{"id":2267,"date":"2025-11-17T10:41:00","date_gmt":"2025-11-17T10:41:00","guid":{"rendered":"https:\/\/rjbarrett.redirectme.net\/?p=2267"},"modified":"2025-11-17T10:41:00","modified_gmt":"2025-11-17T10:41:00","slug":"eu-chat-control-advances-as-privacy-experts-warn-of-hidden-backdoor-risks","status":"publish","type":"post","link":"https:\/\/rjbarrett.redirectme.net\/?p=2267","title":{"rendered":"EU Chat Control Advances as Privacy Experts Warn of Hidden Backdoor Risks"},"content":{"rendered":"<p><br \/>\n<\/p>\n<div>\n<div class=\"wp-block-group key-takeaway has-text-50-background-color has-background is-layout-constrained wp-block-group-is-layout-constrained\">\n<p class=\"has-green-500-color has-text-color has-link-color has-base-font-size wp-elements-48dd9fdda31ea9919c3f47d420f52fae\" style=\"font-style:normal;font-weight:500\"><strong>Key Takeaways: <\/strong><\/p>\n<ul class=\"wp-block-list\">\n<li><strong>The EU has introduced a new Chat Control proposal: <\/strong>Mandatory scanning is gone, but Article 4\u2019s \u2018risk mitigation\u2019 clause could still push services toward scanning private and encrypted messages.<\/li>\n<li><strong>Anonymity could be severely limited: <\/strong>Age-verification rules would make anonymous accounts difficult, affecting journalists, whistleblowers, and users who rely on privacy for safety. <\/li>\n<li><strong>The scope of scanning is expanding: <\/strong>The proposal allows detection of chat text and metadata, raising concerns about large-scale monitoring across the EU\u2019s 450M citizens.<\/li>\n<li><strong>The technology behind it still isn\u2019t viable: <\/strong>Experts say safe CSAM detection in encrypted apps doesn\u2019t exist yet, even Apple abandoned its own client-side scanning system after backlash.<\/li>\n<\/ul>\n<\/div>\n<figure class=\"wp-block-image aligncenter size-large is-resized\"><picture fetchpriority=\"high\" decoding=\"async\" class=\"wp-image-3596988\" style=\"width:700px\"><source type=\"image\/webp\" data-lazy-srcset=\"https:\/\/techreport.com\/wp-content\/uploads\/2025\/11\/new-eu-chat-control-proposal-privacy-experts-see-dangerous-backdoor-1200x675.jpg.webp 1200w, https:\/\/techreport.com\/wp-content\/uploads\/2025\/11\/new-eu-chat-control-proposal-privacy-experts-see-dangerous-backdoor-300x169.jpg.webp 300w, https:\/\/techreport.com\/wp-content\/uploads\/2025\/11\/new-eu-chat-control-proposal-privacy-experts-see-dangerous-backdoor-150x84.jpg.webp 150w, https:\/\/techreport.com\/wp-content\/uploads\/2025\/11\/new-eu-chat-control-proposal-privacy-experts-see-dangerous-backdoor-768x432.jpg.webp 768w, https:\/\/techreport.com\/wp-content\/uploads\/2025\/11\/new-eu-chat-control-proposal-privacy-experts-see-dangerous-backdoor-1536x864.jpg.webp 1536w, https:\/\/techreport.com\/wp-content\/uploads\/2025\/11\/new-eu-chat-control-proposal-privacy-experts-see-dangerous-backdoor-777x437.jpg.webp 777w, https:\/\/techreport.com\/wp-content\/uploads\/2025\/11\/new-eu-chat-control-proposal-privacy-experts-see-dangerous-backdoor.jpg.webp 1920w\" srcset=\"data:image\/svg+xml,%3Csvg%20xmlns='http:\/\/www.w3.org\/2000\/svg'%20viewBox='0%200%201200%20675'%3E%3C\/svg%3E\" data-lazy-sizes=\"(max-width: 1200px) 100vw, 1200px\"\/><img fetchpriority=\"high\" decoding=\"async\" width=\"1200\" height=\"675\" alt=\"New EU Chat Control Proposal Moves Forward \u2013 Privacy Experts See a Dangerous Backdoor.\" srcset=\"https:\/\/techreport.com\/wp-content\/uploads\/2025\/11\/new-eu-chat-control-proposal-privacy-experts-see-dangerous-backdoor-1200x675.jpg 1200w, https:\/\/techreport.com\/wp-content\/uploads\/2025\/11\/new-eu-chat-control-proposal-privacy-experts-see-dangerous-backdoor-300x169.jpg 300w, https:\/\/techreport.com\/wp-content\/uploads\/2025\/11\/new-eu-chat-control-proposal-privacy-experts-see-dangerous-backdoor-150x84.jpg 150w, https:\/\/techreport.com\/wp-content\/uploads\/2025\/11\/new-eu-chat-control-proposal-privacy-experts-see-dangerous-backdoor-768x432.jpg 768w, https:\/\/techreport.com\/wp-content\/uploads\/2025\/11\/new-eu-chat-control-proposal-privacy-experts-see-dangerous-backdoor-1536x864.jpg 1536w, https:\/\/techreport.com\/wp-content\/uploads\/2025\/11\/new-eu-chat-control-proposal-privacy-experts-see-dangerous-backdoor-777x437.jpg 777w, https:\/\/techreport.com\/wp-content\/uploads\/2025\/11\/new-eu-chat-control-proposal-privacy-experts-see-dangerous-backdoor.jpg 1920w\" data-lazy-sizes=\"(max-width: 1200px) 100vw, 1200px\" src=\"https:\/\/techreport.com\/wp-content\/uploads\/2025\/11\/new-eu-chat-control-proposal-privacy-experts-see-dangerous-backdoor-1200x675.jpg?