809:). Mr Ashiq is security evangelist within the U.A.E government and brought a valuable outside perspective. Then there were quotes by Mrs Dawn Turner. I like her posts and regularly quote her as she creates the bigger picture, sets into context and explains. Especially when talking about the intersection of information security and law, this helps a lot. Additional sources will help to enhance. But please avoid destructive steps that would harm the credibility of the article. Discussions in the talk section would be the most fruitful. I like those discussions like in the talk of the
805:
notability of the authors quoted in the following. The first reference deleted as spam was by Jens Bender from
Fraunhofer Institute, one of Germany's most renowned research institutes. The source was published on www.Bund.de, which is the public portal of Germany's Federal Administration. The source was critically evaluating opportunities and risks and helped to bring the article away from wiktionary kind of explanation towards an evaluating essay. Also Ashiq J.A. is known to many security experts. His tweets on #infosec have more than 800 followers (
186:
176:
158:
653:
635:
270:
252:
280:
563:
545:
364:
444:
346:
116:
663:
22:
64:
472:
374:
462:
78:
53:
833:
Espionage agencies and hackers) would get easy access to a network of relationships which can be maliciously exploited. I know that ETSI is continuously working on additional standards helping to secure the data and to better specify eIDAS. But I did not find any notable source so far that allows to discuss this in the article. Please contribute!
970:
QWACs enable website identification at a high level of assurance, attesting the link between the website domain name and the natural or legal person to whom the certificate is issued, and confirming the identity of that person. Providers of web-browsers should then display the certified identity data
832:
Increasingly I follow discussions on the security of eIDAS. I.e. the risk that centralized trust-service-providers could be tempted to breach data security laws and misuse data as they have an overall insight into transactions, participating agents (nodes) their relationships (edges). Governments (or
958:
Recital 65 establishes that, for the purpose of enhancing online security for end-users, "providers of web browsers should, in exceptional circumstances, be able to take precautionary measures that are both necessary and proportionate in response to substantiated concerns regarding security breaches
1012:
QWAC issuers will have to undergo constant monitoring by their auditors in addition to annual audits, plus annual evaluation by an independent
Conformity Assessment Body, as well as monitoring and approval by a national Supervisory Body. It is difficult to imagine how in this scenario the use of
962:
Finally, the
Commissions’ statement issued in the Parliament has made it clear that recognising QWACs does not impose obligations or restrictions on how web browsers establish encrypted connections with websites or authenticate the cryptographic keys. This stance does not impact browser security
912:- The mentions about the EU being able to "hack into any internet-enabled device" is too extreme and unsubstantiated with the sources provided. While yes, internet traffic could theoretically be intercepted and decrypted, that alone wouldn't allow "the EU" to "hack any internet-enabled device".
948:
The purpose of
Qualified Web Authentication Certificates (QWACs) is to enhance the security and transparency of the Internet as trusted services. QWACs do not restrict browsers own security policies, especially as Article 45 of the Identity Regulation leaves it up to them to maintain their own
804:
A couple of days ago, some of the references in the eIDAS article where removed by an anonymous user with the justification that they were "SPAM". I strongly support the movement of keeping
Knowledge free of spam. However I had to undo the activity as it was not justified. Let me defend the
993:
A user added "While the main language of that text..." If I'm reading this correctly, it suggests that web browsers will be able to detect a MITM. However, they will still be able to perform the MITM, which is what a wide range of organizations were concerned about.
930:"Any EU government" refers unequivocally to any government in the EU. It's plural. This might be an American-European English split. In American English, "government" generally refers to the public sector as a whole, not the parliament or cabinet.
933:
Yes, in fact it would allow any EU government to hack into the communications of any internet-enabled device. As long as a device is controlled by the internet, the packets can be intercepted and modified, as stated in the source.
909:- The term "EU Government". This sounds like the EU as a organization will be able to read, decrypt and perhaps re-encrypt HTTPS traffic, when it is in fact the national government that would be able do that.
887:
A significant proportion of publications covering the law specifically examine
Article 45, so I've put more weight to it, since this seems to be the most historically significant provision of the law.
906:
The section "Man-in-the-middle attacks and mass surveillance" has a very negative tone. It also states various factually incorrect statements and fearmongering. I have problems with the following:
89:. The project works to allow users to contribute quality articles and media files to the encyclopedia and track their progress as they are developed. To participate, please visit the
848:
You were prescient. Seven years later, the EU is expanding the law to enable exactly that. There weren't reliable sources then, but there certainly are a lot clamoring about it now.
1013:
QWACS should facilitate an undetected MITM attack. Please refer to the detailed statement elaborated by the
European Signature Dialogue to correct misinformation on the topic.
