#1 Trending Cybersecurity News & Magazine
Thursday, September 21, 2023
No Result
View All Result
The Cyber Express
  • MagazineDownload
  • Firewall Daily
    • All
    • Dark Web News
    • Data Breach News
    • Hacking News
    • Ransomware News
    • Vulnerabilities
    Jr Trump hacked

    Donald Trump Dead, Tweets Trump Jr’s Hacked Twitter(X) Account

    Pizza Hut Australia Data Breach

    Pizza Hut Australia Data Breach: Millions of Customer Records Compromised

    American University of Antigua cyber attack

    ALPHV Ransomware Strikes American University of Antigua, Leaves Detailed Ransom Note

    TransUnion data leak

    Data Not Ours, Says TransUnion After USDoD Claimed to Leak Company Information

    ICC Cybersecurity Incident

    Is the International Criminal Court Cybersecurity Incident a Threat to Justice and Security?

    Microsoft Gaming Data Leak

    Microsoft’s 38TB Data Blunder: GitHub Leak Exposes 30,000 Internal Messages

    PeerBerry data breach

    PeerBerry Data Breach: SiegedSec Hacker Group Claims Responsibility

    Ministry of Public Works and Housing Cyber Attack

    OpIndonesia: Ministry of Public Works and Housing Faces DDoS Attack by Garnesia Team

    Araújo e Policastro Advogados Breach

    Araújo e Policastro Advogados Breach Claimed by 8BASE Ransomware Group

    Trending Tags

    • blackbyte ransomware
    • Ransomware
    • lapsus$ ransomware
    • Apple
    • Apple vulnerability
  • Essentials
    • All
    • Compliance
    • Governance
    • Policy Updates
    • Regulations
    US Cybersecurity Regulations: Tracing the Past and Predicting the Future

    US Cybersecurity Regulations: Tracing the Past and Predicting the Future

    threat landscape

    The Three Trends to Watch in the Growing Threat Landscape

    Mandatory Dark Web Monitoring for Indian Companies: SEBI Bolsters Cybersecurity Measures

    Mandatory Dark Web Monitoring for Indian Companies: SEBI Bolsters Cybersecurity Measures

    Tesla Data Leak

    Massive Tesla Data Leak Exposing Over 75000 Staff Attributed to Former Employees

    Cybersecurity Primer

    Bridging the Gap: Cybersecurity Primer to Address Woes Surrounding US Government Officials

    Executive order for cybersecurity

    White House Directs Federal Agencies to Enhance Cybersecurity Amid Exposure Concerns

    AI Cyber Challenge

    Biden-Harris Administration Introduces AI Cyber Challenge, Offering $20 Million Reward

    aws agent hijack

    New Research Exposes Advanced Cyber Threat – Attackers Hijack AWS Agent to Control Endpoints

    HUB cyber security

    Investors Sue HUB Cyber Security for Misleading Statements on Mount Rainier Merger

    • Regulations
    • Compliance
    • Governance
    • Policy Updates
  • Features
    • Cyber Warfare
    • Espionage
    • Workforce
      • Learning & Development
  • Business
    • All
    • Appointments
    • Budgets
    • Mergers & Aquisitions
    • Partnerships
    • Press Release
    • Startups
    Emerging Tech Summit

    The Emerging Tech Summit – Saudi Arabia 2023

    Business Cybersecurity

    Prioritizing Business Cybersecurity Plans During Mergers and Acquisitions

    TimeAI Summit

    TimeAI Summit is Uniting Tech Giants and Visionaries in Dubai to Shape the Future of AI

    CyberDSA 2023

    CyberDSA 2023: Forging a Resilient Digital Future Through Unprecedented Collaboration

    Summit MENA 2023

    MENA Summit 2023: Exploring the Future of Digital Identity & Authentication

    Cyble Raises 24 Million in Series B Funding

    Cyble Raises 24 Million in Series B Funding: Leveraging AI and Threat Intelligence to Revolutionize Cybersecurity

    Alarming 66% Quarterly Growth in Ransomware Attacks Notes Cyble’s Q2-2023 Ransomware Report

    Alarming 66% Quarterly Growth in Ransomware Attacks Notes Cyble’s Q2-2023 Ransomware Report

