New blogpost regarding EU policy initiatives concerning lawful interception:
https://www.cert.at/en/blog/2025/7/encryption-vs-lawful-interception-eu-policy-news
New blogpost regarding EU policy initiatives concerning lawful interception:
https://www.cert.at/en/blog/2025/7/encryption-vs-lawful-interception-eu-policy-news
⚠️ WATCH OUT! European Commission's questionnaire for public consultation on #DataRetention has some really tricky and misguiding questions! ⚠️
But don't worry - we'll be publishing an answering guide in early August to help you understand the questions and avoid the traps. Well in time for the September 12 deadline! 😌
Stay tuned for the guide! 🗺️
It is ridiculously hot in Europe, unbearably so, and yet we are building systems which are needlessly complex and power-hungry.
Something is very wrong with us.
At least 66 children dead of malnutrition in Gaza as Israel tightens siege
https://www.aljazeera.com/news/2025/6/29/at-least-66-children-dead-of-malnutrition-in-gaza-as-israel-tightens-siege?utm_source=flipboard&utm_medium=activitypub
Posted into Middle East News @middle-east-news-AlJazeera
The European Commission is putting together an "Expert Group for a Technology Roadmap on Encryption": https://ec.europa.eu/transparency/expert-groups-register/screen/expert-groups/consult?lang=en&groupID=4005
The group will include 12 members plus one member of ENISA (Cybersecurity Agency), EUROPOL (Police) and EDPS (Data protection Supervisor).
"The group shall be co-chaired by a representative of DG CNECT and a representative of DG HOME"
Applications are open until September 1st.
Report from Unwanted Witness.
‘Surveillance/Spyware: An Impediment to Civil Society, HRDs and Journalists in East
& Southern Africa’
https://www.unwantedwitness.org/wp-content/uploads/2025/06/Report-06.06.2025-FINAL.pdf
European Commission- Call for applications - Expert Group for a Technology Roadmap on Encryption (E04005) ACTIVE - deadline 1 September 2025.
#dataretention #lawfulinterception #digitalforensics #encryption
"The selection shall prioritise experts with technical profiles, coming from either public or private sector, whilst aiming to ensure proportional representation across the following fields of expertise: • Home affairs, ideally with an experience in fighting high-tech crime, and/or a background in the area of decryption and artifact extraction, computer forensics, network forensics, smartphone forensics, cloud forensics, IoT forensics, memory forensics and/or lawful interception; • Cybersecurity. with diverse backgrounds including but not limited to vulnerability management, evaluation of cybersecurity risks and certification and encryption (including quantum and post-quantum cryptography); • Telecommunication, including with experience in computer networks/Internet, 5G/6G, IoT, VoIP, Satellite, Quantum communication and/or encrypted communication applications; • Big data analysis, including with expertise in AI technologies; • Standardisation, notably in relation with cybersecurity and/or telecommunication technologies, including protocol networks, exchanges of digital data, and lawful interception; • Justice and fundamental rights, including experience in data protection and privacy, as well as experience in criminal justice, such as cyber-enabled and/or cyber-dependent crimes"