technologies and transforming risk into reward.

North Green Security

North Green Security

North Green Security is a UK-based cyber security training and consultancy company.

JLS Technology

JLS Technology

Since 2007, JLS Tech has been recognized as one of the world’s most innovative cybersecurity and technology operations leaders.

Saidot

Saidot

Saidot is a Finnish AI governance and alignment company committed to helping businesses safely and transparently integrate AI into their operations.