_t=1763287191\"\/>\n<\/picture>\n<noscript><picture fetchpriority=\"high\" decoding=\"async\" class=\"wp-image-3596988\" style=\"width:700px\"><source type=\"image\/webp\" srcset=\"https:\/\/techreport.com\/wp-content\/uploads\/2025\/11\/new-eu-chat-control-proposal-privacy-experts-see-dangerous-backdoor-1200x675.jpg.webp 1200w, https:\/\/techreport.com\/wp-content\/uploads\/2025\/11\/new-eu-chat-control-proposal-privacy-experts-see-dangerous-backdoor-300x169.jpg.webp 300w, https:\/\/techreport.com\/wp-content\/uploads\/2025\/11\/new-eu-chat-control-proposal-privacy-experts-see-dangerous-backdoor-150x84.jpg.webp 150w, https:\/\/techreport.com\/wp-content\/uploads\/2025\/11\/new-eu-chat-control-proposal-privacy-experts-see-dangerous-backdoor-768x432.jpg.webp 768w, https:\/\/techreport.com\/wp-content\/uploads\/2025\/11\/new-eu-chat-control-proposal-privacy-experts-see-dangerous-backdoor-1536x864.jpg.webp 1536w, https:\/\/techreport.com\/wp-content\/uploads\/2025\/11\/new-eu-chat-control-proposal-privacy-experts-see-dangerous-backdoor-777x437.jpg.webp 777w, https:\/\/techreport.com\/wp-content\/uploads\/2025\/11\/new-eu-chat-control-proposal-privacy-experts-see-dangerous-backdoor.jpg.webp 1920w\" sizes=\"(max-width: 1200px) 100vw, 1200px\"\/><img fetchpriority=\"high\" decoding=\"async\" width=\"1200\" height=\"675\" src=\"https:\/\/techreport.com\/wp-content\/uploads\/2025\/11\/new-eu-chat-control-proposal-privacy-experts-see-dangerous-backdoor-1200x675.jpg?_t=1763287191\" alt=\"New EU Chat Control Proposal Moves Forward \u2013 Privacy Experts See a Dangerous Backdoor.\" srcset=\"https:\/\/techreport.com\/wp-content\/uploads\/2025\/11\/new-eu-chat-control-proposal-privacy-experts-see-dangerous-backdoor-1200x675.jpg 1200w, https:\/\/techreport.com\/wp-content\/uploads\/2025\/11\/new-eu-chat-control-proposal-privacy-experts-see-dangerous-backdoor-300x169.jpg 300w, https:\/\/techreport.com\/wp-content\/uploads\/2025\/11\/new-eu-chat-control-proposal-privacy-experts-see-dangerous-backdoor-150x84.jpg 150w, https:\/\/techreport.com\/wp-content\/uploads\/2025\/11\/new-eu-chat-control-proposal-privacy-experts-see-dangerous-backdoor-768x432.jpg 768w, https:\/\/techreport.com\/wp-content\/uploads\/2025\/11\/new-eu-chat-control-proposal-privacy-experts-see-dangerous-backdoor-1536x864.jpg 1536w, https:\/\/techreport.com\/wp-content\/uploads\/2025\/11\/new-eu-chat-control-proposal-privacy-experts-see-dangerous-backdoor-777x437.jpg 777w, https:\/\/techreport.com\/wp-content\/uploads\/2025\/11\/new-eu-chat-control-proposal-privacy-experts-see-dangerous-backdoor.jpg 1920w\" sizes=\"(max-width: 1200px) 100vw, 1200px\"\/>\n<\/picture>\n<\/noscript><\/figure>\n<p>The Chat Control proposal is back in Brussels. Again.\u00a0<\/p>\n<p>Lawmakers are treating it like a familiar guest who keeps showing up at the door wearing a slightly different jacket. Privacy experts say the jacket is hiding something sharp.\u00a0<\/p>\n<p>A revised version of the EU\u2019s Child Sexual Abuse Regulation (CSAR) has now moved from the Law Enforcement Working Party to the Coreper (Committee of Permanent Representatives). <\/p>\n<p class=\"has-green-300-background-color has-background\">Coreper is the group of permanent representatives from all EU member states, if Coreper likes the text, the Council will adopt its position. After that, the proposal jumps straight into a fast trilogue.<\/p>\n<p>On paper, the new version looks softer.\u00a0Mandatory scanning of private chats, photos, and URLs was removed. Scanning is now voluntary. Lawmakers seem happy. They might even feel relieved.\u00a0<\/p>\n<p>Privacy experts, however, are staring at one line in Article 4 like it\u2019s a hidden knife taped under the table. <\/p>\n<p>Let\u2019s break down what actually changed, what didn\u2019t, and why critics say this version may be even worse than the old one.