Quotesia
Home
Authors
Popular authors
H. G. Wells
John Burroughs
Thomas Fuller
Josh Billings
O. Henry
Bernard Williams
All authors
Today's birthdays
1840 - Claude Monet
1910 - Norman MacCaig
1889 - Jawaharlal Nehru
1979 - Olga Kurylenko
1797 - Charles Lyell
1908 - Joseph R. McCarthy
Today's birthdays
Popular professions
Cartoonist
Coach
President
Actress
Chef
Businesswoman
All professions
Authors by letter
A
B
C
D
E
F
G
H
I
J
K
L
M
N
O
P
Q
R
S
T
U
V
W
X
Y
Z
All authors
Topics
Top Quotes
Quotesia
Quote Topics
Encryption Quotes
Encryption Quotes
I think anybody who uses email in the center of our life needs encryption.
Alex Stamos
Life
Needs
Think
Our
Email
Encryption
Anybody
Center
Who
Uses
Encryption plays a fundamental role in protecting us all online. It is key to growing the digital economy and delivering public services online. But, like many powerful technologies, encrypted services are used and abused by a small minority of people.
Amber Rudd
People
Key
Digital
Minority
Online
Small
Delivering
Powerful
Abuse
Like
Economy
Protecting
Encryption
Role
Public
Us
Used
Many
Growing
Fundamental
Services
Technologies
Plays
Blockchain technology, or distributed ledger technology, is just a way of using the modern sciences of encryption to enable entities to share a common infrastructure for database retention.
Blythe Masters
Technology
Blockchain
Way
Distributed
Entities
Database
Share
Retention
Sciences
Enable
Encryption
Modern
Just
Common
Infrastructure
Using
Apple chief executive Tim Cook is such a respected figure that it's easy to overlook the basic problem with his argument about encryption: Cook is asserting that a private company and the interests of its customers should prevail over the public's interest as expressed by our courts.
David Ignatius
Prevail
Problem
Argument
Our
Respected
Easy
About
Over
Executive
Overlook
Courts
Tim
Private
His
Encryption
Chief
Chief Executive
Interest
Public
Customers
Interests
Should
Cook
Figure
Company
Expressed
Asserting
Apple
Basic
As all of our lives become digital, the logic of encryption is all of our lives will be covered by strong encryption, and therefore all of our lives - including the lives of criminals and terrorists and spies - will be in a place that is utterly unavailable to court-ordered process. And that, I think, to a democracy should be very, very concerning.
James Comey
Democracy
Strong
Digital
Will
Become
Think
Our
Our Lives
Criminals
Spies
Logic
Concerning
Terrorists
Covered
Encryption
Very
Process
Place
Should
Therefore
Including
Lives
Utterly
The encryption genie is out of the bottle.
Jan Koum
Out
Bottle
Genie
Encryption
It's very hard to keep an uncrackable encryption if you share it with the government.
John McAfee
Government
You
Share
Encryption
Very
Hard
Keep
I trust and use RakEM for my private messages and calls. Other messengers collected metadata about who I messaged, when and where - RakEM does not collect metadata, encrypts local files, and uses the strongest end-to-end encryption around.
John McAfee
Trust
Other
Local
Collect
Collected
About
Strongest
Messages
Calls
Around
Does
Private
Encryption
Where
Use
Who
Uses
Files
In this age of communications that span both distance and time, the only tool we have that approximates a 'whisper' is encryption. When I cannot whisper in my wife's ear or the ears of my business partners, and have to communicate electronically, then encryption is our tool to keep our secrets secret.
John McAfee
Time
Business
Age
Communicate
Wife
Tool
Secret
Our
Distance
Ears
Secrets
Only
Both
Partners
Encryption
Cannot
Span
Whisper
Then
Communications
Business Partners
Keep
Ear
I'm 16 now, I was 15 when it happened... and the encryption code wasn't in fact written by me, but written by the German member. There seems to be a bit of confusion about that part.
