Jesdanun & Liedtke (2017). What the CIA WikiLeaks Dump Tells Us: Encryption Works.

Jesdanun, A., & Liedtke, M. (2017, March 10). What the CIA WikiLeaks Dump Tells Us: Encryption Works. Associated Press. Retrieved from

[Disclosures indicate that encryption is effective …]

“If the tech industry is drawing one lesson from the latest WikiLeaks disclosures, it’s that data-scrambling encryption works, and the industry should use more of it.” (¶1)

[Regimes must purposefully target their attacks, rather than deploying a large net …]

“‘We are in a world where if the U.S. government wants to get your data, they can’t hope to break the encryption,’ said Nicholas Weaver, who teaches networking and security at the University of California, Berkeley. ‘They have to resort to targeted attacks, and that is costly, risky and the kind of thing you do only on targets you care about.'” (¶3)

[How packets work …]

“… any given internet message gets split into a multitude of tiny ‘packets,’ each of which traces its own unpredictable route across the network to its destination.” (¶5)

[Encryption and decryption at both ends of communication …]

“… end-to-end encryption.” (¶6)

[Hardware gaps in encryption …]

“According to the purported CIA documents, spies have found ways to exploit holes in phone and computer software to grab messages when they haven’t been encrypted yet.” (¶17)

[Cindy Cohn, executive director for Electronic Frontier Foundation …]

[Taking encryption seriously, if even for some data …]

“‘The answer to the fact that your front door might be cracked open isn’t to open all your windows and walk around naked, too.'” (¶20)

See this page at