{"id":33233,"date":"2024-07-19T14:20:26","date_gmt":"2024-07-19T12:20:26","guid":{"rendered":"https:\/\/www.uni.lu\/en\/?post_type=news&#038;p=33233"},"modified":"2024-07-19T14:33:59","modified_gmt":"2024-07-19T12:33:59","slug":"striking-the-balance-in-communication-privacy-and-lawful-interception","status":"publish","type":"news","link":"https:\/\/www.uni.lu\/en\/news\/striking-the-balance-in-communication-privacy-and-lawful-interception\/","title":{"rendered":"Striking the balance in communication privacy and lawful interception"},"content":{"rendered":"\n<section class=\"wp-block-unilux-blocks-free-section section\"><div class=\"container xl:max-w-screen-xl\">\n<p><strong>A new security protocol walks the fine line between legitimate interception of communication and protection of privacy rights.<\/strong><\/p>\n\n\n\n<p>Researchers at the University of Luxembourg and the KASTEL Security Research Labs have devised a security protocol that enables court-authorised monitoring of end-to-end encrypted or anonymous communications, while simultaneously detecting illicit or extensive surveillance activities.<\/p>\n\n\n\n<p>\u201c<em>Our aim is to bolster public trust in the integrity of operators and law enforcement agencies significantly<\/em>\u201d, explains Dr <a href=\"https:\/\/www.uni.lu\/fstm-en\/people\/andy-rupp\/\">Andy Rupp<\/a>, research scientist at the <a href=\"https:\/\/www.uni.lu\/fstm-en\/\">Faculty of Science, Technology and Medicine<\/a> of the University of Luxembourg.<\/p>\n\n\n\n<p>In today&#8217;s digital landscape, the right to respect for private life, as enshrined in Article 7 of the EU Charter of Fundamental Rights (and Article 8 of the European Convention on Human Rights) holds a paramount significance. Privacy is key for democracy and for ensuring human dignity, self-determination and personal development. The demand for anonymity and data confidentiality aligns closely with legal instruments, such as the General Data Protection Regulation (GDRP).<\/p>\n\n\n\n<p>At the same time, there is a push by law enforcement agencies to extend the coverage of laws and regulations for legitimate interception, such as the European Council Resolution on the Lawful Interception of Telecommunications&nbsp; from classical telecommunication providers to modern once like instant messaging providers. In Germany, the Act to Restrict the Privacy of Correspondence, Posts and Telecommunications (G10 Act) allows the German domestic intelligence services to intercept and record telecommunications so as to avert imminent danger to the free democratic basic order or to the existence or security of Germany and its federal states. <a href=\"https:\/\/www.uni.lu\/fdef-en\/people\/niovi-vavoula\/\">Niovi Vavoula<\/a>, Associate professor in cyber policy at the <a href=\"https:\/\/www.uni.lu\/fdef-en\">Faculty of Law, Economics and Finance<\/a>, explains: \u201c<em>Germany has in parallel recently published a draft law requiring messaging platforms, email, and cloud service providers to offer users the possibility,&#8221;wherever it is technically possible&#8221;, to encrypt their data<\/em>\u201d. In April 2024, the European Police Chiefs issued a Joint Declaration calling on EU Member States to take action against end-to-end encryption roll-out in instant messaging services, stating this technology prevents the fight against crime. \u201c<em>Many applications are confronted with legal requirements that restrict individual\u2019s privacy and anonymity guarantees, for instance in electronic payments or lawful interception of telecommunications, where surveillance is mandated to investigate suspected crimes<\/em>\u201d.