Tag: CSAM
What encryption is, and why Kenyans should keep using it
In this blog, we examine what end-to-end encryption is, how it works, and why Kenyans should keep using it.
Who we hurt when we attack encryption
Encryption is a vital tool for keeping human rights defenders safe from powerful adversaries. Case studies from Access Now’s Digital Security Helpline show how strong encryption makes the world safer for everyone.
Four strategies to defend encryption and our human rights
When we fight for encryption, we fight for human rights. It enables us to stay safe online, and communicate privately and freely. Yet governments keep pushing to undermine it, and companies are caving in. Here are four ways encryption advocates can push back.
Apple pausa el escaneo ‘hash’ de imágenes en dispositivos tras preocupación de la sociedad civil
Apple taking pause after civil society calls to shelve on-device image hash scanning
Apple’s plan to implement client-side scanning is not a viable or proportionate solution to Child Sexual Abuse Material (CSAM) online. The plan circumvents end-to-end encryption and puts everyone’s privacy and security at risk by reducing individuals’ control over their own devices.
Access Now urges Apple to restore trust by rolling back plans to circumvent end-to-end encryption on its devices
Apple’s plan to implement client-side scanning is not a viable or proportionate solution to Child Sexual Abuse Material (CSAM) online. The plan circumvents end-to-end encryption and puts everyone’s privacy and security at risk by reducing individuals’ control over their own devices.