Tag: encryption

Play, Pay, Repeat: Why Australia Needs to Stop Chasing Encryption Backdoors and Start Getting Serious About Kids, Games,and Digital Safety

Play, Pay, Repeat: Why Australia Needs to Stop Chasing Encryption Backdoors and Start Getting Serious About Kids, Games,and Digital Safety

Over the weekend, I read an article by Jackson Ryan in The Guardian that stopped me in my tracks. It asked a pointed question — “Does video game monetisation harm children, and what is Australia doing about it?” — and its answers were far from 

CyAN Signs 3 Open Letters Against Surveillance Laws

CyAN Signs 3 Open Letters Against Surveillance Laws

We have added CyAN’s signature to 3 open letters against surveillance overreach in Sweden, Japan, and the United States

Unraveling Digital Sovereignty: The Delicate Balance of Digital Sovereignty: Insights and Imperatives

Unraveling Digital Sovereignty: The Delicate Balance of Digital Sovereignty: Insights and Imperatives

Defining Digital Sovereignty in Our Times

In his thought-provoking article, “Digital Sovereignty: A Framework for the Internet Age,” Robin Berjon skilfully outlines the challenges and necessities of digital sovereignty. This article builds on his foundation, delving deeper into nuanced facets of digital sovereignty and highlighting critical issues such as the essential role of end-to-end encryption (E2EE), the economic and security risks posed by tariff wars, and the importance of competent digital governance in managing powerful digital tools.

Central to our discussion is Cory Doctorow’s concept of ‘enshittification’—the gradual degradation of systems as commercial pressures and scale erode their founding principles. This concept serves as a cautionary backdrop to our exploration, particularly as we examine how poor management and short-sighted policies can undermine the digital sovereignty of nations.

The Imperative of End-to-End Encryption (E2EE)

End-to-end encryption (E2EE) is foundational to digital security. As digital data increasingly underpins our societal functions, ensuring that such data remains encrypted and accessible only to intended recipients safeguards both individual privacy and national security. Advocating for the widespread adoption of robust, uncompromised E2EE is crucial for maintaining trust and integrity in international communications. This approach supports the digital sovereignty of nations by ensuring their communications remain secure from foreign interference.

The Temptation of Data Tariffs

In an era where digital borders are becoming as significant as their physical counterparts, there might be a temptation among policymakers to introduce data tariffs as a means of controlling and monetising the international flow of data. Such measures could be seen as attractive for countries looking to bolster their domestic tech industries or protect their data from foreign exploitation. However, the following section will explore why this seemingly bright idea might not shine in practice.

Tariff Wars: A Cautionary Tale

While some may argue that data tariffs could serve as economic levers or protective measures, history teaches us that tariff wars lead to economic inefficiency and often hurt more than they help. Imposing tariffs on data could backfire by isolating markets, increasing costs for consumers and businesses alike, and stifling innovation. To avoid these pitfalls, we must seek cooperative international agreements that support open data flows while respecting each nation’s right to digital sovereignty.

Data Security as National Security

Data security extends beyond protecting personal information; it is an integral component of national security. In a world where data breaches can lead to significant economic, social, and political disruptions, securing our digital assets is paramount. Robust national and international frameworks that prioritise security without compromising global interoperability are essential for maintaining digital sovereignty and economic stability.

Combating ‘Enshittification’ in Digital Governance

Cory Doctorow’s notion of ‘enshittification’—the degradation of systems as they scale—can be observed in the digital world when there is insufficient oversight and management of complex digital tools. This can lead to significant vulnerabilities in terms of security and user experience. Promoting a culture of careful stewardship and informed management across all levels of digital operations is crucial to prevent the decline in the quality and security of digital platforms.

Conclusion: A Call for Thoughtful Digital Governance

Digital sovereignty challenges us to navigate complex territories of technology, policy, and human rights. By championing uncompromised E2EE, advocating against data tariffs, emphasising the national security implications of data security, and demanding knowledgeable handling of digital technologies, we can strive towards a balanced approach that protects both individual rights and national interests. Let’s commit to fostering an environment where digital sovereignty is balanced with global cooperation for a secure, open, and fair digital future.

Read more: Digital Sovereignty: A Framework for the Internet Age by Robin Berjon


About the Author:

Kim Chandler McDonald is the Co-Founder and CEO of 3 Steps Data, driving data/digital governance solutions.
She is the Global VP of CyAN, an award-winning author, storyteller, and advocate for cybersecurity, digital sovereignty, compliance, governance, and end-user empowerment.

Opinion: Yet Another Encryption Kerfuffle

Ukrainian law enforcement demands Signal cooperate against Russian cybercriminals. This is a bad idea, like in any other country.

Opinion:  Encryption Back Doors are Dumb.

Opinion: Encryption Back Doors are Dumb.

A member’s take on why encryption backdoors are a stupid, harmful, pointless idea.

CyAN’s Position on Encryption Backdoor Legislation

The Cybersecurity Advisors Network believes that the security and privacy of information are fundamental to a thriving digital economy and society. We are committed to supporting initiatives, standards, technologies, and laws that enhance the global information ecosystem’s security, trustworthiness, safety, and resilience. Central to this commitment is our unwavering support for strong end-to-end encryption.

The Importance of Encryption

Encryption does more than protect technological infrastructures; it has significant social, political, and economic implications. By securing business transactions and voting processes, encryption ensures that these activities remain confidential and reliable. It also protects individuals’ privacy and shields them from cyber threats. In regions where fundamental rights are threatened, encryption enables dissidents and members of other threatened groups, such as LGBTQ, to communicate securely and free from governmental eavesdropping.

The Risks of Encryption Backdoors

Laws requiring encryption backdoors are often based in good intentions. However, introducing backdoors into encryption solutions compromises the very data security we strive to uphold. Such vulnerabilities can be exploited by malicious actors, lead to government overreach, or introduce unintentional security flaws. Importantly, criminals will bypass these laws by using unregulated encrypted platforms, rendering the backdoors ineffective.

Recent Legislative Challenges

In recent months, CyAN has voiced its opposition to several legislative efforts that threatened encryption integrity:

Meanwhile, new threats to the integrity of end-to-end encryption have emerged in Europe:

Both of these proposals would have a serious and detrimental impact on all services relying on end-to-end encryption – including secure messengers like Signal and WhatsApp, VPNs, and others.

CyAN’s Stance

While we recognize and appreciate the efforts of law enforcement and intelligence agencies in combating crimes such as child exploitation, drug trafficking, and terrorism, these efforts must not compromise the overarching need for privacy and security. CyAN strongly opposes any legislative proposals that threaten the integrity of encryption and, by extension, the privacy and security of the global digital community.

As part of our ongoing commitment to fostering a secure, private, and resilient digital world, CyAN will continue to lead and support efforts to preserve the strength of encryption. We urge legislators and the public to stand with us in opposing any initiatives that undermine these fundamental digital protections.

The Power of Fully Homomorphic Encryption in the Fight Against Ransomware

The Power of Fully Homomorphic Encryption in the Fight Against Ransomware

A repost of an article one of our members wrote for a client of his, regarding the use case of fully homomorphic encryption as a safeguard against ransomware-borne data exfiltration and various forms of extortion.

The Growing Threat of Quantum Supremacy in The Era Of Digital Civilization

The Growing Threat of Quantum Supremacy in The Era Of Digital Civilization

Aliasgar Eranpurwala, a graduate of the CyAN mentorship programme pilot, writes about his work on post-quantum cryptography and quantum key distribution to secure satellite communications