Ref. :  000038447
Date :  2015-06-18
Language :  English
Home Page / The whole website
fr / es / de / po / en

Encryption and anonymity are essential for freedom of information

Reporters Without Borders joins 25 other civil society groups in hailing a report by David Kaye, the United Nations special rapporteur on the promotion and protection of the right to freedom of opinion and expression, that says the use of encryption and anonymity in digital communications deserves strong protection.

Presented at the 29th Session of the UN Human Rights Council (15 June - 3 July), the report points out that human rights defenders, lawyers and journalists rely on these tools to encrypt their communications and protect their contacts and sources, and that any restrictions on these tools should therefore be strictly limited.

Reporters Without Borders welcomes the report with particular enthusiasm as it has been defending digital encryption and online anonymity for years. In an open letter in 2002, when the French government wanted to restrict the use of encryption software, Reporters Without Borders wrote: "Our organization supports and encourages encryption. This science and the software it generates help free speech and media freedom to progress worldwide. In some countries such as China, Vietnam and Tunisia, using encryption is the only option for dissidents and journalists who want to protect the content of their emails and above all to protect their lives."

Reporters Without Borders has a Digital Survival Kit in eight languages containing tools, tips and techniques for circumventing censorship and securing digital communications and data. The kit is in the form of a wiki that can be freely accessed, copied, modified and redistributed. To help develop the kit, request access to the wiki by sending an email to email to


Joint Civil Society Statement, Submitted to the 29th Session of the UN Human Rights Council

The undersigned civil society organizations and independent experts work to promote human rights and press freedom online. We welcome the report of the Special Rapporteur on freedom of opinion and expression on the use of encryption and anonymity in digital communication (A/HRC/29/32), which was presented at the UN Human Rights Council on June 17. We urge all governments to promote the use of strong encryption technologies and to protect the right to seek, receive, and impart information anonymously online. Any laws or regulations that restrict the use of encryption or anonymity online should be revised to comply with the strict three-part test the Special Rapporteur sets out in the report. We also urge information and communications technology (ICT) companies to broadly adopt encryption and other privacy-enhancing measures to safeguard the security of users.

The Internet has been enormously beneficial for the human rights movement and the work of journalists and independent civil society worldwide. Yet it has also created new risks for all users. As described in the 2014 report of the UN High Commissioner for Human Rights (A/HRC/27/37) on privacy in the digital age, digital technologies have enabled intrusive surveillance on an unprecedented scope and scale. Such surveillance can enable governments to violate professional confidentiality and identify journalistic sources, government critics, whistleblowers, or members of persecuted minority groups (such as LGBT people) and expose such individuals to retaliation. Ordinary users also face a range of online threats from overbroad state surveillance, identity thieves, and malicious actors.

As the Special Rapporteur’s report recognizes, strong encryption and anonymity are fundamental for the protection of cybersecurity and human rights in the digital age. Encryption and anonymity, separately or together, “create a zone of privacy to protect opinion and belief” (para. 12). Both are critical to the enjoyment of freedoms of opinion, expression, and association, the press, the right to privacy, and other rights.

Often without knowing it, Internet users rely on the security practices of ICT companies, including support for encryption, to shield their data from online threats. Human rights defenders, lawyers, and journalists use tools to encrypt their data and communications and protect their sources and contacts from reprisals. Indeed, many of the undersigned organizations and individuals rely on encryption in their daily work to ensure the safety of staff and associates. States have a duty to protect the right to privacy, and all Internet users should be able to experiment with and adopt client-to-client encryption and anonymity tools without obstruction by government regulation or corporate policies.

Governments also have an obligation to investigate and prosecute crimes and prevent terrorist attacks. In recent years, however, some governments have sought to restrict access to strong encryption or limit anonymity online in the name of national security or public order. The Special Rapporteur’s report reiterated that any “restrictions on encryption and anonymity must be strictly limited according to principles of legality, necessity, proportionality, and legitimacy in objective” (para. 56). Any public debate on the legitimacy of specific, individualized restrictions on encryption must consider the critical role that encryption and anonymity play to protect and promote human rights, press freedom, and online security. The Special Rapporteur further states that “blanket prohibitions” on encryption and anonymity “fail to be necessary and proportionate.” States should also “avoid all measures that weaken the security that individuals may enjoy online, such as backdoors, weak encryption standards and key escrows” (para 60).

Broad restrictions on the use of encryption and anonymity will not meet these criteria. For example, politicians and government officials in the US and UK have expressed concern that increased use of encryption in social media services or on mobile devices will make it more difficult to investigate terrorist threats. Some have urged companies to insert “back doors” or other vulnerabilities that would allow law enforcement to circumvent these protections. [1]

Yet as the Special Rapporteur confirms, “In the contemporary technological environment, intentionally compromising encryption, even for arguably legitimate purposes, weakens everyone’s security online” (para. 8). Introducing weaknesses into digital architecture for the purposes of surveillance weakens the security of the Internet as a whole, undermining security rather than enhancing it, and conflicts with the state duty to protect the right to privacy.

We urge states to adopt and implement the report’s core recommendations:

1. States should promote and comprehensively protect strong encryption and anonymity. National laws should recognize that individuals are free to protect the privacy of their digital communications by using encryption technology and tools that enable anonymity online (paras 57-59).

2. States should avoid all measures that weaken the security that individuals may enjoy online. Such measures include mandated “backdoors,” weak encryption standards, key escrow arrangements, or generally forcing developers to design systems so they retain the capability to decrypt communications. Requiring companies to build vulnerabilities into secured products unavoidably and disproportionately undermines the security of all users of that product (paras 42, 60).

3. Restrictions should be targeted on a case-specific basis and should be limited to only what is necessary and proportionate for a legitimate aim. Court-ordered decryption may only be permissible when it results from transparent and publicly accessible laws applied solely on a targeted case-by-case basis to individuals (i.e., not to a mass of people) and subject to judicial warrant and the protection of due process rights (paras 57, 60).

4. States should not impose blanket prohibitions on encryption and anonymity, as they are neither necessary nor proportionate. Such bans deprive all online users in the jurisdiction of the right to create private space for opinion and expression, without establishing that the encryption is used for unlawful ends. Some forms of regulation may, in practice, amount to a blanket prohibition—for example, requiring licenses for encryption, mandating weak technical standards for encryption, or controlling the import or export of encryption tools (paras 40-41).

5. States should refrain from making identification of users a condition for access to online services or SIM card registration for mobile users (real-name registration). States should also refrain from limiting access to anonymity tools. Anonymity facilitates the rights to privacy, opinion, and expression in significant ways online and states should protect it and generally not restrict the technologies that provide it. In some cases, anonymity tools may be the only mechanism for individuals to exercise a range of rights securely (paras 47-52). The Special Rapporteur also called on the private sector to review the adequacy of their practices with regard to the responsibility of business to respect human rights. Adequate human rights due diligence for ICT companies should involve assessing threats to the security of Internet users, including from overbroad state surveillance, and developing strategies to mitigate human rights harm. The security practices of ICT companies can significantly promote or compromise encryption and anonymity (along with human rights) online. In particular, the integration of encryption into everyday Internet services and products, such that it is ubiquitous and automatic, would dramatically improve the communications security of anyone who uses the Internet.

Accordingly, we also call on ICT companies to:

1. Refrain from blocking or limiting the transmission of encrypted communications;

2. Permit anonymous communications and use of online services and refrain from imposing real-name registration requirements;

3. Deploy end-to-end encryption by default in every online service and product;

4. Support the development of other secure technologies for websites based on strong and open protocols;

5. Resist efforts by governments to require them to compromise anonymity and encryption. Also resist requests from governments to decrypt specific communications or data except in accordance with a court-order resulting from transparent and publicly accessible laws applied on a targeted case-by-case basis;

