Proton
Salt Typhoon

A ”potentially catastrophic” cyberattack(neues Fenster) against United States broadband infrastructure has likely given the Chinese government access to swathes of highly sensitive security information, including from systems the federal government uses for court-authorized network surveillance requests.

As terrible as this news is for US national security, it also highlights the problem inherent with all surveillance systems that give governments “backdoor” access to critical data. These systems can be compromised, notably by state-sponsored foreign actors. 

This is a lesson the EU would be wise to take to heart. As Hungary is currently assuming the rotating Presidency of the Council of the EU, Hungarian Prime Minister and close friend to Russia(neues Fenster) and China(neues Fenster), Victor Orban, has been pushing hard(neues Fenster) to make EU countries agree on a common position regarding the highly controversial(neues Fenster) “chat control” legislation.

Crucially Hungary, similar to Belgium before it, wants to push for an extremely intrusive and dangerous approach that could ultimately force end-to-end encrypted(neues Fenster) (E2EE) services to create a backdoor for law enforcement. The European Parliament, on the other hand, went in a totally different direction, arguing that the legislation shouldn’t weaken end-to-end encryption(neues Fenster).

What happened in the US?

In an attack that may have lasted “months or longer”, the Chinese hacking group “Salt Typhoon” compromised the networks of key US internet suppliers, including AT&T, Verizon, and Lumen. Salt Typhoon accessed the federal government-mandated surveillance systems that allow internet providers to intercept domestic electronic information related to criminal and national security investigations. It’s unclear if systems for monitoring foreign intelligence were also compromised.

Authorities investigating the incident are looking into whether Salt Typhoon gained access to US internet infrastructure through Cisco Systems routers(neues Fenster), which are responsible for routing a large percentage of all internet traffic. However, no such link has been confirmed, and while Cisco is investigating the matter, they claim to have found no indication their routers are involved.

What is chat control?

The EU’s chat control legislation, formally called the “Regulation to Prevent and Combat Child Sexual Abuse,” aims to address the growing problem of child sexual abuse material (CSAM) online. Introduced in 2022, it opens the door for mandatory scanning of digital communications, including images, videos, and links, on platforms like messaging apps and email services.

Proponents, including EU officials and child protection advocates, argue that this regulation is necessary to protect children from online exploitation and highlight the difficulty law enforcement faces in accessing encrypted messages used by perpetrators. The proposed law focuses solely on fighting against the “content”, and aims to catch and prevent CSAM from spreading using technology-based mechanisms.

One of the more controversial aspects that arose during the legislative process is the Commission and EU governments’ push for client-side scanning, where messages would be scanned for illegal content before being encrypted. This would potentially allow law enforcement to view not only the content you share(neues Fenster), but also the content you simply save on your device.

The legislation faces strong opposition(neues Fenster) from privacy advocates, academics, digital rights groups, and privacy-focused tech companies, including Proton(neues Fenster). While we fully support measures that help safeguard children, this legislation is not the answer. It would effectively create a new method for mass surveillance, requiring service providers to scan all digital communications indiscriminately. Even worse, such surveillance would do very little, if anything, to catch the perpetrators or help the victims of such despicable acts.

Chat control and end-to-end encryption

A particular point of contention has been E2EE, where only the sender and their intended recipient can access communications between them.

While the European Parliament understands the importance of E2EE in safeguarding citizens’ (including children) privacy while ensuring a high level of cybersecurity, EU Member States see it differently. Despite the ineffectiveness of such measures at protecting the real victims, most EU governments(neues Fenster) are more than happy to use the fight against CSAM as an excuse to require online services to develop systems that allow law enforcement access to all encrypted communications.

Lessons to be learned

There is no such thing as end-to-end encryption with a “backdoor” that only lets the good guys in. Even assuming that governments would not extend the scanning of encrypted communications to any sort of minor criminal offense in the future, implementing a backdoor amounts to creating a weakness that compromises the entire system. And the Salt Typhoon attack on the United States surveillance systems clearly demonstrates that if “authorized personnel” can access a backdoor, so can hackers. 

This includes state-sponsored hackers, and it may be no coincidence that Victor Orban, an authoritarian leader who overtly supports and admires other authoritarian leaders such as Vladimir Putin and Xi Jinping, is so keen to introduce weakness into the encryption standards that keep us all safe. 

Verwandte Artikel

The cover image for a Proton Pass blog comparing SAML and OAuth as protocols for business protection
en
SAML and OAuth help your workers access your network securely, but what's the difference? Here's what you need to know.
Proton Lifetime Fundraiser 7th edition
en
Learn how to join our 2024 Lifetime Account Charity Fundraiser, your chance to win our most exclusive plan and fight for a better internet.
The cover image for a Proton Pass blog about zero trust security showing a dial marked 'zero trust' turned all the way to the right
en
Cybersecurity for businesses is harder than ever: find out how zero trust security can prevent data breaches within your business.
How to protect your inbox from an email extractor
en
  • Privatsphäre-Richtlinien
Learn how an email extractor works, why your email address is valuable, how to protect your inbox, and what to do if your email address is exposed.
How to whitelist an email address and keep important messages in your inbox
en
Find out what email whitelisting is, why it’s useful, how to whitelist email addresses on different platforms, and how Proton Mail can help.
The cover image for Proton blog about cyberthreats businesses will face in 2025, showing a webpage, a mask, and an error message hanging on a fishing hook
en
Thousands of businesses of all sizes were impacted by cybercrime in 2024. Here are the top cybersecurity threats we expect companies to face in 2025—and how Proton Pass can protect your business.