Hillary Clinton wants a ‘Manhattan Project’ to cure encryption; Snowden, Andreessen mock

“Speaking at the recent Democratic Presidential candidate debates, Hillary Clinton continued to make it clear that, should she be elected, she’ll make it a campaign priority to wage war on encryption,” Karl Bode reports for DSLReports. “Clinton called for a solution to the ‘problem’ that is encryption, insisting that the government needs to develop a ‘Manhattan-like project’ that would bring the tech industries and government together to cure the menace that is encryption once and for all.”

I would hope that, given the extraordinary capacities that the tech community has and the legitimate needs and questions from law enforcement, that there could be a Manhattan-like project, something that would bring the government and the tech communities together to see they’re not adversaries, they’ve got to be partners. — Hillary Clinton

“The problem is that encryption is a tool that benefits everyone, so it’s not a problem that necessarily needs “solving,” Bode writes. ” So far, the government’s only solution has been to push for backdoors into devices and network hardware, something that companies like Google and Apple have been thankfully pushing back against since it makes everybody less safe.

Maybe the back door is the wrong door, and I understand what Apple and others are saying about that. I just think there’s got to be a way, and I would hope that our tech companies would work with government to figure that out. — Hillary Clinton

“Again,” Bode writes, “the problem is there is no door and you don’t really ‘figure encryption out’ …It’s a tool, and you can’t magically prevent only the ‘bad guys’ from using it.”

Read more in the full article here.

“You might imagine that Clinton — of all people — would be sensitive to the liberty interests of hiding personal communications from prying eyes. This is the public servant, after all, who as secretary of state maintained a private email server — with the benefit to Clinton of being able to vet and delete her own communications before they became a permanent part of the public record,” Tim Dickinson reports for RollingStone. “In this context, it was troubling Saturday evening to hear Clinton’s response to a question about the power of high technology to ensure privacy.”

Dickinson reports, “The reaction from America’s most famous privacy whistleblower was swift:”

“Clinton’s Big Brotherish proposal was as troubling as it was vague. And it seemed stubbornly resistant to the reality that America’s tech firms have shifted to powerful encryption — precisely in the wake of Snowden’s revelations — as a way to reassure consumers around the globe that they are not tools of the American surveillance state,” Dickinson reports. “More troubling: Clinton readily admitted she really didn’t understand her own proposal: ‘I don’t know enough about the technology, Martha, to be able to say what it is,’ Clinton added.”

Dickinson reports, “Clinton’s remarks earned her the mockery of one of the top disrupters in Silicon Valley, who found her call for a door that’s not a backdoor nonsensical: Marc Andreessen, the founder of Netscape and now a top venture capitalist taunted on Twitter, ‘Also we can create magical ponies who burp ice cream while we’re at it.'”

Read more in the full article here.

MacDailyNews Take: Sheesh. Have any of these highly confused candidates — from both major U.S. parties* — ever read a little book called “1984?” If so, they failed to understand it.

Good God, sometimes we think The Idiocracy is upon us and we’re just doomed, no matter what.

*Look at some of the other candidates, again from both parties; a couple are actually good on privacy and protecting citizens’ rights.

Here’s someone who gets it:

At Apple, your trust means everything to us. That’s why we respect your privacy and protect it with strong encryption, plus strict policies that govern how all data is handled.

Security and privacy are fundamental to the design of all our hardware, software, and services, including iCloud and new services like Apple Pay. And we continue to make improvements. Two-step verification, which we encourage all our customers to use, in addition to protecting your Apple ID account information, now also protects all of the data you store and keep up to date with iCloud.

We believe in telling you up front exactly what’s going to happen to your personal information and asking for your permission before you share it with us. And if you change your mind later, we make it easy to stop sharing with us. Every Apple product is designed around those principles. When we do ask to use your data, it’s to provide you with a better user experience.

We’re publishing this website to explain how we handle your personal information, what we do and don’t collect, and why. We’re going to make sure you get updates here about privacy at Apple at least once a year and whenever there are significant changes to our policies.

A few years ago, users of Internet services began to realize that when an online service is free, you’re not the customer. You’re the product. But at Apple, we believe a great customer experience shouldn’t come at the expense of your privacy.

Our business model is very straightforward: We sell great products. We don’t build a profile based on your email content or web browsing habits to sell to advertisers. We don’t “monetize” the information you store on your iPhone or in iCloud. And we don’t read your email or your messages to get information to market to you. Our software and services are designed to make our devices better. Plain and simple.

