{"id":51746,"date":"2023-05-03T14:58:58","date_gmt":"2023-05-03T14:58:58","guid":{"rendered":"https:\/\/packetstormsecurity.com\/news\/view\/34574\/Tor-Project-LGBTQ-Groups-And-CDT-Sound-Alarm-Over-Efforts-To-Weaken-Encryption.html"},"modified":"2023-05-03T14:58:58","modified_gmt":"2023-05-03T14:58:58","slug":"tor-project-lgbtq-groups-and-cdt-sound-alarm-over-efforts-to-weaken-encryption","status":"publish","type":"post","link":"https:\/\/www.threatshub.org\/blog\/tor-project-lgbtq-groups-and-cdt-sound-alarm-over-efforts-to-weaken-encryption\/","title":{"rendered":"Tor Project, LGBTQ Groups, And CDT Sound Alarm Over Efforts To Weaken Encryption"},"content":{"rendered":"<div><img decoding=\"async\" src=\"https:\/\/files.scmagazine.com\/wp-content\/uploads\/2023\/05\/mobile-communication.jpg\" class=\"ff-og-image-inserted\"><\/div>\n<p>A group of more than 40 media and digital rights organizations are calling on Five Eyes nations and democratic governments around the world to reject efforts to weaken encryption and support a global vision of a free and open internet.<\/p>\n<p>In recent years, governments around the world have been making (another) major push to pass laws that would force companies to give law enforcement <a href=\"https:\/\/www.scmagazine.com\/news\/content\/sc-podcast-investigating-the-human-side-of-cybersecurity\">access to encrypted<\/a> communications built into their products, something encryption advocates say would amount to a dangerous backdoor.<\/p>\n<p>In an <a href=\"https:\/\/www.fightforthefuture.org\/news\/2023-05-03-open-letter-protect-our-rights-to-privacy-free-expression-and-press-freedom\/\" target=\"_blank\" rel=\"noreferrer noopener\">open letter<\/a> published Tuesday and sent to policymakers in the U.S., the European Union, Canada, the UK and India, dozens of organizations expressed alarm over a series of new laws that have either passed or are being considered by democratic countries, saying many would weaken privacy protections for activists, dissidents, journalists and citizens around the world who must operate in secrecy to stay safe.<\/p>\n<p>\u201cEncrypted services are at the forefront of the battle for online privacy, freedom of the press, freedom of opinion and expression. Many journalists, whistleblowers and activists depend on secure, encrypted solutions to protect their data as well as their identity,\u201d the groups wrote. \u201cAccess to these tools can be literally life or death for those who rely on them.\u201d<\/p>\n<p>Signatories on the letter include the Tor Project, encrypted apps Threema and Tutanota, Proton AG (the Swiss makers of ProtonMail), digital rights nonprofits the Center for Democracy &amp; Technology and Fight for the Future, the E-Governance and Internet Governance Foundation for Africa, and the Surveillance Technology Oversight Project (STOP).<\/p>\n<p>The letter calls out nations from the Five Eyes alliance in particular, highlighting proposed legislation like the Eliminating Abusive and Rampant Neglect of Interactive Technologies Act of 2023 (<a href=\"https:\/\/www.congress.gov\/bill\/118th-congress\/senate-bill\/1207?q=%7B%22search%22%3A%5B%22earn+IT%22%5D%7D&amp;s=1&amp;r=2\">EARN IT Act)<\/a> in the U.S., the <a href=\"https:\/\/bills.parliament.uk\/bills\/3137\/news\">Online Safety Act<\/a> in the UK and <a href=\"https:\/\/www.parl.ca\/legisinfo\/en\/bill\/44-1\/c-26\">legislation<\/a> under consideration in the Canadian Parliament as examples of a worrying trend that threatens privacy and security in some of the world\u2019s foremost democracies. The term Five Eyes refers to an alliance intelligence agencies that include the United States and Australia, Canada, New Zealand and the United Kingdom.<\/p>\n<p>\u201cGovernment attacks on encrypted services threaten privacy and puts users at risk. This might seem like a distant problem primarily faced in authoritarian countries but the threat is just as real and knocking at the doors of democratic nations,\u201d the groups write.<\/p>\n<p>A group of 132 human rights and LGBTQ organizations sent a <a href=\"https:\/\/cdt.org\/insights\/cdt-leads-broad-civil-society-coalition-urging-senate-to-drop-earn-it-act\/\">separate open letter<\/a> to U.S. Congressional leaders Tuesday urging them not to pass the EARN IT Act.