Morning team

Morning team. The fun starts here. Whilst perusing ntk I came across a great definition of why compromising strong encryption is bad. If you didn’t understand the previous sentence, don’t worry, the chaps at ntk have taken the play school pill;

“””
One: everyone has a legitimate use for encryption: heck, every time you pay by credit card, you’re doing it. Two: if you don’t have control of your keys, you have no guarantee that your communication is safe. Three: big pile of keys at police authority implies big place to go for fun terrorist hacking party. Four: here is the set of “organisations using encryption codes legitimately” and here is the set of terrorists. Observe the intersection. There is NONE. IT IS THE NULL SET. VENN DIAGRAM THAT LOOK LIKE TWO BIG CIRCLES EQUAL BAD PUBLIC POLICY.
“””
This still won’t stop a lot of bad laws being passed but there you go. If you are interested, read last week’s ntk here.