{"id":37609,"date":"2020-10-11T23:51:09","date_gmt":"2020-10-11T23:51:09","guid":{"rendered":"https:\/\/www.threatshub.org\/blog\/five-eyes-nations-plus-japan-and-india-call-for-big-tech-to-bake-backdoors-into-everything\/"},"modified":"2020-10-11T23:51:09","modified_gmt":"2020-10-11T23:51:09","slug":"five-eyes-nations-plus-japan-and-india-call-for-big-tech-to-bake-backdoors-into-everything","status":"publish","type":"post","link":"https:\/\/www.threatshub.org\/blog\/five-eyes-nations-plus-japan-and-india-call-for-big-tech-to-bake-backdoors-into-everything\/","title":{"rendered":"Five Eyes nations plus Japan and India call for Big Tech to bake backdoors into everything"},"content":{"rendered":"<p>The nations of the Five Eyes security alliance \u2013 Australia, Canada, New Zealand, the USA and the UK \u2013 plus Japan and India, have called on technology companies to design their products so they offer access to encrypted messages and content.<\/p>\n<p>A <a href=\"https:\/\/www.justice.gov\/opa\/pr\/international-statement-end-end-encryption-and-public-safety\">joint \u201cInternational Statement\u201d<\/a> issued on Sunday frames the issue as a matter of public safety.<\/p>\n<p>\u201cWe, the undersigned, support strong encryption, which plays a crucial role in protecting personal data, privacy, intellectual property, trade secrets and cyber security,\u201d the Statement commences, adding: \u201cEncryption is an existential anchor of trust in the digital world and we do not support counter-productive and dangerous approaches that would materially weaken or limit security systems.\u201d<\/p>\n<blockquote class=\"pullquote\" readability=\"7\">\n<p>Embed the safety of the public in system designs, thereby enabling companies to act against illegal content and activity effectively with no reduction to safety<\/p>\n<\/blockquote>\n<p>But the Statement also says: \u201cParticular implementations of encryption technology \u2026 pose significant challenges to public safety, including to highly vulnerable members of our societies like sexually exploited children.\u201d The document then quotes statistics about the extent of child exploitation activity online and asserts that if law enforcement agencies can be allowed to view encrypted communications, it will enhance public safety.<\/p>\n<p>It\u2019s not just the public that is at risk, the statement argues. Technology companies themselves may not be able to \u201cidentify and respond to violations of their terms of service\u201d or respond to \u201cthe most serious illegal content and activity on its platform, including child sexual exploitation and abuse, violent crime, terrorist propaganda and attack planning\u201d.<\/p>\n<p>Which is why the seven signatories to the Statement \u201curge industry to address our serious concerns where encryption is applied in a way that wholly precludes any legal access to content\u201d. And they suggest this can be done in the following three ways:<\/p>\n<ul>\n<li>Embed the safety of the public in system designs, thereby enabling companies to act against illegal content and activity effectively with no reduction to safety, and facilitating the investigation and prosecution of offences and safeguarding the vulnerable;<\/li>\n<li>Enable law enforcement access to content in a readable and usable format where an authorisation is lawfully issued, is necessary and proportionate, and is subject to strong safeguards and oversight; and<\/li>\n<li>Engage in consultation with governments and other stakeholders to facilitate legal access in a way that is substantive and genuinely influences design decisions.<\/li>\n<\/ul>\n<p>The Statement ends with the signatory nations saying they \u201c\u2026 challenge the assertion that public safety cannot be protected without compromising privacy or cyber security. We strongly believe that approaches protecting each of these important values are possible and strive to work with industry to collaborate on mutually agreeable solutions.\u201d<\/p>\n<p>The statement does not express entirely new sentiments. The very fact the seven nations felt the need to issue it is surely notable, as many have already enacted legislation aimed at ensuring they can access encrypted online activity. The UK\u2019s <a href=\"https:\/\/www.theregister.com\/2019\/07\/29\/investigatory_powers_act_compatible_human_rights_high_court\/\">Snooper\u2019s Charter<\/a>, Australia\u2019s <a href=\"https:\/\/www.theregister.com\/2018\/08\/14\/oz_encryption_backdoor\/\">Assistance and Access Bill<\/a> and the USA\u2019s CLOUD Act all offer legislative instruments that permit governments to compel access to devices and\/or content under some circumstances.<\/p>\n<p>This new Statement seems to reflect the fact that even those instruments prove ineffective when access is allowed, but results only in finds of encrypted content that cannot be read.<\/p>\n<div class=\"promo_article\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/regmedia.co.uk\/2019\/03\/27\/shutterstock_royal_courts_of_justice3.jpg?x=174&amp;y=115&amp;crop=1\" width=\"174\" height=\"115\" alt=\"Royal Courts of Justice\/Law Courts in london, england (High Court &amp; Court of Appeal of England and Wales)\"><\/p>\n<h2 title=\"Liberty loses but vows appeal\">UK High Court rules Snooper&#8217;s Charter doesn&#8217;t break Euro human rights laws<\/h2>\n<p><a href=\"https:\/\/www.theregister.com\/2019\/07\/29\/investigatory_powers_act_compatible_human_rights_high_court\/\"><span>READ MORE<\/span><\/a><\/div>\n<p><i>The Register<\/i> has asked Facebook, Google and Apple for comment on the Statement and will update this story if any offers substantive comment. \u00ae<\/p>\n<p> READ MORE <a href=\"https:\/\/go.theregister.com\/feed\/www.theregister.com\/2020\/10\/11\/international_statementon_end_to_end_encryption_and_public_safety\/\">HERE<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Or as they put it: \u2018Embed the safety of the public in system designs \u2026 facilitating the investigation and prosecution of offences\u2019 The nations of the Five Eyes security alliance \u2013 Australia, Canada, New Zealand, the USA and the UK \u2013 plus Japan and India, have called on technology companies to design their products so they offer access to encrypted messages and content.