{"id":2888,"date":"2026-05-01T15:28:11","date_gmt":"2026-05-01T14:28:11","guid":{"rendered":"https:\/\/gamingtodaynews.site\/index.php\/2026\/05\/01\/from-encryption-backdoor-to-lawful-access-is-a-compromise\/"},"modified":"2026-05-01T15:28:13","modified_gmt":"2026-05-01T14:28:13","slug":"from-encryption-backdoor-to-lawful-access-is-a-compromise","status":"publish","type":"post","link":"https:\/\/gamingtodaynews.site\/index.php\/2026\/05\/01\/from-encryption-backdoor-to-lawful-access-is-a-compromise\/","title":{"rendered":"From &#039;encryption backdoor&#039; to &#039;lawful access&#039; \u2014 is a compromise\u2026"},"content":{"rendered":"<div class=\"anp-pro-entry\">\n<p>From &#8216;encryption backdoor&#8217; to &#8216;lawful access&#8217; \u2014 is a compromise\u2026 is attracting attention across the tech world. Analysts, enthusiasts, and industry observers are watching closely to see how this story develops.<\/p>\n<p>This update adds another signal to a fast-moving sector where product decisions, platform changes, and competition can quickly shape the market.<\/p>\n<p class=\"anp-pro-p\">Canada is the latest country pushing for &#8220;lawful access&#8221; to data<\/p>\n<p class=\"anp-pro-p\">When you purchase through links on our site, we may earn an affiliate commission. Here\u2019s how it works.<\/p>\n<p class=\"anp-pro-p\">When privacy advocates thought they had won the Crypto Wars in the 1990s, they probably wouldn\u2019t have guessed they\u2019d still be discussing whether decrypting private data is a bad or good idea 30 years later. But since at least 2020, a stream of governments have been trying to create a backdoor to encryption under the new name of &#8220;lawful access&#8221;.<\/p>\n<p class=\"anp-pro-p\">Canada&#8217;s C-22 bill is the latest such proposal. It seeks to force all &#8220;electronic service providers&#8221; to install &#8220;technical capabilities&#8221; to allow law enforcement access to all communications and sensitive data of Canadian citizens.<\/p>\n<p class=\"anp-pro-p\">For law enforcement, it\u2019s about modernising the data access rights and equipping officers with the tools to fight back the most serious crimes \u2014 organized crime, human trafficking, and online sexual exploitation.<\/p>\n<p class=\"anp-pro-p\">For cryptographers, data scientists, security experts, and privacy advocates, however, creating a backdoor to encryption is, of course, a major concern \u2013 a false step that will lead to far more problems than it might solve.<\/p>\n<p class=\"anp-pro-p\">Then, there are the political divisions that it creates and the seemingly endless back-and-forth debates, which take up precious parliamentary time.<\/p>\n<p class=\"anp-pro-p\">In the EU, what\u2019s been called Chat Control took over three years of failed attempts to reach a final stage and produce a watered-down version where the encryption backdoor may be \u201cvoluntary\u201d instead, and with experts believing it\u2019s &#8220;a disaster waiting to happen&#8221;. And that\u2019s only if politicians can push it through.<\/p>\n<p class=\"anp-pro-p\">The hot mess that is Chat Control might even be considered a success story in comparison. The French Parliament rejected an encryption backdoor in 2025. A similar proposal in Sweden went quiet after a strong backlash from privacy and security experts around the same time. In 2023, the UK also decided to halt a similar provision within its Online Safety Act \u201cuntil it is technically feasible\u201d to do so.<\/p>\n<p class=\"anp-pro-p\">But despite these failures, the desire for the ability to decrypt data when convenient to the authorities does not seem to have been blunted.