Hilary Clinton wants Silicon Valley to help combat terrorism

TECHi's Author Chastity Mansfield
Opposing Author Theregister Read Source Article
Last Updated Originally published November 21, 2015 · 7:20 AM EST
Theregister View all Theregister Two Takes by TECHi Read the original story Published November 21, 2015 Updated January 30, 2024
TECHi's Take
Chastity Mansfield
Chastity Mansfield
  • Words 92
  • Estimated Read 1 min

Hillary Clinton is far from the only politician taking advantage of the recent attacks in Paris to call for weaker encryption, but she’s one of the biggest. While she stopped short of calling for government-accessible backdoors in encryptions, she did call on Silicon Valley to start doing its part to combat terrorism and become more cooperative with governments. To be fair, her arguments were more reasonable than most, and all she wants is for the private and public sectors to work together to find a comfortable balance between safety and security.

Theregister

Theregister

  • Words 150
  • Estimated Read 1 min
Read Article

Hillary Clinton has joined a growing number of politicians using the Paris attacks earlier this month to argue for a weaker encryption. Speaking at Council on Foreign Relations in Washington Thursday, the presidential candidate talked extensively about Islamic State, the recent attacks in Paris and what the US government could do in response. Part of that response was in tackling the technological means by which the Islamic State communicates, she said. “[One] challenge is how to strike the right balance of protecting privacy and security. Encryption of mobile communications presents a particularly tough problem. “We should take the concerns of law enforcement and counterterrorism professionals seriously. They have warned that impenetrable encryption may prevent them from accessing terrorist communications and preventing a future attack. On the other hand, we know there are legitimate concerns about government intrusion, network security, and creating new vulnerabilities that bad actors can and would exploit.”

Source

NOTE: TECHi Two-Takes are the stories we have chosen from the web along with a little bit of our opinion in a paragraph. Please check the original story in the Source Button below.

Balanced Perspective

TECHi weighs both sides before reaching a conclusion.

TECHi’s editorial take above outlines the reasoning that supports this position.

More Two Takes from Theregister

Exploiting cheap labor isn’t why Apple makes its products in China
Exploiting cheap labor isn’t why Apple makes its products in China

We all know the reason why so many technology companies manufacture their consumer electronics in China: labor costs in the…

Europe just dealt a massive blow to American technology companies
Europe just dealt a massive blow to American technology companies

The controversial "Safe Harbor" laws that allowed technology companies to move user data between the Europe Union and the United States were ruled…

Microsoft has developed its own Linux-based operating system
Microsoft has developed its own Linux-based operating system

Considering Microsoft's history of exclusivity to its own ecosystem, it's still a little weird to see the company releasing products…

Google is helping app developers bypass Apple’s new security feature
Google is helping app developers bypass Apple’s new security feature

Even though Google has made it clear that it supports Apple's concern for privacy and decision to implement more encryption…