>Well the USG has given us SHA-1, NSA Suite B collection of Cryptographic standards, NIST-organized crypto standards, and have funded the development and most of the ongoing maintainence of Tor.
Certainly. But they've also given us CALEA-mandated backdoors into telecommunications equipment and a regulatory environment that encourages wanton third party custody over sensitive information.
Obviously some of this is subtle and unintended. For example, allowing government-issued spectrum monopolies to be leveraged into walled garden mobile devices is seriously bad for security because it excludes anyone from improving the security of the device's OS or system components other than the manufacturers/carriers who coincidentally have the incentive to deny anything that would reduce user dependence on cloud-based data storage.
The point being, even if we're not doing nothing, we could be doing more.
Certainly. But they've also given us CALEA-mandated backdoors into telecommunications equipment and a regulatory environment that encourages wanton third party custody over sensitive information.
Obviously some of this is subtle and unintended. For example, allowing government-issued spectrum monopolies to be leveraged into walled garden mobile devices is seriously bad for security because it excludes anyone from improving the security of the device's OS or system components other than the manufacturers/carriers who coincidentally have the incentive to deny anything that would reduce user dependence on cloud-based data storage.
The point being, even if we're not doing nothing, we could be doing more.