{"id":221016,"date":"2025-02-25T18:45:25","date_gmt":"2025-02-25T18:45:25","guid":{"rendered":"https:\/\/globetimeline.com\/ar\/tech\/rewrite-this-title-in-arabic-encryption-back-doors-are-a-bad-idea\/"},"modified":"2025-02-25T18:45:25","modified_gmt":"2025-02-25T18:45:25","slug":"rewrite-this-title-in-arabic-encryption-back-doors-are-a-bad-idea","status":"publish","type":"post","link":"https:\/\/globetimeline.com\/ar\/tech\/rewrite-this-title-in-arabic-encryption-back-doors-are-a-bad-idea\/","title":{"rendered":"rewrite this title in Arabic Encryption \u2018back doors\u2019 are a bad idea"},"content":{"rendered":"<p>Summarize this content to 2000 words in 6 paragraphs in Arabic Unlock the Editor\u2019s Digest for freeRoula Khalaf, Editor of the FT, selects her favourite stories in this weekly newsletter.How much authority should democratic governments have to \u201csnoop\u201d on citizens\u2019 online data and communications? The UK government has used new legal powers to demand that Apple create a \u201cback door\u201d enabling law enforcement bodies to access users\u2019 encrypted data uploaded to the cloud. Apple has responded instead by withdrawing from Britain its most secure cloud storage service \u2014 which uses end-to-end encryption that Apple says means even it cannot access the data.Britain is not alone. Sweden\u2019s government wants encrypted messaging apps such as Signal and WhatsApp to open a similar back door. Signal is threatening to leave Sweden if this becomes law. The cases amount to the biggest confrontation yet between western governments\u2019 understandable desire to police crimes such as terrorism and child sex abuse online, and the gold-standard encryption now widely used to protect user privacy in messaging apps and the cloud.Both cases echo the battle when the FBI tried to compel Apple to help it break into an iPhone used by a terrorist in a California shooting in 2015. Apple said if it created an iPhone back door for the FBI, malicious actors might discover it and use it to crack other phones. A hacking firm eventually unlocked the phone for the FBI, ending the stand-off.The British and Swedish demands are much wider. Using its Investigatory Powers Act \u2014 which critics have dubbed a \u201cSnoopers\u2019 Charter\u201d \u2014 the UK Home Office has issued a notice requiring Apple to allow British law enforcement, armed with a court order, to tap encrypted back-ups and other cloud data, anywhere in the world. But the underlying dilemma is the same. When millions of people are sending or storing online sensitive data on, say, their finances or health, data protection is paramount. End-to-end encryption, where only the user and not the service provider holds the key, is the best safeguard.Most cyber security experts argue government bodies cannot be given access without creating a vulnerability that hackers, including authoritarian states, could abuse. Something like this has already happened. In an attack called \u201cSalt Typhoon\u201d, Chinese hackers last year exploited a US government-mandated back door in US telecoms networks to access call and text data and even phone calls of top politicians.In the UK, some 239 civil society groups, companies and cyber security experts have called on the government to rescind its demand to Apple, saying it \u201cjeopardises the security and privacy of millions\u201d. Using similar arguments, bipartisan members of two US congressional oversight committees have asked Tulsi Gabbard, the new national intelligence director, to demand that the UK retracts its order \u2014 and to consider limiting US-UK intelligence sharing if it does not.This is without doubt a thorny issue. No one wishes terrorists and child abusers to be able to evade detection. Some UK security officials have insisted privacy protections can coexist with \u201cexceptional lawful access\u201d, and argued that tech companies could find a clever workaround. Tech experts counter that no foolproof compromise yet exists.But almost all big tech companies rightly co-operate with legitimate law enforcement requests that do not involve \u201cback doors\u201d on a routine basis; Apple\u2019s latest UK transparency report shows it complied with 93 per cent of emergency requests. If a solution is developed enabling this to happen safely with end-to-end encryption, co-operation should extend into this area too. For now, though, governments should treat this kind of protection as a common good. Efforts to police the criminal minority should not undermine the safety and privacy of the law-abiding majority. <\/p>\n","protected":false},"excerpt":{"rendered":"<p>Summarize this content to 2000 words in 6 paragraphs in Arabic Unlock the Editor\u2019s Digest for freeRoula Khalaf, Editor of the FT, selects her favourite stories in this weekly newsletter.How much authority should democratic governments have to \u201csnoop\u201d on citizens\u2019 online data and communications? The UK government has used new legal powers to demand that<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[63],"tags":[],"class_list":{"0":"post-221016","1":"post","2":"type-post","3":"status-publish","4":"format-standard","6":"category-tech"},"_links":{"self":[{"href":"https:\/\/globetimeline.com\/ar\/wp-json\/wp\/v2\/posts\/221016","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/globetimeline.com\/ar\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/globetimeline.com\/ar\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/globetimeline.com\/ar\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/globetimeline.com\/ar\/wp-json\/wp\/v2\/comments?post=221016"}],"version-history":[{"count":0,"href":"https:\/\/globetimeline.com\/ar\/wp-json\/wp\/v2\/posts\/221016\/revisions"}],"wp:attachment":[{"href":"https:\/\/globetimeline.com\/ar\/wp-json\/wp\/v2\/media?parent=221016"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/globetimeline.com\/ar\/wp-json\/wp\/v2\/categories?post=221016"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/globetimeline.com\/ar\/wp-json\/wp\/v2\/tags?post=221016"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}