End-to-end encryption in video conferencing, guaranteeing digital sovereignty
In the current situation, Collaboration has become a key tool for the business continuity of companies. In this column, Maribel Poyato, country manager de Tixeo, highlights concerns about information security and confidentiality.
Encouraged by the health crisis, teleworking and the massive use of digital collaboration tools, like video conferencing, have allowed many companies to continue their activity. This unprecedented situation has also made it easier to highlight issues related to the confidentiality of information exchanged and has led to a real craze for the use of end-to-end encryption in online meetings..
In this context, accentuated by the economic crisis, protection against industrial espionage has become essential for companies. End-to-end encryption is the only guarantee against eavesdropping. But, what is this mechanism, whose definition, unfortunately, distorts too often?
The fight against industrial espionage
End-to-end encryption of video conferencing is a data transmission process (video, audio and data) which only allows the sender and the receiver or receivers to decrypt the data without any decryption phase between the correspondents. You must prevent all electronic listening, even by telecommunications providers, those of Internet access and even by the manufacturer of video conferencing solutions. Therefore, no one can access the encryption keys needed to decrypt the conversation.
Unfortunately, and especially since the beginning of the health crisis, many video conferencing manufacturers claim end-to-end encryption, but in the end they only encrypt the flows that pass between the user and the communication server. So, They can easily access decrypted data when it passes through their servers.
Besides, These manufacturers are mostly subject to US legislation that requires them to obtain encryption keys if requested by authorities.. In these conditions, the security level is far from what was announced.
Fortunately, it is possible to access reliable solutions that offer effective protection against any espionage attempt. To help businesses see things more clearly, Organizations such as the National Cryptological Center can guide them in their choice. An organization that opts for an end-to-end encryption mechanism with certification from a European body that ensures the security of information systems, you are always guaranteed to use a reliable and perfectly secure solution.
Independence and digital sovereignty
Beyond the health crisis, True end-to-end encryption helps ensure business independence. At the European level, This election conditions the digital sovereignty of our industries and economies. It is vital today to opt for European solutions to guarantee security and privacy.
The technology, R&D, the support and, of course, accommodation must be developed and consumed locally to avoid any risk of dependence on non-European powers. But the influences are still very strong and continue to weigh… In fact, a few days ago, the organizers of the Paris Olympic Games in 2024 They chose the Chinese Ali Baba solution for their Cloud. The battle is far from won.
When it comes to end-to-end encryption, surveillance is still necessary: It is always useful to remember this in a context in which certain established powers (governments, authorities, etc.) They sometimes try to limit their use to have greater control over communication flows in the name of security and the fight against terrorism..
Some countries, like Australia, require manufacturers to incorporate backdoors to help authorities intercept and read messages sent by suspects. However, It is important to remember that, even if end-to-end encryption is prohibited, Malicious people will be able to continue to circumvent the rules to achieve their goals.
Banning this mechanism will not solve the problems associated with terrorism, but will make European industry increasingly vulnerable to data looting, with more to lose than gain. In Europe, although some would be tempted to ban the mechanism, The legislation does not impose any limitations on manufacturers. This legal framework is clearly favorable to encryption technologies and thus guarantees their effectiveness in the fight against industrial espionage.
Maribel Poyato
Country Manager Iberia/Latam en Tixeo
¿Te gustó este artículo?
Subscribe to our NEWSLETTER and you won't miss anything.



