OUT OF MIND
Would you like to react to this message? Create an account in a few clicks or log in to continue.
Latest topics
» New US Navy UFO footage reportedly leaked
The Cryptography Conundrum  EmptyToday at 9:19 am by PurpleSkyz

» Why Are Media Ignoring Data Showing Massive COVID-19 Vaccine Death Spike?
The Cryptography Conundrum  EmptyToday at 9:04 am by PurpleSkyz

» More parents STANDING UP
The Cryptography Conundrum  EmptyToday at 8:51 am by PurpleSkyz

» OSHA Returns: Employers May Be Liable for ‘Any Adverse Reaction’ From Mandated Vaccinations
The Cryptography Conundrum  EmptyToday at 8:44 am by PurpleSkyz

» A Legal System Corrupted
The Cryptography Conundrum  EmptyToday at 8:40 am by PurpleSkyz

» AstraZeneca Woes Persist as Vaccine Side Effects Generate Headlines
The Cryptography Conundrum  EmptyToday at 8:36 am by PurpleSkyz

» Another Pastor Arrested In Canada Following Anti-Lockdown Church Service
The Cryptography Conundrum  EmptyToday at 8:32 am by PurpleSkyz

» Learn Why Bill Gates is Being Brought Down for Failing China’s Takeover
The Cryptography Conundrum  EmptyToday at 8:22 am by PurpleSkyz

» Megadrought Nightmare: No Water For Crops, Horrific Wildfires, Colossal Dust Storms And Draconian Water Restrictions
The Cryptography Conundrum  EmptyToday at 8:13 am by PurpleSkyz

» Psychedelics Are Set To Explode In 2021
The Cryptography Conundrum  EmptyToday at 8:08 am by PurpleSkyz

» Steven Cambian - The Ufo report with Jeremy D McGowan
The Cryptography Conundrum  EmptyToday at 8:00 am by PurpleSkyz

» UFO NEWS ~ Strange cigar shaped objects flying through our sky plus MORE
The Cryptography Conundrum  EmptyYesterday at 9:50 am by PurpleSkyz

» Spaceships Landed On The Moon Captured By Nikon Coolpix P1000, Real or Fake?
The Cryptography Conundrum  EmptyYesterday at 9:37 am by PurpleSkyz

» Liquid water discovered inside a meteorite
The Cryptography Conundrum  EmptyYesterday at 9:21 am by PurpleSkyz

» Clif High – The Woo Deal
The Cryptography Conundrum  EmptyYesterday at 9:17 am by PurpleSkyz

» Self-Spreading Insanity: The Age of Contagious Vaccines
The Cryptography Conundrum  EmptyYesterday at 9:08 am by PurpleSkyz

» The People Are Rising: Melbourne, Australia Freedom Rally May 15, 2021
The Cryptography Conundrum  EmptyYesterday at 9:01 am by PurpleSkyz

» Biodigital Convergence: Bombshell Document Reveals the True Agenda
The Cryptography Conundrum  EmptyYesterday at 8:57 am by PurpleSkyz

» Benjamin bla bla blah Fulford - 5/17/2021 - Human Sacrifice on Temple Mount Won’t Save Satanists
The Cryptography Conundrum  EmptyYesterday at 8:53 am by PurpleSkyz

» My Thoughts on the ArVee by Anna Von Reitz
The Cryptography Conundrum  EmptyYesterday at 8:49 am by PurpleSkyz

» FBI releases documents on Seth Rich’s murder
The Cryptography Conundrum  EmptyYesterday at 8:37 am by PurpleSkyz

» The CDC is Suppressing Data?
The Cryptography Conundrum  EmptyYesterday at 8:29 am by PurpleSkyz

You are not connected. Please login or register

OUT OF MIND » THE INSANITY OF REALITY » GOVERNMENT & THE NEW WORLD ORDER » The Cryptography Conundrum

The Cryptography Conundrum

Go down  Message [Page 1 of 1]

1The Cryptography Conundrum  Empty The Cryptography Conundrum Wed Oct 12, 2016 7:31 pm

PurpleSkyz

PurpleSkyz
Admin

The Cryptography Conundrum

Moral, pure, political or subversive?

