Thoughts On Encryption

The debate on encryption has heated up significantly in the last couple of months. Most of the recent discussion has revolved around a particular device in a specific case but encryption is older than that. Modern encryption systems represent the culmination of centuries of development of making sure things aren’t seen.
Encryption As A Weapon
Did you know that twenty years ago the U.S. Government classified encryption as a munition? Data encryption was classified as a military asset and placed on the U.S. Munitions List as an auxiliary asset. The control of encryption as a military asset meant that exporting strong encryption to foreign countries was against the law. For a number of years the only thing that could be exported without fear of legal impact was regular old Data Encryption Standard (DES) methods. Even 3DES, which is theoretically much stronger but practically not much better than it’s older counterpart, was restricted for export to foreign countries.
While the rules around encryption export have been relaxed since the early 2000s, there are still some restrictions in place. Those rules are for countries that are on U.S. Government watch lists for terror states or governments deemed “rogue” states. Continue reading
Jokes aside, there is species called the Borg in the series which do not so nice things. What it is nice about
I was recently asked to automate the way a client handles Cisco IOS upgrades. As I’ve been using
John Donovan introduces Ecomp on the ONS 2016 stage.
I was recently asked to automate the way a client handles Cisco IOS upgrades. As I’ve been using
Open source and networking do mix, but not easily.