{"id":6835,"date":"2015-07-22T16:00:35","date_gmt":"2015-07-22T21:00:35","guid":{"rendered":"http:\/\/hcstx.org\/?p=6835"},"modified":"2015-07-22T16:00:35","modified_gmt":"2015-07-22T21:00:35","slug":"shooting-holes-in-the-willy-wonka-golden-encryption-key-myth","status":"publish","type":"post","link":"https:\/\/thetacticalhermit.com\/index.php\/2015\/07\/22\/shooting-holes-in-the-willy-wonka-golden-encryption-key-myth\/","title":{"rendered":"Shooting Holes in the Willy Wonka &#8220;Golden Encryption Key&#8221; Myth"},"content":{"rendered":"<p>In response to a recent article in <strong><em><a href=\"http:\/\/motherboard.vice.com\/read\/a-golden-key-for-encryption-is-mythical-nonsense\">Motherboard<\/a>,\u00a0<\/em><\/strong>Mr. A had this to say&#8230;.<\/p>\n<p>&nbsp;<\/p>\n<p><a href=\"https:\/\/hcsblogdotorg.files.wordpress.com\/2015\/07\/golde.jpg\"><img decoding=\"async\" loading=\"lazy\" class=\"aligncenter size-full wp-image-6836\" src=\"https:\/\/hcsblogdotorg.files.wordpress.com\/2015\/07\/golde.jpg\" alt=\"golde\" width=\"275\" height=\"183\" \/><\/a><\/p>\n<p>&nbsp;<\/p>\n<div dir=\"ltr\">\n<div>\n<p>This article gets it right, but fails to point out the motivations behind the<em><strong> \u2018golden key\u2019.<\/strong><\/em><\/p>\n<p>First, the idea of a \u2018golden key\u2019 is a decryption backdoor key that only the government would possess. This, we are told, is necessary in order for the government to catch criminals or terrorist by decrypting messages from common communications mediums that are encrypted. (iMessage, FaceTime, etc)<\/p>\n<p>We are told that if you have nothing to hide you shouldn\u2019t worry, and we all are at risk from criminals and terrorist.<\/p>\n<p>Here\u2019s the thing: You could create a \u2018golden key\u2019 and force businesses to use them. You cannot, however, force existing open source encryption technologies to use that golden key.<\/p>\n<p>A criminal organization or terrorist cell with even a small amount of intelligence would not trust vital communications to common technologies like this. They may use them, but anything vital would be obscured with alternative terminology known to senders and recipients. Clear instructions or damning comments would be delivered by alternate means. (encrypted with PGP, OTP, hidden in images or files, uploaded on the\u00a0 DarkNet for download by another party, etc)<\/p>\n<p>So again, what is behind the push for a \u2018golden key\u2019?<\/p>\n<p>This is about you. It\u2019s about all seeing EYE being able to see at will everything about you.<\/p>\n<p>How could it be otherwise?<\/p>\n<p>Criminals will use these technologies with care or not at all. If a golden key is implemented, they will use greater care or stop altogether. They will rely on encryption without a backdoor. So it is once again about you and not the criminal.<\/p>\n<p><em><strong>-Mr. A<\/strong><\/em><\/p>\n<\/div>\n<\/div>\n<p>&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>In response to a recent article in Motherboard,\u00a0Mr. A had this to say&#8230;. &nbsp; &nbsp; This article gets it right, but fails to point out the motivations behind the \u2018golden key\u2019. First, the idea of a \u2018golden key\u2019 is a decryption backdoor key that only the government would possess. This, we are told, is necessary&#8230;<\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"jetpack_post_was_ever_published":false,"_jetpack_newsletter_access":"","_jetpack_newsletter_tier_id":0,"jetpack_publicize_message":"","jetpack_is_tweetstorm":false,"jetpack_publicize_feature_enabled":true,"jetpack_social_post_already_shared":false,"jetpack_social_options":{"image_generator_settings":{"template":"highway","enabled":false}}},"categories":[13,74,1317,883,1814,1189,65],"tags":[1811,1812,1813,1815,183,1816,1817,1818],"jetpack_publicize_connections":[],"jetpack_sharing_enabled":true,"jetpack_featured_media_url":"","_links":{"self":[{"href":"https:\/\/thetacticalhermit.com\/index.php\/wp-json\/wp\/v2\/posts\/6835"}],"collection":[{"href":"https:\/\/thetacticalhermit.com\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/thetacticalhermit.com\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/thetacticalhermit.com\/index.php\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/thetacticalhermit.com\/index.php\/wp-json\/wp\/v2\/comments?post=6835"}],"version-history":[{"count":0,"href":"https:\/\/thetacticalhermit.com\/index.php\/wp-json\/wp\/v2\/posts\/6835\/revisions"}],"wp:attachment":[{"href":"https:\/\/thetacticalhermit.com\/index.php\/wp-json\/wp\/v2\/media?parent=6835"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/thetacticalhermit.com\/index.php\/wp-json\/wp\/v2\/categories?post=6835"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/thetacticalhermit.com\/index.php\/wp-json\/wp\/v2\/tags?post=6835"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}