    Bureau Raises $16.5M in Series A Funding

    Bureau Raises $16.5M in Series A Funding to Drive Global Expansion and Combat Cyber Fraud

    Cyble Partner Network

    Cyble Revolutionizes Cybersecurity Collaboration With Launch of Global Partner Program ‘Cyble Partner Network’

    • Startups
    • Mergers & Aquisitions
    • Partnerships
    • Appointments
    • Budgets
    • Research
      • Whitepapers
      • Sponsored Content
      • Market Reports
    • Interviews
      • Podcast
  • EventsCyberCon
    • World CyberCon India 2023
    •  Cyber Security Webinar
    • Endorsed Events
  • ProductsTools
    • Cyble Vision
    • Cyble Hawk (LEA, Govt.)
    • Am I Breached
    • Cyble Odin (Beta)
SUBSCRIBE
  • MagazineDownload
  • Firewall Daily
    • All
    • Dark Web News
    • Data Breach News
    • Hacking News
    • Ransomware News
    • Vulnerabilities
    Jr Trump hacked

    Donald Trump Dead, Tweets Trump Jr’s Hacked Twitter(X) Account

    Pizza Hut Australia Data Breach

    Pizza Hut Australia Data Breach: Millions of Customer Records Compromised

    American University of Antigua cyber attack

    ALPHV Ransomware Strikes American University of Antigua, Leaves Detailed Ransom Note

    TransUnion data leak

    Data Not Ours, Says TransUnion After USDoD Claimed to Leak Company Information

    ICC Cybersecurity Incident

    Is the International Criminal Court Cybersecurity Incident a Threat to Justice and Security?

    Microsoft Gaming Data Leak

    Microsoft’s 38TB Data Blunder: GitHub Leak Exposes 30,000 Internal Messages

    PeerBerry data breach

    PeerBerry Data Breach: SiegedSec Hacker Group Claims Responsibility

    Ministry of Public Works and Housing Cyber Attack

    OpIndonesia: Ministry of Public Works and Housing Faces DDoS Attack by Garnesia Team

    Araújo e Policastro Advogados Breach

    Araújo e Policastro Advogados Breach Claimed by 8BASE Ransomware Group

    Trending Tags

    • blackbyte ransomware
    • Ransomware
    • lapsus$ ransomware
    • Apple
    • Apple vulnerability
  • Essentials
    • All
    • Compliance
    • Governance
    • Policy Updates
    • Regulations
    US Cybersecurity Regulations: Tracing the Past and Predicting the Future

    US Cybersecurity Regulations: Tracing the Past and Predicting the Future

    threat landscape

    The Three Trends to Watch in the Growing Threat Landscape

    Mandatory Dark Web Monitoring for Indian Companies: SEBI Bolsters Cybersecurity Measures

    Mandatory Dark Web Monitoring for Indian Companies: SEBI Bolsters Cybersecurity Measures

    Tesla Data Leak

    Massive Tesla Data Leak Exposing Over 75000 Staff Attributed to Former Employees

    Cybersecurity Primer

    Bridging the Gap: Cybersecurity Primer to Address Woes Surrounding US Government Officials

    Executive order for cybersecurity

    White House Directs Federal Agencies to Enhance Cybersecurity Amid Exposure Concerns

    AI Cyber Challenge

    Biden-Harris Administration Introduces AI Cyber Challenge, Offering $20 Million Reward

    aws agent hijack

    New Research Exposes Advanced Cyber Threat – Attackers Hijack AWS Agent to Control Endpoints

    HUB cyber security

    Investors Sue HUB Cyber Security for Misleading Statements on Mount Rainier Merger

    • Regulations
    • Compliance
    • Governance
    • Policy Updates
  • Features
    • Cyber Warfare
    • Espionage
    • Workforce
      • Learning & Development
  • Business
    • All
    • Appointments
    • Budgets
    • Mergers & Aquisitions
    • Partnerships
    • Press Release
    • Startups
    Emerging Tech Summit

    The Emerging Tech Summit – Saudi Arabia 2023

    Business Cybersecurity

    Prioritizing Business Cybersecurity Plans During Mergers and Acquisitions

    TimeAI Summit

    TimeAI Summit is Uniting Tech Giants and Visionaries in Dubai to Shape the Future of AI