<\/p>\n\n\n\n<p>As a result, many systems have backdoors embedded into the systems, allowing law enforcement agencies to disclose information about a suspect. These bear the risk of silently misusing these backdoors by other agencies, malicious employees, or also external \u201chackers\u201d, due to a lack of robust technical components to prevent ensuing clandestine mass surveillance or illicit targeted surveillance. This unlawful interception is precisely what the security protocols proposed by Andy Rupp\u2019s team aim to prevent.<\/p>\n\n\n\n<p>The research team has introduced a framework for targeted auditable surveillance, offering honest users multifaceted protection. Digital backdoors operate only for short periods of time and exclusively for designated individuals. At the heart of their framework are cryptographic protocols that force law enforcement agencies to first deposit a (encrypted) surveillance warrant at a tamper-proof public storage, a blockchain, before they are able to access a suspect\u2019s backdoor. A large committee of entities are responsible for checking the legitimacy of the warrant and assisting in providing the backdoor.<\/p>\n\n\n\n<p>How are trusted entities established? \u201c<em>We try to establish trust by a large committee of anonymous people which also change frequently to make collusion and corruption harder. The system is robust in the sense that it still works securely if some minority of committee members are malicious or unresponsive,<\/em>\u201d explains Andy Rupp.<\/p>\n\n\n\n<p>Since immutable records of surveillance measures are left on the blockchain, this enables subsequent in-depth audits by an impartial examiner. Moreover, by counting the number of records for a specific service, e.g. some instant messaging service, the general public can be reassured that no mass surveillance is deployed by government agencies. Of course, as the records deposited on the blockchain can be accessed by anyone, special care needs to be taken to not leak sensitive information about surveillance actions to the public and a potential suspect. The prospective applications of this auditable surveillance framework span across various sectors, from mobile communication systems like 5G and instant messaging services to anonymous electronic payment transactions and privacy-enhancing video surveillance. \u201c<em>We have outlined an initial auditable surveillance framework.<\/em>\u201d, emphasises Andy Rupp. \u201c<em>Numerous technical and legal hurdles would need to be addressed before a real-world application. This will be the focus of our interdisciplinary research endeavours moving forward.<\/em>\u201d<\/p>\n\n\n<ul class=\"flex flex-wrap mt-24 -mx-16  wp-block-unilux-blocks-free-content-card\">\n    <li class=\"w-full sm:w-1\/2 lg:w-1\/3 px-16 wp-block-unilux-blocks-people-item-automated\"><div class=\"ulux-card card-people bg-theme\">    <div class=\"ulux-card__container\">\n        <div class=\"ulux-card__visual\">\n            <!-- Template Image Component: default -->\n<img decoding=\"async\" class=\"w-full\" width=\"\" height=\"\" rel=\"\" alt=\"Dr. Andy RUPP\" src=\"https:\/\/www.uni.lu\/en\/person-image\/NTAwMzYzNzdfX0FuZHkgUlVQUA==\" srcset=\"https:\/\/www.uni.lu\/en\/person-image\/NTAwMzYzNzdfX0FuZHkgUlVQUA==--thumbnail 150w,https:\/\/www.uni.lu\/en\/person-image\/NTAwMzYzNzdfX0FuZHkgUlVQUA==--medium 300w,https:\/\/www.uni.lu\/en\/person-image\/NTAwMzYzNzdfX0FuZHkgUlVQUA==--medium_large 768w,https:\/\/www.uni.lu\/en\/person-image\/NTAwMzYzNzdfX0FuZHkgUlVQUA==--large 1024w,https:\/\/www.uni.lu\/en\/person-image\/NTAwMzYzNzdfX0FuZHkgUlVQUA==--1536x1536 1536w,https:\/\/www.uni.lu\/en\/person-image\/NTAwMzYzNzdfX0FuZHkgUlVQUA==--2048x2048 2048w\" loading=\"lazy\" \/><!