Dontsurveil.me

· policy · Source ↗

TLDR

  • Canada’s Bill C-22 would require all messaging apps to build government-accessible backdoors, ending true end-to-end encryption for Signal, iMessage, WhatsApp, and others.

Key Takeaways

  • Every designated “core provider” must build capability for state access to E2E-encrypted messages under Ministerial order (SAAIA ss. 5-14).
  • Bulk metadata retention for up to one year on all users, regardless of suspicion, was added in C-22 and was not in predecessor Bill C-2.
  • The Salt Typhoon attack (2024) compromised U.S. CALEA lawful-access infrastructure built in 1994 – Canada’s own cyber agency then recommended more encryption, not less.
  • Gag orders can forbid providers from disclosing order existence for up to a year; a voluntary-disclosure safe harbour incentivizes providers to hand over data without a court order.
  • Signal, Apple, Meta, and Canada’s own oversight body NSIRA have all publicly opposed Part 2; no institutional public brief defends it outside the government.

Hacker News Comment Review

  • Commenters flagged that the site’s framing – “only you and the recipient hold the key” – may already be inaccurate: lawful intercept apparently helped U.S. and Canadian authorities trace Sikh assassination networks through “secure” messaging, suggesting existing legal mechanisms already reach encrypted traffic.
  • One commenter attributed the site’s rhetorical style to AI generation, pointing to the multi-vector, movie-trailer prose structure as a tell.

Notable Comments

  • @bigyabai: Cites U.S./Canada use of lawful intercept in the India-linked Sikh assassination cases as evidence E2E messaging is already reachable under existing frameworks.

Original | Discuss on HN