精品国产_亚洲人成在线高清,国产精品成人久久久久,国语自产偷拍精品视频偷拍

立即打開
恐怖襲擊后遺癥:要安全還是要隱私?

恐怖襲擊后遺癥:要安全還是要隱私?

David Burg 2015-11-20
白宮此前駁回了執(zhí)法部門要求科技公司為其設(shè)備植入后門的請求,但巴黎恐怖襲擊事件能否改變白宮的看法呢?

慘絕人寰的巴黎恐怖襲擊引發(fā)了一系列國家安全問題,其中一項便是網(wǎng)絡(luò)安全。目前,針對政府是否應(yīng)該以國家安全之名,輕易突破保護公民通信和交易隱私的技術(shù)這一問題,各界正在展開激烈的討論。

巴黎恐怖事件將這一問題推到了世人面前,因為人們首先想到的一個問題是,恐怖分子是如何策劃,并執(zhí)行了一場如此復(fù)雜的襲擊,又是如何避開了情報部門偵察的。答案或許就在于加密技術(shù)。事實上,專家們提出了三種可能性:(1)恐怖分子使用了強大的場外加密技術(shù);(2)他們借助黑暗網(wǎng)絡(luò)完成分工協(xié)作;(3)準(zhǔn)備工作達到一定程度之后,他們便停止使用技術(shù)手段進行聯(lián)系。

首先,我們必須了解現(xiàn)代加密技術(shù)的工作原理,以及這項技術(shù)為什么會突然引起關(guān)注。數(shù)百年來,人類一直在使用加密技術(shù)保證信息傳輸?shù)陌踩呒壖用芗记珊图夹g(shù)從未像現(xiàn)在這樣被如此廣泛地使用,同時也變得更加復(fù)雜。

簡而言之,加密就是將信息或數(shù)據(jù)轉(zhuǎn)換成一組代碼的過程,讓信息變得晦澀難懂,無法讀取,只有使用正確的密鑰(或多個密鑰)才能破譯或解密信息。今天,世界上任何一個人都可以輕松購買和使用高度復(fù)雜的256位AES加密技術(shù)——這種加密技術(shù)非常強大,美國政府自2002年起也采用這種加密標(biāo)準(zhǔn)。

一般企業(yè)每天也都在使用加密技術(shù),防止身份盜竊和其他犯罪。例如,捕獲和傳輸非加密狀態(tài)下進行支付的信用卡信息,曾經(jīng)是一種非常普遍的作法。道高一尺,魔高一丈。網(wǎng)絡(luò)犯罪分子現(xiàn)在開始想方設(shè)法在支付過程的某個節(jié)點竊取這些信息。之后,他們會利用這些信用卡信息進行牟利。

意識到這個問題之后,支付處理商就部署了許多不同類型的加密技術(shù),讓傳輸?shù)男畔⒆兊酶y攔截或牟利。雖然加密通信可以解密,但這需要時間和計算能力。此外,在我們的私人生活和商業(yè)生活當(dāng)中,加密設(shè)備與通信已經(jīng)變得非常普遍。

事實上,恐怖分子很容易便能找到安全的通信方式。為了保護我們的隱私和個人信息,我們今天使用的許多手機應(yīng)用均支持加密通信。我們購買的許多設(shè)備,例如智能手機,也會出于同樣的原因,對數(shù)據(jù)進行加密。因此,我們的數(shù)據(jù)在源頭(設(shè)備)、傳輸過程和接收設(shè)備上均經(jīng)過了加密。問題在于,這意味著恐怖分子的設(shè)備和通信同樣如此。

當(dāng)然,加密技術(shù)僅是其中之一。除此之外,還有通過各種方式保護隱私的軟件和服務(wù)。比如,讓我們可以匿名使用互聯(lián)網(wǎng)的軟件——當(dāng)用戶使用這些軟件和服務(wù)登錄互聯(lián)網(wǎng)時,犯罪分子和情報人員都無法識別用戶身份或鎖定他所在的位置。

巴黎恐怖襲擊發(fā)生之后,全世界都已經(jīng)注意到了這個問題——恐怖分子和其他犯罪分子可以使用這些普遍可用的技術(shù),造成巨大的危害。現(xiàn)在,我們需要密切關(guān)注爭論的方向及結(jié)果是否會發(fā)生轉(zhuǎn)變。

例如,隨著加密通信的日益普遍,執(zhí)法部門和情報機構(gòu)一直在要求植入“后門”,從而使執(zhí)法機構(gòu)可以繞開加密。某些科技公司和隱私倡議者強烈反對,因為他們擔(dān)心政府會干擾人們的私人生活。就在上個月,白宮駁回了執(zhí)法部門要求科技公司植入后門的請求。

