Skip to main content

The Encryption Witch Hunt

A Senate Judiciary Committee hearing was convened on  December 10, 2019 to confront the  ongoing conflict between government and law enforcement agencies and the tech industry regarding encryption. Experts from Apple and Facebook gave testimony but it was clear from the outset that the verdict had  been reached before the hearing even began: encryption is an evil that must be sacrificed in the interests of law enforcement.
I've followed the press and read many articles about it, but unfortunately none of the coverage went into the level of detail I wanted. So I set about doing it myself. This is my in-depth commentary from a technologist's perspective, of Encryption and Lawful Access: Evaluating Benefits and Risks to Public Safety and Privacy. Follow this link if you want to view the orignal video recording. 
It is important to analyze what took place during the 2 hour 21 minute hearing in order to understand the way governments are approaching this issue. It revals a general lack of understanding of how encryption technology works and a hostile attitude towards the tech industry, represented in this case by Apple and Facebook.


Popular posts from this blog

Book Review : How To Create Pragmatic, Lightweight Languages

At last, a guide that makes creating a language with its associated baggage of lexers, parsers and compilers, accessible to mere mortals, rather to a group of a few hardcore eclectics as it stood until now.

The first thing that catches the eye, is the subtitle:

The unix philosophy applied to language design, for GPLs and DSLs"
What is meant by "unix philosophy" ?. It's taking simple, high quality components and combining them together in smart ways to obtain a complex result; the exact approach the book adopts.
I'm getting ahead here, but a first sample of this philosophy becomes apparent at the beginnings of Chapter 5 where the Parser treats and calls the Lexer like  unix's pipes as in lexer|parser. Until the end of the book, this pipeline is going to become larger, like a chain, due to the amount of components that end up interacting together.

The book opens by putting things into perspective in Chapter 1: Motivation: why do you want to build lan…

Machine Learning Applied to Game of Thrones

No-one wants the beloved series to end. Some, like the geeks at Pachyderm, have gone to great lengths to extend its life span, to the point of employing ML to serve the Iron Throne.  This is a new example of style transfer where ML identifies the essential characteristics of a genre in order to create its own examples, such as we've seen before with art  and even with cooking. But first of all, what is Pachyderm and where does that word come from?
full article on i-programmer

SAP's Creating Trustworthy and Ethical Artificial Intelligence

With the ink hardly dry on the pages of the EU Ethical AI Guidelines manifest, a free online course exploring the issues they raise is already in prospect on the openSAP platform. Run by members of the very same group, the European Union’s High-Level Expert Group on Artificial Intelligence, who wrote the guidelines and in cooperation with SAP's online education platform, a course with the titleCreating Trustworthy and Ethical Artificial Intelligence has been made accessible to anyone with an interest on AI or ML:
full article on