'Not Impossible' To Create Compromised Encryption That's Still Secure
He probably also believes:
It is 'Not Impossible' To Create Corrupt Politicians That Are Still Ethical.
Your computer didn't have any kiddie pr0n on it when you took it in to Best Buy.
But it did have some by the time the minimum wage geek squad called the FIB to get paid for turning it in.
Even if nothing illegal is found, something innocent, like some forms of real art, or the classic baby's behind photo, could result in a minimum wage geek squad ruining someone's life or career.
You underestimate the seriousness. I'll use a TSA example. I've got a pair of nail clippers! Stand back! Back, I say! (clip) (clip clip!) I'm going to use these nail clippers to take over the plane! Nobody will be able to overpower me with my trusty nail clippers!
I'm not an (anti-police)-requester.
I'm an anti-(police-requester). I promise.
So can you please send me the recordings?
Followup question.
Do all people have God given inalienable rights? Or just US citizens?
The government got off on the wrong foot by claiming its demand for communications wasn't a search
Wow.
Doesn't the 4th amendment protect your papers and effects from search without a warrant? What are papers? Not the things you roll up to smoke. But the things used for . . . duh . . . Communications! What else are papers used for? (bird cage lining)
Isn't the primary use of paper, since it was invented by smashing plant material by hand, and rolled up on scrolls, wasn't the purpose: Communications?
So how can a demand for communications, NOT be a demand for 21st century Papers? And thus requiring a warrant? Even PDFs are considered papers in the 21st century.
Most communications today are on "Web Pages" for goodness sake. So aren't your papers, eg, communications, protected by the 4th amendment?
As a patriotic American, I'm proud to stand up and support the freedoms we once had.
Getting your call history from your cell phone provider does not have that delightful dehumanizing appeal of forcibly taking it from your physical phone.
Responsible Warrants can do for real world searches and seizures what Responsible Encryption does for the digital world.
A judge grants a "Responsible Warrant" that is very specific in defining the bounds and parameters which limit the scope of the search. Namely, you are allowed to search anything, on anyone, anywhere, at any time without any supervision whatsoever.
Based on watching the last 20 years of history, I will go ahead and predict that Responsible Warrants are comming soon to a regime near you!
Today they can hack Apple's phone.
Tomorrow they won't be able to.
The next day, they will be able to once again.
Etc.
Wash, rinse, tail-recursion.
New and improved: you get the presidents you deserve.
Fine congress for not getting budgets done on time.
Was: First, let's stop giving politicians bad ideas.
Now: First, let's stop giving bad politicians ideas.
Encryption is either:
1. Secure
2. Insecure
It's a binary choice. Not a sliding scale. Like being pregnant. You are or you are not. There is no try.
If encryption is secure, then hackers cannot break it -- but neither can government.
If encryption is insecure, then government can break it -- but so can hackers.
What other country would agree to accept him?
Can he contribute anything to their country?
If people are allowed to disrespect cops, then they will also not show respect to politicians or to our great orange dear leader. Oh, my.
Since free communication is what the internet is all about, copyright is directly opposed to the internet.
Conflicts between the two will continue to get worse and worse until something big happens to clarify.
Copyright Infringement should be about direct infringement. Not linking. Not embedding. If you go after the direct infringement, then the links or embeds simply do not matter. And you can't find all the links or embeds anyway. So you would better spend your time chasing down the direct infringer, eg follow the link to its source. Leave third parties alone -- especially if the link or embed came from someone else, like a commenter or poster in an online forum.
Also . . .
If you see piracy . . . duck and cover!
I don't have a problem going after copyright infringers. But you're pretty seriously stretching the meaning of "encourages or assists". Stretching it waaaaay too far. Careful there. (snap) Oooops. It just snapped because you stretched it too far.
Be sure you are using an ad blocker while engaging in piracy.
Re:
Your explanation is correct. But it is not as simple as a sound byte that cuts through all of the detail.
You can have either:
1. Secure systems. Hackers can't get in, and neither can government.
2. Insecure systems. Government can get in, but so can hackers.
You can't have both. They are mutually exclusive. It is not a sliding scale. It is like being pregnant. You are. Or you are not. There is no try.