Whitepaper called Keys Under Doormats: Mandating insecurity by requiring government access to all data and communications. Twenty years ago, law enforcement organizations lobbied to require data and communication services to engineer their products to guarantee law enforcement access to all data. After lengthy debate and vigorous predictions of enforcement channels "going dark," these attempts to regulate the emerging Internet were abandoned. In the intervening years, innovation on the Internet flourished, and law enforcement agencies found new and more effective means of accessing vastly larger quantities of data. Today we are again hearing calls for regulation to mandate the provision of exceptional access mechanisms. In this report, a group of computer scientists and security experts, many of whom participated in a 1997 study of these same topics, has convened to explore the likely effects of imposing extraordinary access mandates. They have found that the damage that could be caused by law enforcement exceptional access requirements would be even greater today than it would have been 20 years ago. In the wake of the growing economic and social cost of the fundamental insecurity of today's Internet environment, any proposals that alter the security dynamics online should be approached with caution. Exceptional access would force Internet system developers to reverse "forward secrecy" design practices that seek to minimize the impact on user privacy when systems are breached. The complexity of today's Internet environment, with millions of apps and globally connected services, means that new law enforcement requirements are likely to introduce unanticipated, hard to detect security flaws. Beyond these and other technical vulnerabilities, the prospect of globally deployed exceptional access systems raises difficult problems about how such an environment would be governed and how to ensure that such systems would respect human rights and the rule of law.
b2cf2c1b7f4eb18e903bb934869b5489e8ecd5215e90c29f1411031756900e31
SHA-1 has been broken. Not a reduced-round version. Not a simplified version. The real thing.
1860ba06cb51de8ca806e1c74ca315eb7fd42ed746dfb99f55de2d3b5b9319b6
Crypto-gram for May 15, 2001. In this issue: Defense Options: What Military History Can Teach Network Security, Part 2, The Futility of Digital Copy Prevention, Microsoft and the Window of Vulnerability, and Safe Personal Computing.
20b338b599dd4ab17ef2a4948a8fbd99759076f754f8239a9958eb784470405a
Crypto-gram for April 15, 2001. In this issue: Natural Advantages of Defense: What Military History Can Teach Network Security, Part 1, A Correction: nCipher, CSI's Computer Crime and Security Survey, Crypto-Gram Reprints, and Fake Microsoft Certificates.
341b3529b2ea2c8c9a00ad34655943b05387e5d7056707073869ca80e4b44d0c
Crypto-gram for March 15, 2001. In this issue: The Security Patch Treadmill, Harvard's "Uncrackable" Crypto, TCP/IP Initial Sequence Number Flaw, The Doghouse: iBallot.com, The "Death" of IDS?, and 802.11 Security.
15d5a54d2bf20c20aaa2f201d2cd3da75827f22c25859732288b038f6c69f784
Crypto-gram for February 15, 2001. In this issue: Hard-Drive-Embedded Copy Protection, An Intentional Backdoor, The Doghouse: NASA and eTrue, A Semantic Attack on URLs, E-mail Filter Idiocy, Air Gaps, and Internet Voting vs. Large-Value e-Commerce.
b0b49966a2d150c0a44f721540654f4d81304aea8b42eaa28021ffddd0f33b1f
Crypto-gram for January 15, 2001. In this issue: A Cyber UL?, Solution in Search of a Problem: SafeMessage, A Social Engineering Example, The Doghouse: Gianus Technologies, NIST Crypto Update, Code Signing in Microsoft Windows, and PGP Broken with keystroke recorder.
0c33f46f08e82b8305be0f5faa977094e7924be590044355b4e2dff66f92a763
Crypto-gram for December 15, 2000. In this issue: Voting and Technology, Crypto-Gram Reprints, IBM's New Crypto Mode of Operation, Solution in Search of a Problem: Digital Safe-Deposit Boxes, and New Bank Privacy Regulations.
ff3f1cc0bac61ff3d6e20ab4e727a56aa83079c0f8ff7ab9d5432dd099ba8ad9
Crypto-gram for November 15, 2000. In this issue: Why Digital Signatures Are Not Signatures, SDMI Hacking Challenge, Microsoft Hack (the Company, not a Product), and more.
dc772bbdbf2bb21adfae614b25f3926130299781ac432ce3c9207ebb4138a35b
Crypto-gram for October 15, 2000. In this issue: Semantic Attacks: The Third Wave of Network Attacks, News, Council of Europe Cybercrime Treaty -- Draft, The Doghouse: HSBC, NSA on Security, AES Announced, NSA on AES, and the Privacy Tools Handbook.
