“Traceability based on the message that you have is possible through metadata analysis, but traceability on the basis of searching the content of the messages is not possible,” a speaker said during MediaNama's discussion on encryption. The bigger problem is that the technological capability of law enforcement is limited. All speakers concurred that the problem of end-to-end encryption in counter-terrorism operations was not a technological issue, but a policy and legal issue that needs to be solved. The issue was being discussed as part of a workshop, held by MediaNama, with support from Internet Society (Asia Pacific Office), on challenges to encryption in India. Note that the discussion was held under the Chatham House Rule and thus quotes have not been attributed. Challenges to encryption 1. End-to-end encryption is the issue A speaker explained that when it comes to encrypted communications, there are largely two models: Blackberry model (the escrow model): Decryption keys are held at the centre in an escrow. Gaining access to such keys is technically feasible; it is only a matter of establishing procedure in terms of when to give access, in what situations, what level of access, etc., the speaker explained but another speaker pointed out that there is a massive trust deficit in this model. The NSO-Pegasus incident exacerbated the deficit. Dr V. Kamakoti's affidavit in the Madras High Court proposed this as one of the two models. WhatsApp model: The end-to-end encryption poses a bigger challenge because we can either have it or now.…
- Here are some specs of the time servers the Indian government wants companies to sync their clocks to: RTI December 6, 2022
- RBI Disallows Securitising Loans With Less Than 365-Days Residual Maturity December 6, 2022
- Indian govt may hold social media firms accountable for algorithms under ‘Digital India Act’ December 6, 2022
- Event Announcement: Reworking The Data Protection Bill, Bangalore, 14th Dec #Ad December 6, 2022
- DPDP Bill 2022: A Balance of opportunities and data protection objectives December 6, 2022
MediaNama’s mission is to help build a digital ecosystem which is open, fair, global and competitive.
New bill narrows focus over predecessors that went heavy on data sovereignty, localisation and compliance. What explains this change?
The Structure and Style of a Dogma Community: Conspiracy theories and organized Twitter engagement on Sushant Singh Rajput
Studying the 'community' supporting the late Sushant Singh Rajput (SSR) shows how Twitter was gamed through organized engagement
Do we have an enabling system for the National Data Governance Framework Policy (NDGFP) aiming to create a repository of non-personal data?
A viewpoint on why the regulation of cryptocurrencies and crypto exchnages under 2019's E-Commerce Rules puts it in a 'grey area'
India's IT Rules mandate a GAC to address user 'grievances' , but is re-instatement of content removed by a platform a power it should...
Please subscribe to MediaNama. Don't share prints and PDFs.
You May Also Like
Google has released a Google Travel Trends Report which states that branded budget hotel search queries grew 179% year over year (YOY) in India, in...
135 job openings in over 60 companies are listed at our free Digital and Mobile Job Board: If you’re looking for a job, or...
Twitter takes down tweets from MP, MLA, editor criticising handling of pandemic upon government request
By Aroon Deep and Aditya Chunduru You’re reading it here first: Twitter has complied with government requests to censor 52 tweets that mostly criticised...