-- end Image Component -->\n        <\/div>\n        <div class=\"ulux-card__body card-people\">\n            <h3 class=\"card__name\">Dr. Andy RUPP<\/h3>\n            <div class=\"card__organization\">FSTM<\/div>\n            <div class=\"card__function\">Research scientist<\/div>\n            <div class=\"ulux-card__link-wrapper card__link wp-block-unilux-blocks-simple-cta wp-block-unilux-blocks-people-item-automated\">\n    <a\n        href=\"https:\/\/www.uni.lu\/fstm-en\/people\/andy-rupp\/\"\n        title=\"Dr. Andy RUPP\"\n        class=\"link-text link-text--icon ulux-card__link link-absolute\"\n        target=\"\"\n    >\n        <span class=\"link-text__body\">\n            <span class=\"link-text__name\">Learn more<\/span>\n        <\/span>\n        <svg aria-hidden=\"true\" focusable=\"false\" class=\"icon icon-outline icon--arrow-right \"><use xlink:href=\"https:\/\/www.uni.lu\/wp-content\/themes\/unilux-theme\/assets\/images\/icons\/icons-outline.svg#icon--arrow-right\"><\/use><\/svg>    <\/a>\n<\/div>\n        <\/div>\n    <\/div>\n<\/div><\/li><li class=\"w-full sm:w-1\/2 lg:w-1\/3 px-16 wp-block-unilux-blocks-people-item-automated\"><div class=\"ulux-card card-people bg-theme\">    <div class=\"ulux-card__container\">\n        <div class=\"ulux-card__visual\">\n            <!-- Template Image Component: default -->\n<img decoding=\"async\" class=\"w-full\" width=\"\" height=\"\" rel=\"\" alt=\"Assoc. Prof Niovi VAVOULA\" src=\"https:\/\/www.uni.lu\/en\/person-image\/NTAwNzYwNzFfX05pb3ZpIFZBVk9VTEE=\" srcset=\"https:\/\/www.uni.lu\/en\/person-image\/NTAwNzYwNzFfX05pb3ZpIFZBVk9VTEE=--thumbnail 150w,https:\/\/www.uni.lu\/en\/person-image\/NTAwNzYwNzFfX05pb3ZpIFZBVk9VTEE=--medium 300w,https:\/\/www.uni.lu\/en\/person-image\/NTAwNzYwNzFfX05pb3ZpIFZBVk9VTEE=--medium_large 768w,https:\/\/www.uni.lu\/en\/person-image\/NTAwNzYwNzFfX05pb3ZpIFZBVk9VTEE=--large 1024w,https:\/\/www.uni.lu\/en\/person-image\/NTAwNzYwNzFfX05pb3ZpIFZBVk9VTEE=--1536x1536 1536w,https:\/\/www.uni.lu\/en\/person-image\/NTAwNzYwNzFfX05pb3ZpIFZBVk9VTEE=--2048x2048 2048w\" loading=\"lazy\" \/><!-- end Image Component -->\n        <\/div>\n        <div class=\"ulux-card__body card-people\">\n            <h3 class=\"card__name\">Assoc. Prof Niovi VAVOULA<\/h3>\n            <div class=\"card__organization\">FDEF<\/div>\n            <div class=\"card__function\">Associate professor in Cyber Policy, Chair in Cyber Policy<\/div>\n            <div class=\"ulux-card__link-wrapper card__link wp-block-unilux-blocks-simple-cta wp-block-unilux-blocks-people-item-automated\">\n    <a\n        href=\"https:\/\/www.uni.lu\/fdef-en\/people\/niovi-vavoula\/\"\n        title=\"Assoc. Prof Niovi VAVOULA\"\n        class=\"link-text link-text--icon ulux-card__link link-absolute\"\n        target=\"\"\n    >\n        <span class=\"link-text__body\">\n            <span class=\"link-text__name\">Learn more<\/span>\n        <\/span>\n        <svg aria-hidden=\"true\" focusable=\"false\" class=\"icon icon-outline icon--arrow-right \"><use xlink:href=\"https:\/\/www.uni.lu\/wp-content\/themes\/unilux-theme\/assets\/images\/icons\/icons-outline.svg#icon--arrow-right\"><\/use><\/svg>    <\/a>\n<\/div>\n        <\/div>\n    <\/div>\n<\/div><\/li><\/ul><\/div><\/section>\n\n\n<section class=\"section section wp-block-unilux-blocks-quick-link-discover-section py-0\">\n    <div class=\"container xl:max-w-screen-xl\">\n        \n<h2 class=\"has-text-align-left wp-block-unilux-blocks-heading\"        id=\"discover-more\"\n    >\nDiscover more<\/h2>\n\n<ul