    CyberDSA 2023

    CyberDSA 2023: Forging a Resilient Digital Future Through Unprecedented Collaboration

    Summit MENA 2023

    MENA Summit 2023: Exploring the Future of Digital Identity & Authentication

    Cyble Raises 24 Million in Series B Funding

    Cyble Raises 24 Million in Series B Funding: Leveraging AI and Threat Intelligence to Revolutionize Cybersecurity

    Alarming 66% Quarterly Growth in Ransomware Attacks Notes Cyble’s Q2-2023 Ransomware Report

    Alarming 66% Quarterly Growth in Ransomware Attacks Notes Cyble’s Q2-2023 Ransomware Report

    Bureau Raises $16.5M in Series A Funding

    Bureau Raises $16.5M in Series A Funding to Drive Global Expansion and Combat Cyber Fraud

    Cyble Partner Network

    Cyble Revolutionizes Cybersecurity Collaboration With Launch of Global Partner Program ‘Cyble Partner Network’

    • Startups
    • Mergers & Aquisitions
    • Partnerships
    • Appointments
    • Budgets
    • Research
      • Whitepapers
      • Sponsored Content
      • Market Reports
    • Interviews
      • Podcast
  • EventsCyberCon
    • World CyberCon India 2023
    •  Cyber Security Webinar
    • Endorsed Events
  • ProductsTools
    • Cyble Vision
    • Cyble Hawk (LEA, Govt.)
    • Am I Breached
    • Cyble Odin (Beta)
No Result
View All Result
The Cyber Express
No Result
View All Result
Home Features

What’s the Problem With Backdoor Encryption?

The problem with backdoor encryption doesn’t stop at an unlimited police surveillance state. It continues with other challenges

Editorial by Editorial
July 1, 2023
in Features, Firewall Daily
0
Backdoor Encryption
617
SHARES
3.4k
VIEWS
Share on LinkedInShare on Twitter

by Emily Newton

People will always be interested in keeping their data private. It’s a primary driver for tech companies, but solutions sometimes come with more challenges than they solve.

You might also like

Donald Trump Dead, Tweets Trump Jr’s Hacked Twitter(X) Account

Pizza Hut Australia Data Breach: Millions of Customer Records Compromised

ALPHV Ransomware Strikes American University of Antigua, Leaves Detailed Ransom Note

The primary problem with backdoor encryption has been tough to tackle in the past decade. Tech users should also know the other backdoor encryption risks to better understand the industry’s future.

The Primary Problem With Backdoor Encryption

When someone uses technology to send a message, research a topic or otherwise use the internet, they create data. The average user rate is 1.7 megabytes (MBs) per second, but that number increases with heavier tech usage.

Companies can profit from this data. They collect it to learn what consumers are interested in and what they’re buying, among other data pointing to various consumer trends. The big data industry was worth $241 billion in 2021 and it will likely have a value of $655 billion by 2029.

Standard end-to-end encryption and encryption-at-rest options may keep data safe, but the companies that own those encryption keys are under pressure. Law enforcement agencies want golden key access to devices hidden behind encryption methods.

It might help put criminals away if their data is evidence of a crime, but granting complete access to law enforcement officers would also allow them to potentially exploit users who haven’t committed crimes. Large-scale law enforcement groups like the FBI would also gain access to any data they want.

If oppressive groups got into high-ranking positions, the surveillance state could follow the path of China’s treatment of Uighur citizens.

The government used databases created with user data to track Uighurs, rank them according to the ruling party’s concerns and ultimately send them to re-education camps that are the site of crimes against humanity.

Other Backdoor Encryption Risks

The problem with backdoor encryption doesn’t stop at an unlimited police surveillance state. It continues with other challenges like people trusting it to protect their overall virtual activity.

It isn’t possible for everyone to be an expert in computer programming or cybersecurity. The average consumer may trust an encrypted device or app and believe it makes them completely safe. If the company that made that device is the only one with backdoor access, that must mean people like cyber criminals can’t get in.

There are a few issues with this idea. First, backdoor encryption methods would be public. They’d be another doorway into a secure facility that the building owner announces to the world.

Even though the owner is the only one with a key, criminals could still figure a way through. It’s why encrypted data needs backup security protection like multi-factor authentication, which requires additional identification methods beyond a password.

