Página principal de PROFESIONALESPCM.ORG Página principal de PROFESIONALESPCM.ORG Afíliate el Partido Comunista de España

ESPACIO 2017 - Centenario de la Revolución Soviética!

Secciones: Software y Conocimiento Libre -  Antivirus, Seguridad Informática

Título: Encryption letter to President Barack Obama- Enlace 1

Texto del artículo:


Encryption letter to President Barack Obama


Anticipo del texto:

President Barack Obama
The White House
1600 Pennsylvania Avenue NW
Washington, DC 20500
May 19, 2015
Dear President Obama,
We the undersigned represent a wide variety of civil society organizations dedicated to
protecting civil liberties, human rights, and innovation online, as well as technology
companies, trade associations, and security and policy experts. We are writing today to
respond to recent statements by some Administration officials regarding the deployment
of strong encryption technology in the devices and services offered by the U.S.
technology industry. Those officials have suggested that American companies should
refrain from providing any products that are secured by encryption, unless those
companies also weaken their security in order to maintain the capability to decrypt their
customers’ data at the government’s request. Some officials have gone so far as to
suggest that Congress should act to ban such products or mandate such capabilities.
We urge you to reject any proposal that U.S. companies deliberately weaken the
security of their products. We request that the White House instead focus on
developing policies that will promote rather than undermine the wide adoption of
strong encryption technology. Such policies will in turn help to promote and protect
cybersecurity, economic growth, and human rights, both here and abroad.
Strong encryption is the cornerstone of the modern information economy’s security.
Encryption protects billions of people every day against countless threats—be they street
criminals trying to steal our phones and laptops, computer criminals trying to defraud us,
corporate spies trying to obtain our companies’ most valuable trade secrets, repressive
governments trying to stifle dissent, or foreign intelligence agencies trying to
compromise our and our allies’ most sensitive national security secrets.
Encryption thereby protects us from innumerable criminal and national security threats.
This protection would be undermined by the mandatory insertion of any new
vulnerabilities into encrypted devices and services. Whether you call them “front doors”
or “back doors”, introducing intentional vulnerabilities into secure products for the
government’s use will make those products less secure against other attackers. Every
computer security expert that has spoken publicly on this issue agrees on this point,
including the government’s own experts.
In addition to undermining cybersecurity, any kind of vulnerability mandate would also
seriously undermine our economic security. U.S. companies are already struggling to
maintain international trust in the wake of revelations about the National Security
Agency’s surveillance programs. Introducing mandatory vulnerabilities into American
products would further push many customers—be they domestic or international,

1individual or institutional—to turn away from those compromised products and services.
Instead, they—and many of the bad actors whose behavior the government is hoping to
impact—will simply rely on encrypted offerings from foreign providers, or avail
themselves of the wide range of free and open source encryption products that are easily
available online.
More than undermining every American’s cybersecurity and the nation’s economic
security, introducing new vulnerabilities to weaken encrypted products in the U.S. would
also undermine human rights and information security around the globe. If American
companies maintain the ability to unlock their customers’ data and devices on request,
governments other than the United States will demand the same access, and will also be
emboldened to demand the same capability from their native companies. The U.S.
government, having made the same demands, will have little room to object. The result
will be an information environment riddled with vulnerabilities that could be exploited by
even the most repressive or dangerous regimes. That’s not a future that the American
people or the people of the world deserve.
The Administration faces a critical choice: will it adopt policies that foster a global digital
ecosystem that is more secure, or less? That choice may well define the future of the
Internet in the 21 st century. When faced with a similar choice at the end of the last
century, during the so-called “Crypto Wars”, U.S. policymakers weighed many of the
same concerns and arguments that have been raised in the current debate, and correctly
concluded that the serious costs of undermining encryption technology outweighed the
purported benefits. So too did the President’s Review Group on Intelligence and
Communications Technologies, who unanimously recommended in their December 2013
report that the US Government should “(1) fully support and not undermine efforts to
create encryption standards; (2) not in any way subvert, undermine, weaken, or make
vulnerable generally available commercial software; and (3) increase the use of
encryption and urge US companies to do so, in order to better protect data in transit, at
rest, in the cloud, and in other storage.”
We urge the Administration to follow the Review Group’s recommendation and adopt
policies that promote rather than undermine the widespread adoption of strong encryption
technologies, and by doing so help lead the way to a more secure, prosperous, and rights-
respecting future for America and for the world.
Thank you,
Civil Society Organizations
Access
Advocacy for Principled Action in Government
American-Arab Anti-Discrimination Committee (ADC)
American Civil Liberties Union
American Library Association
Benetech
Bill of Rights Defense Committee