\u2026 READ MORE HERE&#8230;<\/p>\n","protected":false},"author":2,"featured_media":37610,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"colormag_page_layout":"default_layout","footnotes":""},"categories":[63],"tags":[],"class_list":["post-37609","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-the-register"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.6 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Five Eyes nations plus Japan and India call for Big Tech to bake backdoors into everything 2026 | ThreatsHub Cybersecurity News<\/title>\n<meta name=\"description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.threatshub.org\/blog\/five-eyes-nations-plus-japan-and-india-call-for-big-tech-to-bake-backdoors-into-everything\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Five Eyes nations plus Japan and India call for Big Tech to bake backdoors into everything 2026 | ThreatsHub Cybersecurity News\" \/>\n<meta property=\"og:description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.threatshub.org\/blog\/five-eyes-nations-plus-japan-and-india-call-for-big-tech-to-bake-backdoors-into-everything\/\" \/>\n<meta property=\"og:site_name\" content=\"ThreatsHub Cybersecurity News\" \/>\n<meta property=\"article:published_time\" content=\"2020-10-11T23:51:09+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2020\/10\/five-eyes-nations-plus-japan-and-india-call-for-big-tech-to-bake-backdoors-into-everything.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"174\" \/>\n\t<meta property=\"og:image:height\" content=\"115\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"TH Author\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@threatshub\" \/>\n<meta name=\"twitter:site\" content=\"@threatshub\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"TH Author\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/five-eyes-nations-plus-japan-and-india-call-for-big-tech-to-bake-backdoors-into-everything\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/five-eyes-nations-plus-japan-and-india-call-for-big-tech-to-bake-backdoors-into-everything\\\/\"},\"author\":{\"name\":\"TH Author\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\"},\"headline\":\"Five Eyes nations plus Japan and India call for Big Tech to bake backdoors into everything\",\"datePublished\":\"2020-10-11T23:51:09+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/five-eyes-nations-plus-japan-and-india-call-for-big-tech-to-bake-backdoors-into-everything\\\/\"},\"wordCount\":597,\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/five-eyes-nations-plus-japan-and-india-call-for-big-tech-to-bake-backdoors-into-everything\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2020\\\/10\\\/five-eyes-nations-plus-japan-and-india-call-for-big-tech-to-bake-backdoors-into-everything.jpg\",\"articleSection\":[\"The Register\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/five-eyes-nations-plus-japan-and-india-call-for-big-tech-to-bake-backdoors-into-everything\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/five-eyes-nations-plus-japan-and-india-call-for-big-tech-to-bake-backdoors-into-everything\\\/\",\"name\":\"Five Eyes nations plus Japan and India call for Big Tech to bake backdoors into everything 2026 | ThreatsHub Cybersecurity News\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/five-eyes-nations-plus-japan-and-india-call-for-big-tech-to-bake-backdoors-into-everything\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/five-eyes-nations-plus-japan-and-india-call-for-big-tech-to-bake-backdoors-into-everything\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2020\\\/10\\\/five-eyes-nations-plus-japan-and-india-call-for-big-tech-to-bake-backdoors-into-everything.jpg\",\"datePublished\":\"2020-10-11T23:51:09+00:00\",\"description\":\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/five-eyes-nations-plus-japan-and-india-call-for-big-tech-to-bake-backdoors-into-everything\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/five-eyes-nations-plus-japan-and-india-call-for-big-tech-to-bake-backdoors-into-everything\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/five-eyes-nations-plus-japan-and-india-call-for-big-tech-to-bake-backdoors-into-everything\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2020\\\/10\\\/five-eyes-nations-plus-japan-and-india-call-for-big-tech-to-bake-backdoors-into-everything.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2020\\\/10\\\/five-eyes-nations-plus-japan-and-india-call-for-big-tech-to-bake-backdoors-into-everything.jpg\",\"width\":174,\"height\":115},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/five-eyes-nations-plus-japan-and-india-call-for-big-tech-to-bake-backdoors-into-everything\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Five Eyes nations plus Japan and India call for Big Tech to bake backdoors into everything\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"name\":\"ThreatsHub Cybersecurity News\",\"description\":\"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"alternateName\":\"Threatshub.org\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\",\"name\":\"ThreatsHub.org\",\"alternateName\":\"Threatshub.org\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"width\":432,\"height\":435,\"caption\":\"ThreatsHub.org\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/x.com\\\/threatshub\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\",\"name\":\"TH Author\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"caption\":\"TH