{"id":21275,"date":"2016-03-18T02:36:32","date_gmt":"2016-03-18T07:36:32","guid":{"rendered":"http:\/\/fourthamendment.com\/?p=21275"},"modified":"2016-03-18T02:36:32","modified_gmt":"2016-03-18T07:36:32","slug":"lawfare-apple-v-fbi-shows-that-lawyers-and-tech-speak-different-language-on-privacy","status":"publish","type":"post","link":"https:\/\/fourthamendment.com\/?p=21275","title":{"rendered":"Lawfare: Apple v. FBI Shows That Lawyers and Tech Speak Different Language on Privacy"},"content":{"rendered":"<p>Lawfare: <a href=\"https:\/\/www.lawfareblog.com\/apple-v-fbi-shows-lawyers-and-tech-speak-different-language-privacy\">Apple v. FBI Shows That Lawyers and Tech Speak Different Language on Privacy<\/a> by Timothy Edgar:<br \/>\n<!--more--><\/p>\n<blockquote><p>I recently appeared on the Brown University Cybersecurity News Podcast to discuss bridging the lawyer and technology divide in the debate between Apple and the FBI. Interested Lawfare readers can listen to the full audio.<\/p>\n<p>Lawyers and technologists mean different things when they say the word \u201cprivacy.\u201d  For American lawyers, privacy begins with Louis D. Brandeis.  Privacy is the \u201cright to be let alone.\u201d  \u201cUnjustified\u201d intrusions on privacy are a violation of the Fourth Amendment.  The Fourth Amendment protects against unreasonable searches, i.e., those without a warrant or some exception to the warrant requirement.<\/p>\n<p>For technologists, privacy means the ability to have a secure conversation.  In their paper explaining the first practical public-key cryptosystem, Ron Rivest, Adi Shamir and Len Adleman define privacy to mean that \u201cAlice\u201d and \u201cBob\u201d can talk with a technical guarantee that no one else can listen in.  Privacy is defined by logic and math.  There is no wiggle room; a system is either secure or it is broken.<\/p><\/blockquote>\n","protected":false},"excerpt":{"rendered":"<p>Lawfare: Apple v. FBI Shows That Lawyers and Tech Speak Different Language on Privacy by Timothy Edgar:<\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[76],"tags":[],"class_list":["post-21275","post","type-post","status-publish","format-standard","hentry","category-surveillance-technology"],"_links":{"self":[{"href":"https:\/\/fourthamendment.com\/index.php?rest_route=\/wp\/v2\/posts\/21275","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/fourthamendment.com\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/fourthamendment.com\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/fourthamendment.com\/index.php?rest_route=\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/fourthamendment.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=21275"}],"version-history":[{"count":1,"href":"https:\/\/fourthamendment.com\/index.php?rest_route=\/wp\/v2\/posts\/21275\/revisions"}],"predecessor-version":[{"id":21276,"href":"https:\/\/fourthamendment.com\/index.php?rest_route=\/wp\/v2\/posts\/21275\/revisions\/21276"}],"wp:attachment":[{"href":"https:\/\/fourthamendment.com\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=21275"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/fourthamendment.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=21275"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/fourthamendment.com\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=21275"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}