The Good Tech Companies - Encryption Wars: Governments Want a Backdoor, but Hackers Are Watching
Episode Date: February 28, 2025This story was originally published on HackerNoon at: https://hackernoon.com/encryption-wars-governments-want-a-backdoor-but-hackers-are-watching. Governments' demands f...or encryption backdoors pose significant cybersecurity risks. Learn about recent cases, expert warnings, and how to protect your privacy. Check more stories related to cybersecurity at: https://hackernoon.com/c/cybersecurity. You can also check exclusive content about #data-privacy, #encryption, #backdoors-and-breaches, #cybersecurity, #homomorphic-encryption, #data-protection, #investigatory-powers-act, #good-company, and more. This story was written by: @redact. Learn more about this writer by checking @redact's about page, and for more stories, please visit hackernoon.com. Governments around the world are escalating demands for encryption backdoors, claiming they are required for national security needs. Experts warn that these policies create cybersecurity risks for billions of people.
Transcript
Discussion (0)
This audio is presented by Hacker Noon, where anyone can learn anything about any technology.
Encryption wars. Governments want a backdoor, but hackers are watching.
Byredact.dev, greater than governments around the world are escalating demands for encryption
backdoors, greater than claiming they are required for national security needs.
Experts warn that greater than these policies create cyber security risks for billions of
people.
Recently, British officials secretly ordered Apple to create a backdoor into their Advanced Data Protection, ADP, service. Apple responded to this by disabling ADP in the UK,
choosing to roll back the optional protection for their UK-based customers,
to safeguard the cybersecurity of millions of Apple-ousers around the world.
The action from the UK government, enabled by their Investigatory Powers Act,
sets a dangerous precedent. If enforced, this may normalize state-mandated vulnerabilities that
hackers, hostile nations and authoritarian regimes could exploit. The encrypted messaging
app Signal is facing similar demands from some branches of Swedish government.
If enforced, Signal claims they will leave Sweden. The domino effect of backdoor demands.
Apple's decision to withdraw encrypted cloud storage in the UK rather than comply highlights the dilemma facing tech companies. Similar laws in Australia and the US, such as the Assistance
and Access Act and FISA Section 702, already empower
governments to compel decryption, potentially creating backdoor vulnerabilities. Joseph Lorenzo
Hall of the Internet Society predicts a Commonwealth effect, where one nation's backdoor
demand triggers copycat policies globally. Cybersecurity experts universally condemn
backdoors as systemic risks. As then-SA's 2006 encryption sabotage showed, intentional weaknesses inevitably leak,
enabling mass surveillance and cybercrime. The FBI and CISA now urge Americans to adopt
end-to-end encryption for protection, even as the US pressures companies for access.
There is a clear lack of unity between government agencies and departments on this issue,
not to mention other recent contentions between the FBI and Elon's newly minted Department of
Government Efficiency, DOGE. Will backdoors ruin encryption? Whether or not backdoors become
pervasive in encryption is at this point unclear, but we are clearly at a critical juncture,
with multiple spats between public and private entities occurring globally. Governments may abandon backdoor mandates and instead focus on pushing
fully homomorphic encryption, FHE, which enables data processing and analysis without decrypting
data. This may be the best-case scenario based on current technology, protecting your privacy
in an era of surveillance and uncertain encryption until fhe sees widespread adoption if that day ever comes individuals and organizations should
combine robust encryption measures whenever possible while maintaining a strict data hygiene
process data hygiene can be improved for all people and businesses by adopting a strategy
to reduce the size of your digital footprint through careful management. Old social media posts, comments, likes and private messages regularly contain sensitive
information that could be exposed in data breaches or misused by third parties.
Without a well-managed digital footprint, you are exposed to targeted scams,
hackers, and mass surveillance. This is where tools like Redact.dev offer a practical safeguard.
Redact is a toolkit that gives you the ability to clean up and automatically manage your digital
footprint across 30-plus platforms, from Twitter, Xlikes and Facebook activity, to your Slack DMs.
Get Redact, free for our most popular services,
and reduce attack surfaces for hackers and social engineering vulnerabilities.
Thank you for listening to this Hackernoon story, read by Artificial Intelligence.
Visit hackernoon.com to read, write, learn and publish.