How can cryptographers develop more effective means to resist unlawful mass surveillance?

http://alcuinbramerton.blogspot.com/2015/12/the-cryptography-conundrum.html
Alcuin Bramerton Twitter .. Alcuin Bramerton Medium
Alcuin Bramerton profile ..... Index of blog contents ..... Home .....#1ab

Picture: The Morals of Cryptographic Work. Phillip Rogaway. AsiaCrypt 2015.
The Cryptography Conundrum  The%2BMoral%2BCharacter%2Bof%2BCryptographic%2BWork.%2BPhillip%2BRogaway.%2BAsiaCrypt%2B2015.%2B%25231ab

......................................................................
We live immersed in a parasitically interconnected world of nearly unavoidable electronic communications.

Most of the data we generate in that world is unknown to us. Our data is stolen and exploited by invisible Others who know much more about us than we know about them.

We have an agenda for our electronic lives; so do the Others.

Since WikiLeaks, Chelsea Manning and Edward Snowden, we have learned that our electronic agenda and the electronic agenda of the invisible Others of BigData do not always coincide in perfect purity. There is good at work; but there is also evil. There are goodies and there are baddies.

This is one reason why, at the highest levels of state intelligence, Russia is said to be making and using manual typewriters again.

None of that sovereign state's most important planning, recording or analytical documentation is generated or stored electronically. Its paper-only documents are designed to exist beyond the reach of hackers or electronic surveillance.

Russia and others have moved in this direction because, in the world of computer networks, cryptography has failed.

The cryptographers are bought and paid for. As a species, they can no longer be trusted. As an intellectual culture, the cryptographic community has allowed itself to become fatally compromised by ulterior motives.

Cryptography is about code and about how to write it in covert functioning formats for computer networks.

Cryptography is supposed to employ methods of storing and transmitting data in particular forms so that only those for whom it is intended can read and process it. Peeping Toms, voyeurs and electronic tourists are supposed to be designed out. No access. Instead, unscrupulous cryptographers provide the lice with privileged back doors through which to creep in.

Privacy, cryptography and surveillance are overlapping domains.

In December 2015, at AsiaCrypt2015 in New Zealand, Phillip Rogaway of the Department of Computer Science at the University of California, Davis, US, delivered a lecture which raised urgent questions about the moral character of cryptographic work.

Cryptography, he argued, rearranges power; it congures who can do what, from what. This makes cryptography an inherently political tool, and it confers on the field an intrinsically moral dimension.

The Edward Snowden revelations, and others of a similar kind, motivate a reassessment of the political and moral positioning of cryptography. They lead professional cryptographers to ask if their inability to effectively address mass surveillance constitutes a failure of their specialist field.

Rogaway believes that it does. He calls for a community-wide effort by cryptographers to develop more effective means to resist mass surveillance.

He pleads for a reinvention of cryptographic culture to attend not only to puzzles and mathematics, but also to the societal implications of the coding work done.

The full text of Phillip Rogaway's lecture is here (12.12.15: pdf 48pp). And his lecture slides are here.

AsiaCrypt2015 took place from Sunday 29th November to Wednesday 2nd December 2015 in Auckland, New Zealand.

Picture: Peeping Tom. Keyhole. Key. The Moral Character of Cryptographic Work.
The Cryptography Conundrum  Peeping%2BTom.%2BKeyhole.%2BKey.%2BThe%2BMoral%2BCharacter%2Bof%2BCryptographic%2BWork.%2B%25231ab


......................................................................
Thanks to: http://alcuinbramerton.blogspot.com



  

Back to top  Message [Page 1 of 1]

Permissions in this forum:
You cannot reply to topics in this forum