The european union plans to introduce backdoors in messaging applications

The draft resolution is ready and in principle, should be a final round of the decision tables of the Council of the EU on the 25th of the current month before its adoption.

The Council of the EU believe that the implementation of encryption end to end in encrypted messaging applications should not prevent that the forces of order track pedophiles and terrorists.

"A balance between these two poles is necessary," recalls the institution. That is why you are preparing to adopt a resolution that aims to force the introduction of backdoors for the exclusive use of law enforcement agencies within encrypted messaging applications.

The resolution is inspired in principle by a proposal from the EU Commission itself aligned with the presentation of the new EU strategy which seems to say:

Ylva Johansson (European Commissioner for the Interior) comments:

"We are going to present a bill that will oblige Internet service providers to detect, report, erase and report cases of pedophilia online."

In other words, in the case of its adoption, platforms like Signal, WhatsApp or Wire implement end-to-end encryption will be forced to introduce a way for the authorities to access the content encryption.

According to the Communications Decency Act (in force in the United States since 1996), companies that offer online services are exempt from any responsibility for the content published on their platforms.

Under the EARN IT Act (proposed by Republican Senators Lindsey Graham and Josh Hawley, as well as Democratic Senators Richard Blumenthal Dianne Feinstein during the month of March), the situation changes.

Companies are forced to waive their responsibility by offering law enforcement agencies to search for specific content. Those who have implemented end-to-end encryption are left at the risk of content posted on their platforms.

«The EARN IT bill, sponsored by Senators Lindsay Graham (R-GA) and Richard Blumenthal (D-CT), will remove Section 230 protections for any website that does not follow a list of» best practices «. which means these sites can be sued for bankruptcy, ”says the Electronic Frontier Foundation.

matrix (encryption solution provider) used by the French government, andExplains why the approach of introducing backdoors is not correct

Backdoors necessarily introduce a weak point fatal in encryption for everyone, which then becomes the high-value end goal for the attackers.

Anyone who can determine the private key required to break the encryption has full access and one can be absolutely certain that the backdoor key will be revealed, whether through intrusion, social engineering, brute force attack, or accident.

Governments are not trusted third parties to whom the private keys can be trusted.

End-to-end encryption is a completely ubiquitous technology today; trying to legislate against the latter would be like trying to change course or outlaw a branch of mathematics.

Governments protect their own data using end-to-end encryption precisely because they don't want other governments to spy on them. So not only is it hypocritical for governments to advocate for the backdoor, it immediately puts your own government data at risk of being compromised. Furthermore, the creation of backdoor infrastructure sets an incredibly bad precedent for the rest of the world, where less healthy governments will inevitably use the same technology to the massive detriment of the human rights of their citizens.

Encryption is 99,9% beneficial to non-malicious third parties. If we weaken it, 0,1% of cybercriminals will stick to platforms without back doors while 99,9% will be vulnerable.

What solution, then, if encryption is not the way to go?

Matrix offers a "relative reputation" system for users of its platform. The understanding of the latter in development is based on a few points:

  1. Anyone can collect reputation data on rooms, users, servers, communities, or Matrix content and publish it for as large or small an audience as they want by providing a subjective score on whether any content in Matrix is ​​positive or negative in a given context.
  2. This reputation data is published in such a way that privacy is preserved, meaning that it is possible to query the reputation data if a dedicated ID is known, but the data is stored under a pseudonym.
  3. Anyone can subscribe to the reputation feeds. Feeds can be data specific to a user, friends, or trusted sources (for example, a fact-checking company).
  4. Administrators who manage servers in particular jurisdictions have the ability to enforce the rules they need on their servers (for example, they can subscribe to reputable sources from a trusted source that identifies content posted by sexual predators and use them to block them on their server) .

Source: https://matrix.org/


4 comments, leave yours

Leave a Comment

Your email address will not be published. Required fields are marked with *

*

*

  1. Responsible for the data: AB Internet Networks 2008 SL
  2. Purpose of the data: Control SPAM, comment management.
  3. Legitimation: Your consent
  4. Communication of the data: The data will not be communicated to third parties except by legal obligation.
  5. Data storage: Database hosted by Occentus Networks (EU)
  6. Rights: At any time you can limit, recover and delete your information.

  1.   Pedro Pino said

    How awful!!!

  2.   jaime said

    And a cock.
    They not only look at terrorists .. they look at all God, .. at their girlfriends, ex-girlfriends .. come on .. it goes ... we know each other ...

    Go to others with the story.

  3.   George said

    Where are we going to stop. It is true that these issues are delicate and harmful for many, but look at it from this perspective:
    Imagine that a child has excessive access to the Internet at his fingertips. Whose fault is it? We know that technology can be used in 2 different ways:
    1- The healthiest way and for which the Internet was born, to communicate remotely, study, learn, etc. That would be the ideal way to use it, but remember that there is a totally different way.
    2 - To do evil, steal, counterfeit, sell illegal products, harm other people, etc.
    So returning to the previous question, I think that the fault that this happens is the parents, since their child could be using technology badly or accessing dangerous sites without knowledge, since I consider that a child at such young ages It is not governed and I do not consider it necessary that you need to have access to a social network that is one of the pages where the highest incidence of pedophilia and cyberbullying could occur. The Internet for them should be closely linked to content of their ages, to perform tasks, communicate with family and friends, study, watch dolls, etc., but all with control and at a specific time. To summarize, I think that much or all of the fault lies with their parents for not ensuring their safety. Personally, I grew up without the Internet and nothing bad happened to me, on the contrary, I socialized more and I am from that time when traditional games were played with your classmates in the street, we interacted with each other and we were happy just like now. It is true that development is necessary and I am not denying it at all, technology has improved a world but we can never neglect it. So I think that safety and security should start at home, teaching the little ones common sense and the perception of risk that one feels when surfing the Internet.

  4.   Fernando said

    I know that is not the issue but I read the comments carefully and I notice that Don Jorge tries to speak with an inclusive language: children, they ... But he only talks about "fathers" (not mothers?)
    «People» (it should be people), «family members» (family members?), «Friends» (not friends?), «... all the blame is on their parents ...» (not the mothers?), «We interacted with each other »,« You played with your classmates »(only men?),« Teaching the little ones… (and the little ones don't deserve teaching?)… I know it sounds ridiculous. Because it IS ridiculous. Transform a serious and interesting comment, like Don Jorge's, into an amorphous ode to gender equality. On the topic, no doubt criminals will find other safe ways to communicate while the CIA and their European colleagues are still searching for Saddam's weapons of mass destruction.