Five Eyes wants Backdoors to all technology Products and Services

Five Eyes Security Alliance that has been formed through intelligence alliance of nations such as Australia, Canada, New Zealand, USA and UK along with the support from Japan and India have called on technology companies to design their products and services in such a way that the governments can access content by breaking the encryption.

The Treaty meant for joint cooperation in fighting cyber-warfare has released a press statement yesterday on this note and has urged big tech companies like Microsoft, Amazon, Facebook, Twitter and Google to take an interest in the matter on a serious note.

As the law enforcement has the responsibility to secure and protect citizens, strong encryption based services are hindering the concept of investigation and prosecution of crime to the core.

Although Five Eyes is not against companies safeguarding and protecting personal data, privacy and trade secrets of users, we are asking them to just take the responsibility to help us protect the public by allowing us to lawfully access the content otherwise meant for private communication.

Five Eyes, in the July 2019, pronounced a similar statement that asked companies to include mechanisms such as backdoors into their encrypted products and services which allow government authorities to access data lawfully.

Although, Microsoft and Google then said that they will support the cause for certain extent, Apple Inc, which is currently busy unveiling its iPhone 12 said that it cannot put its user privacy into risks by abiding by these laws.

On October 8th,2019 Council of EU tagged the new formulations as super-necessary to curb child se$u@l abuse.

Now, on October 11th,2020 the Five Eyes reinstated the orders and stressed on the fact that it was necessary to enable governments to act against illegally distributed content without reducing the matter of safety at the behest.

Naveen Goud
Naveen Goud is a writer at Cybersecurity Insiders covering topics such as Mergers & Acquisitions, Startups, Cyber Attacks, Cloud Security and Mobile Security

No posts to display