Understanding The Challenges Of Strong Encryption: Part 1

Law360, New York ( April 10, 2017, 2:37 PM EDT) -- On March 7, 2017, WikiLeaks released some 8,761 confidential documents from the U.S. Central Intelligence Agency. Known as "Vault 7," this leak represented an unprecedented exposure of secret CIA files. The public, late night TV and Twitter chewed over the more salacious details, some of which almost seemed to be tailor-made for jokes (thanks to the CIA, your TV watches you!). Almost buried within the revelations, however, stood a surprising detail. The CIA may have complex malware and hacking tools to infiltrate your smartphones, your networks and, yes, your Samsung TVs, but they have no way to bypass strong encryption....

Law360 is on it, so you are, too.

A Law360 subscription puts you at the center of fast-moving legal issues, trends and developments so you can act with speed and confidence. Over 200 articles are published daily across more than 60 topics, industries, practice areas and jurisdictions.


A Law360 subscription includes features such as

  • Daily newsletters
  • Expert analysis
  • Mobile app
  • Advanced search
  • Judge information
  • Real-time alerts
  • 450K+ searchable archived articles

And more!

Experience Law360 today with a free 7-day trial.

Start Free Trial

Already a subscriber? Click here to login

Hello! I'm Law360's automated support bot.

How can I help you today?

For example, you can type:
  • I forgot my password
  • I took a free trial but didn't get a verification email
  • How do I sign up for a newsletter?
Ask a question!