I recently gave a long presentation on the topic of lawful access to encrypted data, first during the CSIRTs Network meeting, then at a local security meetup.
I don't want to share the slides, as they heavily depend on the voice track. In order to make the content accessible, I converted it into two posts on the cert.at website:
* Why is this so hard? https://www.cert.at/en/blog/2026/2/lawful-access-to-encrypted-data-why-is-this-so-hard-to-do
* General considerations https://www.cert.at/en/blog/2026/2/lawful-access-to-encrypted-data-general-considerations
Feedback is welcome.