英语 英语 日语 日语 韩语 韩语 法语 法语 德语 德语 西班牙语 西班牙语 意大利语 意大利语 阿拉伯语 阿拉伯语 葡萄牙语 葡萄牙语 越南语 越南语 俄语 俄语 芬兰语 芬兰语 泰语 泰语 泰语 丹麦语 泰语 对外汉语

【英语语言学习】计算机系统加密技术

时间:2016-10-18 05:33来源:互联网 提供网友:yajing   字体: [ ]
特别声明:本栏目内容均从网络收集或者网友提供,供仅参考试用,我们无法保证内容完整和正确。如果资料损害了您的权益,请与站长联系,我们将及时删除并致以歉意。
    (单词翻译:双击或拖选)

 LINDA WERTHEIMER, HOST:

Long before the attacks in Paris and San Bernardino, law enforcement officials argued that terrorists use technology like encrypted communication tools to evade1 detection. FBI Director James Comey has made the case that encryption poses public safety and national security risks. He is calling for tech companies to make it possible to unlock encrypted devices if a court orders it done. But this same technology also keeps customer data secure and cuts down on identity theft. We called Rod Beckstrom to walk us through this debate. He is the former director of the National Cybersecurity Center. Welcome to our program.
ROD BECKSTROM: Thank you, Linda.
WERTHEIMER: So what is the concern? There's something called end-to-end encryption. What does that do and why is that a headache for law enforcement?
BECKSTROM: Sure, end-to-end encryption means that whether it's a phone call we're on or an email message we're sending or any form of electronic communication, that the content of that communication is encrypted from your device, such as your phone or PC, unto the other person's device at the other side, wherever they might be on the planet Earth. So end-to-end encryption, keeps things encrypted and that means that law enforcement, without a warrant, cannot read that information
WERTHEIMER: They can't intercept2 or break into...
BECKSTROM: Correct. Now, with a warrant, they can always go to the information service provider and attempt to get that information. But even then, they may not be able to because the party selling the encryption services may be a third party and may not even know who the parties are that are communicating.
WERTHEIMER: So what is the argument that tech companies make about the feasibility of designing technology that would satisfy everyone's concerns?
BECKSTROM: We're not all on the same page here. So most of us in the technology community are opposed to what we call backdoors that would allow law enforcement to tap in. And the reason is is if you put a backdoor in, hackers3 can presumably get a hold of that backdoor as well and break it open. So you make systems less secure for everyone if you do that.
WERTHEIMER: At a Senate hearing this month, FBI Director James Comey says he thinks that experts in this field aren't really trying hard enough to give the government access without also putting confidential4 data at risk. That is, I took it to mean that he's - thinks that if you try hard enough, you can think of something that is not a backdoor, that's different so that not everybody could get into it.
BECKSTROM: You know, yes, you can always argue that a backdoor can be built that's more secure, you know, and more difficult to get to and only law enforcement's going to get there. But nobody in the field of security believes that's ultimately going to provide this same protection that a tight end-to-end solution has without a backdoor. So I don't think it's a lack of will. I think it's an issue of what people view as constitutional rights under the Fourth Amendment5, number one, and what customers and business partners expect around the world from secure computing6 systems. And it's a difference of view.
Look, if I were running the FBI, you know, I probably would want to have backdoors as well, so I'm sympathetic to the director's view. But there is risk if you put that backdoor in. There's no question you enhance the risk, number one. Number two, there are the privacy implications that are of concern to parties.
WERTHEIMER: When you were working for the government, obviously you were institutionally on a different side of the argument. You were on the side of being able to get into whatever you needed to get into and find out whatever you needed to find out. What happened? Did you have a sort of a Saul of Damascus moment? I mean, did you always believe what you believe now?
BECKSTROM: My beliefs really haven't changed since I was in government. If anything, it gave me appreciation7 for how challenging it is for the government to balance and play the roles that it needs to, both wanting to keep the nation secure, both having the rights to collect extensive intelligence overseas, less so within the country. You know, the richness of that debate in many ways would, I think, make the founders8 of our country proud.
WERTHEIMER: Rod Beckstrom was the founding director of the U.S. National Cybersecurity Center. Thank you very much for this.
BECKSTROM: Thank you, Linda. Great to be on your show.

点击收听单词发音收听单词发音  

1 evade evade     
vt.逃避,回避;避开,躲避
参考例句:
  • He tried to evade the embarrassing question.他企图回避这令人难堪的问题。
  • You are in charge of the job.How could you evade the issue?你是负责人,你怎么能对这个问题不置可否?
2 intercept G5rx7     
vt.拦截,截住,截击
参考例句:
  • His letter was intercepted by the Secret Service.他的信被特工处截获了。
  • Gunmen intercepted him on his way to the airport.持枪歹徒在他去机场的路上截击了他。
3 hackers dc5d6e5c0ffd6d1cd249286ced098382     
n.计算机迷( hacker的名词复数 );私自存取或篡改电脑资料者,电脑“黑客”
参考例句:
  • They think of viruses that infect an organization from the outside.They envision hackers breaking into their information vaults. 他们考虑来自外部的感染公司的病毒,他们设想黑客侵入到信息宝库中。 来自《简明英汉词典》
  • Arranging a meeting with the hackers took weeks againoff-again email exchanges. 通过几星期电子邮件往来安排见面,他们最终同意了。 来自互联网
4 confidential MOKzA     
adj.秘(机)密的,表示信任的,担任机密工作的
参考例句:
  • He refused to allow his secretary to handle confidential letters.他不让秘书处理机密文件。
  • We have a confidential exchange of views.我们推心置腹地交换意见。
5 amendment Mx8zY     
n.改正,修正,改善,修正案
参考例句:
  • The amendment was rejected by 207 voters to 143.这项修正案以207票对143票被否决。
  • The Opposition has tabled an amendment to the bill.反对党已经就该议案提交了一项修正条款。
6 computing tvBzxs     
n.计算
参考例句:
  • to work in computing 从事信息处理
  • Back in the dark ages of computing, in about 1980, they started a software company. 早在计算机尚未普及的时代(约1980年),他们就创办了软件公司。
7 appreciation Pv9zs     
n.评价;欣赏;感谢;领会,理解;价格上涨
参考例句:
  • I would like to express my appreciation and thanks to you all.我想对你们所有人表达我的感激和谢意。
  • I'll be sending them a donation in appreciation of their help.我将送给他们一笔捐款以感谢他们的帮助。
8 founders 863257b2606659efe292a0bf3114782c     
n.创始人( founder的名词复数 )
参考例句:
  • He was one of the founders of the university's medical faculty. 他是该大学医学院的创建人之一。 来自辞典例句
  • The founders of our religion made this a cornerstone of morality. 我们宗教的创始人把这看作是道德的基石。 来自辞典例句
本文本内容来源于互联网抓取和网友提交,仅供参考,部分栏目没有内容,如果您有更合适的内容,欢迎点击提交分享给大家。
------分隔线----------------------------
TAG标签:   英语听力  听力教程  英语学习
顶一下
(0)
0%
踩一下
(0)
0%
最新评论 查看所有评论
发表评论 查看所有评论
请自觉遵守互联网相关的政策法规,严禁发布色情、暴力、反动的言论。
评价:
表情:
验证码:
听力搜索
推荐频道
论坛新贴