class=\"wp-block-unilux-blocks-quick-link-discover quick-link-list\">\n<li class=\"wp-block-unilux-blocks-quick-link-discover-item\">\n    <a\n                    href=\"https:\/\/eprint.iacr.org\/2023\/1343\"\n                    class=\"quick-link\"\n            target=\"_blank\"\n    >\n            <span class=\"quick-link__container\">\n                <span class=\"quick-link__text\">\n                    Preliminary findings presented at the Asiacrypt 2023 Conference                 <\/span>\n                <svg aria-hidden=\"true\" focusable=\"false\" class=\"icon icon-outline icon--external-link \"><use xlink:href=\"https:\/\/www.uni.lu\/wp-content\/themes\/unilux-theme\/assets\/images\/icons\/icons-outline.svg#icon--external-link\"><\/use><\/svg>            <\/span>\n    <\/a>\n<\/li>\n<\/ul>\n    <\/div>\n<\/section>\n\n\n<section class=\"wp-block-unilux-blocks-free-section section\"><div class=\"container xl:max-w-screen-xl\">\n<h2 class=\"w-full sm:w-1\/2 px-16 has-text-align-left wp-block-unilux-blocks-heading\"        id=\"read-also\"\n    >\nRead also<\/h2>\n\n\n\n<ul class=\"wp-block-unilux-blocks-news-card-group flex flex-wrap -mx-16\"><li class=\"w-full sm:w-1\/2 px-16 w-full px-16 sm:w-1\/2  wp-block-unilux-blocks-news-card\">\n    <div class=\"ulux-card card-news bg-theme\">\n        <div class=\"ulux-card__container\">\n            <div class=\"ulux-card__visual\">\n                <img decoding=\"async\" class=\"w-full\" src=\"https:\/\/www.uni.lu\/wp-content\/uploads\/sites\/9\/2024\/05\/e-voting-by-phone-c-envato-elements-300x225.png\" srcset=\"https:\/\/www.uni.lu\/wp-content\/uploads\/sites\/9\/2024\/05\/e-voting-by-phone-c-envato-elements-768x576.png 768w, https:\/\/www.uni.lu\/wp-content\/uploads\/sites\/9\/2024\/05\/e-voting-by-phone-c-envato-elements-300x225.png 300w, https:\/\/www.uni.lu\/wp-content\/uploads\/sites\/9\/2024\/05\/e-voting-by-phone-c-envato-elements-1024x768.png 1024w, https:\/\/www.uni.lu\/wp-content\/uploads\/sites\/9\/2024\/05\/e-voting-by-phone-c-envato-elements.png 1500w\" sizes=\"(max-width: 768px) 100vw, 768px\" alt=\"\" \/>\n            <\/div>\n\n            <div class=\"ulux-card__body\">\n                <h3 class=\"ulux-card__title break-words\">Cast your vote: making e-voting safer and verifiable<\/h3>\n                <div class=\"ulux-card__category break-words\">Research<\/div>\n                <time class=\"ulux-card__date break-words\"\n                        datetime=\"2024-05-03\">3 May 2024<\/time>\n                <div class=\"ulux-card__topic break-words\">Computer Science &amp; ICT<\/div>\n                <a class=\"ulux-card__link link-text link-absolute\"\n                    href=\"https:\/\/www.uni.lu\/en\/news\/cast-your-vote-making-e-voting-safer-and-verifiable\/\"\n                    target=\"\">\n                    <span class=\"link-text__name\">Learn more<\/span>\n                    <svg aria-hidden=\"true\" focusable=\"false\" class=\"icon icon-outline icon--arrow-right icon--2xs\"><use xlink:href=\"https:\/\/www.uni.lu\/wp-content\/themes\/unilux-theme\/assets\/images\/icons\/icons-outline.svg#icon--arrow-right\"><\/use><\/svg>                <\/a>\n            <\/div>\n        <\/div>\n    <\/div>\n<\/li>\n<\/ul>\n<\/div><\/section>\n","protected":false},"excerpt":{"rendered":"<p>A new security protocol walks the fine line between legitimate interception of communication and protection of privacy rights.