ProtonBlog(new window)

Preserving privacy rights in anti-terror laws

Share this page

Our mission is to promote security, privacy, and freedom on the Internet. That encompasses technical solutions, such as Proton Mail and Proton VPN(new window), but also policy solutions. The right to privacy and user control of personal data will never be safe unless they are also guaranteed by law. Addressing one without the other is a futile endeavor. Last month, we attended the 2018 Tech Against Terrorism(new window) conference in Berlin to help address the policy challenges of online counterterrorism efforts.

The Tech Against Terrorism project was launched in April 2017 by the United Nations Counter-Terrorism Executive Directorate(new window). Its goal is to bring together tech companies of all sizes, academia, civil societies, and lawmakers to discuss the best ways to protect human rights while ridding the Internet of terrorist content. At the core of the Tech Against Terrorism initiative is the Tech Against Terrorism Pledge(new window), which is based on the Universal Declaration of Human Rights. The Pledge is a simple guide that explains how tech companies, large and small, can respect fundamental human rights while tackling terrorist exploitation of the Internet.

Participants at the Dec. 4 conference in Berlin included representatives from some of the world’s largest tech platforms (Facebook, etc.), Europol, the CyberTerrorism Project, and researchers monitoring the German far-right. As the world’s largest encrypted email provider(new window) and a major participant in the global privacy debate, we were invited to the conference to share our views.

While a UN-sponsored conference may seem like a strange place for Proton Mail to appear, we decided to participate because, now more than ever, it is essential to highlight the privacy implications of potential legislation(new window). Our purpose for attending the conference was to raise our objection to another vaguely written, sweeping bill, this time from the EU. The bureaucratically named “A proposal for a Regulation on preventing the dissemination of terrorist content online(new window)” will severely hamper freedom of speech on the Internet and give a competitive edge to large, monopolistic corporations like Google and Facebook. The regulation was so vague that it even seemed like it would ban end-to-end encrypted services, although the EU has since clarified that this will not be the case.

You cannot influence policy if you don’t have a seat at the table. While the discussions at the Tech Against Terrorism conference did not immediately break new ground, it was still essential for us to be present to advocate for privacy rights. We consider this to be a part of our mission that is just as essential as writing code.

As a privacy company, it is important for us to impact the public debate by educating politicians, policymakers, and private citizens about the importance of encryption(new window), the right to privacy(new window), and free speech on the Internet. There are numerous examples, from a former Australian Prime Minister struggling to accept the laws of mathematics(new window) to a US congressman not realizing that Google does not make iPhones(new window), that show that many policymakers simply do not understand basic information about the Internet. By providing our expertise, we hope to help create more informed and nuanced legislation.

Promoting responsible law enforcement

Proton Mail is not against law enforcement(new window). We have a zero-tolerance policy for criminal acts committed using Proton Mail. Democratic societies require security, both online and offline, and as citizens, we support the work law enforcement officers do to protect us.

We are, however, against the abuse of the law. Codifying poor practices into intrusive laws only reduces our collective security. All too often, lawmakers have made the mistake of thinking that privacy and security must be in opposition to one another. This fundamental misunderstanding has led to the UK’s Investigatory Powers Act(new window), Australia’s Assistance and Access Bill(new window), and the EU’s latest regulation proposal.

These bills are policy disasters that weaken and undermine encryption, making the entire Internet less secure(new window). Through our engagement with policymakers, we intend to prevent such abuses in the future.

Removing terrorist content from the Internet is a sensitive topic that will have far-reaching consequences on the freedom of speech and the right to privacy. It will require a concerted effort from lawmakers, non-governmental organizations, civil society actors, and other tech companies to ensure we, as a society, strike the right balance. In this context, we are happy that lawmakers are responding to our continued advocacy, and that we can help represent the interest of citizens worldwide who value free speech and privacy rights.

Whether it’s at the UN, at the ballot box(new window), or in the courtroom, we are committed to ensuring that the Internet remains secure, private, and free.

Best Regards,
The Proton Mail Team

Read this blog in French at (new window)

Sign up and get a free secure email account from Proton Mail.

We also provide a free VPN service(new window) to protect your privacy.

Proton Mail and Proton VPN are funded by community contributions. If you would like to support our development efforts, you can upgrade to a paid plan. Thank you for your support.

Protect your privacy with Proton
Create a free account

Share this page

Richie Koch(new window)

Prior to joining Proton, Richie spent several years working on tech solutions in the developing world. He joined the Proton team to advance the rights of online privacy and freedom.

Related articles

Even though the Snowden leaks came out 10 years ago, the United States never ended its unconstitutional surveillance program. It now has a chance to close the legal loopholes that allow warrantless spying on US citizens. But Congress needs to act bef
Over the past year, hackers have been using new and clever techniques to steal people’s online data. At Proton, we’ve been monitoring these evolving strategies and updating our defenses to stay ahead of the arms race.  Often, the attacks involve new
password fatigue
Most people in the digital age have dozens, if not hundreds, of passwords, and keeping track of them is tiring, to say the least. If you’re suffering from password fatigue, you’ll be happy to know there’s an easy fix. The short answer is that you sh
are password managers safe?
Password managers are a great way to generate secure passwords, keep them in encrypted storage together with your credit card details, and improve your online security across the board. But you might be worried about keeping so much sensitive data in
Most of us probably wouldn’t consent to sharing photos of our family and friends with random strangers on the internet. But that’s exactly what we do when we automatically sync our pictures to the non-private servers of Big Tech companies, which can
Google Drive is the world’s most popular cloud storage service by far, with over 3 billion people using Google Workspace (which includes Google Drive, Google Calendar, Gmail, and more). But this ubiquity has recently caused concern following several