{"id":13396,"date":"2014-09-20T21:23:16","date_gmt":"2014-09-21T02:23:16","guid":{"rendered":"http:\/\/fourthamendment.com\/?p=13396"},"modified":"2014-09-20T21:25:09","modified_gmt":"2014-09-21T02:25:09","slug":"lawfare-the-encryption-wars-continue","status":"publish","type":"post","link":"https:\/\/fourthamendment.com\/?p=13396","title":{"rendered":"Lawfare: The Encryption Wars Continue"},"content":{"rendered":"<p>Lawfare: <a href=\"http:\/\/www.lawfareblog.com\/2014\/09\/the-encryption-wars-continue\/\">The Encryption Wars Continue<\/a> by Paul Rosenzweig:<\/p>\n<blockquote><p>For quite a while it has been the case <a href=\"http:\/\/www.lawfareblog.com\/2013\/08\/encryption-keys-and-surveillance-2\/\">that properly implemented encryption will defeat efforts to crack it<\/a> (at least using current technology). Yet it has been the case for an equally long time that very few people actually use encryption to protect their vital secrets \u2013 not journalists, not criminals, and most assuredly not the (perhaps mythical) \u201caverage layman user.\u201d<\/p>\n<p>Why is that the case? Nobody knows for sure of course, but speculation reasonably focuses on a range of possibilities: ignorance; complexity; laziness and hubris lead the list. User error is a frequent issue. Of all of these, I tend to think complexity and laziness lead the list \u2013 that is, most encryption programs are difficult to use and need to be installed. They don\u2019t have \u201cone button\u201d applications and they are not \u201con\u201d by default.<\/p><\/blockquote>\n","protected":false},"excerpt":{"rendered":"<p>Lawfare: The Encryption Wars Continue by Paul Rosenzweig: For quite a while it has been the case that properly implemented encryption will defeat efforts to crack it (at least using current technology). Yet it has been the case for an &hellip; <a class=\"more-link\" href=\"https:\/\/fourthamendment.com\/?p=13396\">Continue reading <span class=\"meta-nav\">&rarr;<\/span><\/a><\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[5],"tags":[],"class_list":["post-13396","post","type-post","status-publish","format-standard","hentry","category-cell-phones"],"_links":{"self":[{"href":"https:\/\/fourthamendment.com\/index.php?rest_route=\/wp\/v2\/posts\/13396","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/fourthamendment.com\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/fourthamendment.com\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/fourthamendment.com\/index.php?rest_route=\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/fourthamendment.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=13396"}],"version-history":[{"count":2,"href":"https:\/\/fourthamendment.com\/index.php?rest_route=\/wp\/v2\/posts\/13396\/revisions"}],"predecessor-version":[{"id":13398,"href":"https:\/\/fourthamendment.com\/index.php?rest_route=\/wp\/v2\/posts\/13396\/revisions\/13398"}],"wp:attachment":[{"href":"https:\/\/fourthamendment.com\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=13396"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/fourthamendment.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=13396"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/fourthamendment.com\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=13396"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}