| |
HarryLaymanPaperTheFirst 5 - 01 Dec 2009 - Main.HarryLayman
|
|
META TOPICPARENT | name="FirstPaper" |
| |
< < | Current mass-market communications technology is very insecure. User adoption rates for encryption of emails, instant messages, and phone calls are for all intents nil. Even the use of cookie-free, untraceable internet browsing is extremely low, despite its extreme ease. Legal protection for the privacy of such communications is scarcely any better. Witness, for example, the 2007 scandal wherein the ranking Democrat on the House Intelligence committee was entrapped and blackmailed by a national intelligence agency seeking expanded surveillance powers. Authority for roaming, warrantless wiretaps has been claimed by presidents from both political parties. The dominant usage of technology in America has done much to destroy the expectations of privacy and secrecy that people enjoyed just a few decades ago. Might it be possible to convince people to take matters into their own hands? | > > | Current mass-market communications technology is very insecure. User adoption rates for encryption of emails, instant messages, and phone calls are for all intents nil. Even the use of ad-free, cookie-free, untraceable internet browsing is on the order of 5%, despite its extreme ease. Legal protection for the privacy of such communications is scarcely any better. For example, the NSA entrapped, wiretapped, and blackmailed a high-ranking Democratic congresswoman for the purpose of installing her on the House Intelligence committee where she could expand their surveillance powers. Authority for roaming, warrantless wiretaps has been claimed by presidents from both political parties. The dominant usage of technology in America has done much to destroy the expectations of privacy and secrecy that people enjoyed just a few decades ago. Might it be possible to convince people to take matters into their own hands? | | I like to call my proposed solution the PATRIOT phone. It will look like this. It will feature RSA cryptography that is all but impossible to break, with no back doors or key escrow. With the right marketing strategy, a satisfactory product, and reasonable price points, it shouldn't be difficult to put such devices in the hands of several thousands of users. At that point, the device becomes an impediment to large scale surveillance. If even 1% of network traffic were encrypted, it would be impossible to capture that volume of traffic for cryptanalysis -- there simply aren't enough supercomputers. | | As a regulatory matter, the approval of such a device ought to be straightforward. The FCC's Rule Part 15 requires that devices not cause "harmful interference" that would jam other authorized signals (radio, television, etc). There does not appear to be any sort of clause that allows the FCC to disapprove devices that it simply does not like. | |
< < | The cellular phone market is highly concentrated. | > > | The US cellular handset market is highly concentrated. The top three companies account for two thirds of the market, and the top six account for almost 90%. Part of the problem | |
*Outline |
|
|
|
This site is powered by the TWiki collaboration platform. All material on this collaboration platform is the property of the contributing authors. All material marked as authored by Eben Moglen is available under the license terms CC-BY-SA version 4.
|
|
| |