This is a great read about the pitfalls and challenges associated with using encryption and using encryption effectively.
Welcome to the double-edged sword that is encryption.
This article provides an interesting discussion concerning the value of encryption as one layer of defense for sensitive data, but please do not lose sight of the absolute fact that encryption is not a panacea. No defensive mechanism is perfect.
Defenses should be deployed in layers and plans should always be in place to mitigate the effects of eventual data compromise and loss. You can limit the effect of the problem, but you cannot eliminate the risk.
This is a fun little video providing a beginners introduction to encryption and how it works. Enjoy!
Many application and device vendors have recognized the value of touting encryption and security as a component of their products. Yet, as the IoT has grown, the reuse of encryption keys has grown with it out of convenience and lack of oversight. This is and will continue to be a growing security problem.
This situation did certainly shed a great deal of light on the value of purpose of encryption and for that we can all be thankful. I hope this conversation continues to move forward in a more constructive and less antagonistic manner.
Please pay attention to this bill. Contact your member of Congress and/or Senator. This is a complicated issue and the draft bill to this point reflects authors who do not understand and/or do not know whats best or even practical.