Discussion
Loading...

Post

Log in
  • About
  • Code of conduct
  • Privacy
  • Users
  • Instances
  • About Bonfire
Open Rights Group
Open Rights Group
@openrightsgroup@social.openrightsgroup.org  路  activity timestamp 2 weeks ago

Encryption isn't hostile. It's a bedrock of our cybersecurity 馃攼

The UK's national security laws join a long line of attempts to frame encrypted messaging as something to be broken into pieces.

Without it, we're more open to threats from hackers and criminals.

https://www.techradar.com/vpn/vpn-privacy-security/creating-apps-like-signal-or-whatsapp-could-be-hostile-activity-claims-uk-watchdog

#e2ee #encryption #privacy #cybersecurity #nationalsecurity #security #ukpolitics #ukpol

  • Copy link
  • Flag this post
  • Block
Gemma 猸愶笍馃敯馃嚭馃嚫 馃嚨馃嚟 馃帎
Gemma 猸愶笍馃敯馃嚭馃嚫 馃嚨馃嚟 馃帎
@gcvsa@mstdn.plus replied  路  activity timestamp 2 weeks ago

@openrightsgroup The best thing Bill Clinon did while President was remove the export restrictions on strong cryptography.

  • Copy link
  • Flag this comment
  • Block
Rebel Zhang
Rebel Zhang
@rebel1725@fosstodon.org replied  路  activity timestamp 2 weeks ago

@openrightsgroup You have used the term 'hackers' wrong. 'Hackers' refers to a type of people who enjoys playful cleverness, not those who break security, and it is even not tied to the topics of cyber security or even computers. People who break security should be referred to as 'crackers'.

  • Copy link
  • Flag this comment
  • Block
Ben Tasker
Ben Tasker
@ben@mastodon.bentasker.co.uk replied  路  activity timestamp 2 weeks ago

@openrightsgroup

> It is clear that for many lawmakers, encryption is viewed primarily as an obstacle to law enforcement.

Yup.

This week I got a (somewhat belated) reply to questions I sent about the whole Apple thing.

I still haven't really finished processing this section of the reply. They seem to be arguing that E2E doesn't offer users and security/privacy benefit. Also not really sure where the "as you have mentioned" came from... maybe an LLM wrote this?

Home Office: As you have mentioned, end-to-end encryption does not protect users against many of the
most common cyber threats. It has no effect against phishing or spear-phishing, nor the
ability of an attacker to prosecute a denial-of-service attack or deploy malware or
ransomware onto a user鈥檚 device, as it is not designed to. It is entirely possible to have
robust cyber security measures that guard against access to data by malicious actors
whilst also ensuring data can be disclosed in response to specific authorised requests for
lawful access.
Home Office: As you have mentioned, end-to-end encryption does not protect users against many of the most common cyber threats. It has no effect against phishing or spear-phishing, nor the ability of an attacker to prosecute a denial-of-service attack or deploy malware or ransomware onto a user鈥檚 device, as it is not designed to. It is entirely possible to have robust cyber security measures that guard against access to data by malicious actors whilst also ensuring data can be disclosed in response to specific authorised requests for lawful access.
Home Office: As you have mentioned, end-to-end encryption does not protect users against many of the most common cyber threats. It has no effect against phishing or spear-phishing, nor the ability of an attacker to prosecute a denial-of-service attack or deploy malware or ransomware onto a user鈥檚 device, as it is not designed to. It is entirely possible to have robust cyber security measures that guard against access to data by malicious actors whilst also ensuring data can be disclosed in response to specific authorised requests for lawful access.
  • Copy link
  • Flag this comment
  • Block

bonfire.cafe

A space for Bonfire maintainers and contributors to communicate

bonfire.cafe: About 路 Code of conduct 路 Privacy 路 Users 路 Instances
Bonfire social 路 1.0.1-alpha.41 no JS en
Automatic federation enabled
Log in
  • Explore
  • About
  • Members
  • Code of Conduct