<\/p>\n","protected":false},"author":42,"featured_media":33234,"template":"","format":"standard","meta":{"featured_image_focal_point":[],"show_featured_caption":false,"ulux_newsletter_groups":"","uluxPostTitle":"","uluxPrePostTitle":"","_trash_the_other_posts":false,"_price":"","_stock":"","_tribe_ticket_header":"","_tribe_default_ticket_provider":"","_tribe_ticket_capacity":"0","_ticket_start_date":"","_ticket_end_date":"","_tribe_ticket_show_description":"","_tribe_ticket_show_not_going":false,"_tribe_ticket_use_global_stock":"","_tribe_ticket_global_stock_level":"","_global_stock_mode":"","_global_stock_cap":"","_tribe_rsvp_for_event":"","_tribe_ticket_going_count":"","_tribe_ticket_not_going_count":"","_tribe_tickets_list":"[]","_tribe_ticket_has_attendee_info_fields":false},"news-category":[11],"news-topic":[17,25],"organisation":[108,32],"authorship":[42],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v22.3 (Yoast SEO v22.3) - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Striking the balance in communication privacy and lawful interception - University of Luxembourg<\/title>\n<meta name=\"description\" content=\"A new security protocol walks the fine line between legitimate interception of communication and protection of privacy rights.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.uni.lu\/en\/news\/striking-the-balance-in-communication-privacy-and-lawful-interception\/\" \/>\n<meta property=\"og:locale\" content=\"en_GB\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Striking the balance in communication privacy and lawful interception\" \/>\n<meta property=\"og:description\" content=\"A new security protocol walks the fine line between legitimate interception of communication and protection of privacy rights.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.uni.lu\/en\/news\/striking-the-balance-in-communication-privacy-and-lawful-interception\/\" \/>\n<meta property=\"og:site_name\" content=\"UNI EN\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/uni.lu\" \/>\n<meta property=\"article:modified_time\" content=\"2024-07-19T12:33:59+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.uni.lu\/wp-content\/uploads\/sites\/9\/2024\/07\/cybersecurity-c-envato-elements-credit-tonybangkok-2023-11-27-05-30-55-utc-scaled.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"2560\" \/>\n\t<meta property=\"og:image:height\" content=\"1707\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Estimated reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"NewsArticle\",\"@id\":\"https:\/\/www.uni.lu\/en\/news\/striking-the-balance-in-communication-privacy-and-lawful-interception\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.uni.lu\/en\/news\/striking-the-balance-in-communication-privacy-and-lawful-interception\/\"},\"author\":{\"name\":\"svankelst\",\"@id\":\"https:\/\/www.uni.lu\/en\/#\/schema\/person\/bbacc9db2c68a323b1a3cbdab743cd0c\"},\"headline\":\"Striking the balance in communication privacy and lawful interception\",\"datePublished\":\"2024-07-19T12:20:26+00:00\",\"dateModified\":\"2024-07-19T12:33:59+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.uni.lu\/en\/news\/striking-the-balance-in-communication-privacy-and-lawful-interception\/\"},\"wordCount\":749,\"publisher\":{\"@id\":\"https:\/\/www.uni.lu\/en\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.uni.lu\/en\/news\/striking-the-balance-in-communication-privacy-and-lawful-interception\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.uni.lu\/wp-content\/uploads\/sites\/9\/2024\/07\/cybersecurity-c-envato-elements-credit-tonybangkok-2023-11-27-05-30-55-utc-scaled.jpg\",\"inLanguage\":\"en-GB\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.uni.lu\/en\/news\/striking-the-balance-in-communication-privacy-and-lawful-interception\/\",\"url\":\"https:\/\/www.uni.lu\/en\/news\/striking-the-balance-in-communication-privacy-and-lawful-interception\/\",\"name\":\"Striking