{"id":9265,"date":"2016-03-16T12:40:54","date_gmt":"2016-03-16T19:40:54","guid":{"rendered":"https:\/\/blog.mozilla.org\/?p=9265"},"modified":"2016-03-16T12:41:32","modified_gmt":"2016-03-16T19:41:32","slug":"user-security-relies-on-encryption","status":"publish","type":"post","link":"https:\/\/blog.mozilla.org\/blogarchive\/blog\/2016\/03\/16\/user-security-relies-on-encryption\/","title":{"rendered":"User Security Relies on Encryption"},"content":{"rendered":"<p>Security of users is paramount. Technology companies need to do everything in their power to ensure the security of their users and build products and services with strong security measures in place to do that.<\/p>\n<p>At Mozilla, it\u2019s part of our <a href=\"https:\/\/www.mozilla.org\/en-US\/mission\/\">mission<\/a> to safeguard the Web and to take a stand on issues that threaten the health of the Internet. People need to understand and engage with encryption as a core technology that keeps our everyday transactions and conversations secure. That\u2019s why, just days before the Apple story broke, we launched an <a href=\"http:\/\/mzl.la\/encrypt\">awareness campaign<\/a> to educate users on the importance of encryption.<\/p>\n<p><b>The Apple vs. FBI case<\/b><\/p>\n<p>We&#8217;ve supported Apple since we first heard of the FBI request to Apple because this case is about user security and public safety.<\/p>\n<p>The government is requiring Apple to create a flawed version of its software without key security features. The precedent this sets could drastically affect our users and every technology company. This can cause ripple effects across the industry to other technologies and companies. \u00a0And it would make it more likely that other governments would request the creation of this kind of flawed software. This situation is understandably emotionally-charged, but we don\u2019t have the luxury of saying \u201cjust this one time.&#8221;<\/p>\n<p>Last week, the FBI said in a brief that Apple purposefully created its products to be warrant-proof and that this fight is a marketing decision for Apple. The view that any company would design products with the goal of being \u201cwarrant proof\u201d is ludicrous. Companies like Mozilla decide to create security features to protect users, keep the bad guys away and contribute to public safety, not to make their technology warrant proof. Unfortunately, making something that can be easily hacked by the FBI means making something that can be easily hacked by bad guys too.<\/p>\n<p><b>Code is Speech<\/b><\/p>\n<p>We also think that the FBI\u2019s request raises serious concerns around the First Amendment and free speech. We said so in an <a href=\"https:\/\/blog.mozilla.org\/wp-content\/uploads\/2016\/03\/MozillaAmicusBrief030316.pdf\">amicus brief<\/a> we filed earlier this month with a coalition of technology companies. For many technology companies their code represents their view on security. \u00a0For Mozilla, as an open source company, because our code is made publicly available and guided by our <a href=\"https:\/\/www.mozilla.org\/en-US\/about\/manifesto\/\">Manifesto<\/a>, it is an essential way we express our views about security and many other issues.<\/p>\n<p>One of the most important things about this case is that it has created mainstream discourse about some very important topics relevant to all our users &#8211; encryption, user security and government access to data. Encryption is an essential and ubiquitous security tool and weakening our security tools undermines everyday Internet users\u2019 security.<\/p>\n<p><iframe loading=\"lazy\" width=\"500\" height=\"375\" src=\"https:\/\/www.youtube.com\/embed\/tr4sVc8huV8?feature=oembed\" frameborder=\"0\" allowfullscreen><\/iframe><\/p>\n<p style=\"text-align: left;\"><i>Denelle Dixon-Thayer, Chief Business &amp; Legal Officer at Mozilla in conversation with Jochai Ben-Avie, Senior Global Policy Manager on the ongoing encryption conversation &amp; the responsibility of tech companies to defend security.<\/i><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Security of users is paramount. Technology companies need to do everything in their power to ensure the security of their users and build products and services with strong security measures &hellip; <a class=\"go\" href=\"https:\/\/blog.mozilla.org\/blogarchive\/blog\/2016\/03\/16\/user-security-relies-on-encryption\/\">Read more<\/a><\/p>\n","protected":false},"author":563,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[173936],"tags":[],"coauthors":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v22.5 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>User Security Relies on Encryption - The Mozilla Blog (Archived)<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/blog.mozilla.org\/blogarchive\/blog\/2016\/03\/16\/user-security-relies-on-encryption\/\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Denelle Dixon\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/blog.mozilla.org\/blogarchive\/blog\/2016\/03\/16\/user-security-relies-on-encryption\/\",\"url\":\"https:\/\/blog.mozilla.org\/blogarchive\/blog\/2016\/03\/16\/user-security-relies-on-encryption\/\",\"name\":\"User Security Relies on Encryption - The Mozilla Blog (Archived)\",\"isPartOf\":{\"@id\":\"https:\/\/blog.mozilla.org\/blogarchive\/#website\"},\"datePublished\":\"2016-03-16T19:40:54+00:00\",\"dateModified\":\"2016-03-16T19:41:32+00:00\",\"author\":{\"@id\":\"https:\/\/blog.mozilla.org\/blogarchive\/#\/schema\/person\/a4c77c94853bf9dbb79a9a206322d6ec\"},\"breadcrumb\":{\"@id\":\"https:\/\/blog.mozilla.org\/blogarchive\/blog\/2016\/03\/16\/user-security-relies-on-encryption\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/blog.mozilla.org\/blogarchive\/blog\/2016\/03\/16\/user-security-relies-on-encryption\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/blog.mozilla.org\/blogarchive\/blog\/2016\/03\/16\/user-security-relies-on-encryption\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/blog.mozilla.org\/blogarchive\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"User Security Relies on Encryption\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/blog.mozilla.org\/blogarchive\/#website\",\"url\":\"https:\/\/blog.mozilla.org\/blogarchive\/\",\"name\":\"The Mozilla Blog (Archived)\",\"description\":\"Dispatches from the Internet frontier.\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/blog.mozilla.org\/blogarchive\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/blog.mozilla.org\/blogarchive\/#\/schema\/person\/a4c77c94853bf9dbb79a9a206322d6ec\",\"name\":\"Denelle Dixon\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/blog.mozilla.org\/blogarchive\/#\/schema\/person\/image\/1720f6d7063c89117905d2c75f3b155a\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/4e1edda1af518a1659f0bae91f9fab03?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/4e1edda1af518a1659f0bae91f9fab03?s=96&d=mm&r=g\",\"caption\":\"Denelle Dixon\"},\"description\":\"Denelle Dixon-Thayer is Chief Legal and Business Officer at Mozilla Corporation\",\"url\":\"https:\/\/blog.mozilla.org\/blogarchive\/blog\/author\/ddixonmozilla-com\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"User Security Relies on Encryption - The Mozilla Blog (Archived)","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/blog.mozilla.org\/blogarchive\/blog\/2016\/03\/16\/user-security-relies-on-encryption\/","twitter_misc":{"Written by":"Denelle Dixon","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/blog.mozilla.org\/blogarchive\/blog\/2016\/03\/16\/user-security-relies-on-encryption\/","url":"https:\/\/blog.mozilla.org\/blogarchive\/blog\/2016\/03\/16\/user-security-relies-on-encryption\/","name":"User Security Relies on Encryption - The Mozilla Blog (Archived)","isPartOf":{"@id":"https:\/\/blog.mozilla.org\/blogarchive\/#website"},"datePublished":"2016-03-16T19:40:54+00:00","dateModified":"2016-03-16T19:41:32+00:00","author":{"@id":"https:\/\/blog.mozilla.org\/blogarchive\/#\/schema\/person\/a4c77c94853bf9dbb79a9a206322d6ec"},"breadcrumb":{"@id":"https:\/\/blog.mozilla.org\/blogarchive\/blog\/2016\/03\/16\/user-security-relies-on-encryption\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/blog.mozilla.org\/blogarchive\/blog\/2016\/03\/16\/user-security-relies-on-encryption\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/blog.mozilla.org\/blogarchive\/blog\/2016\/03\/16\/user-security-relies-on-encryption\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/blog.mozilla.org\/blogarchive\/"},{"@type":"ListItem","position":2,"name":"User Security Relies on Encryption"}]},{"@type":"WebSite","@id":"https:\/\/blog.mozilla.org\/blogarchive\/#website","url":"https:\/\/blog.mozilla.org\/blogarchive\/","name":"The Mozilla Blog (Archived)","description":"Dispatches from the Internet frontier.","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/blog.mozilla.org\/blogarchive\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/blog.mozilla.org\/blogarchive\/#\/schema\/person\/a4c77c94853bf9dbb79a9a206322d6ec","name":"Denelle Dixon","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/blog.mozilla.org\/blogarchive\/#\/schema\/person\/image\/1720f6d7063c89117905d2c75f3b155a","url":"https:\/\/secure.gravatar.com\/avatar\/4e1edda1af518a1659f0bae91f9fab03?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/4e1edda1af518a1659f0bae91f9fab03?s=96&d=mm&r=g","caption":"Denelle Dixon"},"description":"Denelle Dixon-Thayer is Chief Legal and Business Officer at Mozilla Corporation","url":"https:\/\/blog.mozilla.org\/blogarchive\/blog\/author\/ddixonmozilla-com\/"}]}},"_links":{"self":[{"href":"https:\/\/blog.mozilla.org\/blogarchive\/wp-json\/wp\/v2\/posts\/9265"}],"collection":[{"href":"https:\/\/blog.mozilla.org\/blogarchive\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/blog.mozilla.org\/blogarchive\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/blog.mozilla.org\/blogarchive\/wp-json\/wp\/v2\/users\/563"}],"replies":[{"embeddable":true,"href":"https:\/\/blog.mozilla.org\/blogarchive\/wp-json\/wp\/v2\/comments?post=9265"}],"version-history":[{"count":0,"href":"https:\/\/blog.mozilla.org\/blogarchive\/wp-json\/wp\/v2\/posts\/9265\/revisions"}],"wp:attachment":[{"href":"https:\/\/blog.mozilla.org\/blogarchive\/wp-json\/wp\/v2\/media?parent=9265"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/blog.mozilla.org\/blogarchive\/wp-json\/wp\/v2\/categories?post=9265"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/blog.mozilla.org\/blogarchive\/wp-json\/wp\/v2\/tags?post=9265"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/blog.mozilla.org\/blogarchive\/wp-json\/wp\/v2\/coauthors?post=9265"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}