This article is from the source 'bbc' and was first published or seen on . It last changed over 40 days ago and won't be checked again for changes.
You can find the current article at its original source at http://www.bbc.co.uk/news/technology-40326544
The article has changed 3 times. There is an RSS feed of changes available.
Version 0 | Version 1 |
---|---|
Euro MPs back end-to-end encryption for all citizens | Euro MPs back end-to-end encryption for all citizens |
(1 day later) | |
A European Parliament committee is proposing that end-to-end encryption be enforced on all forms of digital communications to protect citizens. | |
The draft legislation seeks to protect sensitive personal data from hacking and government surveillance. | The draft legislation seeks to protect sensitive personal data from hacking and government surveillance. |
EU citizens are entitled to personal privacy and this extends to online communications, the proposal argues. | |
A ban on "backdoors" into encrypted messaging apps like WhatsApp and Telegram is also being considered. | A ban on "backdoors" into encrypted messaging apps like WhatsApp and Telegram is also being considered. |
Encryption involves digitally scrambling a communication to protect its contents, and then using a digital key to reassemble the data. | Encryption involves digitally scrambling a communication to protect its contents, and then using a digital key to reassemble the data. |
End-to-end encryption means the company providing the service does not have access to the key, meaning it cannot "listen in" to what is being shared - giving the sender and recipient added confidence in the privacy of their conversation. | End-to-end encryption means the company providing the service does not have access to the key, meaning it cannot "listen in" to what is being shared - giving the sender and recipient added confidence in the privacy of their conversation. |
"The principle of confidentiality should apply to current and future means of communication, including calls, internet access, instant messaging applications, email, internet phone calls and personal messaging provided through social media," said a draft proposal drawn up for the European Parliament's Committee on Civil Liberties, Justice, and Home Affairs. | |
The proposal seeks to amend Article Seven of the EU's Charter of Fundamental Rights to add online privacy. It will require approval by committee's members, the wider European Parliament and the Council of Ministers before it can be passed into law. | |
'Existing techniques' | 'Existing techniques' |
During the UK's recent election campaign, the Conservative Party said that tech firms should provide the authorities "access to information as required" to help combat online radicalisation, but ministers have also said they do not want to weaken encryption. | During the UK's recent election campaign, the Conservative Party said that tech firms should provide the authorities "access to information as required" to help combat online radicalisation, but ministers have also said they do not want to weaken encryption. |
That has led to some confusion among tech industry leaders as to whether the government wants some kind of "backdoor", a way to have end-to-end encryption disabled in specific cases, or some other action. | That has led to some confusion among tech industry leaders as to whether the government wants some kind of "backdoor", a way to have end-to-end encryption disabled in specific cases, or some other action. |
However, cyber-security experts warn that criminals can still find a way to protect their communications, even if end-to-end encryption is banned. | However, cyber-security experts warn that criminals can still find a way to protect their communications, even if end-to-end encryption is banned. |
"There are lots of existing techniques law enforcement can use," Dr Steven Murdoch, a cyber-security researcher in the department of computer science at University College London told the BBC News website. | "There are lots of existing techniques law enforcement can use," Dr Steven Murdoch, a cyber-security researcher in the department of computer science at University College London told the BBC News website. |
"One of them is traffic analysis, which is looking at patterns of communications, eg who is talking to who, when and from what location. | "One of them is traffic analysis, which is looking at patterns of communications, eg who is talking to who, when and from what location. |
"The other one is hacking - equipment interference in British law - which can happen before data is encrypted and after it's been decrypted, so there are still ways for law enforcement to gain access to information." | "The other one is hacking - equipment interference in British law - which can happen before data is encrypted and after it's been decrypted, so there are still ways for law enforcement to gain access to information." |
In the Manchester, Westminster and London Bridge terror attacks, the perpetrators were already known to UK security services, Mr Murdoch added. | In the Manchester, Westminster and London Bridge terror attacks, the perpetrators were already known to UK security services, Mr Murdoch added. |
"They were not stopped because there were either insufficient resources or the resources were not sufficiently prioritised," he said. | "They were not stopped because there were either insufficient resources or the resources were not sufficiently prioritised," he said. |
"The suggestions being considered by the UK government would be worse for computer security. So much of people's lives are now carried out online. We should have privacy online just as we have offline." | "The suggestions being considered by the UK government would be worse for computer security. So much of people's lives are now carried out online. We should have privacy online just as we have offline." |