Snowden advocates at SXSW for improved data security
The best encryption may conflict with the business model of Google and Facebook, speakers said at the show
IDG News Service - Encryption technologies can be a powerful tool against government surveillance, but the most effective techniques are still largely out of reach to the average Internet user, former NSA contractor Edward Snowden said Monday.
"Encryption does work," Snowden said, speaking via satellite video from Russia at the South by Southwest Interactive technology festival in Austin, Texas. "We need to think of encryption not as an arcane black art, but as a basic protection in the digital realm," the former U.S. National Security Agency contractor said.
Snowden chose to speak at SXSW rather than before a legislative or policy group because it's the technology community that can really fix security and digital rights, he said. "This is something we should not only implement, but actively research and improve on an academic level," he said.
But now, the best encryption, like end-to-end encryption, often does not find its way into mainstream product and is not always employed by major Internet companies that depend on advertising.
Ideally, more companies would make strong encryption a default part of their services, without requiring action from the consumer, or burying the option several menus deep. It may be difficult, however, for companies like Google and Facebook to adopt the strongest encryption protocols like end-to-end encryption, Snowden said during a discussion about security with two representatives from the American Civil Liberties Union. Those companies gather lots of data about their users and use it for advertising. It's harder to gather that data when the endpoints are encrypted, the speakers said.
Since the disclosures began last June from documents leaked to reporters by Snowden, "companies have improved their security," said Chris Soghoian, a senior policy analyst with the ACLU Speech, Privacy and Technology Project. There is security, for instance, between user's computers and Google's servers, he said.
But it's difficult for major Internet companies providing a free service to offer end-to-end encryption because it conflicts with their business model, he said. Unfortunately, the tools that offer secure, end-to-end online communications are not polished or easy to use, speakers said. "The tools designed with security as a first goal are often developed by independent developers, activists and hobbyists," he said.
After previously classified documents were leaked by Snowden, a number of large technology companies, including Google, Microsoft and Yahoo announced new protocols for encrypting users' data. Yhe problem is that one of the most commonly used encryption technologies, known as TLS (Transport Layer Security) is not that strong against the intelligence gathering community, Snowden said.
TSL encryption, which is used by services owned by Google and Skype, encrypts communications at the point of transport and then the companies de-crypt and re-encrypt it, Snowden said. End-to-end encryption, on the other hand, forces intelligence-gathering groups to target individual computers, which are much harder to crack.
- Comprehensive Advanced Threat Defense The hot topic in the information security industry these days is "Advanced Threat Defense" (ATD). This paper describes a comprehensive, network-based approach to...
- Advanced Threat Defense: A Comprehensive Approach In this interview, Peter George, president, General Dynamics Fidelis Cybersecurity Solutions, explains why we need more than anti-malware, and what constitutes a comprehensive...
- 2013 Cyber Risk Report The "Cyber risk report 2013 Executive summary" presents the major findings of HP Security Research's comprehensive dive into today's cyber vulnerability and threat...
- Cybersecurity for Dummies eBook This book provides an in-depth examination of real-world attacks and APTs, the shortcomings of legacy security solutions, the capabilities of next-generation firewalls, and...
- Live Webcast Security Vulnerabilities Associated With Having Local Administrator Privileges Viewfinity will demonstrate how removing admin rights and granularly managing privileges at the application level reduces the attack surface.
- Security Vulnerabilities Associated With Having Local Administrator Privileges Viewfinity will demonstrate how removing admin rights and granularly managing privileges at the application level reduces the attack surface.
- On-demand webinar - 7 Keys to Service Catalog Implementation Success Watch this webinar to learn 7 crucial keys to make your service catalog a success! All Cybercrime and Hacking White Papers | Webcasts