\u00a0<\/p>\n<h2 class=\"wp-block-heading\">The \u2018Voluntary\u2019 Scanning That Doesn\u2019t Feel Very Voluntary<\/h2>\n<p>The Denmark Presidency produced the new compromise after negotiations stalled for over three years.\u00a0<\/p>\n<p>When the Law Enforcement Working Party met on November 12, the group accepted it with broad support.\u00a0<\/p>\n<p>No dissenting votes. No further changes needed. A rare moment of harmony inside the EU Council meeting room. <\/p>\n<p class=\"has-text-400-color has-text-color has-link-color wp-elements-5ba6d0ba104b07f103b71a2b48988053\"><strong><em>The key change is the removal of mandatory scanning. Messaging apps will not be forced to scan shared pictures, videos, or URLs. Providers like WhatsApp, Signal, Telegram, and email services can choose to scan for CSAM material.\u00a0<\/em><\/strong><\/p>\n<p>It sounds like the pressure is gone. <\/p>\n<p>But then Article 4 happens. It includes something vague, flexible, and extremely powerful. It\u2019s called a \u2018risk mitigation measure.\u2019\u00a0High-risk services may need to apply \u2018all appropriate risk mitigation measures.\u2019 The phrase feels harmless until you imagine how governments could interpret it. <\/p>\n<figure class=\"wp-block-image aligncenter size-full is-resized\"><picture decoding=\"async\" class=\"wp-image-3596996\" style=\"width:701px;height:auto\"><source type=\"image\/webp\" data-lazy-srcset=\"https:\/\/techreport.com\/wp-content\/uploads\/2025\/11\/article-4-extract-from-the-new-chat-control-proposal.png.webp 1184w, https:\/\/techreport.com\/wp-content\/uploads\/2025\/11\/article-4-extract-from-the-new-chat-control-proposal-300x74.png.webp 300w, https:\/\/techreport.com\/wp-content\/uploads\/2025\/11\/article-4-extract-from-the-new-chat-control-proposal-150x37.png.webp 150w, https:\/\/techreport.com\/wp-content\/uploads\/2025\/11\/article-4-extract-from-the-new-chat-control-proposal-768x191.png.webp 768w, https:\/\/techreport.com\/wp-content\/uploads\/2025\/11\/article-4-extract-from-the-new-chat-control-proposal-777x193.png.webp 777w\" srcset=\"data:image\/svg+xml,%3Csvg%20xmlns='http:\/\/www.w3.org\/2000\/svg'%20viewBox='0%200%201184%20294'%3E%3C\/svg%3E\" data-lazy-sizes=\"(max-width: 1184px) 100vw, 1184px\"\/><img loading=\"lazy\" decoding=\"async\" width=\"1184\" height=\"294\" alt=\"article 4 extract from the new chat control proposal.\" srcset=\"https:\/\/techreport.com\/wp-content\/uploads\/2025\/11\/article-4-extract-from-the-new-chat-control-proposal.png 1184w, https:\/\/techreport.com\/wp-content\/uploads\/2025\/11\/article-4-extract-from-the-new-chat-control-proposal-300x74.png 300w, https:\/\/techreport.com\/wp-content\/uploads\/2025\/11\/article-4-extract-from-the-new-chat-control-proposal-150x37.png 150w, https:\/\/techreport.com\/wp-content\/uploads\/2025\/11\/article-4-extract-from-the-new-chat-control-proposal-768x191.png 768w, https:\/\/techreport.com\/wp-content\/uploads\/2025\/11\/article-4-extract-from-the-new-chat-control-proposal-777x193.png 777w\" data-lazy-sizes=\"(max-width: 1184px) 100vw, 1184px\" src=\"https:\/\/techreport.com\/wp-content\/uploads\/2025\/11\/article-4-extract-from-the-new-chat-control-proposal.png?_t=1763291102\"\/>\n<\/picture>\n<noscript><picture decoding=\"async\" class=\"wp-image-3596996\" style=\"width:701px;height:auto\"><source type=\"image\/webp\" srcset=\"https:\/\/techreport.com\/wp-content\/uploads\/2025\/11\/article-4-extract-from-the-new-chat-control-proposal.png.webp 1184w, https:\/\/techreport.com\/wp-content\/uploads\/2025\/11\/article-4-extract-from-the-new-chat-control-proposal-300x74.png.webp 300w, https:\/\/techreport.com\/wp-content\/uploads\/2025\/11\/article-4-extract-from-the-new-chat-control-proposal-150x37.png.webp 150w, https:\/\/techreport.com\/wp-content\/uploads\/2025\/11\/article-4-extract-from-the-new-chat-control-proposal-768x191.png.webp 768w, https:\/\/techreport.com\/wp-content\/uploads\/2025\/11\/article-4-extract-from-the-new-chat-control-proposal-777x193.png.webp 777w\" sizes=\"(max-width: 1184px) 100vw, 1184px\"\/><img loading=\"lazy\" decoding=\"async\" width=\"1184\" height=\"294\" src=\"https:\/\/techreport.com\/wp-content\/uploads\/2025\/11\/article-4-extract-from-the-new-chat-control-proposal.png?