How can we now make sure, that the criminals are not misusing a Cloud infrastructure but still retain confidentially?
- let's replace "Cloud infrastructure" with other things..
How can we now make sure, that the criminals are not misusing an internet connection but still retain confidentially?
How can we now make sure, that the criminals are not misusing a telephone but still retain confidentially?
How can we now make sure, that the criminals are not misusing a fax machine but still retain confidentially?
How can we now make sure, that the criminals are not misusing a first class letter but still retain confidentially?
How can we now make sure, that the criminals are not misusing a conversation but still retain confidentially?
The Fourth Amendment guarantees us a right to be secure against unreasonable search of our person and of our things. It takes a court order to transgress that right to privacy. We must rely on fundamentally good people to be in positions to remove those rights. If they over step their bounds, then expel and punish those individuals.
The Founding Fathers weren't dummies. They had a pretty good set of ground rules. We don't need to reinvent the wheel every time somebody invents a whizbang new gadget.