<\/p>\n<p>The call for changing encryption laws has been an ongoing debate in many of these countries for decades, as technology and the internet has made phones and other devices critical to modern communication and a key source of evidence for law enforcement. The U.S. Department of Justice has waged multiple lobbying efforts since the 1990s to convince Congress to pass legislation requiring access to encrypted communications during investigations or when there is a warrant.<\/p>\n<p>\u201cService providers, device manufacturers, and application developers are deploying products and services with encryption that can only be decrypted by the end user or customer. Because of warrant-proof encryption,&nbsp;the government often cannot obtain the electronic evidence and intelligence necessary to investigate and prosecute threats to public safety and national security, even with a warrant or court order,\u201d the department\u2019s Office of Legal Policy <a href=\"https:\/\/www.justice.gov\/olp\/lawful-access\">wrote<\/a> last year.<\/p>\n<p>Tech companies have said there is no way to create that kind of access for legitimate criminal and national security investigations without watering down security protocols or placing encryption keys in the hands of the government or a third-party, where they could be abused, hacked or stolen.<\/p>\n<p>The letter calls on nations to ensure legislatures aren\u2019t engaging in overreach when they write laws around encryption, ensure encrypted communications aren\u2019t being blocked or throttled to reduce access and \u201crevisit any bills, laws and policies that legitimize undermining encryption or blocking access to services offering encrypted communication.\u201d<\/p>\n<p>READ MORE <a href=\"https:\/\/packetstormsecurity.com\/news\/view\/34574\/Tor-Project-LGBTQ-Groups-And-CDT-Sound-Alarm-Over-Efforts-To-Weaken-Encryption.html\">HERE<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>READ MORE HERE&#8230;<\/p>\n","protected":false},"author":2,"featured_media":51747,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"colormag_page_layout":"default_layout","footnotes":""},"categories":[60],"tags":[9649],"class_list":["post-51746","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-packet-storm","tag-headlinegovernmentprivacyspywarecryptography"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.6 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Tor Project, LGBTQ Groups, And CDT Sound Alarm Over Efforts To Weaken Encryption 2026 | ThreatsHub Cybersecurity News<\/title>\n<meta name=\"description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.threatshub.org\/blog\/tor-project-lgbtq-groups-and-cdt-sound-alarm-over-efforts-to-weaken-encryption\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Tor Project, LGBTQ Groups, And CDT Sound Alarm Over Efforts To Weaken Encryption 2026 | ThreatsHub Cybersecurity News\" \/>\n<meta property=\"og:description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.threatshub.org\/blog\/tor-project-lgbtq-groups-and-cdt-sound-alarm-over-efforts-to-weaken-encryption\/\" \/>\n<meta property=\"og:site_name\" content=\"ThreatsHub Cybersecurity News\" \/>\n<meta property=\"article:published_time\" content=\"2023-05-03T14:58:58+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/files.scmagazine.com\/wp-content\/uploads\/2023\/05\/mobile-communication.jpg\" \/>\n<meta name=\"author\" content=\"TH Author\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@threatshub\" \/>\n<meta name=\"twitter:site\" content=\"@threatshub\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"TH Author\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/tor-project-lgbtq-groups-and-cdt-sound-alarm-over-efforts-to-weaken-encryption\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/tor-project-lgbtq-groups-and-cdt-sound-alarm-over-efforts-to-weaken-encryption\\\/\"},\"author\":{\"name\":\"TH Author\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\"},\"headline\":\"Tor Project, LGBTQ Groups, And CDT Sound Alarm Over Efforts To Weaken Encryption\",\"datePublished\":\"2023-05-03T14:58:58+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/tor-project-lgbtq-groups-and-cdt-sound-alarm-over-efforts-to-weaken-encryption\\\/\"},\"wordCount\":675,\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/tor-project-lgbtq-groups-and-cdt-sound-alarm-over-efforts-to-weaken-encryption\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2023\\\/05\\\/tor-project-lgbtq-groups-and-cdt-sound-alarm-over-efforts-to-weaken-encryption.jpg\",\"keywords\":[\"headline,government,privacy,spyware,cryptography\"],\"articleSection\":[\"Packet