{"id":56354,"date":"2024-06-18T13:44:38","date_gmt":"2024-06-18T13:44:38","guid":{"rendered":"https:\/\/packetstormsecurity.com\/news\/view\/36010\/Encryption-Is-Deeply-Threatening-To-Power.html"},"modified":"2024-06-18T13:44:38","modified_gmt":"2024-06-18T13:44:38","slug":"encryption-is-deeply-threatening-to-power","status":"publish","type":"post","link":"https:\/\/www.threatshub.org\/blog\/encryption-is-deeply-threatening-to-power\/","title":{"rendered":"Encryption Is Deeply Threatening To Power"},"content":{"rendered":"<div><img decoding=\"async\" src=\"https:\/\/i.guim.co.uk\/img\/media\/9977bd756059e124a43f1579b07be8b8a6fc5599\/0_1400_4724_2834\/master\/4724.jpg?width=1200&amp;height=630&amp;quality=85&amp;auto=format&amp;fit=crop&amp;overlay-align=bottom%2Cleft&amp;overlay-width=100p&amp;overlay-base64=L2ltZy9zdGF0aWMvb3ZlcmxheXMvdG8tZGVmYXVsdC5wbmc&amp;enable=upscale&amp;s=a188826719291bf709cf3d1f5d61e38c\" class=\"ff-og-image-inserted\"><\/div>\n<p class=\"dcr-iy9ec7\">Meredith Whittaker practises what she preaches. As the president of the Signal Foundation, she\u2019s a strident voice backing privacy for all. But she doesn\u2019t just spout \u00adhollow words.<\/p>\n<p class=\"dcr-iy9ec7\">In 2018, she burst into public view as one of the organisers of the <a href=\"https:\/\/www.theguardian.com\/technology\/2018\/nov\/01\/google-walkout-global-protests-employees-sexual-harassment-scandals\" data-link-name=\"in body link\">Google walkouts<\/a>, mobilising 20,000 employees of the search giant in a twin protest over the company\u2019s support for state surveillance and failings over sexual misconduct.<\/p>\n<p class=\"dcr-iy9ec7\">Even now, after half a decade in the public eye, with \u00adcongressional testimonies, university professorships and federal agency advisory roles under her belt, Whittaker is still firmly privacy-conscious.<\/p>\n<p class=\"dcr-iy9ec7\">It\u2019s not unusual for business leaders to politely deflect the question when asked about their pay for the CV that accompanies these interviews, for instance. It\u2019s somewhat less common to flatly refuse to comment on their age and family. \u201cAs a privacy advocate, Whittaker doesn\u2019t answer personal questions that could be used to deduce her passwords or \u2018secret answers\u2019 for her bank authentication,\u201d a staff member says after the interview. \u201cShe encourages others to follow suit!\u201d<\/p>\n<p class=\"dcr-iy9ec7\">When she left Google, Whittaker shared a note internally that made it clear that she was committed to working on the ethical deployment of artificial intelligence and organising an \u201caccountable tech industry\u201d. She said: \u201cIt\u2019s clear Google isn\u2019t a place where I can continue this work.\u201d That clarity, and lack of willingness to compromise, has led to&nbsp;Signal.<\/p>\n<p class=\"dcr-iy9ec7\">The Signal Foundation, created in 2017 with $50m in funding from WhatsApp co-founder Brian Acton, exists to \u201cprotect free expression and enable secure global communication through open source privacy&nbsp;technology\u201d.<\/p>\n<aside class=\"dcr-dr95r8\"><svg viewBox=\"0 0 22 14\" class=\"dcr-scql1j\"><path d=\"M5.255 0h4.75c-.572 4.53-1.077 8.972-1.297 13.941H0C.792 9.104 2.44 4.53 5.255 0Zm11.061 0H21c-.506 4.53-1.077 8.972-1.297 13.941h-8.686c.902-4.837 2.485-9.411 5.3-13.941Z\" \/><\/svg><\/p>\n<blockquote class=\"dcr-zzndwp\"><p>Through the 80s, there\u2019s deep unease about the idea that the NSA and GCHQ would lose the monopoly on encryption<\/p><\/blockquote>\n<\/aside>\n<p class=\"dcr-iy9ec7\">It took over development of its messaging app, also called Signal, in 2018, and Whittaker came on board in the newly created role of president in 2022 \u2013 just in time to begin defending Signal, and encryption in general, against a wave of attacks from nation states and companies around the world.