Please enable JavaScript to access this page.
Business News

Encryption ‘back doors’ are a bad idea

Digest opened free editor

How much is the power that democratic governments “intrude” on data and communications via the Internet for citizens? The UK government has used new legal powers to demand the creation of Apple, the creation of a “rear door”, which allows law enforcement bodies to access the encrypted data for users uploaded to the cloud. Apple instead responded by withdrawing from Britain The safest The cloud storage service-which uses encryption from one to one party that Apple says means that it cannot access data.

Britain is not alone. The Sweden government wants encrypted messaging applications such as Signal and WhatsApp to open a A similar back door. The reference threatens to leave Sweden if this law becomes. The cases amount to the largest confrontation so far between the desire of Western governments understood Police crimes are like terrorism And sexual abuse of children on the Internet, and the golden standard encryption is now widely used to protect the user’s privacy in messaging and cloud applications.

Either way the battle was reported when the FBI tried to force it apple To help him storm the iPhone that a terrorist used to shoot in California in 2015. Apple said if you create a rear door for the iPhone for the Federal Investigation Office, it may discover it and use it to break other phones. Piper company in the end Open the phone For the Federal Investigation Office, ending the confrontation.

British and Swedish demands are much wider. Using the investigation powers law – which critics called the “Snoopers Charter” – The UK Ministry of Interior issued a notification It requires Apple To allow British law enforcement, armed with a court order, to benefit from encrypted backups and other cloud data, anywhere in the world.

But the main dilemma is the same. When millions of people send or store sensitive data online, for example, their financial resources or health, data protection is very important. The encryption from one end to the end, where the user only carries and not the service provider, is the best protection.

Most cyber security experts argue that government agencies cannot be granted access without disintegration, who are infiltrators, including authoritarian countries, can misuse them. Something like this has already happened. In an attack called “Salt Typhoon”, Chinese infiltrators last year took advantage of the background of the government in the United States in US telecommunications networks to access calls and text messages and even phone calls to Senior politicians.

In the United Kingdom, about 239 groups of civil communities, companies and cyber security experts invited the government To cancel Its request on Apple, saying that it “endangered the security and privacy of millions. Re backing from its arrangement -Thinking about reducing intelligence participation in the United States of America if not.

This is undoubtedly a thorny issue. No one wants terrorists and children’s users to be able to evade the disclosure. Some UK security officials insisted on protecting privacy You can coexist With “exceptional legal arrival”, he argued that technology companies can find a smart solution. Technology experts contradict the absence of a compromise that is guaranteed so far.

But almost all large technology companies are truly cooperating with legitimate law enforcement requests that do not include “background doors” on a routine basis; Apple’s latest Transparency report in the United Kingdom It explains that it complied with 93 percent of emergency requests. If a solution is developed, which allows this to happen safely through comprehensive encryption, cooperation must extend to this field as well. Currently, though, governments must deal with this type of protection as a general commodity. The efforts made by the criminal minority police should not be undermined the safety and privacy of the vast majority of the law.

https://www.ft.com/__origami/service/image/v2/images/raw/https%3A%2F%2Fd1e00ek4ebabms.cloudfront.net%2Fproduction%2F61462932-caf3-4f12-a836-8ffe97993dca.jpg?source=next-article&fit=scale-down&quality=highest&width=700&dpr=1

2025-02-25 18:27:00

Related Articles

Leave a Reply

Your email address will not be published. Required fields are marked *

Back to top button