Telecommunication has never been perfectly secure. The Cold War culture of recording devices in telephone receivers and bugged embassy offices has been succeeded by a post-9/11 world of NSA wiretaps and demands for data retention. Although the 1990s battle for individual and commercial freedom to use cryptography was won, growth in the use of cryptography has been slow. Meanwhile, regulations r…
"Coyne examines urban living through the frame of cryptography, diving into the technologies, instruments, and processes of hiding information, messages, things, spaces, places, and people within cities"--OCLC-licensed vendor bibliographic record.
In this book, the author argues that in embarking on an unprecedented effort to build surveillance capabilities deeply into communications infrastructure, the U.S. government is opting for short-term security and creating dangerous long-term risks. Landau describes what makes communications security hard, warrantless wiretapping and the role of electronic surveillance in the war on terror, the …
Title from title screen.Includes index.Stefan Brands proposes cryptographic building blocks for the design of digital certificates that preserve privacy without sacrificing security.As paper-based communication and transaction mechanisms are replaced by automated ones, traditional forms of security such as photographs and handwritten signatures are becoming outdated. Most security experts belie…