[Cryptography] Ad hoc "exceptional access" discussion at Crypto'15 ?
hbaker1 at pipeline.com
Tue Jul 14 10:57:44 EDT 2015
At 11:36 PM 7/13/2015, Peter Fairbrother wrote:
>There are at least five valid arguments against "exceptional access".
My version of Cory Doctorow's argument:
"Smartphones" are Turing Machines intended to be extensible with arbitrary "apps".
Once you grant app-hood, ALL bets are off - both for the good guys & the bad guys.
That's the nature of Turing Machines.
Sorry, Mr. Comey, but distinguishing 'good' from 'bad' apps is undecidable.
So either extensibility is out the window (the end of "smart" phones), or
Mr. Comey is out of luck.
More information about the cryptography