HACKER Q&A
📣 methodin

Topics on Encryption vs. Abuse?


I've been trying to find papers or articles about providing end-to-end encryption but in a way that you can detect or avoid it being used for nefarious/illegal purposes. I'm having a difficult time searching for actual technical details about ways to do so and am only getting general articles. Does anyone know of any technical papers or articles about that topic, or perhaps even other terms I can use to find such things?


  👤 PaulHoule Accepted Answer ✓
How about

https://en.wikipedia.org/wiki/Clipper_chip

It's a tough problem. Leaving aside the question of "do we trust the government with it?" That kind of thing is a genie that you can't put back in the bottle. Edward Snowden did not walk away from the NSA with a set of back door keys, but if they existed, somebody like him could.

In 2020 any such tool is on the side of chaos and not order. Today we're having to shut down hospitals because hackers hit the computer. The risk that some people are going to abuse encryption sometime is hypothetical, the risk that people are going to exploit anything that is possible to exploit is urgent.


👤 mytailorisrich
End-to-end encryption means that no-one apart from the sender and recipient have access to the cleartext.

To detect what end-to-end encryption is used for I suppose that you need to scan and analyse the cleartext.

So...