In an open letter published Thursday, a group of more than 270 akademikësh and researchers leading up to sound the alarm, upon the proposal of the European Union on the fight, and the content of the sexual abuse of children on the internet (CSAM). While the purpose of the protection of children is commendable, we argue that the requirements of the technical proposal are unrealistic, and they represent a recipe for the supervision of large, that it would hurt enkriptimin the end, in the end, and it will be gërryejë of the rights to the digital.
“The protection given by the encryption of the part at the end means that no one other than the recipient of the communication does not need to be in a position to obtain information about the content of the communication”, says the paper. “The provision of skills and intelligence, as well as to the data's encrypted, and the data before the kodohen, violating the definition of privacy provided by the encryption end-to-end.”
The proposal of the european union, the threat to privacy
The controversy dates back to the year of 2020, when the European Commission proposed for the first time, the rules for the analysis of the content of child pornography on the internet. The rules shall require that the platforms of the message to apply the technology to detect the CSAM to the new, the unknown, and to identify and conduct of any care, goals, experts say that they have been technologically impossible, without compromising the enkriptimin, and the use of surveillance, mass.
Last year, the members of the European Parliament and tried to frenonin legislation by enacting amendments to eliminuan the mandate of the intelligence services, excluded services are encrypted from end to end, and the limited scanning in cases where the abuse is already suspected. However, the representatives of the member states of the EU, they have not adopted the stance of the uk, and the proposed amendments to the conclusion of the office of the President, the current belgian includes a number of features to be sensitive, legally and technically.
The risks to your privacy and security on the internet
“Taking into consideration that the users of WhatsApp to send 140 billion messages per day, even if it's just one of a hundred text messages will be testoheshin of these detectors, there would be 1.4 million to a positive and false every time,” they write in them. “In order to reduce the number of pozitivëve false statements to a few hundred, at least five, a review should be to identify the statistically by the use of the images or the detectors have different statistically independent.”
The experts have put in the question mark is also proposed to be classified services with a “high-risk” for the analysis of priority, or to check the security of the technologies for the detection, by arguing that such actions are ultimately meaningless, by taking into account the shortcomings of the technical and adopting the almost universal characteristics according to the messages, as well as the separation of the text and the image.
According to the experts, the final result will be the minimi, the complete security, communications, and systems are in pursuit of a solution for the invasive, legally-dubious, and perhaps rendered ineffective against the MSC, which creates the ability to be unprecedented for the supervision and control of a user of the website.
The supervisor of the European Data Protection or other digital rights and are reported also for the proposal as well as a surge of joproporcional of privacy, which can be normalizojë the supervision of inappropriate communications over the internet.
The balance has between security and rights in the digital
Policy-makers in the EU are confronted with the pressure of the strong competitiveness of the parties concerned, as they try to balance the fight against the exploitation of children on the internet, the protection of human rights and the security of the digital.
However, security experts, there is no gray area: an analysis of the client's codified in the law, it is neither realistic nor desirable, and the encryption is strong by side on the edge without a door to the rear, remains the best way to preserve the safety and security of digital, as it allows the authorities to the application of the law to account for the presence of the CSAM, when it is revealed.
Discussion about this post