There are some limits to free speech, even in the US. I haven't gone to the trouble of looking up any of Alchin's texts but if he threatened to do harm to his correspondents than that could very well be a criminal offense even in the US.
Just about what I was going to say. Print a quote in a book review or some other publication, $6.00 per word. Same for oral statements. Politicians may be able to fund an election campaign from the money obtained from the NYT.
Just what I was going to say. Quote a passage from a book in a book review or other publication - $6.00 per word. And politicians might be able to fund their campaign for election from proceeds from the NYT.
Also, like sports broadcast networks (ESPN) that pay big bucks to sports leagues (NFL, NBA) for broadcast rights, then increasing subscriber fees to cable companies to cover these costs, resulting in cable companies increasing fees while people drop the more expensive packages containing sports networks producing major layoffs of sports broadcast personalities. Not sure this is a tragedy of the commons but it could be the tragedy of expensive cable programming and sports broadcast celebrities going away.
Her server might have been more secure than that of the State Department's. Not sure, though. Also, not sure whether Patraeus's secrets to his mistress went beyond her. The military has pretty severe penalties when officers are involved in illicit sexual affairs, particularly if married at the time. A double whammy in his case.
IIRC, the National Institute of Standards and Technology (NIST) was found to have purposely compromised encryption technology by producing a poor random number generator used in some encryption products. Once that was corrected I'm guessing various commercial encryption methods improved immensely.
Perhaps a bit off topic but the push by some government three letter agency leaders and politicians for back doors to encryption probably won't stop the use of secure encryption. Should this be required and implemented then immediately cracked it would be interesting to see the response of those pushing this when their most private correspondence is published including financial records, hotel bills, notes to girlfriends or boyfriends, etc.
It'll be interesting how the anti-privacy hawks will feel if they get their way regarding the installation of back doors in hardware and software and their most private and secret information is made available for all to read. For sure as soon as the back doors are installed they will be hacked and there will be no data privacy for anyone unless stored completely off the Internet. Then again, there may be some advantages. Government may become very transparent!
There's a pretty big building that I passed that houses ISS. Hmm... I wondered if they needed to change their name. I think it stands for Intelligent Software Solutions. And then there's the International Space Station, and there's a company that makes fluorescence equipment. And there are Chase bank branches all over town and I wonder if ISS employees have problems with their banking there. Oh, hum...
All signals, like messages, are encrypted over an HTTPS connection with 128-bit encryption, using TLS 1.2. The connection is encrypted and authenticated using AES_128_GCM. The key exchange mechanism is ECDHE_ECDSA.
Audio and video
To improve audio and video quality, Hangouts calls use a direct peer-to-peer connection when possible, instead of routing through a server.
Audio and video in Hangouts are encrypted using SRTP. Video is AES_CM_128_HMAC_SHA1_80, and audio is AES_CM_128_HMAC_SHA1_32 (128-bit AES encryption and SHA-1 HMAC for authentication).
When you dial a phone number from a Hangout, audio is encrypted until it reaches the carrier network. But telephone carriers are responsible for the audio within carrier networks
I'm not a security expert, but it seems messages using Hangouts are end-to-end encrypted over Wi-Fi and possibly over cell networks. I believe that's also the case for Gmail as messages are stored encrypted on Google's servers. Whether decryption of these Google products messages can be done by others, I don't know. Others should comment.
The possibility of detecting members of a connected web of terrorists by just knowing their messaging connections should one or more persons in the terrorist web is a known terrorist is a fascinating possibility. This suggests the authorities need to leave at least one known terrorist at large for awhile to complete the web while keeping an eye on the connected individuals. Burner phones may be a problem in this scenario, though.
The USA is one of the only places, maybe the only place, where free speech is enshrined in the a founding document. The UK does not have such a commitment as far as I know. Even then, there are limits to free speech in the USA - you can't yell, "Fire!" in a theater when there is no fire to start a riot of escape. Threatening someone with violence or other threats is not allowed and can put one in jail, too.
It seems the conventional wisdom has been that no one, not even Apple, could break into one of their phone's encrypted data. I guess that's not the case. It may be Apple can't guarantee such a level of security and this knowledge will one of the most important results of this episode. Perhaps the best way to prevent anyone getting at your data is to physically destroy the phone with an industrial strength shredder and/or a high temperature blow torch focused on its parts.
I admitted I was somewhat ignorant of what Apple could do and what folks who bought iPhones thought Apple or anyone else could not do, that is get at the decrypted data in the phone. According to Mike Masnick's post above even new phones can be hacked without destroying the data or the encryption key. Updating the phone's OS does not harm the data or or the encryption key if done properly. Apple can do this and apparently has done this at least 70 times for law enforcement.
My interest is to stimulate discussion. I haven't heard whether Apple ever claimed the encrypted data and its decryption key could be obtained. It looks like it can regardless of what iPhone owners thought.
I'm not an iPhone user and pretty ignorant about what's going on here with regard to Apple's ability to undo the encryption on it's phones, old or new, but my guess is that a vary high percentage (>>99% ?) of iPhone purchasers believed that no one, not even Apple, could gain access to the encrypted data on an iPhone that was properly secured. I'm not sure Apple ever said that but it seems to be the conventional wisdom. It's also possible that a lot of folks didn't care, but for knowledgeable people who use their iPhones for things that ordinary, law abiding folks do, such as banking, retail purchases at brick and mortar stores, etc., such security was very, very important. Apple needs to match perception or admit it can't be done.
TV sets have basically become video monitors with multiple inputs - cable/satellite boxes, Blu-ray players, Chromecasts, Rokus, gaming consoles, computers, etc. The only real requirement is they contain an over the air broadcast tuner. I don't even know why they need to have "smartness" built in and from my experience the smart TV UI is horrible. If the built in cable box were to die or need hardware upgrade to get the latest video experience, you'd probably have to throw the whole thing away or get a new attachment anyway. Keep the TV as a video monitor and let folks buy the attachments they want.