Storm\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/tor-project-lgbtq-groups-and-cdt-sound-alarm-over-efforts-to-weaken-encryption\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/tor-project-lgbtq-groups-and-cdt-sound-alarm-over-efforts-to-weaken-encryption\\\/\",\"name\":\"Tor Project, LGBTQ Groups, And CDT Sound Alarm Over Efforts To Weaken Encryption 2026 | ThreatsHub Cybersecurity News\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/tor-project-lgbtq-groups-and-cdt-sound-alarm-over-efforts-to-weaken-encryption\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/tor-project-lgbtq-groups-and-cdt-sound-alarm-over-efforts-to-weaken-encryption\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2023\\\/05\\\/tor-project-lgbtq-groups-and-cdt-sound-alarm-over-efforts-to-weaken-encryption.jpg\",\"datePublished\":\"2023-05-03T14:58:58+00:00\",\"description\":\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/tor-project-lgbtq-groups-and-cdt-sound-alarm-over-efforts-to-weaken-encryption\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/tor-project-lgbtq-groups-and-cdt-sound-alarm-over-efforts-to-weaken-encryption\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/tor-project-lgbtq-groups-and-cdt-sound-alarm-over-efforts-to-weaken-encryption\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2023\\\/05\\\/tor-project-lgbtq-groups-and-cdt-sound-alarm-over-efforts-to-weaken-encryption.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2023\\\/05\\\/tor-project-lgbtq-groups-and-cdt-sound-alarm-over-efforts-to-weaken-encryption.jpg\",\"width\":1080,\"height\":720},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/tor-project-lgbtq-groups-and-cdt-sound-alarm-over-efforts-to-weaken-encryption\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"headline,government,privacy,spyware,cryptography\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/tag\\\/headlinegovernmentprivacyspywarecryptography\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Tor Project, LGBTQ Groups, And CDT Sound Alarm Over Efforts To Weaken Encryption\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"name\":\"ThreatsHub Cybersecurity News\",\"description\":\"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"alternateName\":\"Threatshub.org\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\",\"name\":\"ThreatsHub.org\",\"alternateName\":\"Threatshub.org\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"width\":432,\"height\":435,\"caption\":\"ThreatsHub.org\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/x.com\\\/threatshub\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\",\"name\":\"TH Author\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"caption\":\"TH Author\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Tor Project, LGBTQ Groups, And CDT Sound Alarm Over Efforts To Weaken Encryption 2026 | ThreatsHub Cybersecurity News","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.threatshub.org\/blog\/tor-project-lgbtq-groups-and-cdt-sound-alarm-over-efforts-to-weaken-encryption\/","og_locale":"en_US","og_type":"article","og_title":"Tor Project, LGBTQ Groups, And CDT Sound Alarm Over Efforts To Weaken Encryption 2026 | ThreatsHub Cybersecurity News","og_description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","og_url":"https:\/\/www.threatshub.org\/blog\/tor-project-lgbtq-groups-and-cdt-sound-alarm-over-efforts-to-weaken-encryption\/","og_site_name":"ThreatsHub Cybersecurity News","article_published_time":"2023-05-03T14:58:58+00:00","og_image":[{"url":"https:\/\/files.scmagazine.com\/wp-content\/uploads\/2023\/05\/mobile-communication.jpg","type":"","width":"","height":""}],"author":"TH Author","twitter_card":"summary_large_image","twitter_creator":"@threatshub","twitter_site":"@threatshub","twitter_misc":{"Written by":"TH Author","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.threatshub.org\/blog\/tor-project-lgbtq-groups-and-cdt-sound-alarm-over-efforts-to-weaken-encryption\/#article","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/tor-project-lgbtq-groups-and-cdt-sound-alarm-over-efforts-to-weaken-encryption\/"},"author":{"name":"TH Author","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476"},"headline":"Tor