Backdoor encryption risks also include journalists being tracked down at their homes by parties unhappy with their coverage. State-sponsored hacking groups from places like North Korea, Turkey and Iran are already ramping up their attacks in the past year to gather information and silence journalists. American journalists have also had data stolen to stop critical news reporting on other nations.

Anyone with ill intentions could take advantage of this problem with backdoor encryption. They’d only need to break through the single layer of security or threaten the company holding the golden key to access any data they want.

There’s also the challenge of stolen intellectual property by competing companies. If there’s only one doorway into the encrypted data containing patents, confidential information, inventions and more, a company would only need to hire practiced cyber criminals to get through the weakened layer of security. They could also hold data hostage or threaten the golden key holder to gain access.

Hate groups could also take advantage of backdoor encryption. If they found an effective data breach for the singular door between threat actors and users, personal information like saved addresses, banking information and more could become weaponized against people in minority communities.

The FBI’s most recent data shows an 11.6% increase in hate crimes over 2021, which could only rise with the potential for easier digital crimes.

Alternative Security Solutions

The appeal of backdoor access is the ability to recognize threats more easily because there’s one access point. A recent study tested other threat recognition options in end-to-end encryption environments. The results were promising but not definitive.

Users gained abilities to report any suspicious activity or content. It empowered users but also left room for human error.

People won’t always recognize virtual threats, especially when they’re interacting with highly evolved cybercrime tools beyond their knowledge. It also made people more aware of how much data they created, which erased plausible deniability.

The study also created an opportunity to focus on metadata. When a system recognized file types, sizes or time stamps that looked unusual compared to typical user activity, it could flag the metadata automatically.

It’s a helpful background tool for detecting cybercrimes as they happen, but it would require companies to keep tons of sensitive metadata that become a new cause for security concerns.

Perceptual hashing and predictive matching were also part of the study. Both use digital fingerprints and data matches to recognize criminal activity and trace it to the cybercriminal doing it. However, the systems weren’t as accurate as desired when combating complex data.

Given the many backdoor encryption risks that would come with single-point access to user data, people might assume there’s one alternative security solution that could make it a good idea. The problem with backdoor encryption is that it leaves numerous avenues to access data.

Singular access could also fall into the wrong hands. Although a messaging app company CEO might pledge never to give user data over to law enforcement, a change in CEOs might put that at risk. The next corporate leadership team, politician or national law enforcement bureau might hold different digital security standards.

Understand the Problem With Backdoor Encryption

Numerous backdoor encryption risks make the topic challenging to navigate. People who might see some potential in singular data access should also learn why it concerns many cybersecurity professionals.

As it stands, the problem with backdoor encryption won’t have one alternative solution. If it were to gain widespread approval, consumers would need to enact multiple security measures to protect their privacy better.

Emily Newton is a seasoned tech and industrial writer who explores the impact of technology in different industries. She has over six years of experience providing insights on innovative technologies.

Share this:

  • Click to share on LinkedIn (Opens in new window)
  • Click to share on Reddit (Opens in new window)
  • Click to share on Twitter (Opens in new window)
  • Click to share on Facebook (Opens in new window)
  • More
  • Click to email a link to a friend (Opens in new window)
  • Click to share on WhatsApp (Opens in new window)

Related

Previous Post

FIS Global Data Breach: Cyber Attack on FIS Global Follows MOVEit Mayhem

Next Post

Does Scambaiting Actually Deter Scammers?

Editorial

Editorial

The Cyber Express is a publication that aims to provide the latest news and analysis about the information security industry. The news comes from a variety of sources and is updated regularly so that readers can stay up to date with the latest happenings in this rapidly growing field.

Related Posts

Jr Trump hacked
Firewall Daily

Donald Trump Dead, Tweets Trump Jr’s Hacked Twitter(X) Account

by Avantika Chopra
September 20, 2023
Pizza Hut Australia Data Breach
Data Breach News

Pizza Hut Australia Data Breach: Millions of Customer Records Compromised

by Ashish Khaitan
September 20, 2023
American University of Antigua cyber attack
Firewall Daily

ALPHV Ransomware Strikes American University of Antigua, Leaves Detailed Ransom Note

by Vishwa Pandagle
September 20, 2023
TransUnion data leak
Firewall Daily

Data Not Ours, Says TransUnion After USDoD Claimed to Leak Company Information

by Editorial
September 20, 2023
ICC Cybersecurity Incident
Data Breach News

Is the International Criminal Court Cybersecurity Incident a Threat to Justice and Security?

by Ishita Tripathi
September 20, 2023
Next Post
Scambaiting

Does Scambaiting Actually Deter Scammers?

