- Journal Archives
- Volume 18
- Volume 17
- Volume 16
- Volume 15
- Volume 14
- Volume 13
- Volume 12
- Volume 11
- Volume 10
- Volume 9
- Volume 8
- Volume 7
- Volume 6
- Volume 5
- Volume 4
- Volume 3
- Volume 2
- Volume 1
Since the leaks from whistleblower Edward Snowden revealed that the US government has been running an unprecedentedly enormous data gathering effort on basically all Americans, Congress has been slow to remove what many see as an unforgivable overreach of government power. In fact, today’s Congress is barely even capable of naming a post office these days. If the government is unwilling to go without spying on our phone records, maybe there’s a solution that doesn’t require Congress to do anything. Can private companies find a way to just block the government from collecting this data in the first place?
More precisely, is it legally tenable to just encrypt your data so thoroughly that the NSA won’t be able to read it when they get it? Recently, Snowden’s leaks revealed that RSA, a cybersecurity company, contracted with the NSA to spread the NSA’s random number generator in RSA’s security products. The generator had been intentionally weakened to create backdoors for the agency for its domestic spying efforts. The backlash has been fierce.
In light of such shenanigans, both in government and the private sector, the ongoing debate has been what the average person can do to keep the government from snooping on your Snapchats. One solution is to just to encrypt your data in such a way that it becomes nearly unusable without a key. The secure email service Lavabit used a method where all email was encrypted to a key known only to the user. When a court ordered the metadata surrounding Snowden’s email (i.e. ‘to’ and ‘from’ headers) to be revealed, the founder was unable to comply and eventually ended up shutting down the service entirely rather than hamstringing his users’ privacy protections.
Cybersecurity companies are thus finding value in the notion of being “NSA-proof” and direct marketing efforts to find customers wary of potential government-endorsed breaches, but find themselves in uncharted legal territory. What if you trust a company with your data, only to find the company’s NSA-proof security hobbled by some court order? Because of this risk, and because of the sensitivity and huge amount of data involved, a former NSA official is now warning companies that collect data to be transparent about what they collect, lest they find themselves in some hot water.
Or maybe the solution is to leave your data outside the reach of US-based cybersecurity companies entirely. The founder of Lavabit recommends just that in the farewell letter he posted when shutting down the service. If you can’t beat ‘em, flee.
Recent Blog Posts
- Former Cardinals Executive Pleads Guilty to Hacking, But Will the Cardinals Pay the Price?
- Making a Murder – Technology in Forensic Evidence Questioned
- Is “smart gun” technology the future of gun safety?
- Why High-Profile Athletes’ Defamation Lawsuits Against Al Jazeera Are Nothing More Than a Hail Mary
- Executives of a Chinese Online Video-Sharing Service Provider Stood Trial for Internet Pornography
- The Rise of ‘Swatting’
Tagsadvertising antitrust Apple books career celebrities contracts copyright copyright infringement courts creative content criminal law entertainment Facebook FCC film/television financial First Amendment games Google government intellectual property internet JETLaw journalism lawsuits legislation media medicine Monday Morning JETLawg music NFL patents privacy progress publicity rights radio social networking sports Supreme Court of the United States (SCOTUS) technology telecommunications trademarks Twitter U.S. Constitution