值得注意的是,白宮給出的結(jié)論是,植入后門將導(dǎo)致美國公民更易受到外國政府、網(wǎng)絡(luò)犯罪和恐怖分子的侵擾。

巴黎恐怖襲擊能否改變白宮的看法,我們拭目以待。更廣泛地說,圍繞著加密技術(shù)和其他隱私技術(shù)而展開的爭斗,將日益反映出一個更加寬泛的政策辯題:如何平衡國家安全與公民自由。

隨著下一個十年的到來,我們將迎來更強大的計算能力,尤其是隨著量子計算技術(shù)的普遍應(yīng)用,每個人都將有能力對自己的通信進行難以破解的高級別加密。到時候,這場爭論將會變得更加激烈。(財富中文網(wǎng))

本文作者戴維?伯格為普華永道的全球網(wǎng)絡(luò)安全負責(zé)人。

譯者: 劉進龍/汪皓

審校:任文科

The horrendous Paris attacks raise a number of national security issues, including one involving cybersecurity, and the debate over whether governments should have easy ways to break through technology that safeguards the privacy of our communications and transactions — all in the name of national security.

Paris thrusts this issue onto the front pages because one of the big questions that quickly emerged was how a group could execute such a complex attack while evading detection from intelligence services. Encryption is one potential answer. Indeed, experts hypothesize three different possibilities: (1) the attackers used powerful over-the-counter encryption; (2) they collaborated on the dark web; (3) they stopped using technology for coordination once they reached a certain level of operational readiness.

Let’s be sure we understand how modern encryption technologies work and why they are now springing to the forefront. Though encryption technologies have been used to securely transmit information for hundreds of years, never before have advanced encryption techniques and technology been so widely available and so sophisticated.

Simply put, encryption is the process of converting information or data into a code that obscures information so it cannot be read without the correct key (or keys) used to decipher or decrypt the message. Today, anyone around the world can easily purchase and use highly-sophisticated, 256 bit AES encryption technologies – encryption that is so strong that it has been the U.S. Government standard since 2002.

Businesses use encryption every day to prevent identity theft and other crimes. For example, it was once common to capture and transmit credit card information in an unencrypted state to process payments. Cybercriminals knew this and found ways to copy the information at specific points in the payment process lifecycle. They were then able to use the payment card information and monetize it.

Recognizing the problem, payment processors deployed a number of different encryption technologies, rendering the transmitted information far more difficult to intercept and monetize. While encrypted communications can be decrypted, doing so requires time and computing power. And encrypted devices and communications are now common throughout our personal and commercial lives.

Indeed, terrorists need not look far to find secure ways to communicate. Many apps that we use every day enable encrypted communications to protect our privacy and personal information. And, many of the devices we buy – such as our smartphones – encrypt he data on it for the same reasons. Thus, our data is encrypted at the source (our devices), as its communicated in transit, and at the receiving device. The issue is, such is the case for terrorists’ devices and communications as well.

This, of course, is just encryption. On top of it are software and services that protect privacy in other ways, such as those enabling us to use the Internet anonymously – bad actors and intelligence services alike are unable to identify a user or his location when he goes on the Internet using such software and services.

After the Paris attacks, the world is already seeing heightened attention to the way terrorists and other bad actors can use this commonly-available technology to help them inflict enormous harm. We will need to watch closely to see whether the debate and its outcomes shift.

For example, as the use of encrypted communication has spread, law enforcement and intelligence agencies have pushed for “back doors” – ways to enable law enforcement to bypass the encryption. Some technology companies and privacy advocates have opposed them, fearing government intrusion into their personal lives. And, just last month, the White House overruled law enforcement’s request to push tech companies to create such back doors.

Notably, the White House concluded that creating such back doors would increase U.S. citizens’ vulnerability to foreign government, cyber criminal, and terrorist intrusions.

Time will tell whether the Paris attacks change the White House’s calculus. More broadly, the battle over encryption and other privacy-related technologies will increasingly reflect the larger public policy debates we have seen that balance national security with civil liberties. As we move in the next decade into a world where far more powerful computing capability will come on line, specifically as quantum computing becomes widely available, the ability for every man and woman to encrypt their communications at levels that may not be able to be decrypted will only help sharpen that debate.

David Burg is the global cybersecurity leader at PricewaterhouseCoopers.

熱讀文章
熱門視頻
掃描二維碼下載財富APP

            主站蜘蛛池模板: 延津县| 安龙县| 曲周县| 嵊州市| 南木林县| 惠安县| 淅川县| 会泽县| 辉县市| 济宁市| 福建省| 海门市| 天等县| 安达市| 松溪县| 临武县| 红河县| 商洛市| 伊宁市| 鄂伦春自治旗| 梅州市| 祁阳县| 苍梧县| 台山市| 山东省| 汨罗市| 益阳市| 柳州市| 北安市| 文安县| 仪陇县| 东台市| 甘肃省| 长泰县| 云龙县| 托里县| 根河市| 原平市| 额尔古纳市| 乐山市| 镇安县|