2Center for Democracy & Technology
Committee to Protect Journalists
The Constitution Project
Constitutional Alliance
Council on American-Islamic Relations
Demand Progress
Defending Dissent Foundation
DownsizeDC.org, Inc.
Electronic Frontier Foundation
Electronic Privacy Information Center (EPIC)
Engine
Fight for the Future
Free Press
Free Software Foundation
Freedom of the Press Foundation
GNOME Foundation
Human Rights Watch
The Media Consortium
New America's Open Technology Institute
Niskanen Center
Open Source Initiative
PEN American Center
Project Censored/Media Freedom Foundation
R Street
Reporters Committee for Freedom of the Press
TechFreedom
The Tor Project
U.S. Public Policy Council of Association for Computing Machinery
World Privacy Forum
X-Lab
Companies & Trade Associations
ACT | The App Association
Adobe
Apple Inc.
The Application Developers Alliance
Automattic
Blockstream
Cisco Systems
Coinbase
Cloud Linux Inc.
CloudFlare
Computer & Communications Industry Association
Consumer Electronics Association (CEA)
Context Relevant
The Copia Institute

3CREDO Mobile
Data Foundry
Dropbox
Evernote
Facebook
Gandi.net
Golden Frog
Google
HackerOne
Hackers/Founders
Hewlett-Packard Company
Internet Archive
Internet Association
Internet Infrastructure Coalition (i2Coalition)
Level 3 Communications
LinkedIn
Microsoft
Misk.com
Mozilla
Open Spectrum Inc.
Rackspace
Rapid7
Reform Government Surveillance
Sonic
ServInt
Silent Circle
Slack Technologies, Inc.
Symantec
Tech Assets Inc.
TechNet
Tumblr
Twitter
Wikimedia Foundation
Yahoo
Security and Policy Experts*
Hal Abelson, Professor of Computer Science and Engineering, Massachusetts Institute of
Technology
Ben Adida, VP Engineering, Clever Inc.
Jacob Appelbaum, The Tor Project
Adam Back, PhD, Inventor, HashCash, Co-Founder & President, Blockstream
Alvaro Bedoya, Executive Director, Center on Privacy & Technology at Georgetown
Law
Brian Behlendorf, Open Source software pioneer
Steven M. Bellovin, Percy K. and Vida L.W. Hudson Professor of Computer Science,
Columbia University

4Matt Bishop, Professor of Computer Science, University of California at Davis
Matthew Blaze, Director, Distributed Systems Laboratory, University of Pennsylvania
Dan Boneh, Professor of Computer Science and Electrical Engineering at Stanford
University
Eric Burger, Research Professor of Computer Science and Director, Security and
Software Engineering Research Center (Georgetown), Georgetown University
Jon Callas, CTO, Silent Circle
L. Jean Camp, Professor of Informatics, Indiana University
Richard A. Clarke, Chairman, Good Harbor Security Risk Management
Gabriella Coleman, Wolfe Chair in Scientific and Technological Literacy, McGill
University
Whitfield Diffie, Dr. sc. techn., Center for International Security and Cooperation,
Stanford University
David Evans, Professor of Computer Science, University of Virginia
David J. Farber, Alfred Filter Moore Professor Emeritus of Telecommunications,
University of Pennsylvania
Dan Farmer, Security Consultant and Researcher, Vicious Fishes Consulting
Rik Farrow, Internet Security
Joan Feigenbaum, Department Chair and Grace Murray Hopper Professor of Computer
Science Yale University
Richard Forno, Jr. Affiliate Scholar, Stanford Law School Center for Internet and Society
Alex Fowler, Co-Founder & SVP, Blockstream
Jim Fruchterman, Founder and CEO, Benetech
Daniel Kahn Gillmor, ACLU Staff Technologist
Robert Graham, creator of BlackICE, sidejacking, and masscan
Jennifer Stisa Granick, Director of Civil Liberties, Stanford Center for Internet and
Society
Matthew D. Green, Assistant Research Professor, Johns Hopkins University Information
Security Institute
Robert Hansen, Vice President of Labs at WhiteHat Security
Lance Hoffman, Director, George Washington University, Cyber Security Policy and
Research Institute
Marcia Hofmann, Law Office of Marcia Hofmann
Nadim Kobeissi, PhD Researcher, INRIA
Joseph Lorenzo Hall, Chief Technologist, Center for Democracy & Technology
Nadia Heninger, Assistant Professor, Department of Computer and Information Science,
University of Pennsylvania
David S. Isenberg, Producer, Freedom 2 Connect
Douglas W. Jones, Department of Computer Science, University of Iowa
Susan Landau, Worcester Polytechnic Institute
Gordon Fyodor Lyon, Founder, Nmap Security Scanner Project
Aaron Massey, Postdoctoral Fellow, School of Interactive Computing, Georgia Institute
of Technology
Jonathan Mayer, Graduate Fellow, Stanford University
Jeff Moss, Founder, DEF CON and Black Hat security conferences

