Italy debates Starlink for secure communications

Italy’s ruling League party is urging the government to choose Elon Musk’s Starlink over French-led Eutelsat for secure satellite communications, arguing that Starlink’s technology is more advanced.

Prime Minister Giorgia Meloni’s government is looking for an encrypted communication system for officials operating in high-risk areas, with both Starlink and Eutelsat in talks for the contract.

League leader Matteo Salvini, a strong supporter of former US President Donald Trump, has emphasised the need to prioritise US technology over a French alternative.

Meanwhile, Eutelsat’s CEO confirmed discussions with Italy as the country seeks an interim solution before the EU’s delayed IRIS² satellite system becomes operational.

Meloni’s office has stated that no formal negotiations have taken place and that any decision will be made transparently.

However, opposition parties have raised concerns over Starlink’s involvement, given recent speculation that Musk could cut off Ukraine from its service, potentially affecting national security interests.

Musk responded positively to the League’s endorsement, calling it ‘much appreciated’ on his social media platform X.

For more information on these topics, visit diplomacy.edu.

US investigates UK over alleged backdoor demand for Apple data

United States officials are reviewing whether the UK breached a bilateral agreement by reportedly pressuring Apple to create a ‘backdoor’ for government access to encrypted iCloud backups.

Apple recently withdrew an encrypted storage feature for UK users following reports that it had refused to comply with such demands, which could have affected users worldwide. The Washington Post reported that Apple rejected the UK government’s request.

The US director of national intelligence, Tulsi Gabbard, confirmed in a letter to lawmakers that a legal review is underway to determine if the UK violated the CLOUD Act.

Under the agreement, neither the US nor the United Kingdom can demand data access for citizens or residents of the other country. Initial legal assessments suggest the UK’s reported demands may have overstepped its authority under the agreement.

Apple has long defended its encryption policies, arguing that creating a backdoor for government access would weaken security and leave user data vulnerable to hackers. Cybersecurity experts warn that any such backdoor, once created, would inevitably be exploited.

The tech giant has clashed with regulators over encryption before, notably in 2016 when it resisted US government efforts to unlock a terrorism suspect’s iPhone.

For more information on these topics, visit diplomacy.edu.

Vodafone collaborates with IBM on quantum-safe cryptography

Vodafone UK has teamed up with IBM to explore quantum-safe cryptography as part of a new Proof of Concept (PoC) test for its mobile and broadband services, particularly for users of its ‘Secure Net’ anti-malware service. While quantum computers are still in the early stages of development, they could eventually break current internet encryption methods. In anticipation of this, Vodafone and IBM are testing how to integrate new post-quantum cryptographic standards into Vodafone’s existing Secure Net service, which already protects millions of users from threats like phishing and malware.

IBM’s cryptography experts have co-developed two algorithms now recognised in the US National Institute of Standards and Technology’s first post-quantum cryptography standards. This collaboration, supported by Akamai Technologies, aims to make Vodafone’s services more resilient against future quantum computing risks. Vodafone’s Head of R&D, Luke Ibbetson, stressed the importance of future-proofing digital security to ensure customers can continue enjoying safe internet experiences.

Although the PoC is still in its feasibility phase, Vodafone hopes to implement quantum-safe cryptography across its networks and products soon, ensuring stronger protection for both business and consumer users.

For more information on these topics, visit diplomacy.edu.

UK Home Office’s new vulnerability reporting policy creates legal risks for ethical researchers, experts warn

The UK Home Office has introduced a vulnerability reporting mechanism through the platform HackerOne, allowing cybersecurity researchers to report security issues in its systems. However, concerns have been raised that individuals who submit reports could still face legal risks under the UK’s Computer Misuse Act (CMA), even if they follow the department’s new guidance.

Unlike some private-sector initiatives, the Home Office program does not offer financial rewards for reporting vulnerabilities. The new guidelines prohibit researchers from disrupting systems or accessing and modifying data. However, they also caution that individuals must not ‘break any applicable law or regulations,’ a clause that some industry groups argue could discourage vulnerability disclosure due to the broad provisions of the CMA, which dates back to 1990.

