Client-side scanning, as the technology is called, should really be treated like wiretapping and regulated accordingly

For centuries, cryptography was the exclusive preserve of the state. Then, in 1976, Whitfield Diffie and Martin Hellman came up with a practical method for establishing a shared secret key over an authenticated (but not confidential) communications channel without using a prior shared secret. The following year, three MIT scholars – Ron Rivest, Adi Shamir and Leonard Adleman – came up with the RSA algorithm (named after their initials) for implementing it. It was the beginning of public-key cryptography – at least in the public domain.

From the very beginning, state authorities were not amused by this development. They were even less amused when in 1991 Phil Zimmermann created Pretty Good Privacy (PGP) software for signing, encrypting and decrypting texts, emails, files and other things. PGP raised the spectre of ordinary citizens – or at any rate the more geeky of them – being able to wrap their electronic communications in an envelope that not even the most powerful state could open. In fact, the US government was so enraged by Zimmermann’s work that it defined PGP as a munition, which meant that it was a crime to export it to Warsaw Pact countries. (The cold war was still relatively hot then.)

Continue reading…

Leave a Reply

Your email address will not be published. Required fields are marked *

You May Also Like

The Best Deals and Cases for Every Galaxy S21

Samsung has three new flagship phones it wants to sell you: the…

Dry January Will Be Wetter Than Ever

Labor union members marching through Broad Street carrying signs reading ‘We Want…

Countdown to 2022

new years countdown 2022, Countdown

JPMorgan and Deutsche Bank seek dismissal of lawsuits by Epstein accusers

Women say banks enabled and ignored red flags about the financier’s sex…