1090:
420:
1014:
1105:
521:
426:
1120:
1045:
611:
750:
text or images borrowed from other web sites or published material; such additions will be deleted. Contributors may use copyrighted publications as a source of
1095:
1085:
527:
1060:
228:
90:
85:
58:
617:
1110:
396:
1135:
1130:
1100:
1075:
736:
322:
1115:
234:
498:
685:
785:
from editing. While we appreciate contributions, we must require all contributors to understand and comply with these policies. Thank you.
1065:
1055:
587:
387:
351:
328:
1017:
972:
949:
procedures and criteria in order to maintain and preserve the privacy of online communication using encryption and other proven methods.
997:
Is there a third-party source that analyzes this assertion? The source appears to be a single organization and not a secondary source.
724:
1080:
1070:
1050:
1040:
494:
485:
449:
676:
640:
1125:
570:
550:
199:
163:
33:
493:
on
Knowledge. If you would like to participate, you can choose to edit the article attached to this page, or visit the
140:
63:
782:
723:
Prior content in this article duplicated one or more previously published sources. The material was copied from:
293:
257:
964:
953:
762:
properly. The material may also be rewritten, providing it does not infringe on the copyright of the original
21:
1021:
976:
1002:
939:
892:
873:
853:
297:, an attempt at providing a comprehensive, standardised, pan-jurisdictional and up-to-date resource for the
773:
for how to properly implement limited quotations of copyrighted text. Knowledge takes copyright violations
838:
818:
583:
971:
and the other attested attributes to the end-user in a user-friendly manner in the browser environment.
965:
Statement by the
Commission on Article 45 on the occasion of the adoption of Digital Identity Regulation
379:
39:
766:
747:
743:
725:
http://www.cryptomathic.com/news-events/blog/understanding-the-major-terms-around-digital-signatures
732:
684:
on
Knowledge. If you would like to participate, please visit the project page, where you can join
586:
on Knowledge. If you would like to participate, please visit the project page, where you can join
395:
on Knowledge. If you would like to participate, please visit the project page, where you can join
998:
935:
888:
869:
849:
769:
from that source. Therefore, such paraphrased portions must provide their source. Please see our
727:. Copied or closely paraphrased material has been rewritten or removed and must not be restored,
477:
920:
834:
814:
668:
813:
entry. They help sharpening and improving the article. And please do not work anonymously.
175:
157:
134:
952:
The final version of the European Digital Identity Regulation has confirmed this fact.
789:
392:
652:
634:
1034:
770:
497:, where you can join the project and see a list of open tasks. Leave messages at the
191:
758:, may copy sentences and phrases, provided they are included in quotation marks and
916:
759:
731:
it is duly released under a compatible license. (For more information, please see
269:
251:
868:
Should the 1st and 2nd versions of the law be separate articles or single ones?
490:
279:
562:
544:
471:
461:
443:
959:
or the loss of integrity of an identified certificate or set of certificates."
681:
662:
658:
467:
369:
285:
275:
181:
130:
115:
786:
579:
363:
345:
755:
575:
810:
489:, an attempt to provide a standard approach to writing articles about
204:
77:
52:
954:
https://www.europarl.europa.eu/doceo/document/TA-9-2024-0117_EN.pdf
806:
298:
15:
114:
1025:
1006:
980:
943:
924:
896:
877:
857:
842:
822:
794:
203:, an effort to build a comprehensive and detailed guide to
735:
if you are not the copyright holder of this material, or
391:, a collaborative effort to improve the coverage of the
125:
680:, a collaborative effort to improve the coverage of
574:, a collaborative effort to improve the coverage of
616:This article has not yet received a rating on the
526:This article has not yet received a rating on the
425:This article has not yet received a rating on the
327:This article has not yet received a rating on the
233:This article has not yet received a rating on the
915:For this I am marking this section as disputed.
207:topics of a cross-border nature on Knowledge.
8:
99:Knowledge:WikiProject Articles for creation
19:
1091:Unknown-importance European Union articles
629:
539:
438:
340:
246:
152:
102:Template:WikiProject Articles for creation
83:This article was reviewed by member(s) of
47:
631:
541:
440:
342:
248:
154:
49:
1106:Unknown-importance electronic articles
1121:Unknown-importance Computing articles
1046:AfC submissions by date/06 April 2016
733:"using copyrighted works from others"
7:
674:This article is within the scope of
568:This article is within the scope of
405:Knowledge:WikiProject European Union
385:This article is within the scope of
291:This article is within the scope of
197:This article is within the scope of
1096:WikiProject European Union articles
1086:Start-Class European Union articles
408:Template:WikiProject European Union
301:and the subjects encompassed by it.
