9 Matching Annotations
  1. Nov 2020
    1. Regarding access to digital evidence, the EU and its Member States first recognize encryption as an important tool for the protection of cybersecurity and fundamental rights, such as privacy, including the confidentiality of communications, and personal data. The EU and its Member States are invited to find solutions that allow law enforcement and other competent authorities to gain lawful access to digital evidence concerning malicious cyber activities, without prohibiting or generally weakening encryption, and in full respect of privacy and fair trial guarantees consistent with applicable law.

      How to achieve this? We should follow more closely this discussion.

      ||VladaR||||AndrijanaG||

    Created with Sketch. Visit annotations in context

    Created with Sketch. Tags

    Created with Sketch. Annotators

    Created with Sketch. URL

    1. “competent authorities”

      Widening coverage beyond 'law enforcement agencies' by using term 'competent authorities'.

    2. While the German police have such a tool at its disposal

      Do they have possibility to break E2E?

      ||VladaR||

    Created with Sketch. Visit annotations in context

    Created with Sketch. Tags

    Created with Sketch. Annotators

    Created with Sketch. URL

    1. In December 2018, Australia was the first major democratic country to introduce an encryption-busting law.

      Can we have more info on Australian law and its application - e.g. does it force Facebook to create backdoor for WhatsUP?

      ||Pavlina||||VladaR||||AndrijanaG||

    2. If properly implemented, E2EE lets users have secure conversations — may them be chat, audio, or video — without sharing the encryption key with the tech companies.

      Why end-to-end encryption (E2EE) provides?

      ?AI

    3. The Five Eyes alliance, comprised of the US, the UK, Canada, Australia, and New Zealand, have made similar calls to tech giants in 2018 and 2019, respectively.

      Call for weaker encryption is not new. There has been build-up since 2018 and 2019.

    Created with Sketch. Visit annotations in context

    Created with Sketch. Tags

    Created with Sketch. Annotators

    Created with Sketch. URL

  2. Oct 2020
    1. Relevant points in this document

      • 5 eyes (Australia, Canada, USA, UK, New Zealand) are joint by Japan and India
      • against end-to-end encryption for two reasons: a) companies cannot enforce their internal rules on content moderation; b) law enforcement agencies cannot enforce laws.
      • problems should be solved on the way how applications are designed
      • need to solve problem of encryption via standards
      • argue that they can both protect privacy and limit encryption.

      ||VladaR||||AndrijanaG||||Jovan||||MarcoLotti||||AndrijanaG||

    Created with Sketch. Visit annotations in context

    Created with Sketch. Tags

    Created with Sketch. Annotators

    Created with Sketch. URL

    1. US National Security Agency (NSA) established the Center for Cybersecurity Standards in order to deal with increasing dependence on commercial products to secure National Security Systems.

      The NSA Center for Cybersecurity Standards will focus on:

      • 5G Security
      • Cybersecurity Automation
      • Platform Resilience
      • Cryptographic Algorithms
      • Security Protocols

      Cybersecurity standards will play increasing relevance in digital realm.

      ||VladaR||||AndrijanaG||

      Actors: 3GPP; ATIS; IEEE; IETF; ISO; IEC; OASIS; IETF; TCG; NIST; ANSI

    Created with Sketch. Visit annotations in context

    Created with Sketch. Tags

    Created with Sketch. Annotators

    Created with Sketch. URL