A European right to end-to-end encryption?

被引:0
|
作者
Shurson, Jessica [1 ]
机构
[1] Univ Sussex, Law, Freeman Bldg, Brighton BN19QE, England
关键词
D O I
10.1016/j.clsr.2024.106063
中图分类号
D9 [法律]; DF [法律];
学科分类号
0301 ;
摘要
In Podchasov v Russia, , the European Court of Human Rights unanimously held that a Russian statutory obligation on 'internet communications organisers' to provide information to state authorities that allowed for the decryption of encrypted communications was a disproportionate interference with Article 8 because the available technical means of decryption risked weakening the security of communications for all users of the service. This is significant as authorities in the UK and EU may seek to implement similar statutory obligations on communications service providers.
引用
收藏
页数:6
相关论文
共 50 条
  • [21] Securing SCADA Applications Using OpenPLC With End-To-End Encryption
    Alves, Thiago
    Morris, Thomas
    Yoo, Seong-Moo
    3RD ANNUAL INDUSTRIAL CONTROL SYSTEM SECURITY WORKSHOP (ICSS 2017), 2017, : 1 - 6
  • [22] End-to-end Encryption for SMS Messages in the Health Care Domain
    Hassinen, Marko
    Laitinen, Pertti
    CONNECTING MEDICAL INFORMATICS AND BIO-INFORMATICS, 2005, 116 : 316 - 321
  • [23] Novel end-to-end voice encryption method in GSM system
    Qi, H. F.
    Yang, X. H.
    Jiang, R.
    Liang, B.
    Zhou, S. J.
    PROCEEDINGS OF 2008 IEEE INTERNATIONAL CONFERENCE ON NETWORKING, SENSING AND CONTROL, VOLS 1 AND 2, 2008, : 217 - 220
  • [24] Towards Efficient End-to-End Encryption for Container Checkpointing Systems
    Stoyanov, Radostin
    Reber, Adrian
    Ueno, Daiki
    Clapinski, Michal
    Vagin, Andrei
    Bruno, Rodrigo
    PROCEEDINGS OF THE 15TH ACM SIGOPS ASIA-PACIFIC WORKSHOP ON SYSTEMS, APSYS 2024, 2024, : 60 - 66
  • [25] Integrating end-to-end encryption and authentication technology into broadband networks
    Pierson, LG
    INTEGRATION ISSUES IN LARGE COMMERCIAL MEDIA DELIVERY SYSTEMS, 1996, 2615 : 260 - 269
  • [26] Usability of End-to-End Encryption in E-Mail Communication
    Reuter, Adrian
    Abdelmaksoud, Ahmed
    Boudaoud, Karima
    Winckler, Marco
    FRONTIERS IN BIG DATA, 2021, 4
  • [27] Security Analysis and Countermeasures of an End-to-End Encryption Scheme of LINE
    Isobe, Takanori
    Minematsu, Kazuhiko
    IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2020, E103A (01) : 313 - 324
  • [28] Scalable, Practical VoIP Teleconferencing With End-to-End Homomorphic Encryption
    Rohloff, Kurt
    Cousins, David Bruce
    Sumorok, Daniel
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2017, 12 (05) : 1031 - 1041
  • [29] END-TO-END ANASTOMOSIS FOR RIGHT-SIDED HEMICOLECTOMY
    KARYAKIN, AM
    IVANOV, MA
    VESTNIK KHIRURGII IMENI I I GREKOVA, 1989, 143 (12): : 21 - 26
  • [30] Blockchain-enabled End-to-End Encryption for Instant Messaging Applications
    Singh, Raman
    Chauhan, Ark Nandan Singh
    Tewari, Hitesh
    2022 IEEE 23RD INTERNATIONAL SYMPOSIUM ON A WORLD OF WIRELESS, MOBILE AND MULTIMEDIA NETWORKS (WOWMOM 2022), 2022, : 501 - 506