_t=1763291102\" alt=\"article 4 extract from the new chat control proposal.\" srcset=\"https:\/\/techreport.com\/wp-content\/uploads\/2025\/11\/article-4-extract-from-the-new-chat-control-proposal.png 1184w, https:\/\/techreport.com\/wp-content\/uploads\/2025\/11\/article-4-extract-from-the-new-chat-control-proposal-300x74.png 300w, https:\/\/techreport.com\/wp-content\/uploads\/2025\/11\/article-4-extract-from-the-new-chat-control-proposal-150x37.png 150w, https:\/\/techreport.com\/wp-content\/uploads\/2025\/11\/article-4-extract-from-the-new-chat-control-proposal-768x191.png 768w, https:\/\/techreport.com\/wp-content\/uploads\/2025\/11\/article-4-extract-from-the-new-chat-control-proposal-777x193.png 777w\" sizes=\"auto, (max-width: 1184px) 100vw, 1184px\"\/>\n<\/picture>\n<\/noscript><figcaption class=\"wp-element-caption\">Source: Proposal for a Regulation of the European Parliament and of the Council <\/figcaption><\/figure>\n<p>Germany has publicly reaffirmed opposition to a version of the proposal that mandates scanning of encrypted chats. Whether it will maintain that firm stance throughout the negotiations remains uncertain. <\/p>\n<p>Patrick Breyer, digital rights jurist and longtime critic of Chat Control, says this line reintroduces mandatory scanning through the back door. His argument is simple.\u00a0<\/p>\n<p>If a service is labeled \u2018high-risk,\u2019 it might be obliged to scan everything anyway. Even private, end-to-end encrypted content. <\/p>\n<figure class=\"wp-block-image aligncenter size-large is-resized\"><picture decoding=\"async\" class=\"wp-image-3596992\" style=\"width:700px\"><source type=\"image\/webp\" data-lazy-srcset=\"https:\/\/techreport.com\/wp-content\/uploads\/2025\/11\/Patrick-Breyer-post-on-X-1058x1024.png.webp 1058w, https:\/\/techreport.com\/wp-content\/uploads\/2025\/11\/Patrick-Breyer-post-on-X-300x290.png.webp 300w, https:\/\/techreport.com\/wp-content\/uploads\/2025\/11\/Patrick-Breyer-post-on-X-150x145.png.webp 150w, https:\/\/techreport.com\/wp-content\/uploads\/2025\/11\/Patrick-Breyer-post-on-X-768x743.png.webp 768w, https:\/\/techreport.com\/wp-content\/uploads\/2025\/11\/Patrick-Breyer-post-on-X-20x20.png.webp 20w, https:\/\/techreport.com\/wp-content\/uploads\/2025\/11\/Patrick-Breyer-post-on-X-777x752.png.webp 777w, https:\/\/techreport.com\/wp-content\/uploads\/2025\/11\/Patrick-Breyer-post-on-X.png.webp 1184w\" srcset=\"data:image\/svg+xml,%3Csvg%20xmlns='http:\/\/www.w3.org\/2000\/svg'%20viewBox='0%200%201058%201024'%3E%3C\/svg%3E\" data-lazy-sizes=\"(max-width: 1058px) 100vw, 1058px\"\/><img loading=\"lazy\" decoding=\"async\" width=\"1058\" height=\"1024\" alt=\"Patrick Breyer post on X.\" srcset=\"https:\/\/techreport.com\/wp-content\/uploads\/2025\/11\/Patrick-Breyer-post-on-X-1058x1024.png 1058w, https:\/\/techreport.com\/wp-content\/uploads\/2025\/11\/Patrick-Breyer-post-on-X-300x290.png 300w, https:\/\/techreport.com\/wp-content\/uploads\/2025\/11\/Patrick-Breyer-post-on-X-150x145.png 150w, https:\/\/techreport.com\/wp-content\/uploads\/2025\/11\/Patrick-Breyer-post-on-X-768x743.png 768w, https:\/\/techreport.com\/wp-content\/uploads\/2025\/11\/Patrick-Breyer-post-on-X-20x20.png 20w, https:\/\/techreport.com\/wp-content\/uploads\/2025\/11\/Patrick-Breyer-post-on-X-777x752.png 777w, https:\/\/techreport.com\/wp-content\/uploads\/2025\/11\/Patrick-Breyer-post-on-X.png 1184w\" data-lazy-sizes=\"(max-width: 1058px) 100vw, 1058px\" src=\"https:\/\/techreport.com\/wp-content\/uploads\/2025\/11\/Patrick-Breyer-post-on-X-1058x1024.png?_t=1763290432\"\/>\n<\/picture>\n<noscript><picture decoding=\"async\" class=\"wp-image-3596992\" style=\"width:700px\"><source type=\"image\/webp\" srcset=\"https:\/\/techreport.com\/wp-content\/uploads\/2025\/11\/Patrick-Breyer-post-on-X-1058x1024.png.webp 1058w, https:\/\/techreport.com\/wp-content\/uploads\/2025\/11\/Patrick-Breyer-post-on-X-300x290.png.webp 300w, https:\/\/techreport.com\/wp-content\/uploads\/2025\/11\/Patrick-Breyer-post-on-X-150x145.png.webp 150w, https:\/\/techreport.com\/wp-content\/uploads\/2025\/11\/Patrick-Breyer-post-on-X-768x743.png.webp 768w, https:\/\/techreport.com\/wp-content\/uploads\/2025\/11\/Patrick-Breyer-post-on-X-20x20.png.webp 20w, https:\/\/techreport.com\/wp-content\/uploads\/2025\/11\/Patrick-Breyer-post-on-X-777x752.png.webp 777w, https:\/\/techreport.com\/wp-content\/uploads\/2025\/11\/Patrick-Breyer-post-on-X.png.webp 1184w\" sizes=\"(max-width: 1058px) 100vw, 1058px\"\/><img loading=\"lazy\" decoding=\"async\" width=\"1058\" height=\"1024\" src=\"https:\/\/techreport.com\/wp-content\/uploads\/2025\/11\/Patrick-Breyer-post-on-X-1058x1024.png?