element14 Community
element14 Community
    Register Log In
  • Site
  • Search
  • Log In Register
  • Community Hub
    Community Hub
    • What's New on element14
    • Feedback and Support
    • Benefits of Membership
    • Personal Blogs
    • Members Area
    • Achievement Levels
  • Learn
    Learn
    • Ask an Expert
    • eBooks
    • element14 presents
    • Learning Center
    • Tech Spotlight
    • STEM Academy
    • Webinars, Training and Events
    • Learning Groups
  • Technologies
    Technologies
    • 3D Printing
    • FPGA
    • Industrial Automation
    • Internet of Things
    • Power & Energy
    • Sensors
    • Technology Groups
  • Challenges & Projects
    Challenges & Projects
    • Design Challenges
    • element14 presents Projects
    • Project14
    • Arduino Projects
    • Raspberry Pi Projects
    • Project Groups
  • Products
    Products
    • Arduino
    • Avnet & Tria Boards Community
    • Dev Tools
    • Manufacturers
    • Multicomp Pro
    • Product Groups
    • Raspberry Pi
    • RoadTests & Reviews
  • About Us
    About the element14 Community
  • Store
    Store
    • Visit Your Store
    • Choose another store...
      • Europe
      •  Austria (German)
      •  Belgium (Dutch, French)
      •  Bulgaria (Bulgarian)
      •  Czech Republic (Czech)
      •  Denmark (Danish)
      •  Estonia (Estonian)
      •  Finland (Finnish)
      •  France (French)
      •  Germany (German)
      •  Hungary (Hungarian)
      •  Ireland
      •  Israel
      •  Italy (Italian)
      •  Latvia (Latvian)
      •  
      •  Lithuania (Lithuanian)
      •  Netherlands (Dutch)
      •  Norway (Norwegian)
      •  Poland (Polish)
      •  Portugal (Portuguese)
      •  Romania (Romanian)
      •  Russia (Russian)
      •  Slovakia (Slovak)
      •  Slovenia (Slovenian)
      •  Spain (Spanish)
      •  Sweden (Swedish)
      •  Switzerland(German, French)
      •  Turkey (Turkish)
      •  United Kingdom
      • Asia Pacific
      •  Australia
      •  China
      •  Hong Kong
      •  India
      •  Japan
      •  Korea (Korean)
      •  Malaysia
      •  New Zealand
      •  Philippines
      •  Singapore
      •  Taiwan
      •  Thailand (Thai)
      •  Vietnam
      • Americas
      •  Brazil (Portuguese)
      •  Canada
      •  Mexico (Spanish)
      •  United States
      Can't find the country/region you're looking for? Visit our export site or find a local distributor.
  • Translate
  • Profile
  • Settings
Internet of Things
  • Technologies
  • More
Internet of Things
Blog Support for end-to-end encryption grows; regulations for hacking software at a stand stil
  • Blog
  • Forum
  • Documents
  • Quiz
  • Events
  • Polls
  • Members
  • Mentions
  • Sub-Groups
  • Tags
  • More
  • Cancel
  • New
Join Internet of Things to participate - click to join for free!
  • Share
  • More
  • Cancel
Group Actions
  • Group RSS
  • More
  • Cancel
Engagement
  • Author Author: Catwell
  • Date Created: 4 Aug 2015 4:25 PM Date Created
  • Views 3618 views
  • Likes 2 likes
  • Comments 13 comments
  • security
  • hack
  • government
  • cyber_attack
  • internet_of_things
  • cabeatwell
  • iot
  • hacking
  • nsa
  • innovation
Related
Recommended

Support for end-to-end encryption grows; regulations for hacking software at a stand stil

Catwell
Catwell
4 Aug 2015

image

Even security officials aren't happy with the way cyberattacks are handled. Three former security officials support end-to-end encryption; regulations for hacking software will be redrafted. (image NSA HQ!)

 

Every week, a new cyber attack or wave of hacking scandals. Ashley Madison scandal, anyone? Though everyone from the government to professional hackers are trying to come up with new ways to prevent these attacks, there hasn't been one happy solution. A lot of issues stem from encryption keys and who can get their hands on them. Now, three former US national security officials have spoken out about why end-to-end encryption is the way to go.