One very small part of our business does serve advertisers, and that’s iAd. We built an advertising network because some app developers depend on that business model, and we want to support them as well as a free iTunes Radio service. iAd sticks to the same privacy policy that applies to every other Apple product. It doesn’t get data from Health and HomeKit, Maps, Siri, iMessage, your call history, or any iCloud service like Contacts or Mail, and you can always just opt out altogether.

Finally, I want to be absolutely clear that we have never worked with any government agency from any country to create a backdoor in any of our products or services. We have also never allowed access to our servers. And we never will.

Our commitment to protecting your privacy comes from a deep respect for our customers. We know that your trust doesn’t come easy. That’s why we have and always will work as hard as we can to earn and keep it. — Apple CEO Tim Cook

Apple’s Privacy webpages are here.

SEE ALSO:
Apple launches counteroffensive against UK’s proposed new surveillance law – December 21, 2015
Manhattan DA fires back after Apple CEO Cook defends stance on encryption – December 21, 2015
Apple CEO Tim Cook opposes government back door to encryption – December 21, 2015
Donald Trump: To stop ISIS recruiting, maybe we should be talking to Bill Gates about ‘closing that Internet up in some way’ – December 21, 2015
Hillary Clinton: We need to put Silicon Valley tech firms to ‘work at disrupting ISIS’ – December 7, 2015
Do not let the government snoops weaken encryption – November 4, 2015
Tim Cook attacks Google, U.S. federal government over right to privacy abuses – June 3, 2015
Apple CEO Tim Cook advocates privacy, says terrorists should be ‘eliminated’ – February 27, 2015
Apple’s Tim Cook warns of ‘dire consequences’ of sacrificing privacy for security – February 13, 2015
Apple’s iPhone encryption is a godsend, even if government snoops and cops hate it – October 8, 2014
Short-timer U.S. Attorney General Eric Holder blasts Apple for protecting users’ privacy against government overreach – September 30, 2014
FBI blasts Apple for protective users’ privacy by locking government, police out of iPhones and iPads – September 25, 2014
Apple thinks different about privacy – September 23, 2014
Apple CEO Tim Cook ups privacy to new level, takes direct swipe at Google – September 18, 2014
Apple will no longer unlock most iPhones, iPads for government, police – even with search warrants – September 18, 2014
Would you trade privacy for national security? Most Americans wouldn’t – August 6, 2014
Apple begins encrypting iCloud email sent between providers – July 15, 2014
Obama administration demands master encryption keys from firms in order to conduct electronic surveillance against Internet users – July 24, 2013
U.S. NSA seeks to build quantum computer to crack most types of encryption – January 3, 2014
Apple’s iMessage encryption trips up U.S. feds’ surveillance – April 4, 2013

[Thanks to MacDailyNews Reader “David E.” for the heads up.]

45 Comments

  1. “…cure the menace that is encryption…”, WTF!

    We really need a Manhattan Project to cure the heaping pile of shit that makes up our political parties in the US. If Hillary, Bernie, Rubio, Jeb, and the other stooges are the best this country has to offer it citizens, we are truly doomed.

      1. Electoral College is a joke. It’s an outdated method no longer needed for a long time. It made sense when people had to ride horses for miles to go vote. Right now, individuals votes should be all that matters and no representative. These days it is just a method for manipulation of individual’s votes.

    1. There have to be well over 100,000 people in the US that would make perfectly good presidents. But who in their right mind would want to run for president? The press will dig into every facet of your history and tell the world all your misdeeds (I pulled a girls hair in the third grade and made her cry, so I’m a horrible person and clearly unfit for the job).

      Who the hell wants that shit? Only people with huge egos who are so driven by either vanity or power that’s they’ll put up with anything to get elected, that who.

  2. If a back door exists, who would want access to it? Our government, foreign governments, hackers, terrorists, corporations (to spy on their own employees and other corporations, and the government.)
    Better no back doors and keep everyone out. 🖖😀⌚️

  3. This is the DNC’s best candidate…really. Those who have nothing to hide will not typically use advanced encryption techniques and secure passwords. Those who are engaged in terrorism and criminal activities will use advanced encryption techniques and secure passwords (and regularly modify passwords).