_t=1763290432\" alt=\"Patrick Breyer post on X.\" srcset=\"https:\/\/techreport.com\/wp-content\/uploads\/2025\/11\/Patrick-Breyer-post-on-X-1058x1024.png 1058w, https:\/\/techreport.com\/wp-content\/uploads\/2025\/11\/Patrick-Breyer-post-on-X-300x290.png 300w, https:\/\/techreport.com\/wp-content\/uploads\/2025\/11\/Patrick-Breyer-post-on-X-150x145.png 150w, https:\/\/techreport.com\/wp-content\/uploads\/2025\/11\/Patrick-Breyer-post-on-X-768x743.png 768w, https:\/\/techreport.com\/wp-content\/uploads\/2025\/11\/Patrick-Breyer-post-on-X-20x20.png 20w, https:\/\/techreport.com\/wp-content\/uploads\/2025\/11\/Patrick-Breyer-post-on-X-777x752.png 777w, https:\/\/techreport.com\/wp-content\/uploads\/2025\/11\/Patrick-Breyer-post-on-X.png 1184w\" sizes=\"auto, (max-width: 1058px) 100vw, 1058px\"\/>\n<\/picture>\n<\/noscript><\/figure>\n<p>Breyer says this could make client-side scanning mandatory. That is when your phone or laptop scans your messages before encryption kicks in. It essentially turns your device into a small police assistant.\u00a0<\/p>\n<p>You never asked for that. It\u2019s like buying headphones and discovering they also whisper everything you say back to a security office.\u00a0<\/p>\n<h2 class=\"wp-block-heading\">Encryption Isn\u2019t Just a Tech Feature \u2013 It\u2019s How Modern Life Works<\/h2>\n<p>The biggest concern is the effect on end-to-end encryption. This is the shield that protects private communication on WhatsApp, Signal, and other messengers. <\/p>\n<p>It\u2019s the same shield used by journalists, doctors, activists, lawyers, and everyone who occasionally sends a photo of their passport to a friend for a hotel booking.<\/p>\n<figure class=\"wp-block-image aligncenter size-full\"><picture decoding=\"async\" class=\"wp-image-3597011\"><source type=\"image\/webp\" data-lazy-srcset=\"https:\/\/techreport.com\/wp-content\/uploads\/2025\/11\/How-does-end-to-end-encryption-work.png.webp 1024w, https:\/\/techreport.com\/wp-content\/uploads\/2025\/11\/How-does-end-to-end-encryption-work-300x157.png.webp 300w, https:\/\/techreport.com\/wp-content\/uploads\/2025\/11\/How-does-end-to-end-encryption-work-150x79.png.webp 150w, https:\/\/techreport.com\/wp-content\/uploads\/2025\/11\/How-does-end-to-end-encryption-work-768x402.png.webp 768w, https:\/\/techreport.com\/wp-content\/uploads\/2025\/11\/How-does-end-to-end-encryption-work-777x407.png.webp 777w\" srcset=\"data:image\/svg+xml,%3Csvg%20xmlns='http:\/\/www.w3.org\/2000\/svg'%20viewBox='0%200%201024%20536'%3E%3C\/svg%3E\" data-lazy-sizes=\"(max-width: 1024px) 100vw, 1024px\"\/><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"536\" alt=\"How does end-to-end encryption work\" srcset=\"https:\/\/techreport.com\/wp-content\/uploads\/2025\/11\/How-does-end-to-end-encryption-work.png 1024w, https:\/\/techreport.com\/wp-content\/uploads\/2025\/11\/How-does-end-to-end-encryption-work-300x157.png 300w, https:\/\/techreport.com\/wp-content\/uploads\/2025\/11\/How-does-end-to-end-encryption-work-150x79.png 150w, https:\/\/techreport.com\/wp-content\/uploads\/2025\/11\/How-does-end-to-end-encryption-work-768x402.png 768w, https:\/\/techreport.com\/wp-content\/uploads\/2025\/11\/How-does-end-to-end-encryption-work-777x407.png 777w\" data-lazy-sizes=\"(max-width: 1024px) 100vw, 1024px\" src=\"https:\/\/techreport.com\/wp-content\/uploads\/2025\/11\/How-does-end-to-end-encryption-work.png\"\/>\n<\/picture>\n<noscript><picture decoding=\"async\" class=\"wp-image-3597011\"><source type=\"image\/webp\" srcset=\"https:\/\/techreport.com\/wp-content\/uploads\/2025\/11\/How-does-end-to-end-encryption-work.png.webp 