 

Mike McConnell, a former director of the National Security Agency and director of national intelligence, Michael Chertoff, former homeland security secretary, and William Lynn, a former deputy defense secretary, argued that more US technology companies should be using end-to-end encryption of data so only the sender and the intended recipient have the decryption keys. This way the plain text of messages will not be available to companies offering products and services to the government. The trio doesn't believe the government should have “backdoor access” or duplicate decryption keys saying it only increases the risk of cyberattack. Currently, the argument for backdoor access is it allows the government to catch criminals communicating online, but three argue against this saying “This could lead to a perverse outcome in which law-abiding organizations and individuals lack protected communications but malicious actors have them.”

 

Is this the best solution to security? Not all attempts to regulate cyberattacks are well thought out. Recently, it was revealed that the US government will re-write regulations to restrict the export of software used to break into computers and smartphones. A draft of these regulations was published back in May and stated how the Department of Commerce wanted to restrict the development and testing of exploits, zero-days, and other invasion software. But after it was posted it soon received many comments and complaints, many of them from  security professionals who learned it would severely limit and may even criminalize research into surveillance software. Even those who supported the initial idea criticized the draft for being too clumsy and confusing. Google even called the rules “dangerously broad and vague.”

 

Some draft of the regulation is needed for the latest iteration of the Wassenaar agreement among 41 countries, which limits the shipping of “dual-use” technologies used for peaceful and military purposes. Despite all the negative feedback the Commerce Department took in stride and assured that “All of those comments will be carefully reviewed and distilled, and the authorities will determine how the regulations should be changed. A second iteration of this regulation will be promulgated, and you can infer from that that the first one will be withdrawn.” As of right now with the various data breaches and hacking schemes, it looks kind of bleak when it comes to preventing cyberattacks.

 

C

See more news at:

http://twitter.com/Cabe_Atwell

  • Sign in to reply

Top Comments

  • Robert Peter Oakes
    Robert Peter Oakes over 10 years ago +2
    It is a litle unfare to throw the blame at windows, there are just as many vunerabilities in Linux if not more (No one really knows them all im sure). I still remember the days when it was Unix (Older…
  • DAB
    DAB over 10 years ago in reply to Catwell

    Hi Cabe,

     

    The solution is simple, you use a verified call back function to make sure the user logged in is the person with access.

    The solution would take only a little effort to implement, but it would then limit web access to know users with verified ID's.

     

    Then you include 100% tracking on all files and messages, so no one can send a message without their originating ID.  No more anonymous viruses or spam.

     

    There would be much less abuse of the web if everyone knew that they can be held accountable for their actions.

     

    We have the technology to make this work, only the will is lacking.

     

    DAB

    • Cancel
    • Vote Up 0 Vote Down
    • Sign in to reply
    • More
    • Cancel
  • Catwell
    Catwell over 10 years ago in reply to DAB

    Dab,

     

    How do we solve it? What do you think they are holding back on?

     

    It seems to me, if you offer up a challenge, someone will try to conquer it. Hackers can't be stopped from trying, is my thought. It's a never ending battle we are destine to wage forever.

     

    C

    • Cancel
    • Vote Up 0 Vote Down
    • Sign in to reply
    • More
    • Cancel
  • DAB
    DAB over 10 years ago

    It is very unfortunate that acceptable encryption was not part of the initial net requirements.

     

    I hate to think about the millions of hours that have been lost to hacking, scamming, spam and all of the other useless network issues we face everyday.

     

    I am at a total loss, everyone in the industry knows how we can solve this problem, but nobody wants to take the blame or limit access to make it happen.

     

    DAB

    • Cancel
    • Vote Up 0 Vote Down
    • Sign in to reply
    • More
    • Cancel
<
element14 Community

element14 is the first online community specifically for engineers. Connect with your peers and get expert answers to your questions.

  • Members
  • Learn
  • Technologies
  • Challenges & Projects
  • Products
  • Store
  • About Us
  • Feedback & Support
  • FAQs
  • Terms of Use
  • Privacy Policy
  • Legal and Copyright Notices
  • Sitemap
  • Cookies

An Avnet Company © 2026 Premier Farnell Limited. All Rights Reserved.

Premier Farnell Ltd, registered in England and Wales (no 00876412), registered office: Farnell House, Forge Lane, Leeds LS12 2NE.

ICP 备案号 10220084.

Follow element14

  • X
  • Facebook
  • linkedin
  • YouTube