1 min read

UK government demands backdoors in end-to-end encryption

Luana PASCU

March 27, 2017

UK government demands backdoors in end-to-end encryption

UK”s Home Secretary Amber Rudd is meeting with tech firms on Thursday to persuade them to cooperate in creating backdoors in end-to-end encryption of instant messaging tools for law enforcement to intercept private communication between terrorists.

Rudd is so far displeased with their efforts and wants them to assume responsibility for terrorist situations, according to an interview for BBC.

“It is completely unacceptable, there should be no place for terrorists to hide. We need to make sure that organizations like WhatsApp, and there are plenty of others like that, don’t provide a secret place for terrorists to communicate with each other,” she said. “It used to be that people would steam open envelopes or just listen in on phones when they wanted to find out what people were doing, legally, through warranty. But on this situation we need to make sure that our intelligence services have the ability to get into situations like encrypted WhatsApp.”

Concerns that law enforcement can”t intercept instant messages have increased after the terrorist accused of last week”s attack in London sent a WhatsApp message to an unknown contact a few minutes before the attack.

“This end-to-end encryption protocol is designed to prevent third parties and WhatsApp from having plaintext access to messages or calls. What”s more, even if encryption keys from a user”s device are ever physically compromised, they cannot be used to go back in time to decrypt previously transmitted messages,” according to WhatsApp, which says its top priority is protecting private conversations.

End-to-end encryption does not allow conversations to be intercepted, even by law enforcement. Unless companies cooperate, government agencies are willing to hire hackers to decrypt communication, even though it will be difficult, if not impossible. Rudd pointed out the importance of a partnership between tech companies and law enforcement, and the creation of backdoors in encryption.

tags


Author



Right now

Top posts

E-mails claiming your computer was hacked and your privacy exposed - what you need to know (spoiler: you can relax - they’re bluffing)

E-mails claiming your computer was hacked and your privacy exposed - what you need to know (spoiler: you can relax - they’re bluffing)

July 29, 2021

5 min read
Watch Out for These Ongoing Bank of America Phishing Campaigns Targeting Customers in the US

Watch Out for These Ongoing Bank of America Phishing Campaigns Targeting Customers in the US

July 16, 2021

3 min read
How to protect yourself against cyberstalking

How to protect yourself against cyberstalking

July 06, 2021

2 min read
The Top Five Security Risks Smartphone Users Face Today

The Top Five Security Risks Smartphone Users Face Today

July 02, 2021

4 min read
Phishing Alert: Scammers Use Fake SharePoint and DocuSign Messages to Steal Users’ Login Credentials

Phishing Alert: Scammers Use Fake SharePoint and DocuSign Messages to Steal Users’ Login Credentials

July 02, 2021

3 min read
Your Doxxing Dossier Will Keep Growing Thicker Until You See the Danger

Your Doxxing Dossier Will Keep Growing Thicker Until You See the Danger

June 30, 2021

2 min read

FOLLOW US ON

SOCIAL MEDIA


You might also like

The Perils of Online Dating: Spotting Romance Scammers Before They Break Your Heart and Your Bank Account The Perils of Online Dating: Spotting Romance Scammers Before They Break Your Heart and Your Bank Account
Alina BÎZGĂ

August 05, 2021

3 min read
Google Fixes Five High-Severity Flaws in Chrome 92 for Windows, Mac and Linux Google Fixes Five High-Severity Flaws in Chrome 92 for Windows, Mac and Linux
Filip TRUȚĂ

August 05, 2021

1 min read
Google Drops All Support for Android 2.3.7 and Older Google Drops All Support for Android 2.3.7 and Older
Silviu STAHIE

August 04, 2021

1 min read