The CyberUp Campaign, a coalition of industry professionals, academics, and cybersecurity experts, warns that the CMA’s definition of unauthorized access does not distinguish between malicious intent and ethical security research. While the Ministry of Defence has previously assured researchers they would not face prosecution, the Home Office provides no such assurances, leaving researchers uncertain about potential legal consequences.

A Home Office spokesperson declined to comment on the concerns.

The CyberUp Campaign acknowledged the growing adoption of vulnerability disclosure policies across the public and private sectors but highlighted the ongoing legal risks researchers face in the UK. The campaign noted that other countries, including Malta, Portugal, and Belgium, have updated their laws to provide legal protections for ethical security research, while the UK has yet to introduce similar reforms.

The Labour Party had previously proposed an amendment to the CMA that would introduce a public interest defense for cybersecurity researchers, but this was not passed. Last year, Labour’s security minister Dan Jarvis praised the contributions of cybersecurity professionals and stated that the government was considering CMA reforms, though no legislative changes have been introduced so far.

For more information on these topics, visit diplomacy.edu.

Sweden considers law requiring encrypted messaging backdoors, Signal threatens to exit

Swedish law enforcement and security agencies are advocating for legislation that would require encrypted messaging services such as Signal and WhatsApp to implement technical measures allowing authorities to access user communications, according to a report by SVT Nyheter.

If introduced, the bill would mandate that these platforms retain messages and provide law enforcement with access to the message history of criminal suspects. Minister of Justice Gunnar Strömmer stated that such measures are necessary for authorities to carry out investigations effectively.

Signal Foundation President Meredith Whittaker told SVT Nyheter that if the proposed legislation requires the company to introduce backdoors, Signal would withdraw from the Swedish market rather than comply. The Swedish Armed Forces have also expressed concerns, warning that implementing such access mechanisms could introduce security risks that might be exploited by unauthorised parties.

The bill could be considered by Sweden’s parliament, the Riksdag, next year if it moves forward in the legislative process.

Similar legislative efforts have been introduced in other countries. In the UK, Apple recently disabled end-to-end encryption for iCloud accounts in response to government demands for access to encrypted data.

For more information on these topics, visit diplomacy.edu.

UK users face reduced cloud security as Apple responds to government pressure

Apple has withdrawn its Advanced Data Protection (ADP) feature for cloud backups in Britain, citing government requirements.

Users attempting to enable the encryption service now receive an error message, while existing users will eventually have to deactivate it. The move weakens iCloud security in the country, allowing authorities access to data that would otherwise be encrypted.

Experts warn that the change compromises user privacy and exposes data to potential cyber threats. Apple has insisted it will not create a backdoor for encrypted services, as doing so would increase security risks.

The UK government has not confirmed whether it issued a Technical Capability Notice, which could mandate such access.

Apple’s decision highlights ongoing tensions between tech companies and governments over encryption policies. Similar legal frameworks exist in countries like Australia, raising concerns that other nations could follow suit.

Security advocates argue that strong encryption is essential for protecting user privacy and safeguarding sensitive information from cybercriminals.

For more information on these topics, visit diplomacy.edu.

Quantum computing could render today’s encryption obsolete

The rise of quantum computing poses a serious threat to modern encryption systems, with experts warning that critical digital infrastructure could become vulnerable once quantum devices reach sufficient power.

Unlike classical computers that process binary bits, quantum computers use qubits, allowing them to perform vast numbers of calculations simultaneously.

This capability could make breaking widely used encryption methods, like RSA, possible in minutes—something that would take today’s computers thousands of years.

Although quantum systems powerful enough to crack encryption may still be years away, there is growing concern that hackers could already be collecting encrypted data to decode it once the technology catches up.

Sensitive information—such as national security data, intellectual property, and personal records—could be at risk. In response, the US National Institute of Standards and Technology has introduced new post-quantum encryption standards and is encouraging organisations to transition swiftly, though the scale of the upgrade needed across global infrastructure remains immense.

