Login / Register

Should the government have access to a 'backdoor' to encryption?

Thanks! Share it with your friends!


You disliked this video. Thanks for the feedback!

Sorry, only registred users can create playlists.

Added by Admin in Apartment design architecture


All the materials used are for educational purposes,.

[1] Kelion, L. (2017). WhatsApp's privacy protections questioned after terror attack. BBC News, [online] p. 1. Available at: http://www.bbc.co.uk/news/technology-39405178 [Accessed 01 Nov. 2017]
[2] Sparrow, A. (2017). WhatsApp must be accessible to authorities, says Amber Rudd. The Guardian, [online] p. 1. Available at: https://www.theguardian.com/technology/2017/mar/26/intelligence-services-access-whatsapp-amber-rudd-westminster-attack-encrypted-messaging [Accessed 01 Nov. 2017]
[3] Gurman, S., Tucker, E. (2016). AP: Across US, police officers abuse confidential databases. AP News, [online] p. 1. Available at: https://apnews.com/699236946e3140659fff8a2362e16f43/ap-across-us-police-officers-abuse-confidential-databases [Accessed 03 Nov. 2017]
[4] Ball, J., Borger, J., Greenwald, G. (2013). Revealed: how US and UK spy agencies defeat internet privacy and security, [online] p. 1. Available at: https://www.theguardian.com/world/2013/sep/05/nsa-gchq-encryption-codes-security [Accessed 03 Nov. 2017]
[4] Alexander, A. (2011). Internet role in Egypt's protests, [online] p. 1 Available at: http://www.bbc.co.uk/news/world-middle-east-12400319 [Accessed 04 Nov. 2017]
[5] De Novellis, M. (2017) Facebook, Big Data, And The Ethics Of Behavioral Economics On LSE’s Marketing MSc. [online] p. 1 Available at: https://www.businessbecause.com/news/business-finance-masters/4848/facebook-big-data-ethics-behavioral-economics-lse-marketing-msc [Accessed 02 Nov. 2017]
[6] Sparrow, A. (2017). WhatsApp must not be ‘secret place for terrorists to communicate’, says home secretary. [video] Available at: https://www.theguardian.com/technology/2017/mar/26/intelligence-services-access-whatsapp-amber-rudd-westminster-attack-encrypted-messaging [Accessed 02 Nov. 2017]
[7] Scott, T. (2017). Why The Government Shouldn't Break WhatsApp. [video] Available at: https://www.youtube.com/watch?v=CINVwWHlzTY [Accessed: 01 Nov. 2017]
[8] Melara, M., Blankstein, A., Bonneau, J., Felten, E., Freedman, M. (2015). CONIKS: Bringing Key Transparency to End Users. USENIX Security Symposium (p. 383, 384)
[9] Padlipsky, M., Snow, D., Karger, P. (1978). Limitations of End-to-End Encryption in Secure Computer Networks. (p. 1, 2, 3, 11)
[10] House, F. (2012). Freedom on the Net 2011. Freedom House. (p.1-10)
[11] Qiu, L. (1999). Qiu, J. L. (1999). Virtual censorship in China: Keeping the gate between the cyberspaces. International Journal of Communications Law and Policy, (p. 1-3)
[12] McAndrew, C. (2017). Official portrait of Amber Rudd. [image] Available at: https://en.wikipedia.org/wiki/Amber_Rudd#/media/File:Official_portrait_of_Amber_Rudd_crop_2.jpg [Accessed: 04 Nov. 2017]
[13] BBC News. (2017). WhatsApp indicates Khalid Masood used WhatsApp a couple of minutes before his attack. [image] Available at: http://www.bbc.co.uk/news/technology-39405178 [Accessed 04 Nov. 2017]
[14] BBC News. (2017). Unscrambled data can be retrieved from iCloud back-ups. [image] Available at: http://www.bbc.co.uk/news/technology-39405178 [Accessed 04 Nov. 2017]
[15] BBC News. (2017). Recent CIA leaks indicate it can be difficult to keep hacking tools a secret. [image] Available at: http://www.bbc.co.uk/news/technology-39405178 [Accessed 04 Nov. 2017]
[16] BBC News. (2017). EPA. [image] Available at: http://www.bbc.co.uk/news/uk-39355108 [Accessed 04 Nov. 2017]
[17] Pixels. (Unknown). Unnamed. [image] Available at: https://www.pexels.com/photo/abstract-art-background-blue-370799/ [Accessed 05 Nov. 2017]
[18] BBC News. (2017). BBC. [image] Available at: http://www.bbc.co.uk/news/uk-39351280 [Accessed 05 Nov. 2017]
[19] Pixels. (2016). Unnamed. [image] Available at: https://www.pexels.com/photo/apple-iphone-app-iphone-6-46924/ [Accessed 05 Nov. 2017]
[20] Pixels. (Unknown). Unnamed. [image] Available at: https://www.pexels.com/photo/black-and-white-cctv-cameras-179993/ [Accessed 05 Nov. 2017]
[21] Pempel, K. (2013). Through covert partnerships with tech companies, the spy agencies have inserted secret vulnerabilities into encryption software. [image] Available at: https://www.theguardian.com/world/2013/sep/05/nsa-gchq-encryption-codes-security [Accessed 05 Nov. 2017]
[22] NeuroGadget. (2016). Unnamed. [image] Available at: http://neurogadget.net/2016/05/06/whatsapps-end-end-encryption-not-safe/29504 [Accessed 05 Nov. 2017]
[23] Pixels. (2013). Unnamed. [image] Available at: https://www.pexels.com/photo/administration-architecture-big-ben-bridge-208706/ [Accessed 05 Nov. 2017]
[24] Pixels. (Unknown). Unanmed. [image] Available at: https://www.pexels.com/photo/interior-of-office-building-325229/ [Accessed 05 Nov. 2017]
[25] Pixels. (Unknown). Unnamed. [image] Available at: https://www.pexels.com/photo/close-up-code-coding-computer-239898/ [Accessed 05 Nov. 2017]
[26] Pixels. (2017). Unnamed. [image] Available at: https://www.pexels.com/photo/abstract-art-blur-bright-373543/ [Accessed 05 Nov. 2017]

Post your comment


Be the first to comment