Latest Issue is Out. Subscribe Now



Follow Us On Google News

Latest Cyber News

Pizza Hut Australia Data Breach
Data Breach News

Pizza Hut Australia Data Breach: Millions of Customer Records Compromised

September 20, 2023
American University of Antigua cyber attack
Firewall Daily

ALPHV Ransomware Strikes American University of Antigua, Leaves Detailed Ransom Note

September 20, 2023
TransUnion data leak
Firewall Daily

Data Not Ours, Says TransUnion After USDoD Claimed to Leak Company Information

September 20, 2023
ICC Cybersecurity Incident
Data Breach News

Is the International Criminal Court Cybersecurity Incident a Threat to Justice and Security?

September 20, 2023

Categories

Web Stories

Top 10 CISOs to Follow in 2023
Top 10 CISOs to Follow in 2023
Top 10 Ransomware Gangs in 2023
Top 10 Ransomware Gangs in 2023
Top 5 IoT Security Risks in 2023
Top 5 IoT Security Risks in 2023
Top 10 CTF Platforms in 2023
Top 10 CTF Platforms in 2023
Types of Risks Covered by Cyber Insurance
Types of Risks Covered by Cyber Insurance

About

The Cyber Express by Cyble

#1 Trending Cybersecurity News and Magazine

The Cyber Express  by Cyble is a handbook for all stakeholders of the internet that provides information security professionals with the latest news, updates and knowledge they need to combat cyber threats.

 

Contact

For editorial queries: [email protected]

For marketing and Sales: [email protected]

For Events & Conferences related information: [email protected]

 

Quick Links

  • About Us
  • Advertise With Us
  • Contact Us
  • Editorial Calendar

Our Address

We’re remote friendly, with office locations around the world:

San Francisco, Atlanta, Rome,
Dubai, Mumbai, Bangalore, Hyderabad,  Singapore, Jakarta, Sydney, and Melbourne

 

Headquarters:

The Cyber Express LLC
555 North Point Center E
Alpharetta, GA 30022, USA.

 

India Office:

Cyber Express Media Network
HD-021, 4th Floor, C Wing, Building No.4. Nesco IT Park, WE Highway, Goregaon East, Mumbai, Maharashtra, India – 4000063

Subscribe to Our Feed

RSS Feeds

Follow Us On Google News
  • Privacy Statement
  • Terms of Use
  • Write For Us

© 2023 The Cyber Express (Cybersecurity News and Magazine) | By Cyble Inc.

No Result
View All Result
  • Magazine
  • Firewall Daily
  • Essentials
    • Regulations
    • Compliance
    • Governance
    • Policy Updates
  • Features
    • Cyber Warfare
    • Espionage
    • Workforce
      • Learning & Development
  • Business
    • Startups
    • Mergers & Aquisitions
    • Partnerships
    • Appointments
    • Budgets
    • Research
      • Whitepapers
      • Sponsored Content
      • Market Reports
    • Interviews
      • Podcast
  • Events
    • World CyberCon India 2023
    •  Cyber Security Webinar
    • Endorsed Events
  • Products
    • Cyble Vision
    • Cyble Hawk (LEA, Govt.)
    • Am I Breached
    • Cyble Odin (Beta)

© 2023 The Cyber Express (Cybersecurity News and Magazine) | By Cyble Inc.

Welcome Back!

Login to your account below

Forgotten Password?

Retrieve your password

Please enter your username or email address to reset your password.

Log In

Add New Playlist

This website uses cookies. By continuing to use this website you are giving consent to cookies being used. Visit our Privacy and Cookie Policy.
Top 10 CISOs to Follow in 2023 Top 10 Ransomware Gangs in 2023 Top 5 IoT Security Risks in 2023 Top 10 CTF Platforms in 2023 Types of Risks Covered by Cyber Insurance