<\/p>\n<p class=\"dcr-iy9ec7\">Legislation such as Britain\u2019s <a href=\"https:\/\/www.theguardian.com\/technology\/2023\/oct\/24\/techscape-uk-online-safety-bill-clean-up-internet\" data-link-name=\"in body link\">Online Safety Act<\/a> (OSA) and the EU\u2019s child sexual abuse regulation \u00adcontained language that could be used to ban or crack private communications, while proposals by Meta to turn on end-to-end encryption for Facebook and Instagram sparked a vicious backlash from politicians such as Priti Patel, <a href=\"https:\/\/www.theguardian.com\/technology\/2022\/aug\/22\/priti-patel-urges-meta-to-give-up-on-end-to-end-encryption-plans\" data-link-name=\"in body link\">who called the plans \u201ccatastrophic\u201d<\/a> as UK home secretary.<\/p>\n<p class=\"dcr-iy9ec7\">Those attacks are nothing new, Whittaker says when we meet in the <em>Observer\u2019s<\/em> offices. \u201cYou can go right back to 1976, when <a href=\"https:\/\/www.theguardian.com\/science\/2016\/mar\/01\/turing-award-whitfield-diffie-martin-hellman-online-commerce\" data-link-name=\"in body link\">[Whitfield] Diffie and [Martin] Hellman <\/a>were trying to publish the paper that introduced public key cryptography, which is the technique that allows us to have encrypted communication over the internet that works. There were intelligence services trying to prevent them.<\/p>\n<p class=\"dcr-iy9ec7\">\u201cThrough the 80s, there\u2019s deep unease about the idea that the NSA [US National Security Agency] and GCHQ would lose the monopoly on encryption, and by the 90s, it ends up controlled under arms treaties \u2013 this is the \u2018crypto wars\u2019. You couldn\u2019t send your code in the mail to someone in Europe; it was considered a munitions export.\u201d<\/p>\n<p class=\"dcr-iy9ec7\">But then the huge push to commercialise the internet forced a softening \u2013 to a point. \u201cEncryption for transactions was enabled, and large companies got to choose exactly what was encrypted. At the same time, the Clinton administration endorsed surveillance advertising as a business model, so there was an incentive to gather data about your customers in order to sell to them.\u201d<\/p>\n<p class=\"dcr-iy9ec7\">Surveillance, she says, was a \u201cdisease\u201d from the very beginning of the internet, and encryption is \u201cdeeply threatening to the type of power that constitutes itself via these information asymmetries\u201d. All of which means that she doesn\u2019t expect the fight to end any time soon. \u201cI don\u2019t think these arguments are in good faith. There\u2019s a deeper tension here, because in 20 years of the development of this metastatic tech industry, we have seen every aspect of our lives become subject to mass surveillance perpetrated by a handful of companies partnering with the US government and other <a href=\"https:\/\/www.theguardian.com\/world\/2013\/dec\/02\/history-of-5-eyes-explainer\" data-link-name=\"in body link\">\u2018Five Eyes\u2019 agencies<\/a> to gather more surveillance data about us than has ever been available to any entity in human history.<\/p>\n<p class=\"dcr-iy9ec7\">\u201cSo if we don\u2019t continue to guard these little carve-outs of privacy and ultimately extend them \u2013 we have to throw some elbows to get a bit more space here \u2013 I think we\u2019re in for a much bleaker future than we would be if we can hold this ground, and we can expand the space for privacy and free communication.\u201d<\/p>\n<p class=\"dcr-iy9ec7\">The criticisms of encrypted communications are as old as the technology: allowing anyone to speak without the state being able to tap into their conversations is a godsend for criminals, terrorists and <a href=\"https:\/\/www.theguardian.com\/technology\/2023\/dec\/07\/uk-accuses-meta-of-empowering-child-sexual-abusers-with-encryption-roll-out\" data-link-name=\"in body link\">paedophiles<\/a> around the world.