Difference between revisions of "Exceptional Access"

From MgmtWiki
Jump to: navigation, search
(Created page with "==Full Title or Meme== Good Public Key Cryptography is dependent on the absolute protection of the Private Key Component of the public/private key pair. But it turns o...")
 
(References)
Line 14: Line 14:
  
 
[[Category:Glossary]]
 
[[Category:Glossary]]
[[Category:Cryptograhy]]
+
[[Category:Cryptography]]

Revision as of 13:46, 18 April 2019

Full Title or Meme

Good Public Key Cryptography is dependent on the absolute protection of the Private Key Component of the public/private key pair. But it turns out in most cases that are is good reason to allow Exceptional Access to data protected by the key.

Context

Ever since strong cryptographic encryption technologies were created, shortly after computers become common, there have been governmental agencies that have worried that their lack of access to private data, under the existing rule of law, was a threat to the security of the Common Good that they are charged with protecting.

Problems

Solutions

References