the balance in communication privacy and lawful interception - University of Luxembourg\",\"isPartOf\":{\"@id\":\"https:\/\/www.uni.lu\/en\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.uni.lu\/en\/news\/striking-the-balance-in-communication-privacy-and-lawful-interception\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.uni.lu\/en\/news\/striking-the-balance-in-communication-privacy-and-lawful-interception\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.uni.lu\/wp-content\/uploads\/sites\/9\/2024\/07\/cybersecurity-c-envato-elements-credit-tonybangkok-2023-11-27-05-30-55-utc-scaled.jpg\",\"datePublished\":\"2024-07-19T12:20:26+00:00\",\"dateModified\":\"2024-07-19T12:33:59+00:00\",\"description\":\"A new security protocol walks the fine line between legitimate interception of communication and protection of privacy rights.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.uni.lu\/en\/news\/striking-the-balance-in-communication-privacy-and-lawful-interception\/#breadcrumb\"},\"inLanguage\":\"en-GB\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.uni.lu\/en\/news\/striking-the-balance-in-communication-privacy-and-lawful-interception\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\/\/www.uni.lu\/en\/news\/striking-the-balance-in-communication-privacy-and-lawful-interception\/#primaryimage\",\"url\":\"https:\/\/www.uni.lu\/wp-content\/uploads\/sites\/9\/2024\/07\/cybersecurity-c-envato-elements-credit-tonybangkok-2023-11-27-05-30-55-utc-scaled.jpg\",\"contentUrl\":\"https:\/\/www.uni.lu\/wp-content\/uploads\/sites\/9\/2024\/07\/cybersecurity-c-envato-elements-credit-tonybangkok-2023-11-27-05-30-55-utc-scaled.jpg\",\"width\":2560,\"height\":1707},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.uni.lu\/en\/news\/striking-the-balance-in-communication-privacy-and-lawful-interception\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.uni.lu\/en\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"News\",\"item\":\"https:\/\/www.uni.lu\/en\/news\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Striking the balance in communication privacy and lawful interception\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.uni.lu\/en\/#website\",\"url\":\"https:\/\/www.uni.lu\/en\/\",\"name\":\"Uni.lu\",\"description\":\"University of Luxembourg\",\"publisher\":{\"@id\":\"https:\/\/www.uni.lu\/en\/#organization\"},\"alternateName\":\"University of Luxembourg\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.uni.lu\/en\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-GB\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.uni.lu\/en\/#organization\",\"name\":\"University of Luxembourg\",\"alternateName\":\"Uni.lu\",\"url\":\"https:\/\/www.uni.lu\/en\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\/\/www.uni.lu\/en\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.uni.lu\/wp-content\/uploads\/sites\/9\/2026\/03\/03120157\/UNIV_SM-Profile_1600x1600px-scaled.jpg\",\"contentUrl\":\"https:\/\/www.uni.lu\/wp-content\/uploads\/sites\/9\/2026\/03\/03120157\/UNIV_SM-Profile_1600x1600px-scaled.jpg\",\"width\":2560,\"height\":2560,\"caption\":\"University of Luxembourg\"},\"image\":{\"@id\":\"https:\/\/www.uni.lu\/en\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/uni.lu\",\"https:\/\/www.linkedin.com\/school\/university-of-luxembourg\/\",\"https:\/\/www.instagram.com\/uni.lu\",\"https:\/\/www.youtube.com\/@uni_lu\",\"https:\/\/en.wikipedia.org\/wiki\/University_of_Luxembourg\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.uni.lu\/en\/#\/schema\/person\/bbacc9db2c68a323b1a3cbdab743cd0c\",\"name\":\"svankelst\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Striking the balance in communication privacy and lawful interception - University of Luxembourg","description":"A new security protocol walks the fine line between legitimate interception of communication and protection of privacy rights.