Remove Big data Remove Internet Remove Seminar Remove Technology
article thumbnail

Cybersecurity for the Public Interest

Schneier on Security

It's an impassioned debate, acrimonious at times, but there are real technologies that can be brought to bear on the problem: key-escrow technologies, code obfuscation technologies, and backdoors with different properties. Public-interest technology isn't new. So does society's underlying security needs.

article thumbnail

Cybersecurity for the Public Interest

Schneier on Security

It's an impassioned debate, acrimonious at times, but there are real technologies that can be brought to bear on the problem: key-escrow technologies, code obfuscation technologies, and backdoors with different properties. Public-interest technology isn't new. So does society's underlying security needs.