How can we get communications security right?
Steve Bellovin et al:
Architecture matters a lot, and in subtle ways.
I am enough of a techno-pessimist to believe that baking surveillance, control and censorship into the very fabric of our networks, devices and laws is the absolute road to dictatorial hell.
The exploitation of lawful intercept is more than theoretical.
If you have something that you don't want anyone to know, maybe you shouldn't be doing it in the first place.
What you tell Google you've told the government.
Chaos Computer Club:
The largest European hacker club, "Chaos Computer Club" (CCC), has reverse engineered and analyzed a "lawful interception" malware program used by German police forces. It has been found in the wild and submitted to the CCC anonymously. The malware can not only siphon away intimate data but also offers a remote control or backdoor functionality for uploading and executing arbitrary other programs. Significant design and implementation flaws make all of the functionality available to anyone on the internet.
Anecdotal data suggest that digital searches are becoming common.
Noam Cohen's friend:
Privacy is serious. It is serious the moment the data gets collected, not the moment it is released.