6. Effectively secure user data stored at rest through verifiable practices including encryption;

7. Maintain the security of credentials and provide robust authentication safeguards;

8. Initiate a breach notification and patching system for known, exploitable vulnerabilities; and

9. Provide user education tools on the importance of digital security best practices.

Submitted by: Human Rights Watch


• Access
• Amnesty International
• A rticle 19
• Association for Progressive Communications (APC)
• Australian Privacy Foundation
• Bytes for All, Pakistan
• Center for Democracy & Technology (CDT)
• Chaos Computer Club (CCC) e.V.
• Digital Rights Foundation
• Electronic Frontier Foundation
• Foundation for Internet and Civic Culture, Thailand
• Global Voices Advocacy
• Human Rights Watch
• International Modern Media Institute (Iceland)
• La Quadrature du Net
• Media Matters for Democracy, Pakistan
• Panoptykon
• PEN International
• Privacy International
• Reporters sans frontières (RSF)
• World Wide Web Foundation

[1] See James B. Comey, Director, Federal Bureau of Investigation, “Going Dark: Are Technology, Privacy, and Public Safety on a Collision Course,” Speech at the Brookings Institution, Washington, DC, October 16, 2014,; Mark Scott, “British Prime Minister Suggests Banning Some Online Messaging Apps,” New York Times, January 12, 2015,; Robert Hannigan, “The web is a terrorist’s command-and-control network of choice,” Financial Times, November 3, 2014,

Rate this content
Average of 19 ratings 
Rating 2.42 / 4 MoyenMoyenMoyenMoyen
Same author:
 flecheUnpunished murder encourages more violence against woman journalists
 flecheRSF Index 2018: Hatred of journalism threatens democracies
 fleche2017 World Press Freedom Index
 flecheRSF publishes report on media and journalism in Algeria
 fleche2016 Round-Up: 74 journalists killed worldwide
 fleche2016 Round-Up : Number of journalists detained worldwide continues to rise
 flecheFidel Castro’s heritage:
flagrant media freedom violations

 fleche2016 World Press Freedom Index
 flecheOne year on from Charlie, RSF publishes "Jihad against journalists"
 flecheRSF annual round-up: 110 journalists killed in 2015
 flecheRSF’s 2015 Round-up: 54 journalists held hostage worldwide
 flecheEnvironmental journalism in an increasingly hostile climate
 flecheWorld Press Freedom Index 2015: decline on all fronts
 flecheNew wave of arrests of journalists amid "Enemy infiltration" claims
 flecheBeijing imposes its propaganda beyond its borders
 flecheWorld Press Freedom Index 2015: decline on all fronts
 flecheRound-up of abuses against journalists 2014
 flecheRWB publishes 2014 round-up of violence against journalists
 flechePolice Investigations and Prosecutions Used to Harras News Media
 flecheWorld press freedom index 2014
 flecheJournée mondiale contre la cyber-censure : nouvelle liste des "Ennemis d’Internet"
 flecheWikileaks hounded?

 flechePress Freedom Index 2010
 flecheInternet freedom - Hillary Clinton’s historic speech
 flechePress Freedom Index 2009 - Obama effect in US, while Europe continues to recede
 flecheReport “The dangers for journalists who expose environmental issues”
 fleche“Internet monitored and controlled, even in democracies”
 flechePress Freedom round-up 2008
 flecheOnly peace protects freedoms in post-9/11 world
 flecheRisks faced by journalists in Europe
 flecheThe new predators of press freedom
 fleche2008 annual press freedom report
 flecheThe plight of journalists in 98 countries reviewed
 flechePress freedom round-up 2007
 flecheReporters Without Borders issues its 2007 annual press freedom survey
 flecheWorldwide Press Freedom Index 2006

 flecheWorld Press Freedom Day: Our annual survey and new list of predators
 flecheThe 15 enemies of the Internet and other countries to watch

 flecheReporters Without Borders and the OSCE make six recommendations to ensure freedom of expression on the Internet.
 flecheL'année la plus meurtrière depuis dix ans : 53 journalistes tués
 flecheInternational jailed journalists support day
 flecheWorldwide press freedom index
 flecheAlgérie : Trois quotidiens absents des kiosques
 fleche14th World Press Freedom Day
Keywords   go
Translate this page Traduire par Google Translate

Share on Facebook
Partager sur Twitter
Share on Google+Google + Share on LinkedInLinkedIn
Partager sur MessengerMessenger Partager sur BloggerBlogger
Other items
where is published this article: