Privacy Blog

"Friends don’t let friends get spied on.' – Richard Stallman, President of the Free Software Foundation and longtime advocate of privacy in technology.

US AG Barr Demands Tech Firms Break Encryption

Some politicians simply don’t understand the legitimate needs for encryption. If they are not careful, they may get what they wish for. The latest silliness involves US Attorney General Bill Barr who told attendees of a cybersecurity conference in New York that the government should be able to spy on everyone’s secrets. You can read more at:

What is encryption and why is it important?
Encryption, is the process of changing information in such a way as to make it unreadable by anyone except those possessing special knowledge (usually referred to as a “key”) that allows them to change the information back to its original, readable form.

I’m sure that Attorney General Barr won’t mind if government agents and illegal hackers who surreptitiously access government databases have the ability to spy on all of Barr’s email messages, investments, checking account(s), text messages, personal calendar, records of his phone calls, income tax records, Social Security number, credit card charges, and more. Right? After all, “whats good for the goose is good for the gander.” Let’s make sure that Attorney General Barr understands that HIS privacy will be invaded in the same manner as everyone else’s privacy.

Encryption is important because it allows you to securely protect data that you don’t want anyone else to have access to. Businesses use it to protect corporate secrets, governments use it to secure classified information, and many individuals use it to protect personal information to guard against things like identity theft.

Espionage uses encryption to securely protect folder contents, which could contain emails, chat histories, tax information, credit card numbers, or any other sensitive information. This way, even if your computer is stolen that data is safe.

More Information may be found at:

Categories: Email Security, Encryption, Online Privacy & Security, Thoughts About Privacy

Leave a Reply

Fill in your details below or click an icon to log in: Logo

You are commenting using your account. Log Out /  Change )

Twitter picture

You are commenting using your Twitter account. Log Out /  Change )

Facebook photo

You are commenting using your Facebook account. Log Out /  Change )

Connecting to %s

This site uses Akismet to reduce spam. Learn how your comment data is processed.