| Tweetovi |
| Mayank Varia proslijedio/la je tweet | ||
|
Duality Technologies
@DualityTech
|
23. sij |
|
Duality co-founder and Chief Scientist Shafi Goldwasser on homomorphic #encrytion and how it enables consumers to use apps and enjoy data-driven services without giving away their #privacy. #dataprivacy
reut.rs/2NWly0q
|
||
|
|
||
| Mayank Varia proslijedio/la je tweet | ||
|
Evan Selinger
@EvanSelinger
|
23. sij |
|
Don't know who runs @WeSellYourData & wesellyourdata.com. It's the best-damned thing I've seen in a long time!
"Our company doesn't attempt to provide you a service in exchange for your data. Instead, you voluntarily give us your data, and you receive nothing in return."
|
||
|
|
||
|
Mayank Varia
@mvaria
|
11 h |
|
Nothing. Absolutely nothing. (Seriously, please stop trying to link all computer security stories to the encryption debate.) twitter.com/FortuneMagazin…
|
||
|
|
||
|
Mayank Varia
@mvaria
|
5. velj |
|
Paging @andy_sellars to clean up this mess of an argument gizmodo.com/ceo-of-creepy-…
|
||
|
|
||
|
Mayank Varia
@mvaria
|
3. velj |
|
I have been saying for awhile that encryption protections were going to be linked to the public's trust in the technology sector. But I didn't expect the link to be this brazen gizmodo.com/lindsey-graham… twitter.com/mvaria/status/…
|
||
|
|
||
|
Mayank Varia
@mvaria
|
27. sij |
|
This quote is priceless: "Laws have to determine what’s legal, but you can’t ban technology. Sure, that might lead to a dystopian future or something, but you can’t ban it." nytimes.com/2020/01/18/tec…
|
||
|
|
||
|
Mayank Varia
@mvaria
|
24. sij |
|
"It is now well past time to rethink the belief that [exceptional access] solutions are impossible and that encryption means law enforcement officials cannot do their jobs." thehill.com/opinion/techno…
|
||
|
|
||
|
Mayank Varia
@mvaria
|
24. sij |
|
Tl;dr: silly move, AG. Enjoy that can of worms you just opened…
|
||
|
|
||
|
Mayank Varia
@mvaria
|
24. sij |
|
Touché. Just to reiterate my view: I maintain that "# of phones in custody" is a metric of limited value (i.e., it's an insufficient and uninteresting metric to get from LEAs). But if the AG is going to make this argument, then he has a responsibility to corroborate the assertion
|
||
|
|
||
|
Mayank Varia
@mvaria
|
23. sij |
|
Measuring the problem is certainly relevant. I just don't think that the absolute number of investigations is important. I'm far more interested in forming a taxonomy of scenarios and learning their relative frequency, eg does the locked phone belong to the victim or suspect?
|
||
|
|
||
|
Mayank Varia
@mvaria
|
16. sij |
|
[Facepalm] I'm one of the few people who thinks that "# of encrypted phones in police custody" is irrelevant to the crypto wars. But if *you* bring it up, then fine: publish detailed data showing how often encryption forms an impassable obstruction to an investigation. twitter.com/ericgeller/sta…
|
||
|
|
||
|
Mayank Varia
@mvaria
|
16. sij |
|
This is a big deal for the crypto wars. My hypothesis: if we see trust in law enforcement ≫ trust in technology (companies), then big changes in encryption policy will soon follow. twitter.com/amatwyshyn/sta…
|
||
|
|
||
|
Mayank Varia
@mvaria
|
13. sij |
|
What on earth happened at the RWC corporate happy hours? They turned @matthew_d_green into Mad Max twitter.com/matthew_d_gree…
|
||
|
|
||
|
Mayank Varia
@mvaria
|
13. sij |
|
"Crypto agility" can mean two different things
1. Supporting multiple cipher suites simultaneously (like TLS 1.2). This is vulnerable to downgrade attacks.
2. Designing software so that you can later change crypto primitives quickly if you realize the current one is broken.
|
||
|
|
||
| Mayank Varia proslijedio/la je tweet | ||
|
Ben Adida
@benadida
|
10. sij |
|
17/ So we are far from declaring victory, but we also need to stop saying that voters can't verify their ballots. They can. Even without a slate. They need to be nudged / given the opportunity to actually look. When they look, they find errors. Even in elections with zero stakes.
|
||
|
|
||
|
Mayank Varia
@mvaria
|
10. sij |
|
I know what changed, but I don't want to say so publicly. Hint: it has to do with one of @senykam's former grad school colleagues.
|
||
|
|
||
|
Mayank Varia
@mvaria
|
10. sij |
|
How on earth does Google have this data? The first half of the talk focused on password privacy
|
||
|
|
||
|
Mayank Varia
@mvaria
|
10. sij |
|
As usual, there's a great line in Rogaway's moral character paper that makes precisely this point. Note that large tech companies have adopted DP much more than MPC/FHE, perhaps in part because (non-local) DP encourages the existence of a trusted central curator pic.twitter.com/3cVEFl9cM1
|
||
|
|
||
|
Mayank Varia
@mvaria
|
10. sij |
|
This is the strangest privacy argument I have ever read. "All societies have had one person in history who was truly evil, whereas ad-tech is only somewhat evil. So unless you are willing to shun human civilization and live as a hermit, you cannot criticize ad-tech." twitter.com/XorNinja/statu…
|
||
|
|
||
|
Mayank Varia
@mvaria
|
10. sij |
|
I call them privacy reducing technologies, as they are upending the original hope offered by privacy enhancing technologies twitter.com/mvaria/status/…
|
||
|
|
||