Nervous about the FBI and Apple dispute over leaving backdoors open for law enforcement? For this week’s CDN #FollowFriday, we are showcasing cryptography experts, who can shed more light on why this is an issue and what to do about it.
First up is is Matthew Green, a cryptography professor at Johns Hopkins University in Baltimore, Maryland.
Green tweets at: @matthew_d_green
If a company tells you they engineered your phone to resist compromise of their infrastructure, then maybe they anticipate a compromise.
— Matthew Green (@matthew_d_green) February 18, 2016
Folks, there's a reason why Apple is including themselves in their threat model.
— Matthew Green (@matthew_d_green) February 18, 2016
Google shows up to Apple encryption debate late, looking like they'd rather be anywhere else. https://t.co/6pO5HY8AcN
— Matthew Green (@matthew_d_green) February 18, 2016
Next is Encryption Girl, encryption and privacy advocate.
She tweets at: @EncryptionGirl
Encryption row: Google, WhatsApp, and Mozilla support Apple in FBI fight (Wired UK) https://t.co/QViGg7FzNd
— #EncryptionGirl (@EncryptionGirl) February 18, 2016
I'll be speaking about fraud proofs and redesigning how we validate the blockchain and specify consensus protocols. https://t.co/G3NuGwLyNT
— Peter Todd (@peterktodd) February 17, 2016
Big data privacy must be fixed before the revolution can begin https://t.co/nqoCxyxCij via @ZDNet & @dannyjpalmer
— #EncryptionGirl (@EncryptionGirl) February 17, 2016
Third is Crypto Law, an account that collects information and news on cryptography and privacy law.
Crypto Law tweets at: @CryptographyLaw
#TheGuardian's guide to stop your phone from snooping on you. http://t.co/awnSs1cIcg
— Crypto Law (@CryptographyLaw) August 28, 2014
Police departments have been using the "anti-terrorism" excuse to suck up metadata from us. http://t.co/ITDIeYDckK #HandsOffMyData
— Crypto Law (@CryptographyLaw) August 28, 2014
"Privacy Is Completely And Utterly Dead, And We Killed It" http://t.co/mUUpzXi7jW http://t.co/UL3bSUFwli
— Crypto Law (@CryptographyLaw) August 27, 2014