{"id":2429,"date":"2025-03-20T20:21:44","date_gmt":"2025-03-20T20:21:44","guid":{"rendered":"https:\/\/cybersecurityinfocus.com\/?p=2429"},"modified":"2025-03-20T20:21:44","modified_gmt":"2025-03-20T20:21:44","slug":"signal-threatens-to-leave-france-if-encryption-backdoor-required","status":"publish","type":"post","link":"https:\/\/cybersecurityinfocus.com\/?p=2429","title":{"rendered":"Signal threatens to leave France if encryption backdoor required"},"content":{"rendered":"<div>\n<div class=\"grid grid--cols-10@md grid--cols-8@lg article-column\">\n<div class=\"col-12 col-10@md col-6@lg col-start-3@lg\">\n<div class=\"article-column__content\">\n<div class=\"container\"><\/div>\n<p>Signal is standing its ground to protect its app\u2019s security, threatening on Wednesday to leave France if encryption backdoor requirements are enacted, just as it said it would do in Sweden.<\/p>\n<p>\u201cThose hyping this bad law have rushed to assure French politicians that the proposal isn\u2019t breaking encryption. Their arguments are as tedious as they are stale, as they are laughable. For those catching up, let\u2019s review the basics: end to end encryption must only have two ends\u2014sender and recipients. Otherwise, it is backdoored,\u201d wrote Signal CEO Meredith Whittaker <a href=\"https:\/\/x.com\/mer__edith\/status\/1902383162065400296\">in a post on X<\/a>. <\/p>\n<p>\u201cWhatever method is devised to add a third end\u2014from a perverted PRNG in a cryptographic protocol, to vendor-provided government software grafted onto the side of secure communications that allow said government to add themselves to your chats\u2014it rips a hole in the hull of private communications and is a backdoor.\u201d<\/p>\n\n<\/div>\n<\/div>\n<\/div>\n<\/div>","protected":false},"excerpt":{"rendered":"<p>Signal is standing its ground to protect its app\u2019s security, threatening on Wednesday to leave France if encryption backdoor requirements are enacted, just as it said it would do in Sweden. \u201cThose hyping this bad law have rushed to assure French politicians that the proposal isn\u2019t breaking encryption. Their arguments are as tedious as they [&hellip;]<\/p>\n","protected":false},"author":0,"featured_media":2430,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[3],"tags":[],"class_list":["post-2429","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-education"],"_links":{"self":[{"href":"https:\/\/cybersecurityinfocus.com\/index.php?rest_route=\/wp\/v2\/posts\/2429"}],"collection":[{"href":"https:\/\/cybersecurityinfocus.com\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/cybersecurityinfocus.com\/index.php?rest_route=\/wp\/v2\/types\/post"}],"replies":[{"embeddable":true,"href":"https:\/\/cybersecurityinfocus.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=2429"}],"version-history":[{"count":0,"href":"https:\/\/cybersecurityinfocus.com\/index.php?rest_route=\/wp\/v2\/posts\/2429\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/cybersecurityinfocus.com\/index.php?rest_route=\/wp\/v2\/media\/2430"}],"wp:attachment":[{"href":"https:\/\/cybersecurityinfocus.com\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=2429"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/cybersecurityinfocus.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=2429"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/cybersecurityinfocus.com\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=2429"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}