Mohamed AIT OUAARAB
This module will discuss various threats to encryption in the form of government proposals to gain access to encrypted communications that weaken or even break the strong encryption used in common messaging apps and devices—commonly referred to as backdoor access. This term generally refers to a means of allowing a third party the ability to access the content of encrypted user communications and data in an unencrypted form, without the knowledge or consent of the sender or recipient.
Skills / Knowledge
- Types of threats to encryption
- Methods that enable access to encrypted data
- Methods that involve access to users’ data before encryption or after decryption
Issued on
May 11, 2023
Expires on
Does not expire