<\/p>\n<aside class=\"dcr-dr95r8\"><svg viewBox=\"0 0 22 14\" class=\"dcr-scql1j\"><path d=\"M5.255 0h4.75c-.572 4.53-1.077 8.972-1.297 13.941H0C.792 9.104 2.44 4.53 5.255 0Zm11.061 0H21c-.506 4.53-1.077 8.972-1.297 13.941h-8.686c.902-4.837 2.485-9.411 5.3-13.941Z\" \/><\/svg><\/p>\n<blockquote class=\"dcr-zzndwp\"><p>Signal either works for everyone or it works for no one. Every military in the world uses it, every politician I\u2019m aware of<\/p><\/blockquote>\n<\/aside>\n<p class=\"dcr-iy9ec7\">But, Whittaker argues, few of Signal\u2019s loudest critics seem to be consistent in what they care about. \u201cIf we really cared about helping children, why are the UK\u2019s schools crumbling? Why was social services funded at only 7% of the amount that was suggested to fully resource the agencies that are on the frontlines of stopping abuse?\u201d<\/p>\n<p class=\"dcr-iy9ec7\">Sometimes the criticism is more unexpected. Signal was recently dragged into the US culture wars after a failed rightwing campaign to depose the new chief executive of National Public Radio, Katherine Maher, expanded to cover Signal, where Maher sits on the board of directors. Elon Musk got involved, promoting conspiracy theories that the Signal app \u2013 <a href=\"https:\/\/www.cnet.com\/news\/privacy\/what-is-signal-everything-you-need-to-know-about-elon-musks-app-recommendation\/\" data-link-name=\"in body link\">which he once promoted<\/a> \u2013 had \u201cknown vulnerabilities\u201d, in response to a claim that the app \u201cmay be compromised\u201d.<\/p>\n<p class=\"dcr-iy9ec7\">The allegations were \u201ca weapon in a propaganda war to spread disinformation\u201d, Whittaker says. \u201cWe see similar lines of disinformation, that often appear designed to push \u00adpeople away from Signal, linked to escalations in the Ukraine conflict. We believe these campaigns are designed to scare people away from Signal on to less secure alternatives that may be more susceptible to hacking and interception.\u201d<\/p>\n<p class=\"dcr-iy9ec7\">The same technology that brings the foundation criticism has made it popular among governments and militaries around the world that need to protect their own conversations from the prying eyes of state hackers and others.<\/p>\n<p class=\"dcr-iy9ec7\">Whittaker views this as a leveller \u2013 Signal is for all.<\/p>\n<p class=\"dcr-iy9ec7\">\u201cSignal either works for everyone or it works for no one. Every military in the world uses Signal, every politician I\u2019m aware of uses Signal. Every CEO I know uses Signal because anyone who has anything truly confidential to communicate recognises that storing that on a Meta database or in the clear on some Google server is not good practice.\u201d<\/p>\n<p class=\"dcr-iy9ec7\">Whittaker\u2019s vision is singular and does not entertain distraction. Despite her interest in AI, she is wary of combining it with Signal and is critical of apps such as Meta\u2019s WhatsApp that have introduced AI-enabled functions.<\/p>\n<p class=\"dcr-iy9ec7\">\u201cI\u2019m really proud we don\u2019t have an AI strategy. We\u2019d have to look ourselves in the face and be like, where\u2019s that data coming from to train the models, where\u2019s the input data coming from? How did we get an AI strategy, given that our entire focus is on preserving privacy and not surveilling people?\u201d<\/p>\n<p class=\"dcr-iy9ec7\">Whatever the future holds in terms of technology and political attitudes to privacy, Whittaker is adamant that its principles are an existential matter.<\/p>\n<p class=\"dcr-iy9ec7\">\u201cWe will hold the line right. We would rather fold as a going concern than undermine or backdoor the privacy guarantees that we make to&nbsp;people.\u201d<\/p>\n<h2 id=\"cv\" class=\"dcr-n4qeq9\">CV<\/h2>\n<p class=\"dcr-iy9ec7\"><strong>Age<\/strong> No comment.<br \/><strong>Family<\/strong> No comment.<br \/><strong>Education<\/strong> I studied literature and rhetoric at Berkeley before joining Google in 2006, where I learned the rest.<br \/><strong>Pay<\/strong> No comment.