A European right to end-to-end encryption?

被引:0
|
作者
Shurson, Jessica [1 ]
机构
[1] Univ Sussex, Law, Freeman Bldg, Brighton BN19QE, England
关键词
D O I
10.1016/j.clsr.2024.106063
中图分类号
D9 [法律]; DF [法律];
学科分类号
0301 ;
摘要
In Podchasov v Russia, , the European Court of Human Rights unanimously held that a Russian statutory obligation on 'internet communications organisers' to provide information to state authorities that allowed for the decryption of encrypted communications was a disproportionate interference with Article 8 because the available technical means of decryption risked weakening the security of communications for all users of the service. This is significant as authorities in the UK and EU may seek to implement similar statutory obligations on communications service providers.
引用
收藏
页数:6
相关论文
共 50 条
  • [41] SoK: An Analysis of End-to-End Encryption and Authentication Ceremonies in Secure Messaging Systems
    Alatawi, Mashari
    Saxena, Nitesh
    PROCEEDINGS OF THE 16TH ACM CONFERENCE ON SECURITY AND PRIVACY IN WIRELESS AND MOBILE NETWORKS, WISEC 2023, 2023, : 187 - 201
  • [42] End-to-End Encryption for GSM Cellular Standard Using CL-PKC
    Ramadan, Mohammed
    Li, Fa-Gen
    Xu, Chun-Xiang
    Wahaballa, Abubaker
    INTERNATIONAL CONFERENCE ON COMPUTER NETWORKS AND INFORMATION SECURITY (CNIS 2015), 2015, : 270 - 278
  • [43] SQAMPS: Secure Quorum Architecture for Mobile Presence Services with End-to-End Encryption
    Madankar, Dipti
    Deshmukh, Aaradhana
    Maheshkar, Vaishali
    Mihovska, Albena
    PROCEEDING OF THE THIRD INTERNATIONAL SYMPOSIUM ON WOMEN IN COMPUTING AND INFORMATICS (WCI-2015), 2015, : 608 - 613
  • [44] EEE-GSM: End-to-End Encryption Scheme over GSM System
    Ramadan, Mohammed
    Du, Guohong
    Li, Fagen
    Xu, Chun Xiang
    INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS, 2016, 10 (06): : 229 - 239
  • [45] Secret Key Recovery in a Global-Scale End-to-End Encryption System
    Connell, Graeme
    Fang, Vivian
    Schmidt, Rolfe
    Dauterman, Emma
    Popa, Raluca Ada
    PROCEEDINGS OF THE 18TH USENIX SYMPOSIUM ON OPERATING SYSTEMS DESIGN AND IMPLEMENTATION, OSDI 2024, 2024, : 703 - 719
  • [46] Improving Non-Experts' Understanding of End-to-End Encryption: An Exploratory Study
    Bai, Wei
    Pearson, Michael
    Kelley, Patrick Gage
    Mazurek, Michelle L.
    2020 IEEE EUROPEAN SYMPOSIUM ON SECURITY AND PRIVACY WORKSHOPS (EUROS&PW 2020), 2020, : 210 - 219
  • [47] Chaos Based Joint Compression and Encryption Framework for End-to-End Communication Systems
    Goel, Nidhi
    Raman, Balasubramanian
    Gupta, Indra
    ADVANCES IN MULTIMEDIA, 2014, 2014 (2014)
  • [48] Evaluating In-Workflow Messages for Improving Mental Models of End-to-End Encryption
    Akgul, Omer
    Bai, Wei
    Das, Shruti
    Mazurek, Michelle L.
    PROCEEDINGS OF THE 30TH USENIX SECURITY SYMPOSIUM, 2021, : 447 - 464
  • [49] JEDI: Many-to-Many End-to-End Encryption and Key Delegation for IoT
    Kumar, Sam
    Hu, Yuncong
    Andersen, Michael P.
    Popa, Raluca Ada
    Culler, David E.
    PROCEEDINGS OF THE 28TH USENIX SECURITY SYMPOSIUM, 2019, : 1519 - 1536
  • [50] Jettisoning Junk Messaging in the Era of End-to-End Encryption: A Case Study of WhatsApp
    Agarwal, Pushkal
    Raman, Aravindh
    Ibosiola, Damiola
    Sastry, Nishanth
    Tyson, Gareth
    Garimella, Kiran
    PROCEEDINGS OF THE ACM WEB CONFERENCE 2022 (WWW'22), 2022, : 2582 - 2591