Skip to main content

View Diary: (UPDATED 2) Ellsberg: "He's revealing unconstitutional activity." Twitter: 30 to 1, "He's a hero." (280 comments)

Comment Preferences

  •  There are extraordinarily strong encryption (7+ / 0-)

    algorithms.  Far too strong for any existing computing power to break.

    The weakness lies in key management.  And I don't uncritically accept GrumpyOldGeek's assertions about the security of that.  The problem is how one can securely encrypt such a large database in a way that both isolates individual pieces of data yet allows data mining for related records.

    For instance, let's say Mr. X becomes a person of interest in a terrorism investigation.  We want to see who he has associated with over the past several years.  So we get a warrant for his records.  Now how do we cross-check those with the locations of other people if those records are encrypted with different keys that we don't have access to?

    “What’s the use of having developed a science well enough to make predictions if, in the end, all we’re willing to do is stand around and wait for them to come true?” - Sherwood Rowland

    by jrooth on Mon Jun 10, 2013 at 06:58:08 AM PDT

    [ Parent ]

Subscribe or Donate to support Daily Kos.

Click here for the mobile view of the site