Skip to main content

Terrorists will evade encryption backdoor net according to new study

Many politicians around the world, especially among the Five Eyes nations, are under the impression that mandating backdoors or weakening encryption would make it possible to read all communications with little effort. Not so though, as it turns out that worldwide, there are more than 850 hardware and software encryption options for nefarious actors to use.

Discovered as part of a study by cryptographers Bruce Schneier, Kathleen Seidel, and Saranya Vijayakumar (via Wired), this list paints an expansive landscape of the state of encryption around the world. It truly is global too, with more than two-thirds of the discovered encryption products and services existing outside the U.S., where jurisdiction to force backdoors would be weak at best.

Recommended Videos

Not all options for encryption and obfuscation on that list are military grade of course, with the available offerings ranging from simple VPN services to encrypted applications on smartphones and password managers. But they are produced by a variety of organizations, from commercial enterprises to open-source communities, which also complicates the idea of government-mandated backdoors.

While the researchers in this instance didn’t test the usefulness of such tools, they did highlight how easy it would be for anyone who believed their encrypted service to be compromised to simply move on to something else.

“Our survey demonstrates that … [a]nyone who wants to evade an encryption backdoor in U.S. or U.K. encryption products has a wide variety of foreign products they can use instead: to encrypt their hard drives, voice conversations, chat sessions, VPN links, and everything else,” the research paper reads.

Perhaps even more impressive is the fact that a survey much like this one was conducted in the late ’90s, and found similar numbers of encryption-based products as now, though very few showed up on both lists. This suggests that the environment for encryption is constantly shifting and evolving, which makes having special roots through current offerings even more redundant.

This latest report goes on to suggest that the only people affected by backdoors to encryption would be criminals who were so ineffective that they would likely have been caught in some other way, and legitimate end users who are acting entirely innocently.

Ministers and politicians believe weakening encryption will help target the most nefarious, and yet this research suggests that they are precisely the ones who will easily evade such traps.

Jon Martindale
Jon Martindale is a freelance evergreen writer and occasional section coordinator, covering how to guides, best-of lists, and…
If you’re itching for an HP OMEN MAX gaming laptop, this deal will save you $500
The HP Omen Max gaming laptop with Valorant on the screen.

We've recently published a stunningly positive review of the HP OMEN Max 16. It's got a list of "Pros" a mile long. The single, obligatory con is "Thick and heavy." Considering that it's a gaming laptop, that's practically the equivalent of saying a flashlight is too bright to look at. Thick, and a bit heavy, just comes with the territory. All of this is to say that the review was great and we're fans of the HP OMEN Max 16. As a deal hunter it made me want to go and see if I could find a deal on the HP OMEN Max 16 and I did, sort of. Right now you can get a customizable HP OMEN Max 16t — a laptop that, if it didn't have a separate store page, I would think is identical to the one we reviewed — with a $500 discount, no matter what settings you choose. With the base settings of the laptop, that discount brings it from $2,100 to just $1,600, but you're free to upgrade to your heart's content. Tap the button below to start customizing to your whimsy or keep reading for some advice on how to do so and what to expect from the 16t.

Buy Now

Read more
Google’s AI agent ‘Big Sleep’ just stopped a cyberattack before it started
Sundar Pichai

Google's AI agent, dubbed Big Sleep, has achieved a cybersecurity milestone by detecting and blocking an imminent exploit in the wild—marking the first time an AI has proactively foiled a cyber threat. Developed by Google DeepMind and Project Zero, Big Sleep identified a critical vulnerability in SQLite (CVE-2025-6965), an open-source database engine, that was on the verge of being exploited by malicious actors, allowing Google to patch it before damage occurred. “We believe this is the first time an AI agent has been used to directly foil efforts to exploit a vulnerability in the wild,” the company said.

Why it matters: As cyberattacks surge—costing businesses trillions annually—this breakthrough shifts defense from reactive patching to AI-driven prediction and prevention. It gives security teams a powerful new tool to stay ahead of hackers, potentially saving devices and data worldwide. CEO Sundar Pichai called it "a first for an AI agent—definitely not the last" according to Live Mint.

Read more
Google confirms merging Chrome OS and Android into one platform
Google Chrome app on s8 screen.

Why it matters: Google's push to blend Chrome OS and Android could supercharge affordable laptops like Chromebooks, making them more versatile for work and play. This move echoes Apple's seamless ecosystem across iPadOS and macOS, potentially shaking up the PC market where Windows dominates but innovation lags.

What's happening: In a bombshell interview, Google's Android ecosystem president Sameer Samat outright confirmed the company is "combining Chrome OS and Android into a single platform. This follows months of rumors and aligns with Android 16's new desktop-friendly features, like proper windowing and external display support. But then Samat later clarified on X that it's not a full-on merger killing Chrome OS; instead, it's about weaving Android's tech stack deeper into Chrome for better app compatibility and hardware efficiency.

Read more