Thoughts of the great internet/DOJ war over the right to privacy during data-in-motion encryption

Hits: 65

With the coming ability, in ParrotTalk, to detect initiation of encrypted connection negotiations, among many different protocols, along with the introduction of a redirect message, allows for implementation of a superb encrypted negotiation traffic analyzer. With connection control at the locally scoped naming services, the host domain of internal networks can be searched, managed & monitored.

a) No weakening encryption for the purposes of personal security.

We do not accept either the addition of back-doors or ghost protocols requiring group encryption negotiation, in order to eavesdrop in data-in-motion encryption, as it would result in the weakening of the encryption.

b) public security is limited to network traffffic analysis

We do allow that such a negotiation traffic analyzer, mentioned above, and monitoring of who is communicating with whom is of some value and acceptable state monitoring, by those authorized to monitor the local domain context.

It is the network authority‘s right to information to search & monitor this activity.

Leave a Reply

Your email address will not be published. Required fields are marked *