Difference between revisions of "Exceptional Access"
From MgmtWiki
(Created page with "==Full Title or Meme== Good Public Key Cryptography is dependent on the absolute protection of the Private Key Component of the public/private key pair. But it turns o...") |
(→References) |
||
Line 14: | Line 14: | ||
[[Category:Glossary]] | [[Category:Glossary]] | ||
− | [[Category: | + | [[Category:Cryptography]] |
Revision as of 13:46, 18 April 2019
Full Title or Meme
Good Public Key Cryptography is dependent on the absolute protection of the Private Key Component of the public/private key pair. But it turns out in most cases that are is good reason to allow Exceptional Access to data protected by the key.
Context
Ever since strong cryptographic encryption technologies were created, shortly after computers become common, there have been governmental agencies that have worried that their lack of access to private data, under the existing rule of law, was a threat to the security of the Common Good that they are charged with protecting.