Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

Let's not ignore the full history here. That is a bad faith argument. It was a crime to use expensive encryption 30 years ago, but a lot of decisions were made to allow it. Today, every single one of those old caveats about child porn, drugs, money laundering, terrorism, (both domestic and international) and criminal acts in general all have stories where weaker encryption would have saved hundreds and hundreds of lives. We have to recognize this or we're just arguing past each other.

https://fedsoc.org/commentary/publications/encryption-techno...



>where weaker encryption would have saved hundreds and hundreds of lives.

Can you do the same thing, but in the other direction? How many people would have been harmed if weaker/no encryption was the standard?


Let's go with the USPS. They have been sending daily communications where unencrypted info is the standard since 1775.


I'm not sure how this is answers my question at all.

How many whistleblowers would have been killed without a secure way to blow the whistle? How many journalists and journalist sources would have been killed? Etc. These people aren't using the USPS for good reason.

Point being, you are only doing one side of your calculation and presenting it as a full argument. But it's just a bad argument unless you calculate both sides.


That's a different question. You asked how many people would have been harmed if weaker/no encryption was the standard. The USPS is a message system where federal employees are able to intercept suspicious content, and there is no built-in encryption for mail. Voting by mail is a great example of how a critical message can be sent without relying on encryption. Whistleblowers can still encrypt documents on a flash drive, and drop it into a mailbox. There is nothing stopping them from doing so.


I don't really want to hash this same thing out for the... At least hundredth time. You're not going to convince me, I'm not going to convince you, and we'll both just leave less happy if we keep going.

>Whistleblowers can still encrypt documents on a flash drive, and drop it into a mailbox. There is nothing stopping them from doing so.

The only thing I want to highlight for your consideration is that the USA is not the entire world. The USPS, even if it were perfect, does not exist in the overwhelming majority of the world. People talk to people across borders.

(Also, with some of the proposed laws, encrypting the USB would be illegal)


And no service offering encryption has existed since 1755? Because that is required for your argument. Otherwise you simply send unimportant stuff via USPS and sensitive/secret/important stuff via non-USPS.


My vote, my taxes, my REAL-ID driver license, passport, credit cards, phone SIM, checks, 401k statements, etc. have very recently been sent via USPS. Do you consider this unimportant stuff?


You apparently do.


A bit of a nit-pick. 30 years ago was 1995. It was not a crime to use PGP in the US in 1995. What PKZ was charged with was exporting the encryption technology (or allowing it to export itself by putting the code on an anonymous FTP server.) The Bernstein case was similar in that it was the export of the machine-readable code the government objected to, not it's domestic distribution. The right for researchers to publish text describing algorithms had earlier been recognized by the court (which is why Martin Gardner could describe the RSA cryptosystem in Scientific American in 1977.)




Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: