The elements of the investigation that have been communicated to us are staggering. Here are just some of the practices that are being misused as evidence of terrorist behavior:

– the use of applications such as Signal, WhatsApp, Wire, Silence or ProtonMail to encrypt communications ;

– using Internet privacy tools such as VPN, Tor or Tails7 ;

– protecting ourselves against the exploitation of our personal data by GAFAM via services such as /e/OS, LineageOS, F-Droid ;

– encrypting digital media;

– organizing and participating in digital hygiene training sessions;

– simple possession of technical documentation.

https://www.laquadrature.net/en/2023/06/05/criminalization-of-encryption-the-8-december-case/

Reply to this note

Please Login to reply.

Discussion

No replies yet.