<\/p>\n<figure class=\"anp-pro-inline-figure\" style=\"margin:1.75em auto;text-align:center;max-width:100%\"><img class=\"anp-pro-inline-img\" src=\"https:\/\/gamingtodaynews.site\/wp-content\/uploads\/2026\/05\/9kTjCEy37gh8ucdaDhrVoU-2153-80.jpg\" alt=\"\" style=\"margin:0 auto;max-width:100%;width:auto;height:auto;object-fit:contain;object-position:center\" loading=\"lazy\" decoding=\"async\"><\/figure>\n<p class=\"anp-pro-p\">Under the ProtectEU strategy, European policymakers are looking at how to meet Europol\u2019s demands \u2014 decrypting citizens\u2019 data by 2030. And the UK has resorted to another law of its own \u2013 the controversial 2016 Investigatory Powers Act \u2013 to hit Apple with at least two encryption backdoor requests to bypass iCloud\u2019s Advanced Data Protection feature.<\/p>\n<p class=\"anp-pro-p\">Canada\u2019s recent move highlights the appearance of a change in approach that governments seem to think will ease the passage of this kind of legislation. &#8220;Lawful access&#8221; is the growing rebranding of the hobbling of encryption, but will this softer appearing approach be enough to get the same demands over the line?<\/p>\n<p class=\"anp-pro-p\">Is it even possible to find a compromise between the encryption access requirements of law enforcement and the level of privacy and security that citizens deserve?<\/p>\n<p class=\"anp-pro-p\">I\u2019ve been following these legal attempts closely since the beginning of 2023, and there\u2019s something that I keep hearing as a mantra when I talk with the people working in cybersecurity: encryption is maths. It either works for everyone or it\u2019s broken for everyone. A backdoor, that only the good guys can use, cannot exist.<\/p>\n<p class=\"anp-pro-p\">It\u2019s not just digital rights groups that are aware of this. I once attended an event where a former investigator was arguing how encryption is also &#8220;vital for law enforcement&#8221; because it keeps both citizens and organizations safe.<\/p>\n<p class=\"anp-pro-p\">When the Salt Typhoon occurred \u2014 the unprecedented cyberattacks that targeted all the major US telecom platforms \u2014 FBI and CISA agents were quick to urge all citizens to switch to encrypted services under the refrain &#8220;Encryption is your friend.&#8221; This is surely not something that the authorities really wish to weaken?<\/p>\n<p class=\"anp-pro-p\">Former General Counsel of the US Federal Bureau of Investigation James A. Baker argued that creating a backdoor \u201cwon&#8217;t help law enforcement to protect the people they want to protect, but it will expose them to more threats&#8221;.<\/p>\n<p class=\"anp-pro-p\">It\u2019s bad for both sides, then: private citizens and law enforcement. Undermining encryption not only threatens rights but it\u2019s bad for security, too.<\/p>\n<p class=\"anp-pro-p\">&#8220;Imagine being able to attack the digital infrastructure of a country by using a botnet that is exploiting every single Android phone,&#8221; Society&#8217;s Senior Director for Internet Trust, Robin Wilton, once explained to me. \u201cIt would be catastrophic. Yet, that&#8217;s what happens if you build a platformic vulnerability into a monoculture of devices.&#8221;<\/p>\n<p class=\"anp-pro-p\">That\u2019s a huge risk, for something that many believe won\u2019t do much to stop criminals in practice, and, all the while people will keep using encryption anyway through illegal apps, as the Co-Founder of Matrix and encrypted platform Element told me back in March 2023.