Updating web browsers and modern devices may be straightforward, but older systems, critical infrastructure, and the growing number of Internet of Things (IoT) devices pose significant challenges.

Satellites, for instance, vary in how easily they can be upgraded, with remote sensing satellites often requiring full replacements. Cybersecurity experts stress the need for ‘crypto agility’ to make the transition manageable, aiming to avoid a chaotic scramble once quantum threats materialise.

For more information on these topics, visit diplomacy.edu.

New Microsoft’s quantum chip sparks fresh debate over Bitcoin’s security

According to Bitcoin exchange River, Microsoft’s latest quantum computing chip, Majorana 1, could accelerate the timeline for making Bitcoin resistant to quantum threats. While the risk of a quantum attack remains distant, experts warn that preparations must begin now. The chip, launched on 19 February, is part of a growing race in quantum technology, with Google’s Willow chip also making headlines in December.

River suggests that if quantum computers reach one million qubits by 2027-2029, they could crack Bitcoin addresses in long-range attacks. Though some argue such a scenario is still decades away, River insists early action is key. The potential threat has reignited discussions on BIP-360, a proposed upgrade to strengthen Bitcoin’s defences against future quantum advancements.

Critics remain sceptical, arguing that quantum computing is still in its infancy, with major technical challenges to overcome. Some believe traditional banking systems, which hold far greater assets than Bitcoin, would be targeted first. Others see quantum developments as an opportunity, suggesting they could help fortify Bitcoin’s security rather than weaken it.

For more information on these topics, visit diplomacy.edu.

Microsoft unveils groundbreaking quantum computing chip

Microsoft has announced a groundbreaking quantum computing chip, Majorana 1, which it claims could make useful quantum computers a reality within years. The company believes this innovation puts it ahead in the race to unlock quantum computing’s vast potential.

Unlike classical computers, quantum systems could perform calculations in fields like medicine and chemistry that would otherwise take millions of years, although they also pose risks to current encryption standards.

The Majorana 1 chip relies on a particle called the Majorana fermion, theorised in the 1930s. Microsoft says its unique design makes the chip less error-prone than its competitors.

Despite having fewer qubits than chips from Google and IBM, the company argues that the lower error rates mean fewer qubits are needed for practical applications.

Microsoft’s development of Majorana 1 combines advanced materials like indium arsenide and aluminium, using a superconducting nanowire to observe and control the Majorana particles.

Fabricated at its labs in Washington and Denmark, the chip was described as a ‘high risk, high reward’ endeavour by Jason Zander, a senior Microsoft executive.

Quantum physicist Philip Kim from Harvard University praised the innovation, calling it an exciting step forward. While scaling up the technology remains a challenge, experts suggest Microsoft’s approach could lead to significant advancements in quantum computing.

For more information on these topics, visit diplomacy.edu.

Europol chief warns trust in law enforcement at risk

Law enforcement agencies must ensure public understanding of the need for expanded investigative powers to effectively combat the increasing scale and complexity of cybercrime, Europol’s chief Catherine De Bolle stated at the Munich Cyber Security Conference.

De Bolle emphasised that cybercriminal activity is not only growing in volume but also evolving in sophistication, leveraging both traditional telecom infrastructure and advanced digital tools, including dark web marketplaces. In response, she underscored the necessity for law enforcement agencies to strengthen their technical capabilities. However, she noted that implementing large-scale investigative measures must be balanced with maintaining public confidence in state institutions.

Her remarks followed those of Sir Jeremy Fleming, former director of the UK’s cyber intelligence agency GCHQ, who spoke about the importance of maintaining public trust in intelligence operations.

De Bolle further stressed the need for stronger collaboration between government agencies, private sector entities, and international organisations to address cyber threats effectively. As cybercrime and state-sponsored cyber activities increasingly overlap, she advocated for a shift away from fragmented approaches, calling for ‘multilateral responses’ to improve collective cybersecurity readiness.

For more information on these topics, visit diplomacy.edu.