US to take backdoor approach to introducing backdoors to counter encryption

John Leonard
clock • 3 min read

Administration concedes that legislation to enforce the weakening of security in US products is unlikely to be passed - and adopts a charm offensive instead

The US government looks set to step back from its earlier position on strong encryption, according to a document leaked to the Washington Post. The US intelligence agencies had been attempting t...

To continue reading this article...

Join Computing

  • Unlimited access to real-time news, analysis and opinion from the technology industry
  • Receive important and breaking news in our daily newsletter
  • Be the first to hear about our events and awards programmes
  • Join live member only interviews with IT leaders at the ‘IT Lounge’; your chance to ask your burning tech questions and have them answered
  • Access to the Computing Delta hub providing market intelligence and research
  • Receive our members-only newsletter with exclusive opinion pieces from senior IT Leaders

Join now

 

Already a Computing member?

Login

You may also like
Apple ordered to pay €13 billion in Ireland

Corporate

Accuses EU of retroactively changing rules

clock 11 September 2024 • 2 min read
Apple says iPhone 16 can challenge high-end PCs

Mobile Phones

Apple intelligence debuts in beta next month

clock 10 September 2024 • 4 min read
UK and allies reveal methodology of Russian GRU threat actor Unit 29155

Threats and Risks

Group has targeted organisations including governments and critical infrastructure providers for espionage purposes

clock 06 September 2024 • 2 min read
Most read
01

Teen arrested over TfL cyberattack

13 September 2024 • 3 min read
02
03

Ransomware targets London branch of China's ICBC

13 September 2024 • 2 min read

Sign up to our newsletter

The best news, stories, features and photos from the day in one perfectly formed email.

More on Security

Microsoft offers advice on avoiding another CrowdStrike-style outage

Microsoft offers advice on avoiding another CrowdStrike-style outage

Vendors should minimise use of kernel mode, customers should make full use of integrated Windows security features

John Leonard
clock 29 July 2024 • 3 min read
'Gay furry hackers' breach conservative US think tank behind Project 2025

'Gay furry hackers' breach conservative US think tank behind Project 2025

Heritage Foundation calls group "degenerate perverts"

Tom Allen
clock 11 July 2024 • 2 min read
Why 'change' for the UK must include cybersecurity

Why 'change' for the UK must include cybersecurity

Labour needs to to get ahead and demonstrate a commitment to security from the outset

Rick Jones
clock 11 July 2024 • 4 min read