Proton
Salt Typhoon

A ”potentially catastrophic” cyberattack(nueva ventana) against United States broadband infrastructure has likely given the Chinese government access to swathes of highly sensitive security information, including from systems the federal government uses for court-authorized network surveillance requests.

As terrible as this news is for US national security, it also highlights the problem inherent with all surveillance systems that give governments “backdoor” access to critical data. These systems can be compromised, notably by state-sponsored foreign actors. 

This is a lesson the EU would be wise to take to heart. As Hungary is currently assuming the rotating Presidency of the Council of the EU, Hungarian Prime Minister and close friend to Russia(nueva ventana) and China(nueva ventana), Victor Orban, has been pushing hard(nueva ventana) to make EU countries agree on a common position regarding the highly controversial(nueva ventana) “chat control” legislation.

Crucially Hungary, similar to Belgium before it, wants to push for an extremely intrusive and dangerous approach that could ultimately force end-to-end encrypted (E2EE) services to create a backdoor for law enforcement. The European Parliament, on the other hand, went in a totally different direction, arguing that the legislation shouldn’t weaken end-to-end encryption.

What happened in the US?

In an attack that may have lasted “months or longer”, the Chinese hacking group “Salt Typhoon” compromised the networks of key US internet suppliers, including AT&T, Verizon, and Lumen. Salt Typhoon accessed the federal government-mandated surveillance systems that allow internet providers to intercept domestic electronic information related to criminal and national security investigations. It’s unclear if systems for monitoring foreign intelligence were also compromised.

Authorities investigating the incident are looking into whether Salt Typhoon gained access to US internet infrastructure through Cisco Systems routers(nueva ventana), which are responsible for routing a large percentage of all internet traffic. However, no such link has been confirmed, and while Cisco is investigating the matter, they claim to have found no indication their routers are involved.

What is chat control?

The EU’s chat control legislation, formally called the “Regulation to Prevent and Combat Child Sexual Abuse,” aims to address the growing problem of child sexual abuse material (CSAM) online. Introduced in 2022, it opens the door for mandatory scanning of digital communications, including images, videos, and links, on platforms like messaging apps and email services.

Proponents, including EU officials and child protection advocates, argue that this regulation is necessary to protect children from online exploitation and highlight the difficulty law enforcement faces in accessing encrypted messages used by perpetrators. The proposed law focuses solely on fighting against the “content”, and aims to catch and prevent CSAM from spreading using technology-based mechanisms.

One of the more controversial aspects that arose during the legislative process is the Commission and EU governments’ push for client-side scanning, where messages would be scanned for illegal content before being encrypted. This would potentially allow law enforcement to view not only the content you share, but also the content you simply save on your device.

The legislation faces strong opposition(nueva ventana) from privacy advocates, academics, digital rights groups, and privacy-focused tech companies, including Proton. While we fully support measures that help safeguard children, this legislation is not the answer. It would effectively create a new method for mass surveillance, requiring service providers to scan all digital communications indiscriminately. Even worse, such surveillance would do very little, if anything, to catch the perpetrators or help the victims of such despicable acts.

Chat control and end-to-end encryption

A particular point of contention has been E2EE, where only the sender and their intended recipient can access communications between them.

While the European Parliament understands the importance of E2EE in safeguarding citizens’ (including children) privacy while ensuring a high level of cybersecurity, EU Member States see it differently. Despite the ineffectiveness of such measures at protecting the real victims, most EU governments(nueva ventana) are more than happy to use the fight against CSAM as an excuse to require online services to develop systems that allow law enforcement access to all encrypted communications.

Lessons to be learned

There is no such thing as end-to-end encryption with a “backdoor” that only lets the good guys in. Even assuming that governments would not extend the scanning of encrypted communications to any sort of minor criminal offense in the future, implementing a backdoor amounts to creating a weakness that compromises the entire system. And the Salt Typhoon attack on the United States surveillance systems clearly demonstrates that if “authorized personnel” can access a backdoor, so can hackers. 

This includes state-sponsored hackers, and it may be no coincidence that Victor Orban, an authoritarian leader who overtly supports and admires other authoritarian leaders such as Vladimir Putin and Xi Jinping, is so keen to introduce weakness into the encryption standards that keep us all safe. 

Artículos relacionados

The cover image for a Proton Pass blog explaining how a family password manager can save parents time - the image shows three password fields on top of each other with a security shield shape containing two adult figures and one child figure
en
Tired of resetting passwords for your family? Find out how a family password manager can help you save time on password admin.
what does bcc mean in email
en
  • Guías de privacidad
What is BCC in email language? Here's what BCC means, how it works, and when and why you might want to use it.
President Trump is now at the head of the US warrantless surveillance machine
en
President Trump now controls of the US government's warrantless surveillance machine. We look at how it works and how to defend yourself.
en
See our predictions for the internet in 2025, from AI cyberattacks to DIY surveillance.
he cover image for a blog explaining how to see and manage your saved passwords easily in Proton Pass
en
Saving passwords in a password manager can help you stay safe online, but how can you see all your saved passwords in one place? Find out with Proton Pass.
Email password 101: Fully secure your inbox with 2 simple tools
en
Learn how to secure your email password and inbox with strong passwords, 2FA, passkeys, and tips to prevent data breaches and unauthorized access.