Apple Opens Fire In Encryption Battle

So far, the debate over encryption has been vague and broadly drawn. On one side, Silicon Valley, arguing that weakening encryption puts normal people's privacy and security at risk (and threatens their relationships with customers). On the other, the security services, police and governments, arguing (sometimes without much firm proof) that encryption helps terrorists and makes the loss of life more likely.

The problem has been so far that much of this talk has been hypothetical. Governments haven't actually detailed how they would like to see encryption changed to help them. So technology companies' responses have been equally hazy. This is why Apple's intervention is important. It is a specific response to a specific piece of legislation. Granted, that legislation - the Government's Investigatory Powers Bill or so-called "Snoopers' Charter" - is still vague.

The Government has publicly said that it doesn't want to weaken encryption - the Home Secretary even repeated this when she introduced the bill in Parliament. But the bill could force companies to hand over data 'in the clear' - a pre-existing power which has, as far as we know, never been demanded and certainly never tested in court.

Apple gives that notion both barrels writing that, "this bill will put law abiding citizens at risk, not the criminals, hackers and terrorists.
"The fact is to comply with the Government's proposal, the personal data of millions of law abiding citizens would be less secure."

That's not too different from the broad-stroke objections we've heard so far. But in the rest of its submission, Apple goes through specific clauses of the bill, explaining why it objects to them and, crucially, suggesting how they could be improved.

This is a new stage of the debate. So much depends on the nitty-gritty of how laws are written. After much high-minded rhetoric from both sides, Apple is actually getting stuck in.
Sky: http://bit.ly/1Z1U2jg

 

« NSA Helped UK Spies Find Juniper's Security Holes
Islamic State Aims to Launch Cyberattacks on US »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

Directory of Cyber Security Suppliers

Directory of Cyber Security Suppliers

Our Supplier Directory lists 7,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

High Technology Crime Investigation Association (HTCIA)

High Technology Crime Investigation Association (HTCIA)

HTCIA was formed to provide education and collaboration to our global members for the prevention and investigation of high tech crimes.

Italian Association of Critical Infrastructure Experts (AIIC)

Italian Association of Critical Infrastructure Experts (AIIC)

AIIC acts as a focal point in Italy for expertise on the protection of Critical Infrastructure including ICT networks and cybersecurity.

Quorum Cyber

Quorum Cyber

Quorum Cyber offer end-to-end cyber security solutions, specialising in Managed Security Services, Consulting and Resourcing.

FinlayJames

FinlayJames

FinlayJames supports cyber security companies to meet the increasing demand and pressure on them by finding top talent within the industry for their sales, marketing and technical teams.

Huntress Labs

Huntress Labs

Huntress provides managed threat detection and response services to uncover and address malicious footholds that slip past your preventive defenses.

Acceptto

Acceptto

Acceptto offers the first unified and continuous authentication identity access platform with No-Password.

UKsec: Virtual Cyber Security Summit

UKsec: Virtual Cyber Security Summit

Join 100s of UK Cyber Security Leaders Online for Expert Cyber Security Talks, Strategy Insights, Cyber Resilience Tips and More.

TAV Technologies

TAV Technologies

TAV Technologies is a provider of technology services to the aviation industry in areas including airport infrastructure systems, digital transformation and cybersecurity.

Precursor Security

Precursor Security

Precursor Security are information security specialist, delivering all aspects of Security testing, Cyber Risk Management, and Continuous Security Testing.

Globant

Globant

Globant is an It and software development company. We leverage the latest technologies and methodologies to help organizations transform in every aspect, including software security.

Hyperproof

Hyperproof

Hyperproof is a cloud-based compliance operations software. Launch new programs immediately, collect evidence automatically, and manage a compliance program intelligently.

Avocado Consulting

Avocado Consulting

Avocado helps clients deliver with certainty on their complex IT change, with technology services that automate, monitor and optimise.

risk3sixty

risk3sixty

Risk3sixty are information and cyber risk management craftsmen helping build business-first security and compliance programs.

Fescaro

Fescaro

FESCARO is a trusted cybersecurity partner for global automakers and their partners, helping them transition to software-defined vehicles (SDVs) with tailored automotive software solutions.

Mindflow

Mindflow

Mindflow is dedicated to bringing answers to the challenges the cybersecurity field and beyond face today.

CyberUpgrade

CyberUpgrade

CyberUpgrade is on a mission to empower executives to gain control over their organization’s cybersecurity.