What is Encryption Ban?
Government efforts to outlaw, weaken, or mandate backdoors in end-to-end encryption — arguing that law enforcement needs access to encrypted communications, while security experts warn that any backdoor weakens security for everyone.
Also known as: Encryption Backdoor Mandate, Anti-Encryption Law, Crypto Wars, Going Dark Problem
The "crypto wars" have been raging since the 1990s — governments want to be able to read encrypted messages, while mathematicians and security experts keep explaining why that's technically impossible without making everyone less safe.
The Debate
Government Position ("Going Dark")
- Criminals and terrorists use encryption to communicate beyond law enforcement's reach
- Traditional wiretap capabilities don't work on encrypted messaging
- Law enforcement needs "lawful access" to encrypted content
- Solutions: mandatory backdoors, client-side scanning, or key escrow
Security Expert Position ("Going Bright")
- Backdoors cannot be limited to "good guys" — any weakness will be exploited by criminals and hostile governments
- Law enforcement has more data than ever (metadata, location, cloud backups, device seizure)
- Weakening encryption endangers national security — military, intelligence, and critical infrastructure depend on strong encryption
- No technical solution exists that provides access to one party without creating vulnerability for all
Global Encryption Threats
United States
- EARN IT Act — Would hold platforms liable for user content, effectively pressuring them to abandon encryption
- LAED Act (proposed) — Would require companies to comply with court orders to decrypt
- FBI and DOJ have repeatedly called for encryption backdoors
United Kingdom
- Online Safety Act (2023) — Includes powers to require platforms to scan encrypted messages for illegal content
- Signal and WhatsApp have threatened to leave the UK rather than weaken encryption
- Technical notices can compel companies to build surveillance capabilities
European Union
- "Chat control" proposal — Would require scanning of all messages (including encrypted ones) for child sexual abuse material
- Intense debate between privacy advocates and law enforcement
- Multiple iterations voted down, keep returning
Australia
- Assistance and Access Act (2018) — Can compel companies to create "capabilities" to circumvent encryption
- Broadly criticized by tech industry
- Signal has stated it would rather stop operating in Australia than comply
The Mathematical Reality
As security experts explain: You cannot create a backdoor that only works for authorized parties. Encryption is math. Either the encryption is strong (and no one can break it, including law enforcement), or it's weak (and everyone can break it, including criminals, foreign governments, and hackers).
What's at Stake
If encryption is weakened:
- Banking becomes vulnerable — online transactions depend on encryption
- Medical records are exposed — healthcare privacy requires encryption
- National security is compromised — government communications use the same encryption standards
- Journalists' sources are endangered
- Dissidents in authoritarian countries lose their primary protection
- Business communications become accessible to corporate espionage
Related Terms
EARN IT Act
Proposed US legislation (Eliminating Abusive and Rampant Neglect of Interactive Technologies Act) that would undermine end-to-end encryption by making platforms liable for encrypted content they cannot see.
Encryption Backdoor
A deliberately created vulnerability in encryption that allows a third party (usually government) to bypass the encryption and access protected data.
End-to-End Encryption
A method of secure communication where only the communicating users can read the messages. In principle, it prevents potential eavesdroppers – including telecom providers, Internet providers, and even the provider of the communication service – from being able to access the cryptographic keys needed to decrypt the conversation.
Internet Freedom
The principle that all people should be able to access, use, and share information on the internet without government censorship, surveillance, or corporate gatekeeping — encompassing net neutrality, freedom of expression online, privacy, and resistance to internet shutdowns.
Signal Protocol
A cryptographic protocol that provides end-to-end encryption for voice and instant messaging conversations. Developed by Open Whisper Systems, it combines the Double Ratchet Algorithm, prekeys, and a triple Diffie-Hellman handshake to provide forward secrecy and future secrecy.
Have more questions?
Use our guided flow to get the right next privacy step for Encryption Ban.
Open Guided Flow