1/25/2020

Headline, January 25 2019/ STUDENTS : '' ' PRIVACY DEBATE PRIMERS ' ''


STUDENTS : '' ' PRIVACY 

DEBATE PRIMERS ' ''




STUDENTS INTERNAL MESSAGING AND COMMUNICATIONS on The World Students Society, heretofore ever and more - will be called SAMBOOK.

What laws, by-laws, rules, and values will apply and govern that :
Merium, Rabo, Haleema, Dee, Saima, Zilli, Sara, Juniper, Lakshmi, Seher, Aqsa, Sameen, Areesha, Armeen, Susan, Jennifer, Zainab?

Hussain, Shahzaib, Salar, Bilal,  Haider, Zaeem, Danyial, Toby, Vishnu, Ali? 

U.S.A. - AUSTRALIA - INDIA : Just about every government in the world is considering some very, very new encryption laws.

In India, Facebook's biggest market, officials told the country's Supreme Court in October that Indian law requires Facebook to decrypt messages and supply them to law enforcement agencies upon request.

''They come into the country and say, ''We will establish a non-decryptable system,'' India's attorney general, K.K. Venugopal told the court, referring to Facebook and other big tech platforms

GOVERNMENT THE WORLD OVER have stepped up their calls for an  encryption back door.

Last year, Australian lawmakers passed a bill requiring  technology companies to provide law enforcement and security agencies with access to encrypted communications.

The bill gave the government the ability to get a court order allowing it to secretly order technology companies and technologists to re-engineer software and hardware so that it can be used to spy on users.

Australia's law is based on Britain's 2016 Investigatory Powers Act, which compels British companies to hand over the keys to unscramble to unscramble encrypted data to law enforcement agencies.

The Australian law could apply to overseas companies like Facebook and Apple.

A UNITED STATES JUSTICE DEPARTMENT official has hinted that a year long fight over  encrypted communications could become part of a sweeping investigation of big tech companies.

While a department spokesman declined to discuss specifics, a speech last week by the deputy attorney general Jeffrey A. Rosen, pointed towards heightened  interest in technology called end-to-end encryption, which makes it nearly impossible for law enforcement and spy agencies to get access to people's digital communications.

Law enforcement agencies and technologists have been have been arguing over encryption controls for more than two decades. One side are  privacy advocates and tech bosses like Apple's chief executive, Timothy D. Cook, who believe people should be able to have online communications free of snooping.

On the other side are law enforcement organizations and some lawmakers, who believe tough encryption makes it impossible to rack child predators, terrorists and other predators and criminals.

The United States attorney general, William P. Barr, joined by his British and Australian counterparts, recently pressed Facebook's chief executive Mark Zuchkerberg, to abandon plans to embed end-to-end encryption in services like Messenger and Instagram.

WhatsApp, which is owned by Facebook, already provides that tougher encryption. ''Companies should not deliberately design their systems to preclude any forms of access to content even for preventing or investigating the most serious crimes,'' Mr. Barr wrote in a letter last month.

For the students then, here is an explanation of the technology and the stakes:

HOW IT WORKS

End-to-end encryption scrambles the messages in such a way that they can deciphered only by the sender and the intended recipient, As the label implies, end-to-end encryption takes place on either end of the communication,

A message is encrypted on a sender's device, send to the recipient's device in an unreadable format, then decoded for the recipient,
There are several ways to do this, but the most popular works like this : A program on your device mathematically generates two encryption keys - a public key and a private key.

The public key can be shared with anyone who wants to encrypt a message to you. The private key, or secret key decrypts messages sent to you and never leaves your device.

Think of it as a locked mailbox. Anyone with a public key can put something in your box and lock it, but only you have the private key to unlock it.

The Honor and Serving of the Latest Global Operational Research on Privacy, Encryption, Laws and  Research, continues. The World Students society thanks author Nicole Perlroth.

With respectful dedication to the Security Agencies, Law Enforcement, Students, Professors and Teachers of the World.

See Ya all prepare and register for Great Global Elections on The World Students Society : wssciw.blogspot.com and Twitter - !E-WOW! - The Ecosystem 2011:

 ''' Crystals & Cramps '''

Good Night and God Bless

SAM Daily Times - the Voice of the Voiceless

0 comments:

Post a Comment

Grace A Comment!