Home
Categories
EXPLORE
True Crime
Comedy
Business
History
Society & Culture
Sports
Technology
About Us
Contact Us
Copyright
© 2024 PodJoint
00:00 / 00:00
Sign in

or

Don't have an account?
Sign up
Forgot password
https://is1-ssl.mzstatic.com/image/thumb/Podcasts211/v4/99/f2/c2/99f2c2e4-54fc-05f5-88d2-b77e893ec4b2/mza_8554259338166064335.jpeg/600x600bb.jpg
CogWar
Raymond Andrè Hagen
9 episodes
2 hours ago

Dive into the mind-bending world of Cognitive Warfare, where manipulation, disinformation, and the clash of signals and noise shape our reality. This podcast unravels the intricate web of how it all connects, blending academic insights with the pulse of today’s headlines. Join us as we decode the hidden forces at play in our world.



Hosted on Acast. See acast.com/privacy for more information.

Show more...
Education
Technology,
Science
RSS
All content for CogWar is the property of Raymond Andrè Hagen and is served directly from their servers with no modification, redirects, or rehosting. The podcast is not affiliated with or endorsed by Podjoint in any way.

Dive into the mind-bending world of Cognitive Warfare, where manipulation, disinformation, and the clash of signals and noise shape our reality. This podcast unravels the intricate web of how it all connects, blending academic insights with the pulse of today’s headlines. Join us as we decode the hidden forces at play in our world.



Hosted on Acast. See acast.com/privacy for more information.

Show more...
Education
Technology,
Science
https://assets.pippa.io/shows/cover/1751449963034-b700ce66-42d0-4a80-8778-a5e51a06a956.jpeg
Crypto Wars, Client-Side Scanning, and the Moral Character of Cryptographic Work: part 1
CogWar
1 hour 43 minutes 36 seconds
3 months ago
Crypto Wars, Client-Side Scanning, and the Moral Character of Cryptographic Work: part 1

In this episode of Cog War, hosts Raymond and James dive into the complex and contentious topic of the "Crypto Wars," focusing on the EU's proposed Regulation to Prevent and Combat Child Sex Abuse, often referred to as "chat control" or client-side scanning. This regulation, driven by the Danish presidency of the European Parliament, aims to address serious issues like Child Sexual Abuse Materials (CSAM), terrorism, grooming, and other online crimes but raises significant concerns about privacy, trust, and the integrity of cryptographic systems.

The episode explores the historical context of the Crypto Wars, starting from the 1990s when cryptography was treated as a military asset in the US, leading to legal battles over tools like PGP (Pretty Good Privacy). The hosts discuss how the current debate centers on client-side scanning, a technology proposed by Apple in 2021 to detect CSAM in encrypted communications without directly breaking encryption. This involves inserting an intermediary system between user input and encryption, which scans for specific content signatures. However, this approach has sparked fierce opposition from cryptographers, who argue it undermines the trust and security built into end-to-end encryption.


Key points include:

  • Technical and Philosophical Concerns: Client-side scanning moves trust outside the cryptographic system, relying on external databases of hashed signatures that cannot be mathematically verified. This creates risks of misuse, such as governments or corporations adding non-CSAM content (e.g., specific words or political phrases) to these databases, potentially leading to surveillance overreach.
  • Political Implications: The hosts frame the debate through three lenses:
  1. Affective Arguments: The visceral reaction to privacy violations, akin to someone reading your diary, though this argument has evolved with changing internet norms and younger generations' familiarity with surveillance.
  2. Turnkey Tyranny: Drawing on Edward Snowden’s warnings, the episode highlights fears that weakened cryptography could enable future authoritarian abuses, citing examples like period-tracking apps being subpoenaed post-Dobbs decision.
  3. Rights-Based Perspective: Cryptography is seen as a negative right, protecting individuals from unauthorized state intrusion, akin to the US Second Amendment’s role in resisting centralized power.
  • The "Four Horsemen" of the Info-Apocalypse: The episode addresses the main arguments for weakening cryptography, intellectual property violations, terrorism, CSAM, and crime. While acknowledging the severity of issues like CSAM, the hosts stress the need for human accountability and context in investigations, as algorithms lack the nuance to avoid misinterpretations or false positives.
  • Global and Geopolitical Risks: The EU’s proposal could set a precedent for authoritarian regimes to demand similar access to encrypted communications, expanding surveillance beyond its intended scope. The hosts also warn of the technical challenges, such as the need for mass packet scanning akin to China’s Great Firewall.


Content Warning: This episode includes discussions of sensitive topics like CSAM, terrorism, grooming, and Hurt Core, with a clap to signal sections listeners may wish to skip.


Hosted on Acast. See acast.com/privacy for more information.

CogWar

Dive into the mind-bending world of Cognitive Warfare, where manipulation, disinformation, and the clash of signals and noise shape our reality. This podcast unravels the intricate web of how it all connects, blending academic insights with the pulse of today’s headlines. Join us as we decode the hidden forces at play in our world.



Hosted on Acast. See acast.com/privacy for more information.