Archive

Geek of the Week: Steve Crocker

The inter­est­ing phe­nom­e­non relat­ed to the RSA algo­rithm and is not shared with some of the oth­er algo­rithms is it is use­ful for both encryp­tion and for dig­i­tal sig­na­ture. That is they are two dis­tinct uses and this sin­gle algo­rithm is use­ful for both of those. And there’s an amaz­ing and some­what inter­est­ing sto­ry that then devel­ops from that.

A #Netfreedom Agenda for the 45th POTUS

In addi­tion to free­dom to con­nect, there also needs to be the abil­i­ty to con­nect, and that we need to mod­el best prac­tice at home and around the world, and the poli­cies that relate to that.

Who’s Killing Crypto?

Encryption is a key piece of a robust enter­prise approach to cyber­se­cu­ri­ty. It keeps down the num­ber of data breach­es as the scale and the size of data breach­es con­tin­ues only to grow. It also is the first line of defense that users have against peo­ple access­ing their data on an indi­vid­ual lev­el.

If You Build It, They Won’t Care: Designing Privacy‐Preserving Technologies for People with Other Interests

I think that pri­va­cy is some­thing that we can think of in terms of a civ­il right, as indi­vid­u­als. […] That’s a civ­il rights issue. But I think there’s also a way to think about it in terms of a social issue that’s larg­er than sim­ply the indi­vid­ual.