As encryption and other privacy-enhancing tech is increasingly used, government agencies are seeking new ways to access communications & other data that is also being increasingly generated by new computing devices, apps and websites.
Methods currently used include government hacking & vulnerabilities exploitation, and pursuing access through such legal paths as Title III & the USA Patriot Act.
• What actually is government hacking & what tools are used?
• What are the risks for putting backdoors in encryption that governments around the world are still pursuing?
• What is US Title
|