Remove Encryption Remove Seminar Remove Surveillance Remove Technology
article thumbnail

Cybersecurity for the Public Interest

Schneier on Security

On one side is law enforcement, which wants to be able to break encryption, to access devices and communications of terrorists and criminals. Pervasive surveillance capitalism­ -- as practiced by the Internet companies that are already spying on everyone -- ­matters. Public-interest technology isn't new.

article thumbnail

Cybersecurity for the Public Interest

Schneier on Security

On one side is law enforcement, which wants to be able to break encryption, to access devices and communications of terrorists and criminals. Pervasive surveillance capitalism -- ­as practiced by the Internet companies that are already spying on everyone­ -- matters. Public-interest technology isn't new.

article thumbnail

Topic-specific policy 4/11: information transfer

Notice Bored

Transmission of information through broadcasting, training and awareness activities, reporting, policies, documentation, seminars, publications, blogs etc., Encryption of data and/or of network links, storage media etc. typically using specified encryption schemes (i.e. plus its reception and comprehension.