Fighting European Threats to Encryption: 2023 Year in Review

In the online world, the best tool we have to defend this right is end-to-end encryption.
Politicians across Europe attempted to undermine encryption, seeking to access and scan our private messages and pictures.
EFF spent this year fighting hard against an EU proposal that, if it became law, would have been a disaster for online privacy in the EU and throughout the world.
In the name of fighting online child abuse, the European Commission, the EU's executive body, put forward a draft bill that would allow EU authorities to compel online services to scan user data and check it against law enforcement databases.
The proposal would have pressured online services to abandon end-to-end encryption.
EFF has been opposed to this proposal since it was unveiled last year.
We lobbied EU lawmakers and urged them to protect their constituents' human right to have a private conversation-backed up by strong encryption.
In November, a key EU committee adopted a position that bars mass scanning of messages and protects end-to-end encryption.
It also bars mandatory age verification, which would have amounted to a mandate to show ID before you get online; age verification can erode a free and anonymous internet for both kids and adults.
We'll continue to monitor the EU proposal as attention shifts to the Council of the EU, the second decision-making body of the EU. Despite several Member States still supporting widespread surveillance of citizens, there are promising signs that such a measure won't get majority support in the Council.
Make no mistake-the hard-fought compromise in the European Parliament is a big victory for EFF and our supporters.
The governments of the world should understand clearly: mass scanning of peoples' messages is wrong, and at odds with human rights.
A Wrong Turn in the U.K. EFF also opposed the U.K.'s Online Safety Bill, which passed and became the Online Safety Act this October, after more than four years on the British legislative agenda.
The OSA requires platforms to take action to prevent individuals from encountering certain illegal content, which will likely mandate the use of intrusive scanning systems.
Even worse, it empowers the British government, in certain situations, to demand that online platforms use government-approved software to scan for illegal content.
The U.K. government said that content will only be scanned to check for specific categories of content.
Either all content is scanned and all actors-including authoritarian governments and rogue criminals-have access, or no one does.
Despite our opposition, working closely with civil society groups in the UK, the bill passed in September, with anti-encryption measures intact.
Ofcom must now take the OSA and, over the coming year, draft regulations to operationalize the legislation.
EFF will monitor Ofcom's drafting of the regulation, and we will continue to hold the UK government accountable to the international and European human rights protections that they are signatories to.


This Cyber News was published on www.eff.org. Publication date: Sat, 30 Dec 2023 15:43:05 +0000


Cyber News related to Fighting European Threats to Encryption: 2023 Year in Review

