The use of encryption and anonymity to exercise the rights to freedom of opinion and expression in the digital age 2015, para. 44
Paragraph- Paragraph text
- A key escrow system permits individual access to encryption but requires users to store their private keys with the Government or a "trusted third party". Key escrows, however, have substantial vulnerabilities. For instance, the key escrow system depends on the integrity of the person, department or system charged with safeguarding the private keys, and the key database itself could be vulnerable to attack, undermining any user's communication security and privacy. Key escrow systems, rejected (along with back-door access) after significant debate in the United States in the so-called Crypto Wars of the 1990s, are currently in place in several countries and have been proposed in others. In 2011, Turkey passed regulations requiring encryption suppliers to provide copies of encryption keys to government regulators before offering their encryption tools to users. The vulnerabilities inherent in key escrows render them a serious threat to the security to exercise the freedom of expression.
- Legal status
- Non-negotiated soft law
- Body
- Special Rapporteur on the promotion and protection of the right to freedom of opinion and expression
- Document type
- Special Procedures' report
- Means of adoption
- N.A.
- Topic(s)
- Governance & Rule of Law
- Person(s) affected
- N.A.
- Year
- 2015
- Paragraph type
- Other
- Reference
- SR Freedom of Opinion, Report to the HRC (2015), A/HRC/29/32, para. 44.
- Paragraph number
- 44
sorted by
Date added
58 relationships, 58 entities