Skip to main content
banner image
venafi logo

Who Gets Left Behind by Encryption Advances? [Encryption Digest 47]

Who Gets Left Behind by Encryption Advances? [Encryption Digest 47]

underserved population for encryption
September 11, 2020 | Emil Hanscom

Encryption plays an important role in protecting free speech and political organizing. However, if only the most privileged tech workers maintain encryption technology, other communities will be forgotten.

How can the security industry make sure cryptography benefits everyone? Seny Kamara, one of the few Black academic cryptographers in the world, tells Wired we need to focus more on diversity.


Marginalized Communities are Forgotten by Encryption and Cryptography

This year’s “invited talk” at the International Association for Cryptologic Research's Crypto conference was delivered by Seny Kamara who focused on how cryptography often ignores the needs of the world’s most marginalized communities.

According to WIRED: “The talk, dubbed Crypto for the People and given on August 19, examined the question of who really benefits from encryption technologies and advances in cryptographic research. It sounded a call to reexamine research priorities that today largely serve the interests of governments and corporations instead of marginalized people, be they racial minorities, immigrants, women, the LGBTQ community, or others.”

Even though encryption, including apps like Signal, can protect activists and journalists, the cryptography community can, and should, do much more. “Kamara pointed out that even the open source community and movements like the cypherpunks largely don't directly work to address these needs,” the article continues. “They are focused on taking power from corporations and developing technologies to defend people from mass government surveillance and digital intrusion, but generally not on developing encryption technologies and new areas of abstract theory that are specifically motivated by the needs of underserved communities.”

So, how can the cryptography community help? Kamara recommends the space become more inclusive. “’I think the only reason we have a hard time imagining what this looks like is because, effectively, we’ve been trained for 40 years to do corporate research. So, we lack the imagination, skills, and knowledge to do research 'for the people,'" Kamara says. "But diversity is crucial for this.’"

Related posts


IoT Devices Hit by New Flaw
We’ve seen chip-based flaws before, and it seems like they’ll keep coming in the future. Just last week, IBM’s X-Force Red hacking team discovered a new vulnerability impacting Intel chips.

As TechHQ writes: “[The team] discovered a vulnerability in a series of IoT chips that can be exploited remotely, leaving billions of industrial, commercial, and medical devices at risk. The discovered security flaw affects Cinterion EHS8 M2M modules developed by French maker Thales.”

Thales has been working with IBM and already issued a patch for the vulnerability. But with so many IoT devices currently in the world, and with more adoption in the future, we should be prepared to see similar flaws. At the beginning of the year, EDN reported over 15 major IoT vulnerabilities in just 2019 alone.

Ultimately, every organization and user should make sure their IoT devices are protected and managed properly.

Related posts

Learn more about machine identity management. Explore now.  

Like this blog? We think you will love this.
Featured Blog

What Is an SSL Certificate and How Does it Enable Security

SSL Nomenclature

Read More
Subscribe to our Weekly Blog Updates!

Join thousands of other security professionals

Get top blogs delivered to your inbox every week

Subscribe Now

See Popular Tags

You might also like

TLS Machine Identity Management for Dummies

TLS Machine Identity Management for Dummies

Certificate-Related Outages Continue to Plague Organizations
White Paper

CIO Study: Certificate-Related Outages Continue to Plague Organizations

About the author

Emil Hanscom
Emil Hanscom

Emil is the Public Relations Manager at Venafi. Passionate about educating the global marketplace about infosec and machine-identity issues, they have consistently grown Venafi's global news coverage year over year.

Read Posts by Author
get-started-overlay close-overlay cross icon
get-started-overlay close-overlay cross icon
Venafi Risk assessment Form Image

Sign up for Venafi Cloud

Venafi Cloud manages and protects certificates

* Please fill in this field Please enter valid email address
* Please fill in this field Password must be
At least 8 characters long
At least one digit
At last one lowercase letter
At least one uppercase letter
At least one special character
* Please fill in this field
* Please fill in this field
* Please fill in this field

End User License Agreement needs to be viewed and accepted

Already have an account? Login Here

get-started-overlay close-overlay cross icon

How can we help you?

Thank you!

Venafi will reach out to you within 24 hours. If you need an immediate answer please use our chat to get a live person.

In the meantime, please explore more of our solutions

Explore Solutions

learn more

Email Us a Question

learn more

Chat With Us

learn more