1024w, https:\/\/techreport.com\/wp-content\/uploads\/2025\/11\/How-does-end-to-end-encryption-work-300x157.png.webp 300w, https:\/\/techreport.com\/wp-content\/uploads\/2025\/11\/How-does-end-to-end-encryption-work-150x79.png.webp 150w, https:\/\/techreport.com\/wp-content\/uploads\/2025\/11\/How-does-end-to-end-encryption-work-768x402.png.webp 768w, https:\/\/techreport.com\/wp-content\/uploads\/2025\/11\/How-does-end-to-end-encryption-work-777x407.png.webp 777w\" sizes=\"(max-width: 1024px) 100vw, 1024px\"\/><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"536\" src=\"https:\/\/techreport.com\/wp-content\/uploads\/2025\/11\/How-does-end-to-end-encryption-work.png\" alt=\"How does end-to-end encryption work\" srcset=\"https:\/\/techreport.com\/wp-content\/uploads\/2025\/11\/How-does-end-to-end-encryption-work.png 1024w, https:\/\/techreport.com\/wp-content\/uploads\/2025\/11\/How-does-end-to-end-encryption-work-300x157.png 300w, https:\/\/techreport.com\/wp-content\/uploads\/2025\/11\/How-does-end-to-end-encryption-work-150x79.png 150w, https:\/\/techreport.com\/wp-content\/uploads\/2025\/11\/How-does-end-to-end-encryption-work-768x402.png 768w, https:\/\/techreport.com\/wp-content\/uploads\/2025\/11\/How-does-end-to-end-encryption-work-777x407.png 777w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\"\/>\n<\/picture>\n<\/noscript><\/figure>\n<p class=\"has-green-300-background-color has-background\">Breaking encryption has always been the red line. No government has found a safe way to weaken encryption for criminals without also weakening it for everyone else.\u00a0<\/p>\n<p>It\u2019s like removing the doors from all apartments in a building because one person is suspected of wrongdoing.\u00a0<\/p>\n<p>Everyone becomes vulnerable, and burglars get a Black Friday sale they didn\u2019t expect.<\/p>\n<p>The new compromise avoids saying \u2018break encryption.\u2019 It uses vague language. However, privacy specialists argue that the outcome remains the same.\u00a0<\/p>\n<p>If scanning becomes a mandatory risk mitigation measure, encrypted platforms will need to scan content before encryption is applied. That collapses the entire security model.\u00a0<\/p>\n<h2 class=\"wp-block-heading\">Anonymous Communication May Also Be on the Line <\/h2>\n<p>The Fight Chat Control group published a summary of the new text. They highlight another major change. Anonymous communication becomes nearly impossible. <\/p>\n<figure class=\"wp-block-image aligncenter size-full is-resized\"><picture decoding=\"async\" class=\"wp-image-3596990\" style=\"width:700px\"><source type=\"image\/webp\" data-lazy-srcset=\"https:\/\/techreport.com\/wp-content\/uploads\/2025\/11\/fight-chat-control-initiative-extract.png.webp 992w, https:\/\/techreport.com\/wp-content\/uploads\/2025\/11\/fight-chat-control-initiative-extract-300x226.png.webp 300w, https:\/\/techreport.com\/wp-content\/uploads\/2025\/11\/fight-chat-control-initiative-extract-150x113.png.webp 150w, https:\/\/techreport.com\/wp-content\/uploads\/2025\/11\/fight-chat-control-initiative-extract-768x579.png.webp 768w, https:\/\/techreport.com\/wp-content\/uploads\/2025\/11\/fight-chat-control-initiative-extract-777x586.png.webp 777w\" srcset=\"data:image\/svg+xml,%3Csvg%20xmlns='http:\/\/www.w3.org\/2000\/svg'%20viewBox='0%200%20992%20748'%3E%3C\/svg%3E\" data-lazy-sizes=\"(max-width: 992px) 100vw, 992px\"\/><img loading=\"lazy\" decoding=\"async\" width=\"992\" height=\"748\" alt=\"fight chat control initiative extract.\" srcset=\"https:\/\/techreport.com\/wp-content\/uploads\/2025\/11\/fight-chat-control-initiative-extract.png 992w, https:\/\/techreport.com\/wp-content\/uploads\/2025\/11\/fight-chat-control-initiative-extract-300x226.png 300w, https:\/\/techreport.com\/wp-content\/uploads\/2025\/11\/fight-chat-control-initiative-extract-150x113.png 150w, https:\/\/techreport.com\/wp-content\/uploads\/2025\/11\/fight-chat-control-initiative-extract-768x579.png 768w, https:\/\/techreport.com\/wp-content\/uploads\/2025\/11\/fight-chat-control-initiative-extract-777x586.png 777w\" data-lazy-sizes=\"(max-width: 992px) 100vw, 992px\" src=\"https:\/\/techreport.com\/wp-content\/uploads\/2025\/11\/fight-chat-control-initiative-extract.png?