<\/p>\n<figure class=\"anp-pro-inline-figure\" style=\"margin:1.75em auto;text-align:center;max-width:100%\"><img class=\"anp-pro-inline-img\" src=\"https:\/\/gamingtodaynews.site\/wp-content\/uploads\/2026\/05\/9kTjCEy37gh8ucdaDhrVoU-1920-80.jpg\" alt=\"\" style=\"margin:0 auto;max-width:100%;width:auto;height:auto;object-fit:contain;object-position:center\" loading=\"lazy\" decoding=\"async\"><\/figure>\n<p class=\"anp-pro-p\">As a new encryption backdoor bill makes headlines, 30 organizations and more than 20 cybersecurity experts have already signed the open letter, published by the Global Encryption Coalition, on Tuesday, joining the call to the Canadian federal government to withdraw Bill C-22.<\/p>\n<p class=\"anp-pro-p\">Exactly one week before, on April 21, another coalition, made up of 14 civil liberty groups, refugee rights campaigners, academics, and digital rights organizations, alongside 15 of Canada&#8217;s most prominent privacy scholars and legal experts, also sent a letter to Prime Minister Mark Carney and every Member of Parliament to call for a full withdrawal.<\/p>\n<p class=\"anp-pro-p\">The hard truth is that the people building the software aren\u2019t on board, either. The likes of Signal, WhatsApp, and Telegram have said over and over that they would rather leave the market than undermine their encryption protections. Apple even decided to kill its iCloud\u2019s end-to-end encryption feature in the UK altogether, instead of creating a false sense of security with a backdoor.<\/p>\n<p class=\"anp-pro-p\">Whether all of this will be enough to make Canadian politicians \u2014 and others thinking of introducing the same \u2014 step back, is a story for another time. What\u2019s clear, though, is that this recent outcry against lawful access is a perfect echo of what we&#8217;ve heard each time a backdoor to encryption is suggested.<\/p>\n<p class=\"anp-pro-p\">Perhaps, Proton\u2019s CEO and Founder, Andy Yen, is right. To find a compromise, the first step is for the tech industry to acknowledge that, yes, privacy can be misused, &#8220;but the cost of a world without is so much higher&#8221;.<\/p>\n<p class=\"anp-pro-p\">The second step may be for law enforcement to accept, too, that \u2014 exactly as happens in the offline world \u2014 there is some information that they may not be able to access.<\/p>\n<p class=\"anp-pro-p\">Follow TechRadar on Google News and add us as a preferred source to get our expert news, reviews, and opinion in your feeds. Make sure to click the Follow button!<\/p>\n<p class=\"anp-pro-p\">Chiara is a multimedia journalist committed to covering stories to help promote the rights and denounce the abuses of the digital side of life \u2013 wherever cybersecurity, markets, and politics tangle up. She believes an open, uncensored, and private internet is a basic human need and wants to use her knowledge of VPNs to help readers take back control. She writes news, interviews, and analysis on data privacy, online censorship, digital rights, tech policies, and security software, with a special focus on VPNs, for TechRadar and TechRadar Pro. Got a story, tip-off, or something tech-interesting to say? Reach out to chiara.castro@futurenet.com<\/p>\n<p class=\"anp-pro-p\">Please logout and then login again, you will then be prompted to enter your display name.<\/p>\n<h2>Why This Matters<\/h2>\n<p>This development may influence user expectations, future product strategy, and the competitive balance inside the broader technology industry.<\/p>\n<p>Companies in adjacent segments often react quickly to similar moves, which is why stories like this tend to matter beyond a single announcement.<\/p>\n<h2>Looking Ahead<\/h2>\n<p>The full impact will become clearer over time, but the story already highlights how quickly the modern tech landscape can evolve.<\/p>\n<p>Observers will continue tracking the next steps and how they affect products, users, and the wider market.