{"id":1168,"date":"2016-04-16T11:05:47","date_gmt":"2016-04-16T17:05:47","guid":{"rendered":"https:\/\/www.netjeff.com\/wp\/?p=1168"},"modified":"2016-04-16T11:05:47","modified_gmt":"2016-04-16T17:05:47","slug":"should-all-locks-have-keys-phones-castles-encryption-and-you","status":"publish","type":"post","link":"https:\/\/www.netjeff.com\/wp\/?p=1168","title":{"rendered":"Should all locks have keys? Phones, Castles, Encryption, and You."},"content":{"rendered":"<p>Passing a law that requires companies to build devices with digital keyholes which <strong>only<\/strong> good-guys can use, is the same as passing a law that says the value of \u03c0 (pi) must be exactly 3.<\/p>\n<p>Here's an excellent short video about the literal impossibility of such laws, and the enormous risks of going ahead anyway.\u00a0 Because unlike real-world keyholes where the bad-guy must be physically present at each keyhole they want to break through, in the digital world each bad-guy can simultaneously attack millions of digital keyholes from the other side of the world.\u00a0 The end of the video says it best: \"Anyone who says otherwise <em>[that digital keyholes <\/em>can<em> be built which allow only angel good-guys while blocking demon bad-guys]<\/em> is either ignorant of the mathematics, or less of an angel then they appear.\"<\/p>\n<p>There's no math in the video, just really good explanation.<\/p>\n<p><iframe loading=\"lazy\" src=\"https:\/\/www.youtube.com\/embed\/VPBH1eW28mo\" width=\"560\" height=\"315\" frameborder=\"0\" allowfullscreen=\"allowfullscreen\"><\/iframe><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Passing a law that requires companies to build devices with digital keyholes which only good-guys can use, is the same as passing a law that says the value of \u03c0 (pi) must be exactly 3. Here's an excellent short video about the literal impossibility of <a class=\"more-link\" href=\"https:\/\/www.netjeff.com\/wp\/?p=1168\">Read More &#8230;<\/a><\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[10,4,5],"tags":[],"class_list":["post-1168","post","type-post","status-publish","format-standard","hentry","category-risk","category-security","category-tech"],"_links":{"self":[{"href":"https:\/\/www.netjeff.com\/wp\/index.php?rest_route=\/wp\/v2\/posts\/1168","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.netjeff.com\/wp\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.netjeff.com\/wp\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.netjeff.com\/wp\/index.php?rest_route=\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.netjeff.com\/wp\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=1168"}],"version-history":[{"count":3,"href":"https:\/\/www.netjeff.com\/wp\/index.php?rest_route=\/wp\/v2\/posts\/1168\/revisions"}],"predecessor-version":[{"id":1171,"href":"https:\/\/www.netjeff.com\/wp\/index.php?rest_route=\/wp\/v2\/posts\/1168\/revisions\/1171"}],"wp:attachment":[{"href":"https:\/\/www.netjeff.com\/wp\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=1168"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.netjeff.com\/wp\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=1168"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.netjeff.com\/wp\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=1168"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}