Report of findings by the technical-substantive task force on encryption
The following is a report from an ad hoc task force. The issue/task which the task force was convened to address is as follows: What realistic alternatives exist for gaining lawful access to end-to-end encrypted communication, other than weakening encryption?