EU’s Chat Control Law

EU’s Chat Control Law


Context: The European Union’s proposed Chat Control law, aimed at combating child sexual abuse online, has sparked intense debate among member states about privacy and potential misuse.


• The law includes provisions for mass scanning of private messages and breaking end-to-end encryption. Critics argue that scanning creates risky backdoors, compromising the security by exposing it to exploitation by malicious third parties.                                                                                           • Also, the scanning technology could be misused by authoritarian regimes to target dissidents.
• The revised draft limits scanning to images, videos, and URLs, excluding text and audio messages.
• Another change requires user consent for scanning, but a refusal would block multimedia sharing, making the “choice” effectively illusory.


What is Encryption?


• Encryption is the process of converting readable information into an unreadable format using specific rules. These rules, or encryption algorithms, use keys to lock and unlock the information.
• E.g. with a key “kite,” the algorithm encrypts “ice cream” into “AdNgzrrtxcpeUzzAdN7dwA==”. If a different key, like “motorcycle,” is used, the encrypted text becomes entirely different.
• The key acts like a password. A computer can decrypt the scrambled text (ciphertext) only if it has the correct key and knows the encryption rules used.


End-to-End (E2E) Encryption


• E2E encryption refers to a method where data is encrypted from the point of origin to its final destination. This ensures that the information remains protected throughout its entire journey.
• Encryption-in-transit protects data while it’s being transmitted between your device and the server.
• E2E encryption protects data both during transmission and when it’s stored on servers, only decrypting it when the intended recipient receives the message.
• In symmetric encryption, the same key is used for both encrypting and decrypting the information.
• Asymmetric encryption uses different keys for encryption and decryption, offering additional security

DICS Branches

Our Branches

DICS Ahmedabad

Ahmedabad

(Head Office)

Address : 506, 3rd EYE THREE (III), Opp. Induben Khakhrawala, Girish Cold Drink Cross Road, CG Road, Navrangpura, Ahmedabad, 380009.


Mobile : 8469231587 / 9586028957

Telephone : 079-40098991

E-mail: dics.upsc@gmail.com

Gandhinagar

Address: A-306, The Landmark, Urjanagar-1, Opp. Spicy Street, Kudasan – Por Road, Kudasan, Gandhinagar – 382421


Mobile : 9723832444 / 9723932444

E-mail: dics.gnagar@gmail.com

DICS Vadodara

Vadodara

Address: 2nd Floor, 9 Shivali Society, L&T Circle, opp. Ratri Bazar, Karelibaugh, Vadodara, 390018


Mobile : 9725692037 / 9725692054

E-mail: dics.vadodara@gmail.com

DICS Surat

Surat

Address: 403, Raj Victoria, Opp. Pal Walkway, Near Galaxy Circle, Pal, Surat-394510


Mobile : 8401031583 / 8401031587

E-mail: dics.surat@gmail.com

DICS New Delhi

New Delhi(In Association with Edge IAS)

Address: 57/17, 2nd Floor, Old Rajinder Nagar Market, Bada Bazaar Marg, Delhi-60


Mobile : 9104830862 / 9104830865

E-mail: dics.newdelhi@gmail.com