OUT OF MIND
Would you like to react to this message? Create an account in a few clicks or log in to continue.
Latest topics
» Is it possible to apply positive + in favor Newton III Motion Law as a dynamic system in a motor engine
The Cryptography Conundrum  EmptySat Mar 23, 2024 11:33 pm by globalturbo

» Meta 1 Coin Scam Update - Robert Dunlop Arrested
The Cryptography Conundrum  EmptySat Mar 23, 2024 12:14 am by RamblerNash

» As We Navigate Debs Passing
The Cryptography Conundrum  EmptyMon Jan 08, 2024 6:18 pm by Ponee

» 10/7 — Much More Dangerous & Diabolical Than Anyone Knows
The Cryptography Conundrum  EmptyThu Nov 02, 2023 8:30 pm by KennyL

» Sundays and Deb.....
The Cryptography Conundrum  EmptySun Oct 01, 2023 9:11 pm by NanneeRose

» African Official Exposes Bill Gates’ Depopulation Agenda: ‘My Country Is Not Your Laboratory’
The Cryptography Conundrum  EmptyThu Sep 21, 2023 4:39 am by NanneeRose

» DEBS HEALTH
The Cryptography Conundrum  EmptySun Sep 03, 2023 10:23 am by ANENRO

» Attorney Reveals the “Exculpatory” Evidence Jack Smith Possesses that Exonerates President Trump
The Cryptography Conundrum  EmptyTue Aug 29, 2023 10:48 am by ANENRO

» Update From Site Owner to Members & Guests
The Cryptography Conundrum  EmptyTue Aug 29, 2023 10:47 am by ANENRO

» New global internet censorship began today
The Cryptography Conundrum  EmptyMon Aug 21, 2023 9:25 am by NanneeRose

» Alienated from reality
The Cryptography Conundrum  EmptyMon Aug 07, 2023 4:29 pm by PurpleSkyz

» Why does Russia now believe that Covid-19 was a US-created bioweapon?
The Cryptography Conundrum  EmptyMon Aug 07, 2023 4:27 pm by PurpleSkyz

»  Man reports history of interaction with seemingly intelligent orbs
The Cryptography Conundrum  EmptyMon Aug 07, 2023 3:34 pm by PurpleSkyz

» Western reactions to the controversial Benin Bronzes
The Cryptography Conundrum  EmptyMon Aug 07, 2023 3:29 pm by PurpleSkyz

» India unveils first images from Moon mission
The Cryptography Conundrum  EmptyMon Aug 07, 2023 3:27 pm by PurpleSkyz

» Scientists achieve nuclear fusion net energy gain for second time
The Cryptography Conundrum  EmptyMon Aug 07, 2023 3:25 pm by PurpleSkyz

» Putin Signals 5G Ban
The Cryptography Conundrum  EmptyMon Aug 07, 2023 3:07 pm by PurpleSkyz

» “Texas Student Dies in Car Accident — Discovers Life after Death”
The Cryptography Conundrum  EmptyMon Aug 07, 2023 3:05 pm by PurpleSkyz

» The hidden history taught by secret societies
The Cryptography Conundrum  EmptyMon Aug 07, 2023 3:03 pm by PurpleSkyz

» Vaccines and SIDS (Crib Death)
The Cryptography Conundrum  EmptyMon Aug 07, 2023 3:00 pm by PurpleSkyz

» Sun blasts out highest-energy radiation ever recorded, raising questions for solar physics
The Cryptography Conundrum  EmptyMon Aug 07, 2023 2:29 pm by PurpleSkyz

» Why you should be eating more porcini mushrooms
The Cryptography Conundrum  EmptySun Aug 06, 2023 10:38 am by PurpleSkyz


You are not connected. Please login or register

The Cryptography Conundrum

Go down  Message [Page 1 of 1]

1The Cryptography Conundrum  Empty The Cryptography Conundrum Wed Aug 10, 2016 12:02 pm

PurpleSkyz

PurpleSkyz
Admin

The Cryptography Conundrum

Moral, pure, political or subversive?

How can cryptographers develop more effective means to resist unlawful mass surveillance?

http://alcuinbramerton.blogspot.com/2015/12/the-cryptography-conundrum.html
Alcuin Bramerton Twitter .. Alcuin Bramerton Medium
Alcuin Bramerton profile ..... Index of blog contents ..... Home .....#1ab

Picture: The Morals of Cryptographic Work. Phillip Rogaway. AsiaCrypt 2015.
The Cryptography Conundrum  The%2BMoral%2BCharacter%2Bof%2BCryptographic%2BWork.%2BPhillip%2BRogaway.%2BAsiaCrypt%2B2015.%2B%25231ab

......................................................................
We live immersed in a parasitically interconnected world of nearly unavoidable electronic communications.

Most of the data we generate in that world is unknown to us. Our data is stolen and exploited by invisible Others who know much more about us than we know about them.

We have an agenda for our electronic lives; so do the Others.

Since WikiLeaks, Chelsea Manning and Edward Snowden, we have learned that our electronic agenda and the electronic agenda of the invisible Others of BigData do not always coincide in perfect purity. There is good at work; but there is also evil. There are goodies and there are baddies.

This is one reason why, at the highest levels of state intelligence, Russia is said to be making and using manual typewriters again.

None of that sovereign state's most important planning, recording or analytical documentation is generated or stored electronically. Its paper-only documents are designed to exist beyond the reach of hackers or electronic surveillance.

Russia and others have moved in this direction because, in the world of computer networks, cryptography has failed.

The cryptographers are bought and paid for. As a species, they can no longer be trusted. As an intellectual culture, the cryptographic community has allowed itself to become fatally compromised by ulterior motives.

Cryptography is about code and about how to write it in covert functioning formats for computer networks.

Cryptography is supposed to employ methods of storing and transmitting data in particular forms so that only those for whom it is intended can read and process it. Peeping Toms, voyeurs and electronic tourists are supposed to be designed out. No access. Instead, unscrupulous cryptographers provide the lice with privileged back doors through which to creep in.

Privacy, cryptography and surveillance are overlapping domains.

In December 2015, at AsiaCrypt2015 in New Zealand, Phillip Rogaway of the Department of Computer Science at the University of California, Davis, US, delivered a lecture which raised urgent questions about the moral character of cryptographic work.

Cryptography, he argued, rearranges power; it congures who can do what, from what. This makes cryptography an inherently political tool, and it confers on the field an intrinsically moral dimension.

The Edward Snowden revelations, and others of a similar kind, motivate a reassessment of the political and moral positioning of cryptography. They lead professional cryptographers to ask if their inability to effectively address mass surveillance constitutes a failure of their specialist field.

Rogaway believes that it does. He calls for a community-wide effort by cryptographers to develop more effective means to resist mass surveillance.

He pleads for a reinvention of cryptographic culture to attend not only to puzzles and mathematics, but also to the societal implications of the coding work done.

The full text of Phillip Rogaway's lecture is here (12.12.15: pdf 48pp). And his lecture slides are here.

AsiaCrypt2015 took place from Sunday 29th November to Wednesday 2nd December 2015 in Auckland, New Zealand.

Picture: Peeping Tom. Keyhole. Key. The Moral Character of Cryptographic Work.
The Cryptography Conundrum  Peeping%2BTom.%2BKeyhole.%2BKey.%2BThe%2BMoral%2BCharacter%2Bof%2BCryptographic%2BWork.%2B%25231ab


......................................................................

Thanks to: http://alcuinbramerton.blogspot.com

Back to top  Message [Page 1 of 1]

Permissions in this forum:
You cannot reply to topics in this forum