{"title":"后门和加密密钥之战","authors":"Donald L. Buresh","doi":"10.14302/ISSN.2766-8681.JCSR-21-3789","DOIUrl":null,"url":null,"abstract":"This paper argues that the use of backdoors in software is inherently counterproductive and leads to invasion of privacy, either by federal or state governments or by intrusive hackers. The essay outlines encryption’s nature, pointing out that a software backdoor is a secret means of ignoring data authentication. Several examples of known backdoors known to terrorists, criminals, and governments alike are highlighted. Arguments in favor and opposing backdoors are provided, where the Apple Computer, Inc. v. FBI controversy is discussed. Finally, the balancing of harms test as proposed by John Stuart Mill is introduced, where the article concludes that when balancing the opposing positions, the scale tips toward data encryption because an innocent party would suffer the most harm from the existence of a software backdoor.","PeriodicalId":32638,"journal":{"name":"Journal of Current Research in Scientific Medicine","volume":null,"pages":null},"PeriodicalIF":0.0000,"publicationDate":"2021-07-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"The Battle for Backdoors and Encryption Keys\",\"authors\":\"Donald L. Buresh\",\"doi\":\"10.14302/ISSN.2766-8681.JCSR-21-3789\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"This paper argues that the use of backdoors in software is inherently counterproductive and leads to invasion of privacy, either by federal or state governments or by intrusive hackers. The essay outlines encryption’s nature, pointing out that a software backdoor is a secret means of ignoring data authentication. Several examples of known backdoors known to terrorists, criminals, and governments alike are highlighted. Arguments in favor and opposing backdoors are provided, where the Apple Computer, Inc. v. FBI controversy is discussed. Finally, the balancing of harms test as proposed by John Stuart Mill is introduced, where the article concludes that when balancing the opposing positions, the scale tips toward data encryption because an innocent party would suffer the most harm from the existence of a software backdoor.\",\"PeriodicalId\":32638,\"journal\":{\"name\":\"Journal of Current Research in Scientific Medicine\",\"volume\":null,\"pages\":null},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2021-07-09\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Journal of Current Research in Scientific Medicine\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.14302/ISSN.2766-8681.JCSR-21-3789\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Journal of Current Research in Scientific Medicine","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.14302/ISSN.2766-8681.JCSR-21-3789","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0
摘要
本文认为,在软件中使用后门本质上是适得其反的,并导致侵犯隐私,无论是联邦政府或州政府还是侵入性黑客。这篇文章概述了加密的本质,指出软件后门是一种忽略数据认证的秘密手段。文中强调了恐怖分子、犯罪分子和政府都知道的几个已知后门的例子。在苹果电脑公司与联邦调查局的争论中,提供了支持和反对后门的论据。最后,介绍了John Stuart Mill提出的危害平衡测试,文章得出结论,在平衡对立立场时,天平倾向于数据加密,因为软件后门的存在将使无辜的一方遭受最大的伤害。
This paper argues that the use of backdoors in software is inherently counterproductive and leads to invasion of privacy, either by federal or state governments or by intrusive hackers. The essay outlines encryption’s nature, pointing out that a software backdoor is a secret means of ignoring data authentication. Several examples of known backdoors known to terrorists, criminals, and governments alike are highlighted. Arguments in favor and opposing backdoors are provided, where the Apple Computer, Inc. v. FBI controversy is discussed. Finally, the balancing of harms test as proposed by John Stuart Mill is introduced, where the article concludes that when balancing the opposing positions, the scale tips toward data encryption because an innocent party would suffer the most harm from the existence of a software backdoor.