_t=1763290134\"\/>\n<\/picture>\n<noscript><picture decoding=\"async\" class=\"wp-image-3596990\" style=\"width:700px\"><source type=\"image\/webp\" srcset=\"https:\/\/techreport.com\/wp-content\/uploads\/2025\/11\/fight-chat-control-initiative-extract.png.webp 992w, https:\/\/techreport.com\/wp-content\/uploads\/2025\/11\/fight-chat-control-initiative-extract-300x226.png.webp 300w, https:\/\/techreport.com\/wp-content\/uploads\/2025\/11\/fight-chat-control-initiative-extract-150x113.png.webp 150w, https:\/\/techreport.com\/wp-content\/uploads\/2025\/11\/fight-chat-control-initiative-extract-768x579.png.webp 768w, https:\/\/techreport.com\/wp-content\/uploads\/2025\/11\/fight-chat-control-initiative-extract-777x586.png.webp 777w\" sizes=\"(max-width: 992px) 100vw, 992px\"\/><img loading=\"lazy\" decoding=\"async\" width=\"992\" height=\"748\" src=\"https:\/\/techreport.com\/wp-content\/uploads\/2025\/11\/fight-chat-control-initiative-extract.png?_t=1763290134\" alt=\"fight chat control initiative extract.\" srcset=\"https:\/\/techreport.com\/wp-content\/uploads\/2025\/11\/fight-chat-control-initiative-extract.png 992w, https:\/\/techreport.com\/wp-content\/uploads\/2025\/11\/fight-chat-control-initiative-extract-300x226.png 300w, https:\/\/techreport.com\/wp-content\/uploads\/2025\/11\/fight-chat-control-initiative-extract-150x113.png 150w, https:\/\/techreport.com\/wp-content\/uploads\/2025\/11\/fight-chat-control-initiative-extract-768x579.png 768w, https:\/\/techreport.com\/wp-content\/uploads\/2025\/11\/fight-chat-control-initiative-extract-777x586.png 777w\" sizes=\"auto, (max-width: 992px) 100vw, 992px\"\/>\n<\/picture>\n<\/noscript><figcaption class=\"wp-element-caption\">Source: fightchatcontrol.eu<\/figcaption><\/figure>\n<p>The proposal requires every user to verify their age before accessing communication services. This eliminates the option to create anonymous accounts.\u00a0<\/p>\n<p>That affects whistleblowers and journalists. It affects people escaping abusive households. It affects people living under repressive governments who rely on anonymity for safety. <\/p>\n<p class=\"has-text-400-color has-text-color has-link-color wp-elements-77f15731b6811c4ea132a9b402ba27ea\"><strong><em>Requiring age verification for every single user is like asking everyone to show their passport before entering a grocery store. It may solve one problem. It creates many more.<\/em><\/strong><\/p>\n<p>Article 6 also includes restrictions that critics call a \u2018digital house arrest\u2019 for minors. It bans children from installing many apps associated with grooming risk. The list includes WhatsApp, Instagram, and even online games like Roblox.\u00a0<\/p>\n<p>Imagine a 15-year-old today without messaging apps or online games. They would end up communicating solely through school assignments and fridge magnets.\u00a0<\/p>\n<h2 class=\"wp-block-heading\">Why This Version Worries Experts Even More<\/h2>\n<p>The original proposal already concerned privacy advocates. It focused on scanning photos, videos, and URLs for CSAM content.<\/p>\n<p>The new version goes further. Breyer notes it includes scanning of private chat text and metadata. Metadata can reveal who you talk to, how often, and from where you talk to them.\u00a0<\/p>\n<p>It turns the communication graph of the entire EU population into a map available for inspection.<\/p>\n<p class=\"has-green-300-background-color has-background\">This shift from media scanning to text scanning is a significant development. It expands what authorities can request. It expands the scope of what companies must monitor to avoid being labeled \u2018high-risk.\u2019 And it expands the potential for abuse.<\/p>\n<p>Critics also point out that voluntary scanning does not guarantee privacy.\u00a0<\/p>\n<p>If one major app decides to comply, others may feel pressure to follow. Competition might turn into a race where the winner is the one who scans the most.\u00a0<\/p>\n<h2 class=\"wp-block-heading\">A Political Win, A Technical Minefield<\/h2>\n<p>Politically, lawmakers are celebrating. After years of deadlock, they finally have a text that appears less aggressive. Removing mandatory scanning looks like a concession.