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.uni.lu\/en\/news\/striking-the-balance-in-communication-privacy-and-lawful-interception\/","og_locale":"en_GB","og_type":"article","og_title":"Striking the balance in communication privacy and lawful interception","og_description":"A new security protocol walks the fine line between legitimate interception of communication and protection of privacy rights.","og_url":"https:\/\/www.uni.lu\/en\/news\/striking-the-balance-in-communication-privacy-and-lawful-interception\/","og_site_name":"UNI EN","article_publisher":"https:\/\/www.facebook.com\/uni.lu","article_modified_time":"2024-07-19T12:33:59+00:00","og_image":[{"width":2560,"height":1707,"url":"https:\/\/www.uni.lu\/wp-content\/uploads\/sites\/9\/2024\/07\/cybersecurity-c-envato-elements-credit-tonybangkok-2023-11-27-05-30-55-utc-scaled.jpg","type":"image\/jpeg"}],"twitter_card":"summary_large_image","twitter_misc":{"Estimated reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"NewsArticle","@id":"https:\/\/www.uni.lu\/en\/news\/striking-the-balance-in-communication-privacy-and-lawful-interception\/#article","isPartOf":{"@id":"https:\/\/www.uni.lu\/en\/news\/striking-the-balance-in-communication-privacy-and-lawful-interception\/"},"author":{"name":"svankelst","@id":"https:\/\/www.uni.lu\/en\/#\/schema\/person\/bbacc9db2c68a323b1a3cbdab743cd0c"},"headline":"Striking the balance in communication privacy and lawful interception","datePublished":"2024-07-19T12:20:26+00:00","dateModified":"2024-07-19T12:33:59+00:00","mainEntityOfPage":{"@id":"https:\/\/www.uni.lu\/en\/news\/striking-the-balance-in-communication-privacy-and-lawful-interception\/"},"wordCount":749,"publisher":{"@id":"https:\/\/www.uni.lu\/en\/#organization"},"image":{"@id":"https:\/\/www.uni.lu\/en\/news\/striking-the-balance-in-communication-privacy-and-lawful-interception\/#primaryimage"},"thumbnailUrl":"https:\/\/www.uni.lu\/wp-content\/uploads\/sites\/9\/2024\/07\/cybersecurity-c-envato-elements-credit-tonybangkok-2023-11-27-05-30-55-utc-scaled.jpg","inLanguage":"en-GB"},{"@type":"WebPage","@id":"https:\/\/www.uni.lu\/en\/news\/striking-the-balance-in-communication-privacy-and-lawful-interception\/","url":"https:\/\/www.uni.lu\/en\/news\/striking-the-balance-in-communication-privacy-and-lawful-interception\/","name":"Striking the balance in communication privacy and lawful interception - University of Luxembourg","isPartOf":{"@id":"https:\/\/www.uni.lu\/en\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.uni.lu\/en\/news\/striking-the-balance-in-communication-privacy-and-lawful-interception\/#primaryimage"},"image":{"@id":"https:\/\/www.uni.lu\/en\/news\/striking-the-balance-in-communication-privacy-and-lawful-interception\/#primaryimage"},"thumbnailUrl":"https:\/\/www.uni.lu\/wp-content\/uploads\/sites\/9\/2024\/07\/cybersecurity-c-envato-elements-credit-tonybangkok-2023-11-27-05-30-55-utc-scaled.jpg","datePublished":"2024-07-19T12:20:26+00:00","dateModified":"2024-07-19T12:33:59+00:00","description":"A new security protocol walks the fine line between legitimate interception of communication and protection of privacy