System Integrity
Preemptive Monitoring in End-to-end Encrypted Services
Technical measures to screen messages in end-to-end encrypted systems introduce systemic risk for both service providers and users.
Investigatory Powers (Amendment) Bill: Written Evidence
Joint Briefing on the Investigatory Powers (Amendment) Bill
Input to the Draft Industry Standards for Designated Internet Services and Relevant Electronic Services
Techxit: The UK Declares Its Exit from the High-Tech Startup World
No one in their right mind would now want to start up a high-tech company in the UK. With...
A Joint Call to World Leaders for a Secure and Trusted Digital Economy
Security Through Encryption and Despite Encryption: An (un)Achievable Outcome?
On 16 June 2021 we organised a roundtable to explore in greater detail how to apply the European Council’s...
The Economic Impact of Laws that Weaken Encryption
Editor’s note: The full report and the extracted executive summary are available in pdf format in English, French, Spanish,...
How Do Surveillance Laws Impact the Economy?
In 2018 the Australian parliament passed the “TOLA” Act, expanding the government's powers to bypass digital data protections, and...
How Strong Encryption Can Protect Survivors of Domestic Violence
For many of us in quarantine, our only privacy often comes in the form of digital communications. While we’re...
International Community Joins Indian Policy and Cybersecurity Experts in Warning about the Dangers of Traceability
A growing group of international and local cybersecurity and policy experts are weighing in on proposed changes to Indian...
Losing the Right to Encryption Means Losing Business
Every time a government passes a law that affects the Internet, tech companies must ask themselves a critical question:...