The government reads your text messages? The European Union discusses child safety measures, and facing widespread opposition to combating chat 2.0 – NaturalNews.com
The government reads your text messages? The European Union discusses the child safety measures, and faces widespread opposition to combating chat 2.0
- Technical feasibility and security risks: the proposed detection systems are “non -technical” and will provide large security weaknesses, which makes users vulnerable to exploitation by harmful actors and hostile governments. Positive and high negative rates make them not suitable for widespread detection campaigns.
- The requirements of the scanning on the device undermining the protection that the encryption is designed from the end to the end to ensure it. This approach provides a single failure point and gives the external parties to the data that aims to survive.
- The vast language and mystery of the organization creates a great risk of misunderstanding, which may lead to the costly litigation and excessive classification. Technology can be used to monitor other types of content, which leads to great erosion of online privacy and freedom of expression.
- Many member states, including Austria, the Netherlands and Poland, have expressed strong opposition to the proposal. Germany can play a decisive role in preventing the proposal. The European Parliament is expected to continue to pressure for a more balanced and privacy friend.
- The debate about the Chat Control 2.0 list highlights the need for an accurate and based approach to evidence and balances the protection of vulnerable children while preserving individual freedoms and digital security.
On the eve of the critical European Council meeting on September 12, A coalition of more than 500 Cyber security and encryption experts and computer scientists from 34 countries issued a blatant warning against the proposed list for chatting in the European Union 2.0. The list, which aims to combat sexual assault materials (CSAM), has sparked severe debate and criticism of privacy advocates, technology experts and many member states of the European Union.
The proposed law Explain that messaging applications, email platforms, cloud services, and even service providers for encrypted communications from one to tip, check all the user content, including text, photos and videosFor suspicious materials. Critics argue that this comprehensive monitoring undermines privacy, security and civil freedoms, while only a few to combat the issue that aims to address effectively.
Technical feasibility and security risks
Open message, It is signed by senior experts from institutions such as Ku Leuven, Eth Zurich, Johns Hopkins, and Max Planck Institute for Security and Privacy, provided that the proposed detection systems are “technically unable.” Scientists argue that widespread survey would provide large security weaknesses, making users vulnerable to exploitation by malicious actors and hostile governments.
“Current research confirms that modern detection devices will lead to positive negative prices and unacceptable error, which makes them inappropriate for large -scale detection campaigns on a scale hundreds of millions of users.” This means that ordinary users can be a mark on unjustified investigations, while those intent on spreading harmful content can easily avoid detection using simple technical solutions.
Undering encryption from one side to end, privacy
A major point of dispute is the condition of the list for scanning on the device, which includes Verify the content on user devices before encryption. The researchers assert that this practice undermines the protection that the encryption is designed from one end to the end to ensure it.
“The survey by the customer, regardless of its technical implementation, undermines the protection that the encryption is designed from one side to ensure it,” the message is noticed. This approach provides a single failure point and gives the external parties to the data that aims to survive. Signal, a famous encrypted correspondent application, already said that it will withdraw its service from the European Union if the list requires a mandatory scan on the devices.
Legal and ethical effects: function and excessive crawl
Critics also warn of the possibility of “crawling function”, as the same technology used to detect CSAM can be applied later to monitor other types of content, such as political messages, violating copyright, or even opposition. This can lead to excessive classification and significant erosion of online privacy and freedom of expression.
“The proposal opens the door Unprecedented capabilities to monitorAnd control and control, “Experts.
Various positions between the European Union member states
While the European Commission’s proposal has received support from countries such as France, Spain and Italy, many member states, including Austria, the Netherlands and Poland, have expressed strong opposition. Germany, a main player in the European Union, can play a decisive role in the result. Voting against or abstaining from Berlin will be sufficient to prevent the proposal by helping to form the required minority from member states that represent at least 35 percent of the European Union population.
It is expected that the European Parliament, which has already voted to reduce survey and protect encryption, will continue to press for a more balanced and friendly approach. The text of the settlement must be negotiated in the “3D” between Parliament and the Council before the list enters into force.
An accurate balance between safety and privacy
While the European Union is struggling with the complex issue of the safety of the child online, the discussion on the Chat Control 2.0 list is a precise balance between protecting vulnerable children and maintaining individual freedoms. The wide -ranging opposition from experts and member states emphasizes the need for a more accurate evidence based on evidence. In the end, the success of any list depends on its ability to achieve meaningful protection without prejudice Digital security and privacy From all citizens of the European Union.
Sources of this article include:
(Tagstotranslate) Great Government (T) Big Technology (T) Control (T) Child Safety (T) Cyber Security (T) Cyberwar (T) Glitch (T) Privacy Hour














Post Comment