• Home
    • What is
    • Computer security
      • Windows security
      • Mac security
      • Linux security
    • Mobile security
      • Android security
      • iOS Security
    • Data security
    • SCCM
    • Reviews
      • Case studies
    • Advertise
    • Contact
      • Privacy Policy
  • Subscribe now

    Loading
  • Home
  • What is
  • Computer security
    • Windows security
    • Mac security
    • Linux security
  • Mobile security
    • Android security
    • iOS Security
  • Data security
  • SCCM
  • Reviews
    • Case studies
  • Advertise
  • Contact
    • Privacy Policy
Home » Breaking Computer security Cyber Security Intruders Latest Cybersecurity News

No Place to Hide campaign aims to halt end-to-end encryption

William Marshal Posted On January 20, 2022
0



No Place to Hide UK campaign

The United Kingdom new campaign called No Place to Hide asks tech companies to halt their end-to-end protection protocol on social media platforms to help the law enforcement official track down child abuse and exploitation.

End-to-end protection is already existing in certain social media platforms, and will be adopted by other medias including Facebook Messenger, Instagram and others to deliver increased privacy. End-to-end encryption will allow only the sender and receiver the privilege to view the messages, and not the service provider or other bodies won’t be able to look at the conversation.

UK based campaign No Place to Hide and its purpose

The campaign No Place to Hide, may benefit children as it will allow law enforcement agencies to look into social media conversation identifying child abuse and harassment. As of now there are 14 million reports of child sexual abuse that is being registered online, and these could have massive hit when end-to-end encryption is employed. Furthermore, this privacy improvement could benefit the citizens in general but it will take a massive toll on child safety.

No Place to Hide campaign
Source: No Place to Hide Campaign

However, No Place to Hide isn’t completely against end-to-end encryption, but their steps may things difficult for tech firms to proceed with the same.  The campaign asks tech firms to ensure they can protect children and prove that the encryption protocol that will be adopted by them will not risk child safety. So companies must define their encryption in such a way that it will keep child safety in mind and do their best to offer the same while encrypting conversations.

Privacy or child safety – A question that is tough to answer

The campaign is largely funded by the UK government followed by charities, survivors and safety-tech companies. As  per the Rolling Stone report around $725,000 is allocated for the campaign. On the other hand, Big Brother Watch, a UK civil liberties group has responded that this campaign is only to wider the surveillance on private conversations.

This is a debatable topic, as both privacy and safety are important to citizens. However, we at The Cybersecurity Times believe that there could be an alternative formula to mitigate the situation as child safety is even more important than privacy. As safety is basic need for anyone, while privacy is definetly not a necessity but a right. Tech firms can look for alternate means to handle the situation, and we hope they will.

Subscribe to our newsletter for daily alerts on cyber events, you can also follow us on Facebook, Linkedin, Instagram, Twitter and Reddit.

You can reach out to us via Twitter or Facebook, for any advertising requests.

Share the article with your friends


No Place to HideNo Place to Hide CampaignNo Place to Hide UK Campaign


Author

William Marshal

William has been one of the key contributors to 'The Cybersecurity Times' with 9.5 years of experience in the cybersecurity journalism. Apart from writing, he also like hiking, skating and coding.

Leave A Reply

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

This site uses Akismet to reduce spam. Learn how your comment data is processed.

  • Subscribe to our newsletter

    Loading
  • Windows security

    • Top 9 Best Log Management Tools for 2025
      September 20, 2025
    • Top 4 Remote Support Tools for 2025- Best Remote Support...
      September 18, 2025
    • Top 5 Best Unified Endpoint Management (UEM) Software...
      September 12, 2025
    • Top 5 Threat Intelligence Tools For 2025
      July 25, 2025
    • Top 5 Best Microsoft Intune Alternatives to Consider...
      July 23, 2025


  • About us

    Our vision is to deliver the trending and happening cyber events to the enthusiasts.

    We believe in delivering educational and quality content for hassle-free understanding of the subject.

  • Subscribe to our newsletter

    Loading
  • Follow us

  • Advertise with us

    You can reach us via Facebook, Linkedin, or Twitter for advertising purposes.


© The Cybersecurity Times 2022. All rights reserved.
Press enter/return to begin your search