rights.","breadcrumb":{"@id":"https:\/\/www.uni.lu\/en\/news\/striking-the-balance-in-communication-privacy-and-lawful-interception\/#breadcrumb"},"inLanguage":"en-GB","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.uni.lu\/en\/news\/striking-the-balance-in-communication-privacy-and-lawful-interception\/"]}]},{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/www.uni.lu\/en\/news\/striking-the-balance-in-communication-privacy-and-lawful-interception\/#primaryimage","url":"https:\/\/www.uni.lu\/wp-content\/uploads\/sites\/9\/2024\/07\/cybersecurity-c-envato-elements-credit-tonybangkok-2023-11-27-05-30-55-utc-scaled.jpg","contentUrl":"https:\/\/www.uni.lu\/wp-content\/uploads\/sites\/9\/2024\/07\/cybersecurity-c-envato-elements-credit-tonybangkok-2023-11-27-05-30-55-utc-scaled.jpg","width":2560,"height":1707},{"@type":"BreadcrumbList","@id":"https:\/\/www.uni.lu\/en\/news\/striking-the-balance-in-communication-privacy-and-lawful-interception\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.uni.lu\/en\/"},{"@type":"ListItem","position":2,"name":"News","item":"https:\/\/www.uni.lu\/en\/news\/"},{"@type":"ListItem","position":3,"name":"Striking the balance in communication privacy and lawful interception"}]},{"@type":"WebSite","@id":"https:\/\/www.uni.lu\/en\/#website","url":"https:\/\/www.uni.lu\/en\/","name":"Uni.lu","description":"University of Luxembourg","publisher":{"@id":"https:\/\/www.uni.lu\/en\/#organization"},"alternateName":"University of Luxembourg","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.uni.lu\/en\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-GB"},{"@type":"Organization","@id":"https:\/\/www.uni.lu\/en\/#organization","name":"University of Luxembourg","alternateName":"Uni.lu","url":"https:\/\/www.uni.lu\/en\/","logo":{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/www.uni.lu\/en\/#\/schema\/logo\/image\/","url":"https:\/\/www.uni.lu\/wp-content\/uploads\/sites\/9\/2026\/03\/03120157\/UNIV_SM-Profile_1600x1600px-scaled.jpg","contentUrl":"https:\/\/www.uni.lu\/wp-content\/uploads\/sites\/9\/2026\/03\/03120157\/UNIV_SM-Profile_1600x1600px-scaled.jpg","width":2560,"height":2560,"caption":"University of Luxembourg"},"image":{"@id":"https:\/\/www.uni.lu\/en\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/uni.lu","https:\/\/www.linkedin.com\/school\/university-of-luxembourg\/","https:\/\/www.instagram.com\/uni.lu","https:\/\/www.youtube.com\/@uni_lu","https:\/\/en.wikipedia.org\/wiki\/University_of_Luxembourg"]},{"@type":"Person","@id":"https:\/\/www.uni.lu\/en\/#\/schema\/person\/bbacc9db2c68a323b1a3cbdab743cd0c","name":"svankelst"}]}},"blog_id":9,"_links":{"self":[{"href":"https:\/\/www.uni.lu\/en\/wp-json\/wp\/v2\/news\/33233"}],"collection":[{"href":"https:\/\/www.uni.lu\/en\/wp-json\/wp\/v2\/news"}],"about":[{"href":"https:\/\/www.uni.lu\/en\/wp-json\/wp\/v2\/types\/news"}],"author":[{"embeddable":true,"href":"https:\/\/www.uni.lu\/en\/wp-json\/wp\/v2\/users\/42"}],"version-history":[{"count":2,"href":"https:\/\/www.uni.lu\/en\/wp-json\/wp\/v2\/news\/33233\/revisions"}],"predecessor-version":[{"id":33237,"href":"https:\/\/www.uni.lu\/en\/wp-json\/wp\/v2\/news\/33233\/revisions\/33237"}],"wp:authorship":[{"embeddable":true,"href":"https:\/\/www.uni.lu\/en\/wp-json\/wp\/v2\/users\/42"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.uni.lu\/en\/wp-json\/wp\/v2\/media\/33234"}],"wp:attachment":[{"href":"https:\/\/www.uni.lu\/en\/wp-json\/wp\/v2\/media?parent=33233"}],"wp:term":[{"taxonomy":"news-category","embeddable":true,"href":"https:\/\/www.uni.lu\/en\/wp-json\/wp\/v2\/news-category?post=33233"},{"taxonomy":"news-topic","embeddable":true,"href":"https:\/\/www.uni.lu\/en\/wp-json\/wp\/v2\/news-topic?post=33233"},{"taxonomy":"organisation","embeddable":true,"href":"https:\/\/www.uni.lu\/en\/wp-json\/wp\/v2\/organisation?post=33233"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}