Error message

Deprecated function: Array and string offset access syntax with curly braces is deprecated in include_once() (line 20 of /home/drbiz/public/2013.realism.com/includes/file.phar.inc).

Security, Encryption, and You

Event Name: 
Business Builders
Event Date(s): 
17 Dec 2015

This short presentation was done in response to the renewed calls for government access to communications after ISIS terrorist attacks against Paris on 13 Nov 2015.

Use License: 
All Rights Reserved
Active: 
Yes

 

 

 

Security, Encryption, and You

 

Business Builders
San Fernando Valley

 

Leonard Daly

17 December 2015
 

 

 

This is the 21st Century

 

  • Electronic Business, Transactions, and Communications are now the norm
  • People expect to send and receive messages in private
    • Banking
    • Medical records
    • Personal messages
    • Business communications
  • All are secured with encyrption

 

 

 

Your Data and Access are Now Mobile

 

Standard messages are encrypted

 

 

 

 

All data on phone can be encrypted

 

 

 

Multiple Leaks Pushed Encryption

 

  • NSA leaks from Edward Snowden
     
  • Multiple commercial releases of private information
     
  • Pushed by consumers and businesses

 

 

 

Renewed Calls for Access

 

 

  • Terrorist attackes in Paris (2015-11-13) renewed calls for more government monitoring of all communication

     

  • Multiple claims for a "backdoor" to access messages and devices

"... if you create a product that allows evil monsters to communicate in this way, ... that is a big problem. So we need high tech’s help in securing an internet that even with a court order you can’t get to what they’re saying. That’s a big problem."

 

Sen. Diane Feinstein, interview with MSNBC (16 Nov 2015)

 

 

Why it's Wrong

 

  • Encryption locks communications


     

 

 

 

  • "Back-doors" are available to anyone

 

 

Access

 

 

  • The Government would not be the only one with access

     

  • Using the decryption process is not a skilled operation

     

  • Access to communications are available to all

     

  • Anyone with money, power, or luck will have access to all messages, transactions, etc.