Skip to main content
Home

Sign up to Newsletter

  • NEWS
  • ACT
  • CAMPAIGNS
  • LEARN
  • IMPACT
  • ABOUT
  • DONATE
Padlocks graphic

Encryption

Report and Analysis

Report
International Law Guide cover screenshot

PI’s Guide to International Law and Surveillance

PI’s Guide to International Law and Surveillance aims to provide the most hard-hitting results that reinforce and strengthen the core principles and standards of international law on surveillance. You can find UN resolutions, independent expert reports and international human rights bodies jurisprudence.

Continue reading
Report
illustration of 2 people alone in a field

Securing Privacy: PI on End-to-End Encryption

PI’s report on end-to-end encryption (E2EE) analyses and defends expanding the use of E2EE to protect our communications. It defines E2EE, delves into its human rights implications, briefly addresses some prominent proposals for government access to E2EE content, and concludes with PI’s recommendations regarding E2EE.

Continue reading
Report
Bug Off! A Primer for Human Rights Groups on Wiretapping

Bug Off! A Primer for Human Rights Groups on Wiretapping

The explosion of telecommunications services has improved the ability for human rights groups to disseminate information worldwide. New telephone, facsimile and computer communications have created opportunities for human rights groups to improve organizing and to promote human rights faster and at
Continue reading

News

4th October 2019

Who, what, why? A guide to understanding the Facebook encryption debate if you have lost the plot

3rd October 2019

PI response to confused governments’ confusing declaration of war and victory on encryption

29th May 2019

Ghosts in Your Machine: Spooks Want Secret Access to Encrypted Messages

15th May 2018

#efail and PGP - What should I do?

21st April 2017

Winning the debate on encryption — a 101 guide for politicians

1st February 2017

Defeating encryption: the battle of governments against their people

Examples of Abuse

Want to know how this translate in the real world? Here is the latest example in the news.

Zoom exempts free service from end-to-end encryption to aid law enforcement

Zoom said it would deliver end-to-end encryption as one of a number of security enhancements to its service, but it will only be available to enterprise and business customers whose identity they can verify and not on the free service. The company says it wants to be able to work with law
Read more
See more examples of abuse

Our Advocacy

Privacy International's oral statement at the UN Human Rights Council

During the 51st Ordinary Session of the Human Rights Council, on 16 September 2022, Privacy International participated in the inter-active dialogue on the report of the UN High Commissioner for Human Rights on the right to privacy in the digital age.

Privacy International contributed to the UN report by submitting its information on current issues of concerns, including government hacking, attempts to limit the use of encryption, and other topics.

Read more
View more advocacy

Get Involved

  • Act with Us
  • Donate
  • Join
Back to top button

Newsletter

Click here to sign-up to our mailing-list!

Mastodon

Follow Us

  • Facebook
  • Instagram
  • Mastodon
  • RSS
  • Twitter
  • Youtube

Navigation

  • NEWS
  • ACT
  • CAMPAIGNS
  • LEARN
  • IMPACT
  • ABOUT
  • DONATE

How We Fight

  • Our Global Reach
  • Advocacy and Litigation
  • Research
  • Legal Action
  • Our Demands

About

  • Our Impact
  • Governance
  • People
  • Opportunities
  • Financial
  • Service Status

Privacy

  • How We Use Your Data
  • How We Learned
  • Why Cookies?!

Resources

  • Why Privacy Matters
  • Learn about issues
  • Learn about Data Protection
  • Browse Examples of Abuse
  • Listen to our podcast

Contact Us

62 Britton Street,
London, EC1M 5UY
UK

Charity Registration No: 1147471

Click here to contact us.

Click here for media and press enquiries.