Insights from Egor Alshevski
To explore these pressing issues, we engaged with Egor Alshevski, the CEO and founder of InTouch AG. Alshevski, a passionate entrepreneur and philanthropist, has dedicated significant resources to developing a fully secure messaging platform. However, as he delved deeper into the project, he encountered challenges that revealed the complexities of achieving such an ambitious goal.
Q: Egor, is it feasible to create a 100% secure messenger?
Egor Alshevski: There is a widespread belief that with enough technological advancement, absolute security can be achieved. However, the reality is that creating a completely secure messenger is not possible. While we can implement advanced encryption methods, stringent security protocols, and ongoing monitoring, vulnerabilities will always exist. These vulnerabilities can arise from software flaws, hardware issues, or the ever-evolving tactics employed by cybercriminals. The threat landscape is dynamic, necessitating constant adaptation of our defenses, but we must accept that no system can be entirely immune to attacks.
Q: How does government intervention impact the development of secure messaging platforms?
Egor Alshevski: Government pressure is one of the most significant obstacles we face. Authorities possess a variety of tools, from legislative actions to technical surveillance. For example, Australia’s Assistance and Access Act of 2018 effectively requires companies to create backdoors in their encryption or to weaken their security protocols upon request from law enforcement. Such legislation undermines the very essence of secure messaging.
Another concerning instance is the proposed EU Child Sexual Abuse Regulation, which, while aimed at preventing the spread of illegal content, would effectively dismantle encryption by mandating that service providers scan all communications. This requirement would compromise the privacy protections that encryption is designed to uphold.
Recent developments have highlighted the mounting pressure on tech companies to comply with governmental demands for user data access. Privacy and free speech advocates, who resist these backdoor access attempts, find themselves in increasingly precarious positions. This scenario raises significant concerns about the future of privacy and freedom in the digital realm, as governments continue to assert control over digital communications and challenge those who oppose such measures.
Q: What methods do governments employ to bypass encryption, and how do these affect user security?
Egor Alshevski: Governments utilize sophisticated techniques to access communications, even when encrypted. For instance, they may employ GSM ID tracking to monitor mobile devices and intercept communications directly. Additionally, vulnerabilities in device software can be exploited to gain access to data, circumventing encryption altogether.
Moreover, even if message content is encrypted, metadata—such as the identities of communicators, timestamps, and duration of conversations—remains accessible. This metadata can reveal significant insights into a person’s communication habits and can be utilized for tracking purposes.