Encryption Backdoor Policy

The idea of having a backdoor into encryption protocols would make situations like the OPM Breach far worse. It is said that encryption would not have helped secure the OPM database. The reason is the visitors had full access anyway and could decrypt at will. Imagine a situation in which such access does not exist but there is a backdoor that could be discovered to see how large the problem could be.

Encryption relies upon computer code. Making such code more resilient is part of the point of the exercise of building it. Weakening it would only destroy the perception of encryption as a useful means to secure information. ALL of the online companies rely on encryption. A significantly damaged impression of encryption would destroy online business. With 100% certainty. People are already uneasy about the true secure nature of computers, this would tip things over further.

A better approach does not involve back doors but a kind of technology theory akin to quantum information theory. Essentially, the echoes of information, correlation by impression of datums on a known state (before and after), entanglement as it where would be superior anyway. Such tools would be much more effective in argumentation and presentation.

The key question in any review of supposed deviant activity is was something wrong done that had negative impact? You can always work backwards from the point of issue to causal factors if they exist. Archaeologists and anthropologists do this all the time and do so for entire cultures. In the old days, such reviews did not rely on letters people wrote to each other. People did not write as much then as they do now. Therefore, the methods then are still effective today as all actions always leave an impression. Operating in that way would then avoid aborting the still fragile efficacy of information technology.


Leave a Reply

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out /  Change )

Google+ photo

You are commenting using your Google+ account. Log Out /  Change )

Twitter picture

You are commenting using your Twitter account. Log Out /  Change )

Facebook photo

You are commenting using your Facebook account. Log Out /  Change )


Connecting to %s

This site uses Akismet to reduce spam. Learn how your comment data is processed.