1061:Unknown-importance Europe articles
14:
506:Knowledge:WikiProject Electronics
86:WikiProject Articles for creation
1111:WikiProject Electronics articles
737:"donating copyrighted materials"
694:Knowledge:WikiProject Technology
661:
651:
633:
561:
543:
509:Template:WikiProject Electronics
470:
460:
442:
372:
362:
344:
278:
268:
250:
184:
174:
156:
76:
62:
51:
20:
1136:WikiProject Technology articles
1131:Start-Class Technology articles
1101:Start-Class electronic articles
1076:Unknown-importance law articles
697:Template:WikiProject Technology
596:Knowledge:WikiProject Computing
123:This article was accepted from
1116:Start-Class Computing articles
599:Template:WikiProject Computing
38:It is of interest to multiple
1:
944:01:23, 24 November 2023 (UTC)
843:08:13, 14 December 2016 (UTC)
823:08:07, 14 December 2016 (UTC)
688:and see a list of open tasks.
590:and see a list of open tasks.
399:and see a list of open tasks.
1007:01:48, 2 December 2023 (UTC)
925:10:41, 9 November 2023 (UTC)
897:16:21, 4 November 2023 (UTC)
878:15:37, 4 November 2023 (UTC)
858:16:39, 4 November 2023 (UTC)
213:Knowledge:WikiProject Europe
129:on 6 April 2016 by reviewer
1066:WikiProject Europe articles
1056:Start-Class Europe articles
807:https://twitter.com/AshiqJA
777:, and persistent violators
216:Template:WikiProject Europe
1152:
864:eIDAS 1.0 and 2.0 separate
771:guideline on non-free text
618:project's importance scale
528:project's importance scale
427:project's importance scale
388:WikiProject European Union
329:project's importance scale
235:project's importance scale
1026:09:08, 9 April 2024 (UTC)
981:09:07, 9 April 2024 (UTC)
795:18:01, 7 April 2016 (UTC)
719:Copyright problem removed
646:
615:
556:
525:
455:
424:
357:
326:
307:Knowledge:WikiProject Law
263:
232:
169:
122:
71:
46:
1081:WikiProject Law articles
1071:Start-Class law articles
1051:Accepted AfC submissions
1041:Start-Class AfC articles
754:, and, if allowed under
483:This article is part of
310:Template:WikiProject Law
902:MITM Section inaccuracy
828:Data-Security and eIDAS
486:WikiProject Electronics
411:European Union articles
1126:All Computing articles
677:WikiProject Technology
584:information technology
119:
28:This article is rated
571:WikiProject Computing
380:European Union portal
118:
96:Articles for creation
93:for more information.
59:Articles for creation
1015:(4) Post | LinkedIn
746:, we cannot accept
700:Technology articles
512:electronic articles
989:MITM Qualification
602:Computing articles
478:Electronics portal
200:WikiProject Europe
120:
34:content assessment
792:
716:
715:
712:
711:
708:
707:
669:Technology portal
628:
627:
624:
623:
538:
537:
534:
533:
499:project talk page
437:
436:
433:
432:
339:
338:
335:
334:
245:
244:
241:
240:
151:
150:
147:
146:
1143:
790:
702:
701:
698:
695:
692:
671:
666:
665:
655:
648:
647:
637:
630:
604:
603:
600:
597:
594:
565:
558:
557:
547:
540:
514:
513:
510:
507:
504:
480:
475:
474:
464:
457:
456:
446:
439:
413:
412:
409:
406:
403:
382:
377:
376:
375:
366:
359:
358:
348:
341:
315:
314:
311:
308:
305:
288:
283:
282:
272:
265:
264:
254:
247:
221:
220:
217:
214:
211:
194:
189:
188:
187:
178:
171:
170:
160:
153:
128:
107:
106:
103:
100:
97:
80:
73:
72:
67:
66:
65:
55:
48:
31:
25:
24:
16:
1151:
1150:
1146:
1145:
1144:
1142:
1141:
1140:
1031:
1030:
991:
904:
885:
866:
830:
802:
721:
699:
696:
693:
690:
689:
667:
660:
601:
598:
595:
592:
591:
511:
508:
505:
502:
501:
476:
469:
410:
407:
404:
401:
400:
378:
373:
371:
312:
309:
306:
303:
302:
294:WikiProject Law
284:
277:
219:Europe articles
218:
215:
212:
209:
208:
190:
185:
183:
124:
104:
101:
98:
95:
94:
61:
32:on Knowledge's
29:
12:
11:
5:
1149:
1147:
1139:
1138:
1133:
1128:
1123:
1118:
1113:
1108:
1103:
1098:
1093:
1088:
1083:
1078:
1073:
1068:
1063:
1058:
1053:
1048:
1043:
1033:
1032:
1029:
1028:
990:
987:
986:
985:
984:
983:
968:
960:
956:
950:
931:
903:
900:
884:
881:
865:
862:
861:
860:
829:
826:
801:
798:
775:very seriously
720:
717:
714:
713:
710:
709:
706:
705:
703:
686:the discussion
673:
672:
656:
644:
643:
638:
626:
625:
622:
621:
614:
608:
607:
605:
588:the discussion
566:
554:
553:
548:
536:
535:
532:
531:
524:
518:
517:
515:
482:
481:
465:
453:
452:
447:
435:
434:
431:
430:
423:
417:
416:
414:
402:European Union
397:the discussion
393:European Union
384:
383:
367:
355:
354:
352:European Union
349:
337:
336:
333:
332:
325:
319:
318:
316:
290:
289:
273:
261:
260:
255:
243:
242:
239:
238:
231:
225:
224:
222:
196:
195:
179:
167:
166:
161:
149:
148:
145:
144:
121:
111:
110:
108:
81:
69:
68:
56:
44:
43:
37:
26:
13:
10:
9:
6:
4:
3:
2:
1148:
1137:
1134:
1132:
1129:
1127:
1124:
1122:
1119:
1117:
1114:
1112:
1109:
1107:
1104:
1102:
1099:
1097:
1094:
1092:
1089:
1087:
1084:
1082:
1079:
1077:
1074:
1072:
1069:
1067:
1064:
1062:
1059:
1057:
1054:
1052:
1049:
1047:
1044:
1042:
1039:
1038:
1036:
1027:
1023:
1019:
1018:158.169.40.25
1016:
1011:
1010:
1009:
1008:
1004:
1000:
999:DenverCoder19
995:
988:
982:
978:
974:
973:158.169.40.25
969:
966:
961:
957:
955:
951:
947:
946:
945:
941:
937:
936:DenverCoder19
932:
929:
928:
927:
926:
922:
918:
913:
910:
907:
901:
899:
898:
894:
890:
889:DenverCoder19
882:
880:
879:
875:
871:
863:
859:
855:
851:
850:DenverCoder19
847:
846:
845:
844:
840:
836:
827:
825:
824:
820:
816:
812:
808:
799:
797:
796:
793:
788:
784:
780:
776:
772:
768:
765:
761:
757:
753:
749:
745:
744:legal reasons
740:
739:if you are.)
738:
734:
730:
726:
718:
704:
687:
683:
679:
678:
670:
664:
659:
657:
654:
650:
649:
645:
642:
639:
636:
632:
619:
613:
610:
609:
606:
589:
585:
581:
577:
573:
572:
567:
564:
560:
559:
555:
552:
549:
546:
542:
529:
523:
520:
519:
516:
500:
496:
492:
488:
487:
479:
473:
468:
466:
463:
459:
458:
454:
451:
448:
445:
441:
428:
422:
419:
418:
415:
398:
394:
390:
389:
381:
370:
368:
365:
361:
360:
356:
353:
350:
347:
343:
330:
324:
321:
320:
317:
300:
296:
295:
287:
281:
276:
274:
271:
267:
266:
262:
259:
256:
253:
249:
236:
230:
227:
226:
223:
206:
202:
201:
193:
192:Europe portal
182:
180:
177:
173:
172:
168:
165:
162:
159:
155:
142:
139:
136:
132:
127:
117:
113:
112:
109:
92:
88:
87:
82:
79:
75:
74:
70:
60:
57:
54:
50:
45:
41:
35:
27:
23:
18:
17:
996:
992:
914:
911:
908:
905:
886:
870:DenverCoder9
867:
835:ScienceGuard
831:
815:ScienceGuard
803:
778:
774:
763:
751:
741:
728:
722:
675:
569:
495:project page
484:
386:
313:law articles
292:
198:
137:
105:AfC articles
91:project page
84:
40:WikiProjects
963:policies. (
752:information
748:copyrighted
503:Electronics
491:electronics
450:Electronics
299:legal field
30:Start-class
1035:Categories
883:Article 45
800:References
767:plagiarize
760:referenced
691:Technology
682:technology
641:Technology
286:Law portal
126:this draft
593:Computing
580:computing
576:computers
551:Computing
756:fair use
205:European
141:contribs
917:Creekie
811:Beatles
783:blocked
729:unless
582:, and
210:Europe
164:Europe
36:scale.
787:/wiae
131:Zppix
1022:talk
1003:talk
977:talk
940:talk
921:talk
893:talk
874:talk
854:talk
839:talk
819:talk
791:/tlk
779:will
742:For
135:talk
781:be
612:???
522:???
421:???
323:???
304:Law
258:Law
229:???
1037::
1024:)
1005:)
979:)
967:).
942:)
923:)
895:)
876:)
856:)
841:)
821:)
764:or
578:,
143:).
1020:(
1001:(
975:(
938:(
919:(
891:(
872:(
852:(
837:(
817:(
620:.
530:.
429:.
331:.
237:.
138:·
133:(
42:.
Text is available under the Creative Commons Attribution-ShareAlike License. Additional terms may apply.