7c3f8790fcf1093735c62ec84aa0c538c534313880ca411050db9d2325ac0c88
Crypto-gram for August 15, 2000. In this issue: Full Disclosure and the Window of Exposure, News, Carnivore Disinformation, FBI Requires Constitutional Changes, The Doghouse: FaceMail, PGP Vulnerability, and Comments from Readers.
0e4cbb003e4a2c2f2d719a1a3c31cb1025f8835a3832f59fa40e8e4a5db45de0
Crypto-gram for August 15, 2000. In this issue: Secrets and Lies: Digital Security in a Networked World, Microsoft Vulnerabilities, Publicity, and Virus-Based Fixes, News, Counterpane Internet Security News, Crypto-Gram Reprints, European "Crime in Cyberspace" Convention, The Doghouse: Authentica, Bluetooth, and Comments from Readers.
25a5817a41cbe004c4d6e1112bdf771fb54aa8cfa70fb1ad5de105a3f6e42b66
Crypto-gram for July 15, 2000. In this issue: Full Disclosure and the CIA, Counterpane Internet Security News, More Counterpane Internet Security News, News, Even the President Can't Choose a Good Password, The Doghouse: Intuit QuickBooks, Full Disclosure and Lockmaking, Security Risks of Unicode, Crypto-Gram Reprints, and Comments from Readers.
f64ae0592134ce4f7b1bd16733a9f0798ae00b308be2abfdfab0435e2c1b5630
CRYPTO-GRAM June 15, 2000. In this issue: News, SOAP (Simple Object Access Protocol), Java and Viruses, crypto-gram reprints, The Doghouse: Infraworks, The Data Encryption Standard (DES), and Comments from Readers.
73a3d2a43340b4bdb58234178ca1eb892824e2b2e7c2d20501c377a9969e00f1
CRYPTO-GRAM May 15, 2000. In this issue: More on Microsoft Kerberos, Trusted Client Software, ILOVEYOU Virus, Computer Security: Will We Ever Learn?, Counterpane Internet Security News, and the Cybercrime Treaty.
42d10ab0dec9914d8b3833d78c6cbc4a2c76fc43734f36d7457fdc1d684c3a08
CRYPTO-GRAM April 15, 2000. In this issue: AES News, The French Banking Card Hack, Counterpane -- Featured Research, Counterpane Internet Security News, The Doghouse: Cyber Security Information Act, Microsoft Active Setup "Backdoor", The Uniform Computer Information Transactions Act (UCITA), and Comments from Readers.
1ecdc6ce3a58a7f087fe74065e4831f41987d3282b128d31159013cf3cd45bde
CRYPTO-GRAM March 15, 2000. In this issue: Kerberos and Windows 2000, AES News, Counterpane Internet Security News, Software as a Burglary Tool, The Doghouse: The Virginia Legislature, Software Complexity and Security, Comments from Readers.
cc8d54b0047cdd3d3665e525c99e57b83b3d15f74dcacb134652b1e298d5551f
CRYPTO-GRAM February 15, 2000 - In this issue: Distributed Denial-of-Service Attacks, New Chinese Cryptography Regulations, Counterpane Internet Security News, Publicizing Vulnerabilities, Counterpane -- Featured Research, Mitnick Case Yields New Crypto Twist and Cookies.
fea3e31504782a1a977597df976c9a991722a8061fc296b53e7ab1b5fb4a6798
Crypto-gram for December 15, 1999. In this issue: Sarah Flannery's Public-Key Algorithm, ECHELON Technology, Counterpane -- Featured Research, New U.S. Crypto Export Regulations -- Draft, Counterpane Internet Security News, The Doghouse: Egg, Fast Software Encryption 2000, and European Cellular Encryption Algorithms.
99973dd01b396fa5a1b9e37afb43d8df2b87f15d2ec6be01a343a27e3c9ecdcb
Ten Risks of PKI: What You're not Being Told about Public Key Infrastructure. Real security is never that simple, and that is especially true with PKI.
2926ad11fff203d81cb0566ec64e3e3a591e8b4c1615f063f61f1551104e045a