Jon Johansen
Me
Confusion
Bit
Member
About
Seems
Fact
Part
Written
Encryption
German
In Fact
Happened
Code
Now
A company can spend hundreds of thousands of dollars on firewalls, intrusion detection systems and encryption and other security technologies, but if an attacker can call one trusted person within the company, and that person complies, and if the attacker gets in, then all that money spent on technology is essentially wasted.
Kevin Mitnick
Technology
Money
Other
Spend
Hundreds
Hundreds Of Thousands
Spent
Systems
Security
Thousands
Detection
Intrusion
Call
Within
Dollars
Encryption
Trusted
Person
Gets
Essentially
Then
Company
Wasted
Technologies
The government does things like insisting that all encryption programs should have a back door. But surely no one is stupid enough to think the terrorists are going to use encryption systems with a back door. The terrorists will simply hire a programmer to come up with a secure encryption scheme.
Kevin Mitnick
Government
Will
Stupid
Think
Enough
Programs
Back
Back Door
Secure
Systems
Insisting
Scheme
No-One
Simply
Come
Like
Surely
Does
Terrorists
Hire
Encryption
Up
Going
Door
Should
Use
Things
Programmer
The arc of technology is in the direction of unbreakable encryption, and no laws are going to get in the way of that reality.
Michael Hayden
Technology
Reality
Way
Arc
Laws
Direction
Encryption
Get
Going
There is an unarguable downside to unbreakable encryption.
Michael Hayden
Encryption
Downside
Trying to explain Turing's work in encryption and decryption? It's complicated.
Morten Tyldum
Work
Complicated
Encryption
Trying
Explain
Since Snowden went public, companies such as Apple and Google - two of the world's most valuable companies - have incorporated much greater encryption into their products and have also been at pains to show that they will not go along with U.S. government demands to access their encrypted products.
Peter Bergen
Government
World
Valuable
Will
Google
Since
Demands
Along
Most
Also
Greater
Access
Go
Been
Encryption
Snowden
Public
Much
Show
Products
Pains
Companies
Apple
Two
Incorporated
Under the cover of encryption, terror masterminds provide recruits with the tactics and tools necessary to carry out attacks using small arms and explosives. None of this requires any overseas travel.
Tom Cotton
Travel
Tools
Out
Carry
Small
Tactics
Attacks
Arms
None
Terror
Cover
Provide
Overseas
Encryption
Any
Requires
Explosives
Using
Necessary
Somebody will be able to overcome any encryption technique you use!
Noam Chomsky
You
Overcome
Will
Somebody
Able
Encryption
Any
Use
Technique
I disagree with Apple on many things - such as its exclusive use of proprietary software and arbitrary restrictions on users seeking to copy, share, edit, and create software on their devices. However, I strongly feel that defending its users' and customers' right to strong encryption in court is incredibly important.
Chelsea Manning
Strong
Disagree
Important
Incredibly
Software
Arbitrary
Seeking
Strongly
Restrictions
Share
Proprietary
Feel
Exclusive
Devices
Court
Edit
However
Encryption
Customers
Create
Use
Users
Many
Apple
Right
Things
Copy
Defending
Attempts to restrict encryption at the state or local levels would only serve to undermine security and economic competitiveness for the entire nation.
Ted Lieu
Nation
State
Local
Security
Would
Entire
Restrict
Only
Economic
Attempts
Undermine
Encryption
Serve
Levels
Competitiveness
With the growing availability of commoditized encryption, it is becoming easier for common criminals to communicate beyond the reach of traditional surveillance.
William Barr
Communicate
Criminals
Easier
Reach
Beyond
Becoming
Traditional
Encryption
Surveillance
Common
Availability
Growing
The stakes in the encryption debate are high, with significant consequences for personal privacy, the U.S. private sector, and our national security.
Ted Lieu
Privacy
Debate
National
Consequences
Our
Sector
Significant
High
Security
Private
Encryption
Private Sector
National Security
Personal
Stakes
No more encryption quotes
Haven't find the right quote? Try another of these similiar topics.
Best
About
Belief
Actor