5Peter G. Neumann, Senior Principal Scientist, SRI International Computer Science Lab,
Moderator of the ACM Risks Forum
Ken Pfeil, former CISO at Pioneer Investments
Ronald L. Rivest, Vannevar Bush Professor, Massachusetts Institute of Technology
Paul Rosenzweig, Professorial Lecturer in Law, George Washington University School of
Law
Jeffrey I. Schiller, Area Director for Security, Internet Engineering Task Force (1994-
2003), Massachusetts Institute of Technology
Bruce Schneier, Fellow, Berkman Center for Internet and Society, Harvard Law School
Micah Sherr, Assistant Professor of Computer Science, Georgetown University
Adam Shostack, author, “Threat Modeling: Designing for Security”
Eugene H. Spafford, CERIAS Executive Director, Purdue University
Alex Stamos, CISO, Yahoo
Geoffrey R. Stone, Edward H. Levi Distinguished Service Professor of Law, The
University of Chicago
Peter Swire, Huang Professor of Law and Ethics, Scheller College of Business, Georgia
Institute of Technology
C. Thomas (Space Rogue), Security Strategist, Tenable Network Security
Dan S. Wallach, Professor, Department of Computer Science and Rice Scholar, Baker
Institute of Public Policy
Nicholas Weaver, Researcher, International Computer Science Institute
Chris Wysopal, Co-Founder and CTO, Veracode, Inc.
Philip Zimmermann, Chief Scientist and Co-Founder, Silent Circle
*Affiliations provided only for identification purposes.


Artículo de www.profesionalespcm.org insertado por: El administrador web - Fecha: 02/08/2015 - Modificar

Comparte el artículo en las REDES SOCIALES: delicious Delicious | meneame Meneame | facebook Facebook | twitter Twitter | Technorati | barrapuntoBarrapunto
Próximamente disponible también para * Digg * Google Bookmarks* Wikio * Bitacoras.com * Reddit * * RSS * Technorati * Tuenti
Accedido o leido aproximadamente 356 veces desde 02/08/2015

PCE - Construyendo Unidad Popular-
PCE - Construyendo Unidad Popular

Al Giro de Italia - No pedalees para el apartheid israelí

Sitio desnuclearizado, camapaña de Ecologistas en Acción
Sitio desnuclearizado, campaña de Ecologistas en Acción

Sitio Web de la Agrupación de Profesionales y Técnicos del Partido Comunista de Madrid - http://www.profesionalespcm.org 
Actualizado a 12/12/17
Los comentarios y colaboraciones son bienvenidos
(comunistas_ARROBA_profesionalespcm_PUNTO_org): Carta a comunistas_ARROBA_profesionalespcm_PUNTO_org
Envíanos tu colaboración, o comentarios vía formulario.
¡¡AFÍLIATE EL PARTIDO COMUNISTA DE MADRID - PCE
!

