Yesterday was my last day at Delphi Technologies. It was my first real job out of college.

I thoroughly enjoyed my time there. It was challenging and fulfilling, starting in test automation for embedded systems, and ending as a product owner on a cross-functional development team. As with any rewarding endeavor, I constantly went back and forth between “I need to leave this place” and “I’m going to retire here.” Ended up going with the first one, but I got nine years of experience and friendships to show for it.

It was bittersweet. I am simultaneously excited for the future, and sad to leave my coworkers (if any of you find this – Hi! I have a blog). I wish them all the best – they are well equipped for the challenges ahead.

I accepted a job offer to return to software testing – this time on web and consumer-facing applications. That was two weeks ago, and now there is a high possibility that my onboarding Monday will be remote. Pandemics move fast. Still extremely excited, with that twinge of apprehension that comes with speeding toward the unknown.

To new beginnings.

So you want to learn more about the encryption debate.1 Well, take a knee, gang, its #storytime.

Flash back 10 years ago. No one gave a shit about cybersecurity unless you were in China or a ghostwritten Tom Clancy novel. Then, as people started using networked services in more places, the information leaks began. It was still not an issue for the government (particularly, law enforcement), because useful data was just as accessible to them as it was to nefarious agents, like hackers or Facebook.

In 2013, the Snowden leaks began to paint a picture of just how much our own security agencies relied on cybersecurity weakness in their day-to-day operations. Snowden had trouble finding a journalist who could figure out how to use PGP to read his heavily encrypted messages to disseminate this information.

The leaked information made Silicon Valley companies very angry. So they began to encrypt transmissions between their data centers, as well as building it into their email, messaging, and mobile operating systems.

Now, encryption is just lots of math. Ever watch a movie about code breakers in WWII? Encryption. The only difference now is that common computers can do a lot more math in a short amount of time. But before this point, it was never viewed as particularly important to consumer software.

Think of it this way. In the same way that a gun is an offensive weapon, encryption is a defensive weapon. It protects your information from prying eyes, whomever that may be.

So now law enforcement has a problem. This technology is widely available, even to enemies of the state. Their proposed solution is to break it. Or to put it in their words, make it work for some and not for others. Kind of like how if you point a gun at something or someone you like, it will not fire. Because it only works in certain situations.

This is obviously a farce. As the old argument goes, if we outlaw guns, only law breakers will have guns. Since enemies of the state are not likely to stop using encrypted communication if it is outlawed, the only people without it will be law-abiding citizens. Effectively the exact opposite of the stated goal.

Remember this when some idiot presidential candidate2 tries to tell you how encryption is bad because terrorists are bad. The only benefit of outlawing encryption is to spy on you.


  1. I know there is a new John Oliver monologue about this. I haven’t seen it. I hope he makes some of these points better than me. ↩

  2. via GIPHY↩
I’m glad that Google Reader shutting down won’t break the internet now.
I’m glad that Google Reader shutting down won’t break the internet now.
Got me a job. Just in time to not be able to call in sick with March Madness
RT @ThePaintCrew Digger just said the Duwan Johnson and Tyron Moore will get it done for Purdue