As encryption and other privacy-enhancing tech is increasingly used, government agencies are seeking new ways to access communications & other data that is also being increasingly generated by new computing devices, apps and websites. Methods currently used include government hacking & vulnerabilities exploitation, and pursuing access through such legal paths as Title III & the USA Patriot Act. • What actually is government hacking & what tools are used? • What are the risks for putting backdoors in encryption that governments around the world are still pursuing? • What is US Title
|