BÚSQUEDAS en este sitio web
AGREGADOR - SINDICACIÓN DE NOTICIAS RSS RDF XML DE PROFESIONALESPCM.ORG - SYNDICATE OUR NEWS - Content FeedsAGREGADOR - SINDICACIÓN DE NOTICIAS RSS RDF XML DE PROFESIONALESPCM.ORG - SYNDICATE OUR NEWS - Content FeedsAgregador RSS de noticias y contenidos - Aquí OTRA VERSIÓN DEL AGREGADOR RSS XML  AGREGADOR - SINDICACIÓN DE NOTICIAS RSS RDF XML DE PROFESIONALESPCM.ORG - SYNDICATE OUR NEWS - Content FeedsAGREGADOR - SINDICACIÓN DE NOTICIAS RSS RDF XML DE PROFESIONALESPCM.ORG - SYNDICATE OUR NEWS - Content Feeds

IMPRIMIR Imprimir ESTA PAGINA (sólo si es imprescindible)  

Secciones: 
    [11-M Terror y Manipulación]  [15M, Unid@s Podemos, mareas, unidad popular, PAH]  [Acta Moderna]  [África]  [Anarquismo]  [Antiglobalización]  [Antivirus, Seguridad Informática]  [Archivo Sonoro, música y vídeo]  [Argentina]  [Bibliografía/Citas]  [Brasil]  [CC.OO.]  [CGT]  [Chile]  [China]  [Ciencia]  [Cine]  [Colombia]  [Congresos]  [Contactos]  [Convenios Colectivos]  [Convocatorias]  [Convocatorias defensa FERROCARRIL]  [Correo recibido]  [Cuba Socialista]  [Documentos militante IU/ PCE]  [Documentos, opinión, debate]  [Ecologismo]  [Economía]  [El Problema Español]  [Empleo (ofertas)]  [Enlaces]  [Esperanto]  [Estados Unidos de América]  [Europa]  [FIRMAS DE APOYO A MANIFIESTOS]  [Formación / Educación]  [Foro/Lista de Correo]  [Fotografías]  [Huelga General]  [Humor]  [Infancia / Juventud]  [Legislación]  [Literatura y otras Artes]  [Marxismo]  [Memoria Histórica]  [México]  [Movimiento Obrero/Mundo del Trabajo]  [Mujer / Feminismo]  [Mundo Insurgente]  [No Fumar /Derecho Fumadores Pasivos]  [Organigrama]  [Palestina]  [Plan de Trabajo]  [Prensa / Medios comunicación]  [Profesionales y Comunistas]  [República Española, La Tercera y Socialista]  [Resoluciones]  [Rusia, URSS, Centenario Revolución Soviética]  [Sáhara Occidental]  [Salud]  [Sexualidad y mundo gay]  [SIDA]  [Software y Conocimiento Libre]  [Venezuela Bolivariana]  [Yugoslavia]
Volver a la página principal de www.profesionalespcm.org

Volver a la página de inicio
Código QR para dispositivos móviles:


Novedades

     ¡ PINCHA AQUÍ PARA VER LISTADO COMPLETO Y CRONOLÓGICO DE LAS NOVEDADES PINCHA AQUÍ PARA LISTADO COMPLETO Y CRONOLÓGICO DE LAS NOVEDADESPINCHA AQUÍ PARA VER LISTADO COMPLETO Y CRONOLÓGICO DE LAS NOVEDADES



NO PAGUES LA CRISIS

ESTADÍSTICAS DE ESTE SITIO WEB:
  Página principal de www.profesionalespcm.orgINCLUYE EL BANNER EN TU SITIO WEB   PCE


Recomendado reproducir material citando su procedencia. Esta publicación es copyleft. Puede ser copiada sin ninguna restricción siempre que se mantenga esta nota. Apostamos por una Internet para todos y por el Software Libre LA AGRUPACIÓN DE PROFESIONALES DEL PCM SE IDENTIFICA Y HACE RESPONSABLE EXCLUSIVAMENTE DE LOS TEXTOS INCLUIDOS EN ESTE SITIO WEB, QUE FIRME COMO RESOLUCIONES O COMUNICADOS DE LA MISMA. Todos los datos públicos de este sitio web están tomados de la Red o enviados por sus creadores, su único fin es divulgar la noticia, nunca apropiarse de textos y fotos, Siempre publicamos  la fuente cuando es conocida
NO AL CANON DE CDs DE LA SGAE
NO A LAS PATENTES DE SOFTWARE

No acepto ser fumador pasivoEl humo ambiental del tabaco mata. No fumes en lugares comunes
GRACIAS POR NO FUMAR EN LUGARES COMUNES
EL COCHE DEVORA A TU CUIDAD, TU PLANETA Y TUS AMIGOS, APARCA EL COCHE PARA SIEMPREAPÁRCALO PARA SIEMPRE