<\/p>\n<p>READ MORE <a href=\"https:\/\/packetstormsecurity.com\/news\/view\/36010\/Encryption-Is-Deeply-Threatening-To-Power.html\">HERE<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>READ MORE HERE&#8230;<\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"colormag_page_layout":"default_layout","footnotes":""},"categories":[60],"tags":[10958],"class_list":["post-56354","post","type-post","status-publish","format-standard","hentry","category-packet-storm","tag-headlinegovernmentprivacyphonespywarecryptography"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.6 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Encryption Is Deeply Threatening To Power 2026 | ThreatsHub Cybersecurity News<\/title>\n<meta name=\"description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.threatshub.org\/blog\/encryption-is-deeply-threatening-to-power\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Encryption Is Deeply Threatening To Power 2026 | ThreatsHub Cybersecurity News\" \/>\n<meta property=\"og:description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.threatshub.org\/blog\/encryption-is-deeply-threatening-to-power\/\" \/>\n<meta property=\"og:site_name\" content=\"ThreatsHub Cybersecurity News\" \/>\n<meta property=\"article:published_time\" content=\"2024-06-18T13:44:38+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/i.guim.co.uk\/img\/media\/9977bd756059e124a43f1579b07be8b8a6fc5599\/0_1400_4724_2834\/master\/4724.jpg?width=1200&amp;height=630&amp;quality=85&amp;auto=format&amp;fit=crop&amp;overlay-align=bottom%2Cleft&amp;overlay-width=100p&amp;overlay-base64=L2ltZy9zdGF0aWMvb3ZlcmxheXMvdG8tZGVmYXVsdC5wbmc&amp;enable=upscale&amp;s=a188826719291bf709cf3d1f5d61e38c\" \/>\n<meta name=\"author\" content=\"TH Author\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@threatshub\" \/>\n<meta name=\"twitter:site\" content=\"@threatshub\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"TH Author\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"6 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/encryption-is-deeply-threatening-to-power\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/encryption-is-deeply-threatening-to-power\\\/\"},\"author\":{\"name\":\"TH Author\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\"},\"headline\":\"Encryption Is Deeply Threatening To Power\",\"datePublished\":\"2024-06-18T13:44:38+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/encryption-is-deeply-threatening-to-power\\\/\"},\"wordCount\":1305,\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/encryption-is-deeply-threatening-to-power\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/i.guim.co.uk\\\/img\\\/media\\\/9977bd756059e124a43f1579b07be8b8a6fc5599\\\/0_1400_4724_2834\\\/master\\\/4724.jpg?width=1200&amp;height=630&amp;quality=85&amp;auto=format&amp;fit=crop&amp;overlay-align=bottom%2Cleft&amp;overlay-width=100p&amp;overlay-base64=L2ltZy9zdGF0aWMvb3ZlcmxheXMvdG8tZGVmYXVsdC5wbmc&amp;enable=upscale&amp;s=a188826719291bf709cf3d1f5d61e38c\",\"keywords\":[\"headline,government,privacy,phone,spyware,cryptography\"],\"articleSection\":[\"Packet Storm\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/encryption-is-deeply-threatening-to-power\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/encryption-is-deeply-threatening-to-power\\\/\",\"name\":\"Encryption Is Deeply Threatening To Power 2026 | ThreatsHub Cybersecurity News\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/encryption-is-deeply-threatening-to-power\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/encryption-is-deeply-threatening-to-power\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/i.guim.co.uk\\\/img\\\/media\\\/9977bd756059e124a43f1579b07be8b8a6fc5599\\\/0_1400_4724_2834\\\/master\\\/4724.jpg?width=1200&amp;height=630&amp;quality=85&amp;auto=format&amp;fit=crop&amp;overlay-align=bottom%2Cleft&amp;overlay-width=100p&amp;overlay-base64=L2ltZy9zdGF0aWMvb3ZlcmxheXMvdG8tZGVmYXVsdC5wbmc&amp;enable=upscale&amp;s=a188826719291bf709cf3d1f5d61e38c\",\"datePublished\":\"2024-06-18T13:44:38+00:00\",\"description\":\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/encryption-is-deeply-threatening-to-power\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/encryption-is-deeply-threatening-to-power\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/encryption-is-deeply-threatening-to-power\\\/#primaryimage\",\"url\":\"https