Author\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Five Eyes nations plus Japan and India call for Big Tech to bake backdoors into everything 2026 | ThreatsHub Cybersecurity News","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.threatshub.org\/blog\/five-eyes-nations-plus-japan-and-india-call-for-big-tech-to-bake-backdoors-into-everything\/","og_locale":"en_US","og_type":"article","og_title":"Five Eyes nations plus Japan and India call for Big Tech to bake backdoors into everything 2026 | ThreatsHub Cybersecurity News","og_description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","og_url":"https:\/\/www.threatshub.org\/blog\/five-eyes-nations-plus-japan-and-india-call-for-big-tech-to-bake-backdoors-into-everything\/","og_site_name":"ThreatsHub Cybersecurity News","article_published_time":"2020-10-11T23:51:09+00:00","og_image":[{"width":174,"height":115,"url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2020\/10\/five-eyes-nations-plus-japan-and-india-call-for-big-tech-to-bake-backdoors-into-everything.jpg","type":"image\/jpeg"}],"author":"TH Author","twitter_card":"summary_large_image","twitter_creator":"@threatshub","twitter_site":"@threatshub","twitter_misc":{"Written by":"TH Author","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.threatshub.org\/blog\/five-eyes-nations-plus-japan-and-india-call-for-big-tech-to-bake-backdoors-into-everything\/#article","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/five-eyes-nations-plus-japan-and-india-call-for-big-tech-to-bake-backdoors-into-everything\/"},"author":{"name":"TH Author","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476"},"headline":"Five Eyes nations plus Japan and India call for Big Tech to bake backdoors into everything","datePublished":"2020-10-11T23:51:09+00:00","mainEntityOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/five-eyes-nations-plus-japan-and-india-call-for-big-tech-to-bake-backdoors-into-everything\/"},"wordCount":597,"publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/five-eyes-nations-plus-japan-and-india-call-for-big-tech-to-bake-backdoors-into-everything\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2020\/10\/five-eyes-nations-plus-japan-and-india-call-for-big-tech-to-bake-backdoors-into-everything.jpg","articleSection":["The Register"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.threatshub.org\/blog\/five-eyes-nations-plus-japan-and-india-call-for-big-tech-to-bake-backdoors-into-everything\/","url":"https:\/\/www.threatshub.org\/blog\/five-eyes-nations-plus-japan-and-india-call-for-big-tech-to-bake-backdoors-into-everything\/","name":"Five Eyes nations plus Japan and India call for Big Tech to bake backdoors into everything 2026 | ThreatsHub Cybersecurity News","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/five-eyes-nations-plus-japan-and-india-call-for-big-tech-to-bake-backdoors-into-everything\/#primaryimage"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/five-eyes-nations-plus-japan-and-india-call-for-big-tech-to-bake-backdoors-into-everything\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2020\/10\/five-eyes-nations-plus-japan-and-india-call-for-big-tech-to-bake-backdoors-into-everything.jpg","datePublished":"2020-10-11T23:51:09+00:00","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","breadcrumb":{"@id":"https:\/\/www.threatshub.org\/blog\/five-eyes-nations-plus-japan-and-india-call-for-big-tech-to-bake-backdoors-into-everything\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.threatshub.org\/blog\/five-eyes-nations-plus-japan-and-india-call-for-big-tech-to-bake-backdoors-into-everything\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/five-eyes-nations-plus-japan-and-india-call-for-big-tech-to-bake-backdoors-into-everything\/#primaryimage","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2020\/10\/five-eyes-nations-plus-japan-and-india-call-for-big-tech-to-bake-backdoors-into-everything.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2020\/10\/five-eyes-nations-plus-japan-and-india-call-for-big-tech-to-bake-backdoors-into-everything.jpg","width":174,"height":115},{"@type":"BreadcrumbList","@id":"https:\/\/www.threatshub.org\/blog\/five-eyes-nations-plus-japan-and-india-call-for-big-tech-to-bake-backdoors-into-everything\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.threatshub.org\/blog\/"},{"@type":"ListItem","position":2,"name":"Five Eyes nations plus Japan and India call for Big Tech to bake backdoors into everything"}]},{"@type":"WebSite","@id":"https:\/\/www.threatshub.org\/blog\/#website","url":"https:\/\/www.threatshub.org\/blog\/","name":"ThreatsHub Cybersecurity News","description":"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform","publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"alternateName":"Threatshub.org","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.threatshub.org\/blog\/#organization","name":"ThreatsHub.org","alternateName":"Threatshub.org","url":"https:\/\/www.threatshub.org\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","width":432,"height":435,"caption":"ThreatsHub.org"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/threatshub"]},{"@type":"Person","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476","name":"TH Author","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","caption":"TH Author"}}]}},"_links":{"self":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/37609","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/comments?post=37609"}],"version-history":[{"count":0,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/37609\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media\/37610"}],"wp:attachment":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media?parent=37609"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/categories?post=37609"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/tags?post=37609"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}