British PM Wants To Ban Encryption

UK-Ban.png

 

David Cameron has signalled that he intends to ban strong encryption, putting the British government on a collision course with some of the biggest tech companies in the world. The British Prime Minister re-affirmed his commitment to tackling strong encryption products in Parliament in response to a question.

Strong encryption refers to the act of scrambling information in such a way that it cannot be understood by anyone — even law enforcement with a valid warrant, or the software company itself — without the correct key or password.

It's currently used in some of the most popular tech products in the world, including the iPhone, WhatsApp, and Facebook.

But amid heightened terrorism fears, David Cameron is attempting to take action.

Over the last year, encryption has become a hot tech policy issue. Following exiled whistleblower Edward Snowden’s revelations about mass surveillance online by the NSA and other spy agencies, tech companies have increasingly moved to incorporate strong encryption into their products to protect consumers’ data. And simultaneously, governments and law enforcement officials have upped their rhetoric, warning that proliferation of the tech could help terrorists and criminals evade capture.

When Apple implemented strong encryption by default in late 2014, for example, a senior US police officer warned that the iPhone would become the “phone of choice for the pedophile” as a result. And European police chief Rob Wainwright said in March 2015 that encryption is now the “biggest problem” in tackling terrorism.

It’s a difficult situation. On the one hand, it’s easy to sympathise with law enforcement, who fear that large amounts of communications data they previously had access to are now “going dark.” 
But security experts warn that any attempt to weaken encryption or introduce “back doors” for the authorities can have unintended and dangerous consequences. There’s no back door that can only be used by the good guys, they argue, and weakening the tech will put consumers at risk from criminals and hackers.

Yahoo : http://bit.ly/1Lb41cV

« Use Threat Intelligence to Boost Mobile Security
FBI - Encryption is Great as Long as it Still Lets Us In »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Cyber Security Supplier Directory

Cyber Security Supplier Directory

Our Supplier Directory lists 6,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

Technology Association of Georgia (TAG)

Technology Association of Georgia (TAG)

TAG's mission is to educate, promote, influence and unite Georgia's technology community to stimulate and enhance Georgia's tech-based economy.

RSA Insurance Group

RSA Insurance Group

RSA is one of the world’s leading multinational quoted insurance groups. Commercial services include cyber risk insurance.

Clearwater Security & Compliance

Clearwater Security & Compliance

Clearwater Compliance specialize in Privacy, Security, Compliance and Risk Management Solutions for Health Care, Law Firms and other businesses.

Insta Group

Insta Group

Insta are a trusted cyber security partner for security-critical companies and organizations.

Medigate

Medigate

Medigate is a dedicated medical device security platform protecting all of the connected medical devices on health care provider networks.

Cycura

Cycura

Cycura provide advanced, customized, and confidential cyber security services, cyber investigation services, and digital forensic services to governments, companies, and organizations.

Tigera

Tigera

Tigera provides zero-trust network security and continuous compliance for Kubernetes platforms that enables enterprises to meet their security and compliance requirements.

Barbara IoT

Barbara IoT

Barbara is an industrial device platform specifically designed for IoT deployments.

MyCyberSecurity Clinic (MyCSC)

MyCyberSecurity Clinic (MyCSC)

MyCyberSecurity Clinic's main goal is toward establishing an international reference centre for excellence in the field of digital forensics and data recovery services.

PeopleSec

PeopleSec

PeopleSec specializes in the human element of cybersecurity with a comprehensive set of services designed to maximize your security by educating your workforce as a whole.

Informer

Informer

Informer provides an Attack Surface Management SaaS platform alongside penetration testing services. We combine machine learning and human intelligence to reduce cyber risk.

Cyber Chasse

Cyber Chasse

Cyber Chasse is an IT consulting and staffing company offering a full range of cybersecurity solutions, contract staffing services and online training courses.

Circle Security

Circle Security

Circle’s breakthrough security API unifies solutions for identity and data security into one architecture and empowers organizations to secure their identity, data and privacy in their applications.

xdr.global

xdr.global

Xdr.global is a cybersecurity consulting firm, focused on promoting and aligning Extended Detection and Response (XDR) security solutions.

Gomboc.ai

Gomboc.ai

Gomboc solve cloud infrastructure security policy deviations by providing tailored remediations to the IaC (Infrastructure as Code).

Institute for Applied Network Security (IANS)

Institute for Applied Network Security (IANS)

For the security practitioner caught between rapidly evolving threats and demanding executives, IANS Research is a clear-headed resource for decision making and articulating risk.