[Effaustin-discuss] Fwd: Announcing Crypto Summit 2.0

Jon Lebkowsky jonl at effaustin.org
Fri Jan 22 09:14:57 CST 2016


---------- Forwarded message ----------
From: Nathan White <nathan at accessnow.org>
Date: Thu, Jan 21, 2016 at 2:46 PM
Subject: Announcing Crypto Summit 2.0

Hey Everybody,

I am happy to finally share that we have announced plans for the Crypto
Summit 2.0.

Today we officially opened registration and sent a call for comments.

Register for Crypto Summit 2.0 now!

Crypto Summit 2.0 <https://www.accessnow.org/crypto-summit-2-0/>, which
will be held in San Francisco on March 30, 2016. The event will take place
alongside RightsCon <http://www.rightscon.org>, our annual conference that
explores the intersection of human rights and technology. In coordination
with the announcement, Access Now is asking for global feedback on
questions regarding encryption policy.

The first Crypto Summit <https://www.accessnow.org/crypto_summit_part1/>,
held in June 2015 in Washington, D.C., brought together technology, policy,
and legal experts from different sectors. The conference focused on the
history of the debates over encryption, the different types of encryption
tools and technologies, the legal fight over the use of encryption, and the
benefits and challenges posed by encryption.

While the 2015 conference was largely presentation-led, the 2.0 event will
instead primarily have a discussion format, and will attempt to address
some of the outstanding questions on encryption and the policies around it.
The conference will take place across four tracks, with each track focused
on a specific issue. The tracks are below.

In advance of the Crypto Summit 2.0, Access Now is asking those interested
in digital security and encryption around the world to help us further
develop these topics
Accordingly, we are asking for responses to questions
that could help deepen the conversation and focus it, to address the global
debate meaningfully and comprehensively.

You are invited to review the questions, and send us your answer until February
21, 2016
also may be submitted via email to Nathan (at) Accessnow (dot) org).

It is free to attend the Crypto Summit 2.0 (note: RightsCon requires
separate registration). For more information, or to register to attend the
Crypto Summit 2.0, please visit https://www.accessnow.org/crypto-summit-2-0/

Crypto Summit 2.0 tracks are:


   Roles and responsibilities in an encrypted world

Right now, law enforcement and intelligence agencies around the world are
mining data, re-routing internet traffic, and hacking into devices and
systems, sometimes on a mass scale. While these tactics may present an
alternative to undermining encryption, they each come with their own costs,
including serious costs to human rights. Discussants in this track will
explore without prejudice the rumored, public, or potential methods and
tools that are available to government surveillance agencies; where and how
they are explicitly authorized; their costs and benefits; and high-level
safeguards that need to be in place if they are carried out. (hashtag:


   The costs of mandated access on the borderless digital economy

When laws require that companies change their way of doing business in
order to facilitate surveillance, it often adds economic, reputation, and
legal costs. These costs include the cost of building new or different
infrastructure, or restructuring supply or service chains for different
jurisdictions around the world; the costs of defending a company against
questionable court orders or fighting gag orders and other restrictions on
transparency; and the more amorphous costs of violating human rights,
deteriorating user trust, and losing business as a result. Discussants in
this track will attempt to explore these costs and discuss means and
methods for measuring their impact on end users. (hashtag: #CS2costs)


   The weight of security: Measuring the benefits of robust encryption

Some justify invasive surveillance techniques and authorities by pointing
to terrorist attacks, injuries, and deaths. However, encryption also saves
lives. This side of the scale, favoring robustly secured networks, is not
well defined. This track will explore the benefits -- including the return
on investment -- of encryption and try to formulate a means to quantify and
measure those benefits. (hashtag: #CS2benefits)


   Busting barriers: Identifying and conquering the obstacles to widespread
   adoption of encryption

Encryption is well known as the best and most reliable (though not
completely reliable) way of protecting sensitive data. However, too few
companies are using it, and they are implementing it only sporadically, and
sometimes in outdated forms. This track will explore why that is, and what
the best ways may be to overcome the barriers and move toward a future
where encryption, particularly for our most sensitive data, is ubiquitous.
(hashtag: #CS2barriers)

Nathan White
Senior Legislative Manager
Phone: (269) 267-0580
PGP ID: 0x9030A74E
Fingerprint: C2C2 CEDB 8368 05D7 CB89 72DF 59F9 6246 9030 A74E

*Sign up* for our action alerts <https://www.accessnow.org/campaign/>

Jon Lebkowsky (@jonl) jonl at effaustin.org
President, EFF-Austin <http://effaustin.org/>
| Twitter <http://twitter.com/jonl> | LinkedIn
<http://www.linkedin.com/in/jonlebkowsky> | Facebook
<http://www.facebook.com/jonlebkowsky> |  Google+
<https://plus.google.com/107989370857115020482/posts> | Tumblr
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://lists.effaustin.org/pipermail/effaustin-discuss_lists.effaustin.org/attachments/20160122/4ca3d31d/attachment.html>

More information about the Effaustin-discuss mailing list