{"id":44,"date":"2024-04-22T00:54:05","date_gmt":"2024-04-22T00:54:05","guid":{"rendered":"https:\/\/student.wp.odu.edu\/bwood024\/?p=44"},"modified":"2024-04-22T00:54:05","modified_gmt":"2024-04-22T00:54:05","slug":"article-review-2","status":"publish","type":"post","link":"https:\/\/student.wp.odu.edu\/bwood024\/2024\/04\/22\/article-review-2\/","title":{"rendered":"Article Review 2"},"content":{"rendered":"\n<p>Bugs in our pockets &#8211; the risks of client-side scanning<br>The article &#8220;Bugs in our pockets: the risks of client-side scanning&#8221; addresses the<br>contentious debate surrounding the use of client-side scanning (CSS) as a technology solution<br>in the context of encryption and public safety. The authors delve into the implications of<br>widespread cryptography adoption in digital communications and the challenges it poses for law<br>enforcement and national security agencies in accessing critical information. CSS is proposed<br>as a potential compromise, enabling targeted data analysis on devices without compromising<br>end-to-end encryption.<br>From a social sciences perspective, the article examines how technological advancements<br>intersect with privacy, security, and law enforcement practices. It raises questions about the<br>efficacy of CSS in preventing crime and balancing privacy concerns with investigative needs.<br>Research methods involve a critical analysis of CSS&#8217;s potential benefits and drawbacks, utilizing<br>scenarios and theoretical frameworks to evaluate its impact. The analysis highlights the inherent<br>security and privacy risks associated with CSS, emphasizing the complexities and potential<br>vulnerabilities of this approach.<br>In relation to concepts discussed in class, CSS introduces a perspective on the trade-offs<br>between privacy and security. It shows the ethical dilemmas and practical implications of<br>implementing surveillance technologies while safeguarding individual rights. The article<br>underscores the need for a comprehensive understanding of CSS&#8217;s limitations, potential misuse,<br>and evasion tactics, urging caution in adopting this technology.<br>The article also contributes significantly to society by promoting an informed discourse on<br>encryption, surveillance, and privacy in the digital age. By evaluating the risks and limitations of<br>CSS, the study prompts a critical examination of the balance between public safety and<br>individual liberties.<br>Furthermore, the article sheds light on the potential impact of CSS on marginalized groups,<br>emphasizing the need to consider how such technologies may disproportionately affect<br>vulnerable populations. The risks of increased surveillance and privacy infringements could<br>exacerbate existing inequalities and vulnerabilities within marginalized communities,<br>underscoring the importance of ethical considerations and safeguards in technological<br>implementations.<\/p>\n\n\n\n<p>In conclusion, the study challenges the notion that CSS is a panacea for the encryption.<br>versus public safety debate and highlights the complex interplay between technology, policy,<br>and societal values. It calls for a nuanced approach to cybersecurity that considers the many<br>implications of surveillance technologies on individuals and society as a whole. The article&#8217;s<br>contribution lies in fostering critical dialogue and promoting an understanding of the ethical and<br>practical implications of CSS in contemporary digital landscapes.<br>Resource: <\/p>\n\n\n\n<p class=\"has-black-color has-text-color has-link-color wp-elements-64f9c371583695d65fcd323c678cd6b5\"><a href=\"https:\/\/academic.oup.com\/cybersecurity\/article\/10\/1\/tyad020\/7590463?searchresult=1\">https:\/\/academic.oup.com\/cybersecurity\/article\/10\/1\/tyad020\/7590463?searchresult=1<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Bugs in our pockets &#8211; the risks of client-side scanningThe article &#8220;Bugs in our pockets: the risks of client-side scanning&#8221; addresses thecontentious debate surrounding the use of client-side scanning (CSS) as a technology solutionin the context of encryption and public&#8230; <a class=\"more-link\" href=\"https:\/\/student.wp.odu.edu\/bwood024\/2024\/04\/22\/article-review-2\/\">Continue Reading &rarr;<\/a><\/p>\n","protected":false},"author":27869,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":"","wds_primary_category":3},"categories":[3],"tags":[],"_links":{"self":[{"href":"https:\/\/student.wp.odu.edu\/bwood024\/wp-json\/wp\/v2\/posts\/44"}],"collection":[{"href":"https:\/\/student.wp.odu.edu\/bwood024\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/student.wp.odu.edu\/bwood024\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/student.wp.odu.edu\/bwood024\/wp-json\/wp\/v2\/users\/27869"}],"replies":[{"embeddable":true,"href":"https:\/\/student.wp.odu.edu\/bwood024\/wp-json\/wp\/v2\/comments?post=44"}],"version-history":[{"count":1,"href":"https:\/\/student.wp.odu.edu\/bwood024\/wp-json\/wp\/v2\/posts\/44\/revisions"}],"predecessor-version":[{"id":45,"href":"https:\/\/student.wp.odu.edu\/bwood024\/wp-json\/wp\/v2\/posts\/44\/revisions\/45"}],"wp:attachment":[{"href":"https:\/\/student.wp.odu.edu\/bwood024\/wp-json\/wp\/v2\/media?parent=44"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/student.wp.odu.edu\/bwood024\/wp-json\/wp\/v2\/categories?post=44"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/student.wp.odu.edu\/bwood024\/wp-json\/wp\/v2\/tags?post=44"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}