<\/p>\n<\/div>\n","protected":false},"excerpt":{"rendered":"<p>From &#8216;encryption backdoor&#8217; to &#8216;lawful access&#8217; \u2014 is a compromise\u2026 is attracting attention across the tech world. Analysts,<\/p>\n","protected":false},"author":0,"featured_media":2889,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1],"tags":[534,1113,263,1112,683],"class_list":["post-2888","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-games","tag-access","tag-backdoor","tag-data","tag-encryption","tag-privacy"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.1.1 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>From &#039;encryption backdoor&#039; to &#039;lawful access&#039; \u2014 is a compromise\u2026 - gamingtodaynews.site<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/gamingtodaynews.site\/index.php\/2026\/05\/01\/from-encryption-backdoor-to-lawful-access-is-a-compromise\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"From &#039;encryption backdoor&#039; to &#039;lawful access&#039; \u2014 is a compromise\u2026 - gamingtodaynews.site\" \/>\n<meta property=\"og:description\" content=\"From &#8216;encryption backdoor&#8217; to &#8216;lawful access&#8217; \u2014 is a compromise\u2026 is attracting attention across the tech world. Analysts,\" \/>\n<meta property=\"og:url\" content=\"https:\/\/gamingtodaynews.site\/index.php\/2026\/05\/01\/from-encryption-backdoor-to-lawful-access-is-a-compromise\/\" \/>\n<meta property=\"og:site_name\" content=\"gamingtodaynews.site\" \/>\n<meta property=\"article:published_time\" content=\"2026-05-01T14:28:11+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2026-05-01T14:28:13+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/gamingtodaynews.site\/wp-content\/uploads\/2026\/05\/9kTjCEy37gh8ucdaDhrVoU-1280-80.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1280\" \/>\n\t<meta property=\"og:image:height\" content=\"720\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"7 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/gamingtodaynews.site\/index.php\/2026\/05\/01\/from-encryption-backdoor-to-lawful-access-is-a-compromise\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/gamingtodaynews.site\/index.php\/2026\/05\/01\/from-encryption-backdoor-to-lawful-access-is-a-compromise\/\"},\"author\":{\"name\":\"\",\"@id\":\"\"},\"headline\":\"From &#039;encryption backdoor&#039; to &#039;lawful access&#039; \u2014 is a compromise\u2026\",\"datePublished\":\"2026-05-01T14:28:11+00:00\",\"dateModified\":\"2026-05-01T14:28:13+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/gamingtodaynews.site\/index.php\/2026\/05\/01\/from-encryption-backdoor-to-lawful-access-is-a-compromise\/\"},\"wordCount\":1380,\"image\":{\"@id\":\"https:\/\/gamingtodaynews.site\/index.php\/2026\/05\/01\/from-encryption-backdoor-to-lawful-access-is-a-compromise\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/gamingtodaynews.site\/wp-content\/uploads\/2026\/05\/9kTjCEy37gh8ucdaDhrVoU-1280-80.jpg\",\"keywords\":[\"Access\",\"Backdoor\",\"Data\",\"Encryption\",\"Privacy\"],\"articleSection\":[\"Games\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/gamingtodaynews.site\/index.php\/2026\/05\/01\/from-encryption-backdoor-to-lawful-access-is-a-compromise\/\",\"url\":\"https:\/\/gamingtodaynews.site\/index.php\/2026\/05\/01\/from-encryption-backdoor-to-lawful-access-is-a-compromise\/\",\"name\":\"From &#039;encryption backdoor&#039; to &#039;lawful access&#039; \u2014 is a compromise\u2026 - gamingtodaynews.site\",\"isPartOf\":{\"@id\":\"https:\/\/gamingtodaynews.site\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/gamingtodaynews.site\/index.php\/2026\/05\/01\/from-encryption-backdoor-to-lawful-access-is-a-compromise\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/gamingtodaynews.site\/index.php\/2026\/05\/01\/from-encryption-backdoor-to-lawful-access-is-a-compromise\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/gamingtodaynews.site\/wp-content\/uploads\/2026\/05\/9kTjCEy37gh8ucdaDhrVoU-1280-80.jpg\",\"datePublished\":\"2026-05-01T14:28:11+00:00\",\"dateModified\":\"2026-05-01T14:28:13+00:00\",\"author\":{\"@id\":\"\"},\"breadcrumb\":{\"@id\":\"https:\/\/gamingtodaynews.site\/index.php\/2026\/05\/01\/from-encryption-backdoor-to-lawful-access-is-a-compromise\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/gamingtodaynews.site\/index.php\/2026\/05\/01\/from-encryption-backdoor-to-lawful-access-is-a-compromise\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/gamingtodaynews.site\/index.php\/2026\/05\/01\/from-encryption-backdoor-to-lawful-access-is-a-compromise\/#primaryimage\",\"url\":\"https:\/\/gamingtodaynews.site\/wp-content\/uploads\/2026\/05\/9kTjCEy37gh8ucdaDhrVoU-1280-80.jpg\",\"contentUrl\":\"https:\/\/gamingtodaynews.site\/wp-content\/uploads\/2026\/05\/9kTjCEy37gh8ucdaDhrVoU-1280-80.jpg\",\"width\":1280,\"height\":720},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/gamingtodaynews.site\/index.php\/2026\/05\/01\/from-encryption-backdoor-to-lawful-access-is-a-compromise\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/gamingtodaynews.site\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"From &#039;encryption backdoor&#039; to &#039;lawful access&#039; \u2014 is a compromise\u2026\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/gamingtodaynews.site\/#website\",\"url\":\"https:\/\/gamingtodaynews.site\/\",\"name\":\"gamingtodaynews.site\",\"description\":\"\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/gamingtodaynews.site\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"From &#039;encryption backdoor&#039; to &#039;lawful access&#039; \u2014 is a compromise\u2026 - gamingtodaynews.site","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/gamingtodaynews.site\/index.php\/2026\/05\/01\/from-encryption-backdoor-to-lawful-access-is-a-compromise\/","og_locale":"en_US","og_type":"article","og_title":"From &#039;encryption backdoor&#039; to &#039;lawful access&#039; \u2014 is a compromise\u2026 - gamingtodaynews.site","og_description":"From &#8216;encryption backdoor&#8217; to &#8216;lawful access&#8217; \u2014 is a compromise\u2026 is attracting attention across the tech world. Analysts,","og_url":"https:\/\/gamingtodaynews.site\/index.php\/2026\/05\/01\/from-encryption-backdoor-to-lawful-access-is-a-compromise\/","og_site_name":"gamingtodaynews.site","article_published_time":"2026-05-01T14:28:11+00:00","article_modified_time":"2026-05-01T14:28:13+00:00","og_image":[{"width":1280,"height":720,"url":"https:\/\/gamingtodaynews.site\/wp-content\/uploads\/2026\/05\/9kTjCEy37gh8ucdaDhrVoU-1280-80.jpg","type":"image\/jpeg"}],"twitter_card":"summary_large_image","twitter_misc":{"Est. reading time":"7 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/gamingtodaynews.site\/index.php\/2026\/05\/01\/from-encryption-backdoor-to-lawful-access-is-a-compromise\/#article","isPartOf":{"@id":"https:\/\/gamingtodaynews.site\/index.php\/2026\/05\/01\/from-encryption-backdoor-to-lawful-access-is-a-compromise\/"},"author":{"name":"","@id":""},"headline":"From &#039;encryption backdoor&#039; to &#039;lawful access&#039; \u2014 is a