Encryption

13 results arranged by date

Statements   |   China, Internet, Security, USA

UPDATE: Google, Mozilla revoke authority of CNNIC after breach of trust

San Francisco, April 2, 2015--The Committee to Protect Journalists welcomes Google's plan to revoke the authority of root certificates belonging to China Internet Network Information Center (CNNIC) following CNNIC's major breach of the trust placed in them to underpin global Internet security. Mozilla also said it will not trust any CNNIC certificates dated after April 1, and is considering further action.

Blog   |   China, Internet, Security

China's CNNIC issues false certificates in serious breach of crypto trust

Google's landing page for China is viewed on a laptop in Hong Kong. False credentials were issued for Google and other domains by Chinese digital certificate company CNNIC. (AFP/Frederic J. Brown)

In a major breach of public trust and confidence, the Chinese digital certificate authority China Internet Network Information Center (CNNIC) certified false credentials for numerous domains, including several owned by Google. The deliberate breach had the potential to seriously endanger vulnerable users, such as journalists communicating with sources. The breach was discovered by Google and published on its security blog on March 23. Despite this serious lapse, it appears CNNIC's authority will not be revoked, and that its credentials will continue to be trusted by almost all computers around the world.

Blog   |   Internet

Yahoo! End-to-End email preview promises greater protection for journalists

Good news for journalists wanting added protection from surveillance. Yahoo! has announced a technical preview of its email security tool End-to-End, which it has been developing in collaboration with Google. This is another milestone in the tech companies' efforts to protect users not just from outsiders, but also from the companies themselves.

March 30, 2015 5:00 PM ET

Tags:

Blog   |   Internet, Security

How CPJ is working to ensure journalists can protect themselves

Preparations for the Circumvention Tech Festival in Valencia, Spain, where journalists, technologists, and human rights defenders gathered to share skills and advice. (Geoffrey King)

Last week, the Committee to Protect Journalists' Internet Advocacy team was in Valencia, Spain, for the first Circumvention Tech Festival: a mashup of journalists, activists, technologists, and human rights defenders united by a desire to fight censorship and surveillance. More than 500 registered participants from 40 countries shared their skills, strategies, and experiences in combating these global challenges.

Blog   |   Internet, Security

CPJ calls on U.N. to protect use of encryption for journalists

For journalists to work safely they must be able to protect themselves and their sources, which is why encryption is such a vital tool. On February 10, the Committee to Protect Journalists and the Reporters Committee for Freedom of the Press submitted a joint letter to the U.N. urging it to ensure that long-standing freedom of expression and privacy principles also protect reporters' use of encryption and anonymity-protecting technologies.

February 18, 2015 5:47 PM ET

Tags:

Statements   |   UK

UK police used anti-terror legislation to uncover journalists' sources

San Francisco, February 4, 2015--The Committee to Protect Journalists is deeply concerned about reports that police agencies in the United Kingdom made more than 600 applications under anti-terror legislation to uncover journalists' confidential sources in the past three years. Today's revelation in the Guardian, citing the interception of communications commissioner, Anthony May, comes amid criticism of Prime Minister David Cameron's pledge to make end-to-end encryption illegal in the U.K.

February 4, 2015 5:36 PM ET

Tags:

Blog   |   Internet, Security, UK

Classifying media and encryption as a threat is danger to press freedom

The U.K. prides itself on its commitment to free expression, but the latest revelations of surveillance of journalists and calls by Britain's Prime Minister, David Cameron, to ban secure messaging belie the country's drift toward a more restrictive environment for the press. The revelations further underscore the threat surveillance by Western democracies poses to journalism, a threat that prompted the Committee to Protect Journalists' Right to Report in the Digital Age campaign.

Statements   |   Internet, Security

CPJ welcomes Facebook move to enable access via Tor hidden service

San Francisco, November 3, 2014 - The Committee to Protect Journalists welcomes Facebook's move to enable access via a Tor hidden service, which came into effect on Friday. The step protects journalists and other users who are at risk of surveillance, censorship, or online attack.

November 3, 2014 4:52 PM ET

Tags:

Blog   |   Internet

How resistance to encryption jeopardizes journalism

FBI Director James B. Comey, pictured right with outgoing Attorney General Eric Holder in June, says FBI efforts to fight crime are being thwarted by moves to protect user privacy. (Alex Wong/Getty Images/AFP)

Earlier today, the Brookings Institution hosted a discussion with FBI Director James B. Comey, who made the case that steps taken by Apple and Google to protect user privacy were damaging the FBI's efforts to fight crime and safeguard U.S. national security. The discussion was due to take place hours before Apple launched its latest iPads, which benefit from the updated security features of the new iOS 8 operating system.

October 16, 2014 5:08 PM ET

Tags:

Blog   |   Internet

Simple steps to protect journalists and sources from eavesdroppers

Journalists are among those most likely to face technical attempts at attack and interception. Reporting is based on discussions with sources who may want to remain out of the limelight, and news sites attract extensive readership, making them a desirable target for potential attackers. But there are simple steps to protect against the most common form of eavesdropping, and journalists should be aware of the types of technical adversaries they may face.

October 16, 2014 10:23 AM ET

Tags:

13 results

1 2 Next Page »