Strong Encryption Explained: 6 Encryption Best Practices - Strong encryption protects data securely from unauthorized access, but the specific algorithms that qualify as strong encryption change over time as computing power increases and researchers develop new ways to break encryption. Even the strongest ...
5 months ago Esecurityplanet.com
What Is Encryption? Definition, How it Works, & Examples - To understand how encryption works, we need to understand how it fits into the broader realm of cryptology, how it processes data, common categories, top algorithms, and how encryption fits into IT security. Symmetric encryption will typically be ...
6 months ago Esecurityplanet.com
Types of Encryption, Methods & Use Cases - Encryption category types will explain the overarching and basic categories of classification for encryption, including the two most important: symmetric and asymmetric encryption. Encryption tool types will discuss the major classifications of ...
6 months ago Esecurityplanet.com
Fighting Ursa Aka APT28: Illuminating a Covert Campaign - Early this year, Ukrainian cybersecurity researchers found Fighting Ursa leveraging a zero-day exploit in Microsoft Outlook. During this time, Fighting Ursa conducted at least two campaigns with this vulnerability that have been made public. Unit 42 ...
6 months ago Unit42.paloaltonetworks.com
Business Data Encryption: Protecting Sensitive Information - In addition to implementing encryption technologies and policies, organizations should prioritize employee training on data encryption. By selecting the appropriate encryption technologies, implementing strong encryption policies, and training ...
4 months ago Securityzap.com
Symmetric vs. Asymmetric Encryption in the Cloud: Choosing the Right Approach - Asymmetric and symmetric encryptions are the modes of encryption typically used in cryptography. There is a single key involved with symmetric encryption used both for encryption and decryption. Symmetric and asymmetric encryption as ways of ...
5 days ago Cybersecurity-insiders.com
Encrypting Data Using Asymmetric Encryption - Asymmetric encryption, commonly known as public-key encryption, is an important technique for safeguarding data transport and storage. Asymmetric encryption's multi-step process involving key generation, encryption, transmission, decryption, and key ...
5 months ago Feeds.dzone.com
The 6 Best Encryption Software - Though encryption could still be broken or cracked, strong encryption is nearly impenetrable. Top encryption software: Comparison table Top encryption software BitLocker: Best for Windows environments. It's an excellent choice for encryption software ...
1 month ago Techrepublic.com
Fighting European Threats to Encryption: 2023 Year in Review - In the online world, the best tool we have to defend this right is end-to-end encryption. Politicians across Europe attempted to undermine encryption, seeking to access and scan our private messages and pictures. EFF spent this year fighting hard ...
6 months ago Eff.org
An overview of storage encryption for enterprises - Storage encryption is a key element in keeping enterprise data safe. Most enterprises use a combination of encryption methods to protect their data on premises, in motion and in the cloud, so it's important to understand the different types and best ...
1 month ago Techtarget.com
9 Best DDoS Protection Service Providers for 2024 - eSecurity Planet content and product recommendations are editorially independent. We may make money when you click on links to our partners. Learn More. One of the most powerful defenses an organization can employ against distributed ...
6 months ago Esecurityplanet.com
Microsoft Cloud Users Store Personal Data In Europe - In effort to resolve privacy worries, Microsoft is to allow its cloud customers to store all personal data within EU. Microsoft has confirmed that it will allow cloud customers to store all their personal data within the European Union, in an effort ...
5 months ago Silicon.co.uk
How secure is the "Password Protection" on your files and drives? - People in certain professions, such as healthcare, law, and corporations, often rely on password protection when sending files via email, believing it provides adequate security against prying eyes. Protecting files with passwords without encrypting ...
1 month ago Helpnetsecurity.com
The European Space Agency Explores Cybersecurity for Space Industry - Cybersecurity for space missions is not optional and should be taken seriously. While Europe's burgeoning commercial space industry is facing some challenges, the European Space Agency is taking specific steps to boost defenses, such as planning to ...
7 months ago Darkreading.com
A personal Year in Review to round out 2023 - As you've probably seen by now, Talos released our 2023 Year in Review report last week. It's an extremely comprehensive look at the top threats, attacker trends and malware families from the past year with never-before-seen Cisco Talos telemetry. ...
6 months ago Blog.talosintelligence.com
The Evolution of Cyber Threats: Past, Present, and Future - Cyber threats have evolved significantly over time, posing increasing risks to individuals, organizations, and governments in our interconnected world. Let's explore the past, present, and future of cyber threats to better understand how to protect ...
5 months ago Securityzap.com
Internet Security: Ensuring Safe Online Experiences - Cybercriminals are constantly evolving their tactics, from sophisticated cyber attacks to insidious data breaches, putting your virtual safety at risk. Protecting your data isn't the only concern; safeguarding your identity, finances, and peace of ...
3 months ago Securityzap.com
Third Of European Businesses Have Adopted AI, AWS - AWS finds AI already adopted at sizeable number of European businesses, resulting in increased revenues, productivity. An insight into the adoption rate of artificial intelligence within the business community has been offered in a new report from ...
5 months ago Silicon.co.uk
Cybersecurity Trends: Shaping the Future Landscape - Embark on a journey through the ever-evolving landscape of cybersecurity, where hidden threats and silent breaches shape the digital realm. AI is transforming the cybersecurity landscape by enhancing threat detection and mitigation, ushering in a ...
3 months ago Securityzap.com
How to Identify & Monitor Insider Threat Indicators [A Guide] - Most security protocols look outward when looking for cybersecurity threats. Our recent study found that 42% of exposed credentials came from an insider threat-former employees whose credentials were still active, employee error, or a malicious ...
3 months ago Securityboulevard.com
Sensitive data loss is due to lack of encryption - In an era where data is the lifeblood of businesses, safeguarding sensitive information has become paramount. Cybersecurity lapses have historically been a cause of data breaches, but a recent study sheds light on a new dimension of vulnerability - ...
6 months ago Cybersecurity-insiders.com
Protecting Encryption And Privacy In The US: 2023 Year in Review - The best technology to protect that right is end-to-end encryption. 2023 has been a year of unprecedented threats to encryption and privacy. In the US, three Senate bills were introduced that, in our view, would discourage, weaken, or create ...
6 months ago Eff.org
Cybersecurity considerations to have when shopping for holiday gifts - Another aspect of security that many shoppers don't consider this time of year is the security of the products they're buying, even through a legitimate online marketplace. This is a glaring issue with home security cameras and Wi-Fi-connected ...
6 months ago Blog.talosintelligence.com
European firms urge China to give more clarity on data transfer laws - AP Moeller - Maersk A/S Siemens AG BEIJING, Nov 15 - European firms "Urgently" need China to give clearer definitions of key terms in its cross-border data transfer rules, a European business lobby group said on Wednesday, warning firms also stood to ...
7 months ago Reuters.com
Windows 11 to let admins mandate SMB encryption for outbound connections - Windows 11 will let admins mandate SMB client encryption for all outbound connections, starting with today's Windows 11 Insider Preview Build 25982 rolling out to Insiders in the Canary Channel. SMB encryption provides data end-to-end encryption and ...
7 months ago Bleepingcomputer.com

Latest Cyber News


Cyber Trends (last 7 days)


Trending Cyber News (last 7 days)