compromise\u2026","datePublished":"2026-05-01T14:28:11+00:00","dateModified":"2026-05-01T14:28:13+00:00","mainEntityOfPage":{"@id":"https:\/\/gamingtodaynews.site\/index.php\/2026\/05\/01\/from-encryption-backdoor-to-lawful-access-is-a-compromise\/"},"wordCount":1380,"image":{"@id":"https:\/\/gamingtodaynews.site\/index.php\/2026\/05\/01\/from-encryption-backdoor-to-lawful-access-is-a-compromise\/#primaryimage"},"thumbnailUrl":"https:\/\/gamingtodaynews.site\/wp-content\/uploads\/2026\/05\/9kTjCEy37gh8ucdaDhrVoU-1280-80.jpg","keywords":["Access","Backdoor","Data","Encryption","Privacy"],"articleSection":["Games"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/gamingtodaynews.site\/index.php\/2026\/05\/01\/from-encryption-backdoor-to-lawful-access-is-a-compromise\/","url":"https:\/\/gamingtodaynews.site\/index.php\/2026\/05\/01\/from-encryption-backdoor-to-lawful-access-is-a-compromise\/","name":"From &#039;encryption backdoor&#039; to &#039;lawful access&#039; \u2014 is a compromise\u2026 - gamingtodaynews.site","isPartOf":{"@id":"https:\/\/gamingtodaynews.site\/#website"},"primaryImageOfPage":{"@id":"https:\/\/gamingtodaynews.site\/index.php\/2026\/05\/01\/from-encryption-backdoor-to-lawful-access-is-a-compromise\/#primaryimage"},"image":{"@id":"https:\/\/gamingtodaynews.site\/index.php\/2026\/05\/01\/from-encryption-backdoor-to-lawful-access-is-a-compromise\/#primaryimage"},"thumbnailUrl":"https:\/\/gamingtodaynews.site\/wp-content\/uploads\/2026\/05\/9kTjCEy37gh8ucdaDhrVoU-1280-80.jpg","datePublished":"2026-05-01T14:28:11+00:00","dateModified":"2026-05-01T14:28:13+00:00","author":{"@id":""},"breadcrumb":{"@id":"https:\/\/gamingtodaynews.site\/index.php\/2026\/05\/01\/from-encryption-backdoor-to-lawful-access-is-a-compromise\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/gamingtodaynews.site\/index.php\/2026\/05\/01\/from-encryption-backdoor-to-lawful-access-is-a-compromise\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/gamingtodaynews.site\/index.php\/2026\/05\/01\/from-encryption-backdoor-to-lawful-access-is-a-compromise\/#primaryimage","url":"https:\/\/gamingtodaynews.site\/wp-content\/uploads\/2026\/05\/9kTjCEy37gh8ucdaDhrVoU-1280-80.jpg","contentUrl":"https:\/\/gamingtodaynews.site\/wp-content\/uploads\/2026\/05\/9kTjCEy37gh8ucdaDhrVoU-1280-80.jpg","width":1280,"height":720},{"@type":"BreadcrumbList","@id":"https:\/\/gamingtodaynews.site\/index.php\/2026\/05\/01\/from-encryption-backdoor-to-lawful-access-is-a-compromise\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/gamingtodaynews.site\/"},{"@type":"ListItem","position":2,"name":"From &#039;encryption backdoor&#039; to &#039;lawful access&#039; \u2014 is a compromise\u2026"}]},{"@type":"WebSite","@id":"https:\/\/gamingtodaynews.site\/#website","url":"https:\/\/gamingtodaynews.site\/","name":"gamingtodaynews.site","description":"","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/gamingtodaynews.site\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"}]}},"_links":{"self":[{"href":"https:\/\/gamingtodaynews.site\/index.php\/wp-json\/wp\/v2\/posts\/2888","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/gamingtodaynews.site\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/gamingtodaynews.site\/index.php\/wp-json\/wp\/v2\/types\/post"}],"replies":[{"embeddable":true,"href":"https:\/\/gamingtodaynews.site\/index.php\/wp-json\/wp\/v2\/comments?post=2888"}],"version-history":[{"count":1,"href":"https:\/\/gamingtodaynews.site\/index.php\/wp-json\/wp\/v2\/posts\/2888\/revisions"}],"predecessor-version":[{"id":2892,"href":"https:\/\/gamingtodaynews.site\/index.php\/wp-json\/wp\/v2\/posts\/2888\/revisions\/2892"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/gamingtodaynews.site\/index.php\/wp-json\/wp\/v2\/media\/2889"}],"wp:attachment":[{"href":"https:\/\/gamingtodaynews.site\/index.php\/wp-json\/wp\/v2\/media?parent=2888"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/gamingtodaynews.site\/index.php\/wp-json\/wp\/v2\/categories?post=2888"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/gamingtodaynews.site\/index.php\/wp-json\/wp\/v2\/tags?post=2888"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}