A European right to end-to-end encryption?

被引:0
|
作者
Shurson, Jessica [1 ]
机构
[1] Univ Sussex, Law, Freeman Bldg, Brighton BN19QE, England
关键词
D O I
10.1016/j.clsr.2024.106063
中图分类号
D9 [法律]; DF [法律];
学科分类号
0301 ;
摘要
In Podchasov v Russia, , the European Court of Human Rights unanimously held that a Russian statutory obligation on 'internet communications organisers' to provide information to state authorities that allowed for the decryption of encrypted communications was a disproportionate interference with Article 8 because the available technical means of decryption risked weakening the security of communications for all users of the service. This is significant as authorities in the UK and EU may seek to implement similar statutory obligations on communications service providers.
引用
收藏
页数:6
相关论文
共 50 条
  • [31] DCGAN-based symmetric encryption end-to-end communication systems
    An, Yongli
    Wang, Mengtao
    Chen, Lei
    Ji, Zhanlin
    AEU-INTERNATIONAL JOURNAL OF ELECTRONICS AND COMMUNICATIONS, 2022, 154
  • [32] Design of Cryptographic model for End-to-End Encryption in FPGA based systems
    Chatterjee, Runa
    Chakraborty, Rajdeep
    Mandal, J. K.
    PROCEEDINGS OF THE 2019 3RD INTERNATIONAL CONFERENCE ON COMPUTING METHODOLOGIES AND COMMUNICATION (ICCMC 2019), 2019, : 459 - 465
  • [33] End-to-End Voice Encryption Based on Multiple Circular Chaotic Permutation
    Hayati, Nur
    Suryanto, Yohan
    Ramli, Kalamullah
    Suryanegara, Muhammad
    PROCEEDINGS OF 2019 2ND INTERNATIONAL CONFERENCE ON COMMUNICATION ENGINEERING AND TECHNOLOGY (ICCET 2019), 2019, : 101 - 106
  • [34] Stick: An End-to-End Encryption Protocol Tailored for Social Network Platforms
    Basem, Omar
    Ullah, Abrar
    Hassen, Hani Ragab
    IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2023, 20 (02) : 1258 - 1269
  • [35] NOVEL KEY MANAGEMENT FOR 3G END-TO-END ENCRYPTION
    Wang, Jian
    Jiang, Nan
    Li, Hui
    Niu, Xinxin
    Yang, Yixian
    2009 GLOBAL MOBILE CONGRESS, 2009, : 161 - +
  • [36] In Encryption We Don't Trust: The Effect of End-To-End Encryption to the Masses on User Perception
    Dechand, Sergej
    Naiakshina, Alena
    Danilova, Anastasia
    Smith, Matthew
    2019 4TH IEEE EUROPEAN SYMPOSIUM ON SECURITY AND PRIVACY (EUROS&P), 2019, : 401 - 415
  • [37] Using End-to-end Data Encryption to Secure SIP Device Configuration
    Chen, Xudong
    Fan, Wenjun
    2013 IEEE INTERNATIONAL CONFERENCE ON GRANULAR COMPUTING (GRC), 2013, : 58 - 63
  • [38] The end of end-to-end?
    Garfinkel, S
    TECHNOLOGY REVIEW, 2003, 106 (06) : 30 - 30
  • [39] Outcome of Functional End-to-End Anastomosis Following Right Hemicolectomy
    Sameshima, Shinichi
    Koketsu, Shinichiro
    Yoneyama, Satomi
    Miyato, Hideyo
    Kaji, Toshio
    Sawada, Toshio
    INTERNATIONAL SURGERY, 2009, 94 (03) : 249 - 253
  • [40] End-to-end consensus using end-to-end channels
    Wiesmann, Matthias
    Defago, Xavier
    12TH PACIFIC RIM INTERNATIONAL SYMPOSIUM ON DEPENDABLE COMPUTING, PROCEEDINGS, 2006, : 341 - +