    I suppose that Clinton want to build an array of quantum computers that would, theoretically, crack and passwords and encryptions in milliseconds, but I am not sure if this technology exits. Osama bin Laden eschewed digital communication among his terror cells and used the old fashion method of human carriers. Despite the Hollywood portrayal of CIA craftiness in “Zero Dark Thirty” it was blind luck and undisciplined behavior of Al Qaeda that resulted bin Laden’s death.

      1. Forget about just buying something. Anything involving financial or medical information on the internet (banking, investments, insurance claims, bill paying, etc.) is using encryption. Not to mention every iMessage you send.

  4. I didn’t take this to be a seriously considered proposal. It sounds like it was thought up on the spur of the moment. She suggested we get smart people together to find a way to protect privacy and help the security forces find the bad guys. Sounds pretty bland. I doubt we’ll hear about this again.

  5. this from the [REDACTED] who willfully wiped her personal fileserver email library to evade scrutiny from the government of her back scenes dealing and conniving. this alone should convince even the most liberal of you, dear readers, of how plainly ambitious, two-faced, and malevolent Shrillary is

  6. “idiocracy” wasn’t a comedy, it was a prophecy. We’re seeing it play out before our very eyes.

    Encryption baked into our devices is invisible to most of us and makes our daily lives safer by protecting our information from those who would do harm, while enabling useful actions that would be too risky without encryption, like banking transactions. It’s a good thing.

    Those who purposefully seek to do harm have other methods to secretly communicate that don’t rely upon the fact that Apple won’t incorporate a method to see what we say to each other into the hardware and software of their products. Politicians who posture about forcing companies to do so are just that: Posturing Politicians, nothing more and nothing much.

    1. “Liberals” don’t think that. Hillary and the Washington Machine™ do. Just as the Westminster Machine™ does. Ordinary “Liberals” are just as horrified by this as ordinary “Conservatives” are.

    2. Liberals respect individuals right to privacy. I’m not just saying that as a personal opinion – that’s word for word from the dictionary definition of liberal. Hilliary Clinton is not really a liberal – she speaks for the rich and entrenched political establishment. She’s more of an oligarch or plutocrat.

      Both parties have been moving to the right for years. Hilary’s political stances are as far right a regular Republicans were about 20 years ago. And Republicans have moved so far to the extreme right, the leading Republican candidate, Trump, sounds like he writes his speeches by running a search/replace on Mein Kempf replacing Germany with America and replacing Jews with Mexicans or Muslims. He’s manipulating people’s fear and base emotions, focusing public blame and hatred onto scapegoats, to enhance his own political power. It’s might be new in our country’s political system, but that extreme right political playbook has been around for a long time.

  7. Wow! A world where all the intelligent people are busy trying to solve cancer, build the best technologies while the stupid politicians have all the power to run around like elephants in a china shop. Amazing!

    These stupid politicians go around saying things like, “He’s “only” an Engineer”, or, “He’s “only” a scientist”. While at the same time wielding the exact same technology to build their empires.

    Hang on a mo. Who is the stupid ones? Maybe not the politicians after all.

  8. Sorry Hillary. Edward Turing died many years ago, so you have no one to break the code so to speak.

    I long for a wiki leaks dump of all of Hillary’s deleted and “not marked classified” emails so the work can truly understand that this lady is playing you for a fool. Here major objective as SoS was to visit as many countries as possible and to turn over the middle east from dictators to anarchists – other than those leaders that were contributing to the Clinton Foundation most of whom were likely financially supporting Al Queda.

  9. You don’t solve encryption. There is no unique answer. If you break one algorithm, others will spring up to replace it. The Manhatten Project solved a singular problem. Creating a nuclear bomb. The physics does not change. Also encryption is not a problem. It is a solution.

    Ironically Clinton and Trump seem to have the same science and technology advisors. They often propose the same ignorant crap.

    Trump vs. Clinton vs. Sanders. One way or another we’re screwed. Where are the Kennedys and/or Reagans of this time?

  10. In life things generally aren’t binary, there is no exact right or wrong way to do something, yet politicians insist there way is right and everyone else is wrong. Encryption is binary, you either have it or you don’t, it either works or it doesn’t, yet Politicians seem to think there is some intermediate solution that will work fine for the good guys but be totally inaccessible to bad guys. Encryption can’t decide who it is going to work for and when. It has to either work all the time or else it doesn’t work at all. They may as well suggest bullets that only work on bad people.

Reader Feedback

This site uses Akismet to reduce spam. Learn how your comment data is processed.