Ahmedabad
(Head Office)Address : 506, 3rd EYE THREE (III), Opp. Induben Khakhrawala, Girish Cold Drink Cross Road, CG Road, Navrangpura, Ahmedabad, 380009.
Mobile : 8469231587 / 9586028957
Telephone : 079-40098991
E-mail: dics.upsc@gmail.com
Context: The European Union’s proposed Chat Control law, aimed at combating child sexual abuse online, has sparked intense debate among member states about privacy and potential misuse.
• The law includes provisions for mass scanning of private messages and breaking end-to-end encryption. Critics argue that scanning creates risky backdoors, compromising the security by exposing it to exploitation by malicious third parties. • Also, the scanning technology could be misused by authoritarian regimes to target dissidents.
• The revised draft limits scanning to images, videos, and URLs, excluding text and audio messages.
• Another change requires user consent for scanning, but a refusal would block multimedia sharing, making the “choice” effectively illusory.
• Encryption is the process of converting readable information into an unreadable format using specific rules. These rules, or encryption algorithms, use keys to lock and unlock the information.
• E.g. with a key “kite,” the algorithm encrypts “ice cream” into “AdNgzrrtxcpeUzzAdN7dwA==”. If a different key, like “motorcycle,” is used, the encrypted text becomes entirely different.
• The key acts like a password. A computer can decrypt the scrambled text (ciphertext) only if it has the correct key and knows the encryption rules used.
• E2E encryption refers to a method where data is encrypted from the point of origin to its final destination. This ensures that the information remains protected throughout its entire journey.
• Encryption-in-transit protects data while it’s being transmitted between your device and the server.
• E2E encryption protects data both during transmission and when it’s stored on servers, only decrypting it when the intended recipient receives the message.
• In symmetric encryption, the same key is used for both encrypting and decrypting the information.
• Asymmetric encryption uses different keys for encryption and decryption, offering additional security
Address : 506, 3rd EYE THREE (III), Opp. Induben Khakhrawala, Girish Cold Drink Cross Road, CG Road, Navrangpura, Ahmedabad, 380009.
Mobile : 8469231587 / 9586028957
Telephone : 079-40098991
E-mail: dics.upsc@gmail.com
Address: A-306, The Landmark, Urjanagar-1, Opp. Spicy Street, Kudasan – Por Road, Kudasan, Gandhinagar – 382421
Mobile : 9723832444 / 9723932444
E-mail: dics.gnagar@gmail.com
Address: 2nd Floor, 9 Shivali Society, L&T Circle, opp. Ratri Bazar, Karelibaugh, Vadodara, 390018
Mobile : 9725692037 / 9725692054
E-mail: dics.vadodara@gmail.com
Address: 403, Raj Victoria, Opp. Pal Walkway, Near Galaxy Circle, Pal, Surat-394510
Mobile : 8401031583 / 8401031587
E-mail: dics.surat@gmail.com
Address: 57/17, 2nd Floor, Old Rajinder Nagar Market, Bada Bazaar Marg, Delhi-60
Mobile : 9104830862 / 9104830865
E-mail: dics.newdelhi@gmail.com