We can’t keep weapons out of prisons; we can’t possibly expect to keep them out of airports.
Think of your existing power as the exponent in an equation that determines the value of information. The more power you have, the more additional power you derive from the new data.
A colleague once told me that the world was full of bad security systems designed by people who read Applied Cryptography.
Corporate and government surveillance aren’t separate; they’re an alliance of interests.
When a big company lays you off, they often give you a year’s salary to ‘go pursue a dream.’ If you’re stupid, you panic and get another job. If you’re smart, you take the money and use the time to figure out what you want to do next.
Trying to make bits uncopyable is like trying to make water not wet. The sooner people accept this, and build business models that take this into account, the sooner people will start making money again.
If the FBI parks a van bristling with cameras outside your house, you are justified in closing your blinds.
Despite fearful rhetoric to the contrary, terrorism is not a transcendent threat. A terrorist attack cannot possibly destroy our country’s way of life; it’s only our reaction to that attack that can do that kind of damage.
It is insufficient to protect ourselves with laws; we need to protect ourselves with mathematics.
Cryptography products may be declared illegal, but the information will never be.
Why is it that we all – myself included – believe these stories? Why are we so quick to assume that the TSA is a bunch of jack-booted thugs, officious and arbitrary and drunk with power? It’s because everything seems so arbitrary, because there’s no accountability or transparency in the DHS.
Liberty requires security without intrusion, security plus privacy.
Secret courts making secret rulings on secret laws, and companies flagrantly lying to consumers about the insecurity of their products and services, undermine the very foundations of our society.
The more we expect technology to protect us from people in the same way it protects us from nature, the more we will sacrifice the very values of our society in futile attempts to achieve this security.
Metadata equals surveillance; it’s that simple.
Surveillance of power is one of the most important ways to ensure that power does not abuse its status. But, of course, power does not like to be watched.
Chaos is hard to create, even on the Internet.
We no longer know whom to trust. This is the greatest damage the NSA has done to the Internet, and will be the hardest to fix.
If you ask amateurs to act as front-line security personnel, you shouldn’t be surprised when you get amateur security.
The question to ask when you look at security is not whether this makes us safer, but whether it’s worth the trade-off.