A European right to end-to-end encryption?

被引:0
|
作者
Shurson, Jessica [1 ]
机构
[1] Univ Sussex, Law, Freeman Bldg, Brighton BN19QE, England
关键词
D O I
10.1016/j.clsr.2024.106063
中图分类号
D9 [法律]; DF [法律];
学科分类号
0301 ;
摘要
In Podchasov v Russia, , the European Court of Human Rights unanimously held that a Russian statutory obligation on 'internet communications organisers' to provide information to state authorities that allowed for the decryption of encrypted communications was a disproportionate interference with Article 8 because the available technical means of decryption risked weakening the security of communications for all users of the service. This is significant as authorities in the UK and EU may seek to implement similar statutory obligations on communications service providers.
引用
收藏
页数:6
相关论文
共 50 条
  • [1] Research on end-to-end encryption of TETRA
    Beijing FORICH Software Technology Co. Ltd., Network Security Division, Beijing 100083, China
    不详
    J. China Univ. Post Telecom., 2006, 2 (70-73):
  • [2] Research on End-to-End Encryption of TETRA
    ZHANG Zhi-hui 1
    2.Information Security Center
    The Journal of China Universities of Posts and Telecommunications, 2006, (02) : 70 - 73
  • [3] SDNS ARCHITECTURE AND END-TO-END ENCRYPTION
    NELSON, R
    HEIMANN, J
    LECTURE NOTES IN COMPUTER SCIENCE, 1990, 435 : 356 - 366
  • [4] Anonymous Traceback for End-to-End Encryption
    Kenney, Erin
    Tang, Qiang
    Wu, Chase
    COMPUTER SECURITY - ESORICS 2022, PT II, 2022, 13555 : 42 - 62
  • [5] Subverting Telegram's End-to-End Encryption
    Cogliati, Benoit
    Ethan, Jordan
    Jha, Ashwin
    IACR TRANSACTIONS ON SYMMETRIC CRYPTOLOGY, 2023, 2023 (01) : 5 - 40
  • [6] System of end-to-end symmetric database encryption
    Galushka, V. V.
    Aydinyan, A. R.
    Tsvetkova, O. L.
    Fathi, V. A.
    Fathi, D. V.
    INTERNATIONAL CONFERENCE INFORMATION TECHNOLOGIES IN BUSINESS AND INDUSTRY 2018, PTS 1-4, 2018, 1015
  • [7] On Track of Sigfox Confidentiality with End-to-End Encryption
    Fujdiak, Radek
    Blazek, Petr
    Mikhaylov, Konstantin
    Malina, Lukas
    Mlynek, Petr
    Misurec, Jiri
    Blazek, Vojtech
    13TH INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY AND SECURITY (ARES 2018), 2019,
  • [8] Mitigation of Attacks on Email End-to-End Encryption
    Schwenk, Joerg
    Brinkmann, Marcus
    Poddebniak, Damian
    Mueller, Jens
    Somorovsky, Juraj
    Schinzel, Sebastian
    CCS '20: PROCEEDINGS OF THE 2020 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2020, : 1647 - 1664
  • [9] SafeSMS - End-to-end encryption for SMS messages
    Hassinen, M
    ConTEL 2005: Proceedings of the 8th International Conference on Telecommunications, Vols 1 and 2, 2005, : 359 - 365
  • [10] End-to-End Encryption for Personal Telehealth Systems
    Oellerer, Gerald
    Mense, Alexander
    PHEALTH 2014, 2014, 200 : 140 - 145