• Menu
  • Skip to main content
  • Skip to primary sidebar

The Cyber Security News

Latest Cyber Security News

Header Right

  • Latest News
  • Vulnerabilities
  • Cloud Services
Cyber Security News

UK’s Privacy Tsar Mounts Fierce Defense of End-to-End Encryption

You are here: Home / General Cyber Security News / UK’s Privacy Tsar Mounts Fierce Defense of End-to-End Encryption
January 24, 2022

The UK’s privacy watchdog has defended close-to-close encryption (E2EE) adhering to a govt marketing campaign lobbying for a halt to even further roll-outs by the likes of Meta.

The publicly funded “No Spot to Hide” marketing campaign, backed by many children’s charities, is contacting for social media companies to stop implementing E2EE right until they can confirm children’s security will not be put at risk as a consequence.

Meta’s delayed roll-out of the security and privacy-improving technology is now slated for 2023 for Messenger and Instagram. Its messaging system WhatsApp previously makes use of E2EE.

✔ Approved From Our Partners
AOMEI Backupper Lifetime

Protect and backup your data using AOMEI Backupper. AOMEI Backupper takes secure and encrypted backups from your Windows, hard drives or partitions. With AOMEI Backupper you will never be worried about loosing your data anymore.

Get AOMEI Backupper with 72% discount from an authorized distrinutor of AOMEI: SerialCart® (Limited Offer).

➤ Activate Your Coupon Code


The arguments from the tech are that it blindfolds law enforcement and supplies a safe haven for pedophiles to groom victims and share sex abuse material.

Even so, the Info Commissioner’s Office environment (ICO) has argued that various techniques and impressive methods now exist which can help investigators – and that E2EE performs a vital purpose in guarding small children and broader culture.

“The discussion on end-to-close encryption use is far too unbalanced to make a clever and knowledgeable preference. There is too a great deal concentration on the prices without the need of also weighing up the important rewards,” argued the ICO’s executive director for technology and innovation, Stephen Bonner.

“E2EE serves an critical position both in safeguarding our privacy and on the net basic safety. It strengthens children’s on the net protection by not making it possible for criminals and abusers to deliver them damaging information or accessibility their pictures or place. It is also essential for businesses, enabling them to share information and facts securely and fosters client self confidence in digital expert services.”

Accessing encrypted material is not the only way police can capture offenders, Bonner included.

“Law enforcers have other solutions such as listening to studies of people targeted, infiltrating the teams scheduling these offenses, working with proof from convicted abusers and their techniques to determine other offenders,” he argued.

“We are also looking at a array of other procedures and innovations accessible that can be used with no accessing content material to assist halt abuse or capture these hoping to hurt. As an illustration, platforms are listening to teenagers’ experiences and restricting search final results for any individual making an attempt unwanted call.”

The authorities should be doubling down on help for these approaches and obtaining new ones, Bonner concluded.

As an alternative, the govt is utilizing taxpayer dollars to fund its E2EE campaign with help from advertising giant M&C Saatchi.


Some areas of this short article are sourced from:
www.infosecurity-magazine.com

Previous Post: «Cyber Security News US Data Breaches Surge 68% to All-Time High
Next Post: Hackers Creating Fraudulent Crypto Tokens as Part of ‘Rug Pull’ Scams hackers creating fraudulent crypto tokens as part of 'rug pull'»

Reader Interactions

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Primary Sidebar

Report This Article

Recent Posts

  • Severe Flaw in Google Cloud’s Cloud SQL Service Exposed Confidential Data
  • New Russian-Linked Malware Poses “Immediate Threat” to Energy Grids
  • Predator Android Spyware: Researchers Sound the Alarm on Alarming Capabilities
  • 5 Must-Know Facts about 5G Network Security and Its Cloud Benefits
  • Romania’s Safetech Leans into UK Cybersecurity Market
  • New COSMICENERGY Malware Exploits ICS Protocol to Sabotage Power Grids
  • Barracuda Warns of Zero-Day Exploited to Breach Email Security Gateway Appliances
  • Advanced Phishing Attacks Surge 356% in 2022
  • Expo Framework API Flaw Reveals User Data in Online Services
  • NCSC Warns Against Chinese Cyber Attacks on Critical Infrastructure

Copyright © TheCyberSecurity.News, All Rights Reserved.