:\\\/\\\/i.guim.co.uk\\\/img\\\/media\\\/9977bd756059e124a43f1579b07be8b8a6fc5599\\\/0_1400_4724_2834\\\/master\\\/4724.jpg?width=1200&amp;height=630&amp;quality=85&amp;auto=format&amp;fit=crop&amp;overlay-align=bottom%2Cleft&amp;overlay-width=100p&amp;overlay-base64=L2ltZy9zdGF0aWMvb3ZlcmxheXMvdG8tZGVmYXVsdC5wbmc&amp;enable=upscale&amp;s=a188826719291bf709cf3d1f5d61e38c\",\"contentUrl\":\"https:\\\/\\\/i.guim.co.uk\\\/img\\\/media\\\/9977bd756059e124a43f1579b07be8b8a6fc5599\\\/0_1400_4724_2834\\\/master\\\/4724.jpg?width=1200&amp;height=630&amp;quality=85&amp;auto=format&amp;fit=crop&amp;overlay-align=bottom%2Cleft&amp;overlay-width=100p&amp;overlay-base64=L2ltZy9zdGF0aWMvb3ZlcmxheXMvdG8tZGVmYXVsdC5wbmc&amp;enable=upscale&amp;s=a188826719291bf709cf3d1f5d61e38c\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/encryption-is-deeply-threatening-to-power\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"headline,government,privacy,phone,spyware,cryptography\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/tag\\\/headlinegovernmentprivacyphonespywarecryptography\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Encryption Is Deeply Threatening To Power\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"name\":\"ThreatsHub Cybersecurity News\",\"description\":\"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"alternateName\":\"Threatshub.org\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\",\"name\":\"ThreatsHub.org\",\"alternateName\":\"Threatshub.org\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"width\":432,\"height\":435,\"caption\":\"ThreatsHub.org\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/x.com\\\/threatshub\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\",\"name\":\"TH Author\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"caption\":\"TH Author\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Encryption Is Deeply Threatening To Power 2026 | ThreatsHub Cybersecurity News","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.threatshub.org\/blog\/encryption-is-deeply-threatening-to-power\/","og_locale":"en_US","og_type":"article","og_title":"Encryption Is Deeply Threatening To Power 2026 | ThreatsHub Cybersecurity News","og_description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","og_url":"https:\/\/www.threatshub.org\/blog\/encryption-is-deeply-threatening-to-power\/","og_site_name":"ThreatsHub Cybersecurity News","article_published_time":"2024-06-18T13:44:38+00:00","og_image":[{"url":"https:\/\/i.guim.co.uk\/img\/media\/9977bd756059e124a43f1579b07be8b8a6fc5599\/0_1400_4724_2834\/master\/4724.jpg?width=1200&amp;height=630&amp;quality=85&amp;auto=format&amp;fit=crop&amp;overlay-align=bottom%2Cleft&amp;overlay-width=100p&amp;overlay-base64=L2ltZy9zdGF0aWMvb3ZlcmxheXMvdG8tZGVmYXVsdC5wbmc&amp;enable=upscale&amp;s=a188826719291bf709cf3d1f5d61e38c","type":"","width":"","height":""}],"author":"TH Author","twitter_card":"summary_large_image","twitter_creator":"@threatshub","twitter_site":"@threatshub","twitter_misc":{"Written by":"TH Author","Est. reading time":"6 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.threatshub.org\/blog\/encryption-is-deeply-threatening-to-power\/#article","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/encryption-is-deeply-threatening-to-power\/"},"author":{"name":"TH Author","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476"},"headline":"Encryption Is Deeply Threatening To Power","datePublished":"2024-06-18T13:44:38+00:00","mainEntityOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/encryption-is-deeply-threatening-to-power\/"},"wordCount":1305,"publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/encryption-is-deeply-threatening-to-power\/#primaryimage"},"thumbnailUrl":"https:\/\/i.guim.co.uk\/img\/media\/9977bd756059e124a43f1579b07be8b8a6fc5599\/0_1400_4724_2834\/master\/4724.jpg?width=1200&amp;height=630&amp;quality=85&amp;auto=format&amp;fit=crop&amp;overlay-align=bottom%2Cleft&amp;overlay-width=100p&amp;overlay-base64=L2ltZy9zdGF0aWMvb3ZlcmxheXMvdG8tZGVmYXVsdC5wbmc&amp;enable=upscale&amp;s=a188826719291bf709cf3d1f5d61e38c","keywords":["headline,government,privacy,phone,spyware,cryptography"],"articleSection":["Packet