Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

FTC Calls on Tech Firms to Resist Foreign Anti-Encryption Demands

Posted on August 26, 2025August 26, 2025 By CWS

The Federal Commerce Fee (FTC) has despatched letters to main tech corporations in the USA, urging them to withstand international governments’ calls for to weaken encryption. 

The letters had been despatched by FTC Chairman Andrew Ferguson to Akamai, Alphabet (Google), Amazon, Apple, Cloudflare, Discord, GoDaddy, Meta, Microsoft, Sign, Snap, Slack, and X.

Ferguson instructed the businesses that they may really feel pressured to weaken information safety and privateness protections on the request of international governments, or in response to their legal guidelines. The EU’s Digital Providers Act and the UK’s On-line Security Act and Investigatory Powers Act got as examples by the FTC chairman. 

The Investigatory Powers Act was not too long ago cited by the British authorities as an argument for requesting that Apple present backdoor entry to encrypted information. The US introduced final week that the UK had deserted this demand.

Nonetheless, the FTC desires to make sure that American tech corporations don’t give in to such calls for sooner or later.  

“I’m involved that these actions by international powers to impose censorship and weaken end-to-end encryption will erode Individuals’ freedoms and topic them to myriad harms, comparable to surveillance by international governments and an elevated danger of identification theft and fraud,” Ferguson stated. 

“I’m additionally involved that corporations comparable to your individual may try and simplify compliance with the legal guidelines, calls for, or anticipated calls for of international governments by censoring Individuals or subjecting them to elevated international surveillance even when the international authorities’s requests don’t technically require that,” he added. 

The FTC official stated international corporations is perhaps tempted to just accept the calls for made by international governments to simplify operations and compliance through the use of the identical insurance policies throughout jurisdictions.Commercial. Scroll to proceed studying.

Nonetheless, Ferguson highlighted that corporations have “impartial obligations to American customers below Part 5 of the Federal Commerce Fee Act, which prohibits unfair or misleading acts or practices in or affecting commerce”.

Particularly, if an organization advertises safe communications however then makes use of weak encryption to adjust to a international authorities’s calls for, it could possibly symbolize a violation of the FTC Act. 

The company identified that it has introduced dozens of circumstances in opposition to corporations that didn’t hold guarantees to guard client information.

Governments frequently name for the introduction of encryption backdoors, primarily arguing that they’re wanted to facilitate felony investigations. The present Trump administration seems to oppose encryption backdoors, however the earlier Trump administration did make such calls for. 

Nonetheless, privateness advocates and the cybersecurity trade have raised considerations that encryption backdoors applied for good functions may also be leveraged by criminals and international intelligence businesses, undermining the very safety they’re designed to guard. 

Associated: Encryption Backdoors: The Safety Practitioners’ View

Associated: Fraud Losses Reached $12.5 Billion in 2024: FTC

Associated: Order Out of Chaos – Utilizing Chaos Concept Encryption to Shield OT and IoT

Security Week News Tags:AntiEncryption, Calls, Demands, Firms, Foreign, FTC, Resist, Tech

Post navigation

Previous Post: Threat Actors Adapting Android Droppers Even to Deploy Simple Malware to Stay Future-Proof
Next Post: Organizations Warned of Exploited Git Vulnerability

Related Posts

Flaws Expose 100 Dell Laptop Models to Implants, Windows Login Bypass Security Week News
Vibe Coding: When Everyone’s a Developer, Who Secures the Code? Security Week News
SAP Patches Critical Flaws That Could Allow Remote Code Execution, Full System Takeover Security Week News
Critical Microsens Product Flaws Allow Hackers to Go ‘From Zero to Hero’ Security Week News
CodeSecCon Is Today: Where Software Security’s Next Chapter Unfolds (Virtual Event) Security Week News
Possible Zero-Day Patched in SonicWall SMA Appliances Security Week News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Docker Desktop Vulnerability Leads to Host Compromise
  • AI Systems Vulnerable to Prompt Injection via Image Scaling Attack
  • X/Twitter The Most Aggressive Social Media App Collecting Users Location Information
  • HOOK Android Trojan Adds Ransomware Overlays, Expands to 107 Remote Commands
  • Malicious Bing Ads deploy Weaponized PuTTY to Exploit Kerberos and Attack Active Directory services

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Docker Desktop Vulnerability Leads to Host Compromise
  • AI Systems Vulnerable to Prompt Injection via Image Scaling Attack
  • X/Twitter The Most Aggressive Social Media App Collecting Users Location Information
  • HOOK Android Trojan Adds Ransomware Overlays, Expands to 107 Remote Commands
  • Malicious Bing Ads deploy Weaponized PuTTY to Exploit Kerberos and Attack Active Directory services

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News