None of the agencies involved have commented on the report, although the tipsters stressed that there weren't any imminent moves. The new conversations involved former Microsoft exec Ray Ozzie, former Intel security chief Ernie Brickell and UC San Diego professor Stefan Savage. The focus was on unlocking device data rather than trying to intercept messages.
It's not certain which ideas would have sway. However, Ozzie has been working on a system where a device would generate a post-encryption key that would live on-device in a separately encrypted storage area. In theory, only the manufacturer could access that key and unlock the main partition at will. The Obama administration had explored a similar approach, but had been stuck on the possibility that crooks might find a way to delete access keys or to find firmware that didn't have the key (say, devices from other countries). The current DOJ is wondering if the solution really needs to be airtight, according to sources -- the key approach would be considered good enough for "ordinary" crooks who wouldn't have the know-how to delete the key.
The new push is still unlikely to please many privacy advocates and security experts. Both camps maintain that there's no such thing as a device that's open to law enforcement, but secure against malicious intruders -- if you introduce a vulnerability for one side, you introduce it for everyone. What's to stop rogue developers from writing tools that make it easy to strip the secret key? There are also philosophical problems. Mandatory access implies that the government has a right to access user data, and that this right is ultimately more important than the security risk it might create for innocent people.