Storm"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.threatshub.org\/blog\/encryption-is-deeply-threatening-to-power\/","url":"https:\/\/www.threatshub.org\/blog\/encryption-is-deeply-threatening-to-power\/","name":"Encryption Is Deeply Threatening To Power 2026 | ThreatsHub Cybersecurity News","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/encryption-is-deeply-threatening-to-power\/#primaryimage"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/encryption-is-deeply-threatening-to-power\/#primaryimage"},"thumbnailUrl":"https:\/\/i.guim.co.uk\/img\/media\/9977bd756059e124a43f1579b07be8b8a6fc5599\/0_1400_4724_2834\/master\/4724.jpg?width=1200&amp;height=630&amp;quality=85&amp;auto=format&amp;fit=crop&amp;overlay-align=bottom%2Cleft&amp;overlay-width=100p&amp;overlay-base64=L2ltZy9zdGF0aWMvb3ZlcmxheXMvdG8tZGVmYXVsdC5wbmc&amp;enable=upscale&amp;s=a188826719291bf709cf3d1f5d61e38c","datePublished":"2024-06-18T13:44:38+00:00","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","breadcrumb":{"@id":"https:\/\/www.threatshub.org\/blog\/encryption-is-deeply-threatening-to-power\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.threatshub.org\/blog\/encryption-is-deeply-threatening-to-power\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/encryption-is-deeply-threatening-to-power\/#primaryimage","url":"https:\/\/i.guim.co.uk\/img\/media\/9977bd756059e124a43f1579b07be8b8a6fc5599\/0_1400_4724_2834\/master\/4724.jpg?width=1200&amp;height=630&amp;quality=85&amp;auto=format&amp;fit=crop&amp;overlay-align=bottom%2Cleft&amp;overlay-width=100p&amp;overlay-base64=L2ltZy9zdGF0aWMvb3ZlcmxheXMvdG8tZGVmYXVsdC5wbmc&amp;enable=upscale&amp;s=a188826719291bf709cf3d1f5d61e38c","contentUrl":"https:\/\/i.guim.co.uk\/img\/media\/9977bd756059e124a43f1579b07be8b8a6fc5599\/0_1400_4724_2834\/master\/4724.jpg?width=1200&amp;height=630&amp;quality=85&amp;auto=format&amp;fit=crop&amp;overlay-align=bottom%2Cleft&amp;overlay-width=100p&amp;overlay-base64=L2ltZy9zdGF0aWMvb3ZlcmxheXMvdG8tZGVmYXVsdC5wbmc&amp;enable=upscale&amp;s=a188826719291bf709cf3d1f5d61e38c"},{"@type":"BreadcrumbList","@id":"https:\/\/www.threatshub.org\/blog\/encryption-is-deeply-threatening-to-power\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.threatshub.org\/blog\/"},{"@type":"ListItem","position":2,"name":"headline,government,privacy,phone,spyware,cryptography","item":"https:\/\/www.threatshub.org\/blog\/tag\/headlinegovernmentprivacyphonespywarecryptography\/"},{"@type":"ListItem","position":3,"name":"Encryption Is Deeply Threatening To Power"}]},{"@type":"WebSite","@id":"https:\/\/www.threatshub.org\/blog\/#website","url":"https:\/\/www.threatshub.org\/blog\/","name":"ThreatsHub Cybersecurity News","description":"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform","publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"alternateName":"Threatshub.org","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.threatshub.org\/blog\/#organization","name":"ThreatsHub.org","alternateName":"Threatshub.org","url":"https:\/\/www.threatshub.org\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","width":432,"height":435,"caption":"ThreatsHub.org"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/threatshub"]},{"@type":"Person","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476","name":"TH Author","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","caption":"TH Author"}}]}},"_links":{"self":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/56354","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/comments?post=56354"}],"version-history":[{"count":0,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/56354\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media?parent=56354"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/categories?post=56354"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/tags?post=56354"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}