TheJakartaPost

Please Update your browser

Your browser is out of date, and may not be compatible with our website. A list of the most popular web browsers can be found below.
Just click on the icons to get to the download page.

Jakarta Post

In defense of encryption

Encryption is under unprecedented threat from established democracies, which are inadvertently paving a dangerous path that the world’s autocrats are only too eager to follow.

Sally Wentworth (The Jakarta Post)
Premium
Project Syndicate/Reston, United States
Fri, October 17, 2025 Published on Oct. 16, 2025 Published on 2025-10-16T12:38:06+07:00

Change text size

Gift Premium Articles
to Anyone

Share the best of The Jakarta Post with friends, family, or colleagues. As a subscriber, you can gift 3 to 5 articles each month that anyone can read—no subscription needed!
Illustration of cybersecurity Illustration of cybersecurity (Shutterstock/Andrii Yalanskyi)

E

ncryption, the simple act of scrambling data so that it cannot be read by third parties, keeps us, our loved ones and our communities safe by protecting everything from private messages to online-banking details and medical records. It is the foundation of trust in our digital society, as crucial for personal security as it is for national security.

Despite this, encryption is under unprecedented threat from established democracies, which are inadvertently paving a dangerous path that the world’s autocrats are only too eager to follow. Specifically, policymakers in these countries often present strong encryption as being at odds with effective law enforcement. But this is a false choice. The reality is that we need legislation that protects people online while also maintaining the security infrastructure that safeguards our data. These goals are not mutually exclusive.

Policymakers continue to claim that creating “backdoors” for law enforcement, exceptional government access to encrypted communications, is necessary to help catch criminals. But cybersecurity research has consistently demonstrated the impossibility of building a backdoor that only the “good guys” can use. A backdoor is a backdoor.

The Salt Typhoon case, in which a Chinese government-supported hacker group gained access to US telecom systems by exploiting backdoors originally created for American law enforcement and intelligence agencies, should have sufficed to show that there is no way to control who exploits engineering vulnerabilities built into a system. However noble their aims, such tools will inevitably become a weapon that criminals, hostile state actors and malicious hackers can abuse.

Consider the European Union’s proposed Child Sexual Abuse Regulation, more commonly known as Chat Control, which would require providers to scan private communications to detect child sexual abuse material (CSAM). While the goal of protecting children from abuse is urgent and critically important, the proposal would compromise the confidentiality provided by end-to-end encryption.

Under the regulation, providers would have to implement client-side scanning, a technology that scans messages on users’ devices before they are encrypted and sent. If breaking encryption is like ripping open an envelope as a letter passes through the post office, client-side scanning is like having someone reading over your shoulder as you write it. The result is the same: privacy and confidentiality are lost. Moreover, client-side scanning would not stop CSAM, as perpetrators can circumvent scanning by zipping the photos or copying and pasting them into another file format.

Viewpoint

Every Thursday

Whether you're looking to broaden your horizons or stay informed on the latest developments, "Viewpoint" is the perfect source for anyone seeking to engage with the issues that matter most.

By registering, you agree with The Jakarta Post's

Thank You

for signing up our newsletter!

Please check your email for your newsletter subscription.

View More Newsletter

Once such systems are in place, they create new vulnerabilities that hold implications for free speech. There is no guarantee, for example, that they will not be used to scan for other types of content, political dissent, union organizing or information that powerful actors want to suppress.

to Read Full Story

  • Unlimited access to our web and app content
  • e-Post daily digital newspaper
  • No advertisements, no interruptions
  • Privileged access to our events and programs
  • Subscription to our newsletters
or

Purchase access to this article for

We accept

TJP - Visa
TJP - Mastercard
TJP - GoPay

Redirecting you to payment page

Pay per article

In defense of encryption

Rp 35,000 / article

1
Create your free account
By proceeding, you consent to the revised Terms of Use, and Privacy Policy.
Already have an account?

2
  • Palmerat Barat No. 142-143
  • Central Jakarta
  • DKI Jakarta
  • Indonesia
  • 10270
  • +6283816779933
2
Total Rp 35,000

Your Opinion Matters

Share your experiences, suggestions, and any issues you've encountered on The Jakarta Post. We're here to listen.

Enter at least 30 characters
0 / 30

Thank You

Thank you for sharing your thoughts. We appreciate your feedback.

Share options

Quickly share this news with your network—keep everyone informed with just a single click!

Change text size options

Customize your reading experience by adjusting the text size to small, medium, or large—find what’s most comfortable for you.

Gift Premium Articles
to Anyone

Share the best of The Jakarta Post with friends, family, or colleagues. As a subscriber, you can gift 3 to 5 articles each month that anyone can read—no subscription needed!

Continue in the app

Get the best experience—faster access, exclusive features, and a seamless way to stay updated.