The Global Encryption Coalition, and the Internet Society as a founding member, urges the Canadian government to withdraw Bill C-22.
-
The Global Encryption Coalition, and the Internet Society as a founding member, urges the Canadian government to withdraw Bill C-22. Imposing backdoors on services jeopardizes our digital security. 1/
-
Mandating backdoors exposes Canadians to foreign surveillance and privacy threats. With new AI systems collapsing the timeline from discovery to exploitation to mere hours, adversaries will weaponize these flaws almost instantly. 3/
Our open letter asks the government to withdraw C-22 and conduct an Internet Impact Assessment. Experts and organizations can sign until May 12, 2026. Read and sign: https://www.globalencryption.org/2026/04/open-letter-on-bill-c-22-an-act-respecting-lawful-access/ 4/
-
The Global Encryption Coalition, and the Internet Society as a founding member, urges the Canadian government to withdraw Bill C-22. Imposing backdoors on services jeopardizes our digital security. 1/
While Bill C-22 aims to make Canadians safer, Part 2 forces services to install technical capabilities to access sensitive data. There is no way to provide backdoor access to encrypted data without compromising the security of millions. 2/
-
Our open letter asks the government to withdraw C-22 and conduct an Internet Impact Assessment. Experts and organizations can sign until May 12, 2026. Read and sign: https://www.globalencryption.org/2026/04/open-letter-on-bill-c-22-an-act-respecting-lawful-access/ 4/
Want to take action? Write a letter to your MP and ask them to reject Bill C-22: https://www.internetsociety.org/our-work/internet-policy/keep-canada-protected/ 5/
-
While Bill C-22 aims to make Canadians safer, Part 2 forces services to install technical capabilities to access sensitive data. There is no way to provide backdoor access to encrypted data without compromising the security of millions. 2/
Mandating backdoors exposes Canadians to foreign surveillance and privacy threats. With new AI systems collapsing the timeline from discovery to exploitation to mere hours, adversaries will weaponize these flaws almost instantly. 3/
-
R relay@relay.infosec.exchange shared this topic