Encryption

Fetch Headings.ExtraData
Below are groups and resources (books, articles, websites, etc.) related to this topic. Click on an item’s title to go its resource page with author, publisher, description/abstract and other details, a link to the full text if available, as well as links to related topics in the Subject Index. You can also browse the Title, Author, Subject, Chronological, Dewey, LoC, and Format indexes, or use the Search box.
Particularly recommended items are flagged with a red logo:

Connexions Library

The Big Secret That Makes the FBI's Anti-Encryption Campaign a Big Lie
McLaughlin, Jenna
Article
2015
McLaughlin discusses how hacking techniques and their increasing use are justified in a prevalent way by the American government.
FBI director wants access to encrypt Apple, Google users' data, demands law 'fix'
Article
2014
The FBI director has slammed Apple and Google for offering their customers encryption technology that protects users’ privacy. "Deeply concerned" James Comey wants to push on Congress to "fix" laws to...
The FBI Director's Evidence Against Encryption Is Pathetic
Froomkin, Dan; Vargas-Cooper, Natasha
Article
2014
FBI Director James Comey gave a speech Thursday about how cell-phone encryption could lead law enforcement to a “very dark place” where it “misses out” on crucial evidence to nail criminals. To make h...
The Great SIM Heist: How Spies Stole the Keys to the Encryption Castle
Scahill, Jeremy; Begley, Josh
Article
2015
American and British spies hacked into the internal computer network of the largest manufacturer of SIM cards in the world, stealing encryption keys used to protect the privacy of cellphone communicat...
Sending encrypted emails using Thunderbird and PGP
Article
2013
There are easy ways to ensure your Internet activities remain confidential.
Surveillance Self-Defense
Website
2018
Modern technology has given those in power new abilities to eavesdrop and collect data on innocent people. Surveillance Self-Defense is EFF's guide to defending yourself and your friends from surveill...
Ten Steps You Can Take Right Now Against Internet Surveillance
O'Brien, Danny
Article
2013
One of the trends we've seen is how, as the word of the NSA's spying has spread, more and more ordinary people want to know how (or if) they can defend themselves from surveillance online. With a few ...
U.N. Report Asserts Encryption as a Human Right in the Digital Age
Froomkin, Dan
Article
2015
Encryption is not the refuge of scoundrels, as Obama administration law-enforcement officials loudly proclaim – it is an essential tool needed to protect the right of freedom of opinion and expression...
Who Knows: Safegurding Your Privacy in a Networked World
Cavourkian, Ann and Tapscott, Don
Book
1995

Sources Library

Google's upcoming Allo messaging app is 'dangerous', Edward Snowden claims
Altalebi, Lamees
2016
Using Google's upcoming messaging app is "dangerous", according to Edward Snowden. In a tweet, the whistleblower advised against using Allo, the search giant’s latest app, saying: "Google's decision t...
The hubris of investigators
Buttar, Shahid
2016
A now-vacated hearing over whether to require Apple to undermine the security of its users prompted an ongoing controversy over government access to encrypted devices. While the court in San Bernardin...
The use of encryption tools and the protection of anonymity online as safeguards for freedom of the press
Kaye, David
2015
David Kaye is the UN Special Rapporteur on the promotion and protection of the right to freedom of expression. In his latest report, he stressed that governments are obligated to protect encryption to...
Will Full Encryption Sideline Google's Targeted Ads?
Miners, Zach
2014
Mining personal data to deliver targeted ads is the lifeblood of Google’s business—and of many other online firms. But what if that data dries up at the source?