Project, LGBTQ Groups, And CDT Sound Alarm Over Efforts To Weaken Encryption","datePublished":"2023-05-03T14:58:58+00:00","mainEntityOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/tor-project-lgbtq-groups-and-cdt-sound-alarm-over-efforts-to-weaken-encryption\/"},"wordCount":675,"publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/tor-project-lgbtq-groups-and-cdt-sound-alarm-over-efforts-to-weaken-encryption\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2023\/05\/tor-project-lgbtq-groups-and-cdt-sound-alarm-over-efforts-to-weaken-encryption.jpg","keywords":["headline,government,privacy,spyware,cryptography"],"articleSection":["Packet Storm"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.threatshub.org\/blog\/tor-project-lgbtq-groups-and-cdt-sound-alarm-over-efforts-to-weaken-encryption\/","url":"https:\/\/www.threatshub.org\/blog\/tor-project-lgbtq-groups-and-cdt-sound-alarm-over-efforts-to-weaken-encryption\/","name":"Tor Project, LGBTQ Groups, And CDT Sound Alarm Over Efforts To Weaken Encryption 2026 | ThreatsHub Cybersecurity News","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/tor-project-lgbtq-groups-and-cdt-sound-alarm-over-efforts-to-weaken-encryption\/#primaryimage"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/tor-project-lgbtq-groups-and-cdt-sound-alarm-over-efforts-to-weaken-encryption\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2023\/05\/tor-project-lgbtq-groups-and-cdt-sound-alarm-over-efforts-to-weaken-encryption.jpg","datePublished":"2023-05-03T14:58:58+00:00","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","breadcrumb":{"@id":"https:\/\/www.threatshub.org\/blog\/tor-project-lgbtq-groups-and-cdt-sound-alarm-over-efforts-to-weaken-encryption\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.threatshub.org\/blog\/tor-project-lgbtq-groups-and-cdt-sound-alarm-over-efforts-to-weaken-encryption\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/tor-project-lgbtq-groups-and-cdt-sound-alarm-over-efforts-to-weaken-encryption\/#primaryimage","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2023\/05\/tor-project-lgbtq-groups-and-cdt-sound-alarm-over-efforts-to-weaken-encryption.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2023\/05\/tor-project-lgbtq-groups-and-cdt-sound-alarm-over-efforts-to-weaken-encryption.jpg","width":1080,"height":720},{"@type":"BreadcrumbList","@id":"https:\/\/www.threatshub.org\/blog\/tor-project-lgbtq-groups-and-cdt-sound-alarm-over-efforts-to-weaken-encryption\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.threatshub.org\/blog\/"},{"@type":"ListItem","position":2,"name":"headline,government,privacy,spyware,cryptography","item":"https:\/\/www.threatshub.org\/blog\/tag\/headlinegovernmentprivacyspywarecryptography\/"},{"@type":"ListItem","position":3,"name":"Tor Project, LGBTQ Groups, And CDT Sound Alarm Over Efforts To Weaken Encryption"}]},{"@type":"WebSite","@id":"https:\/\/www.threatshub.org\/blog\/#website","url":"https:\/\/www.threatshub.org\/blog\/","name":"ThreatsHub Cybersecurity News","description":"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform","publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"alternateName":"Threatshub.org","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.threatshub.org\/blog\/#organization","name":"ThreatsHub.org","alternateName":"Threatshub.org","url":"https:\/\/www.threatshub.org\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","width":432,"height":435,"caption":"ThreatsHub.org"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/threatshub"]},{"@type":"Person","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476","name":"TH Author","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","caption":"TH Author"}}]}},"_links":{"self":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/51746","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/comments?post=51746"}],"version-history":[{"count":0,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/51746\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media\/51747"}],"wp:attachment":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media?parent=51746"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/categories?post=51746"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/tags?post=51746"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}