\u00a0<\/p>\n<p>It\u2019s easy to present this as a victory for privacy.\u00a0\u00a0<\/p>\n<p class=\"has-text-400-color has-text-color has-link-color wp-elements-4a261dc597ae5d409545b48edcb605d6\"><strong><em>Technically, the situation is far from reassuring. The proposal now relies heavily on interpretation. The phrase \u2018all appropriate risk mitigation measures\u2019 could mean anything.\u00a0<\/em><\/strong><\/p>\n<p>It gives enormous discretion to authorities. It lets governments later argue that scanning is essential for safety.\u00a0<\/p>\n<p>That is why privacy groups call this version a political trick. It removes the scary parts from the front of the bill. Then it grows them back under a different name.\u00a0<\/p>\n<h2 class=\"wp-block-heading\">The EU Parliament Will Have Its Say \u2013 But History Is Complicated\u00a0<\/h2>\n<p>The next step is Coreper. If they approve the text on November 19 or soon after, the Council will adopt its official position.\u00a0<\/p>\n<p>Then a trilogue begins between the Council, the Commission, and the European Parliament.\u00a0<\/p>\n<figure class=\"wp-block-image aligncenter size-full\"><picture decoding=\"async\" class=\"wp-image-3596994\"><source type=\"image\/webp\" data-lazy-srcset=\"https:\/\/techreport.com\/wp-content\/uploads\/2025\/11\/fight-chat-control-extract-whats-next.png.webp 958w, https:\/\/techreport.com\/wp-content\/uploads\/2025\/11\/fight-chat-control-extract-whats-next-300x119.png.webp 300w, https:\/\/techreport.com\/wp-content\/uploads\/2025\/11\/fight-chat-control-extract-whats-next-150x59.png.webp 150w, https:\/\/techreport.com\/wp-content\/uploads\/2025\/11\/fight-chat-control-extract-whats-next-768x305.png.webp 768w, https:\/\/techreport.com\/wp-content\/uploads\/2025\/11\/fight-chat-control-extract-whats-next-777x308.png.webp 777w\" srcset=\"data:image\/svg+xml,%3Csvg%20xmlns='http:\/\/www.w3.org\/2000\/svg'%20viewBox='0%200%20958%20380'%3E%3C\/svg%3E\" data-lazy-sizes=\"(max-width: 958px) 100vw, 958px\"\/><img loading=\"lazy\" decoding=\"async\" width=\"958\" height=\"380\" alt=\"fight chat control extract what's next.\" srcset=\"https:\/\/techreport.com\/wp-content\/uploads\/2025\/11\/fight-chat-control-extract-whats-next.png 958w, https:\/\/techreport.com\/wp-content\/uploads\/2025\/11\/fight-chat-control-extract-whats-next-300x119.png 300w, https:\/\/techreport.com\/wp-content\/uploads\/2025\/11\/fight-chat-control-extract-whats-next-150x59.png 150w, https:\/\/techreport.com\/wp-content\/uploads\/2025\/11\/fight-chat-control-extract-whats-next-768x305.png 768w, https:\/\/techreport.com\/wp-content\/uploads\/2025\/11\/fight-chat-control-extract-whats-next-777x308.png 777w\" data-lazy-sizes=\"(max-width: 958px) 100vw, 958px\" src=\"https:\/\/techreport.com\/wp-content\/uploads\/2025\/11\/fight-chat-control-extract-whats-next.png?_t=1763290638\"\/>\n<\/picture>\n<noscript><picture decoding=\"async\" class=\"wp-image-3596994\"><source type=\"image\/webp\" srcset=\"https:\/\/techreport.com\/wp-content\/uploads\/2025\/11\/fight-chat-control-extract-whats-next.png.webp 958w, https:\/\/techreport.com\/wp-content\/uploads\/2025\/11\/fight-chat-control-extract-whats-next-300x119.png.webp 300w, https:\/\/techreport.com\/wp-content\/uploads\/2025\/11\/fight-chat-control-extract-whats-next-150x59.png.webp 150w, https:\/\/techreport.com\/wp-content\/uploads\/2025\/11\/fight-chat-control-extract-whats-next-768x305.png.webp 768w, https:\/\/techreport.com\/wp-content\/uploads\/2025\/11\/fight-chat-control-extract-whats-next-777x308.png.webp 777w\" sizes=\"(max-width: 958px) 100vw, 958px\"\/><img loading=\"lazy\" decoding=\"async\" width=\"958\" height=\"380\" src=\"https:\/\/techreport.com\/wp-content\/uploads\/2025\/11\/fight-chat-control-extract-whats-next.png?_t=1763290638\" alt=\"fight chat control extract what's next.\" srcset=\"https:\/\/techreport.com\/wp-content\/uploads\/2025\/11\/fight-chat-control-extract-whats-next.png 958w, https:\/\/techreport.com\/wp-content\/uploads\/2025\/11\/fight-chat-control-extract-whats-next-300x119.png 300w, https:\/\/techreport.com\/wp-content\/uploads\/2025\/11\/fight-chat-control-extract-whats-next-150x59.png 150w, https:\/\/techreport.com\/wp-content\/uploads\/2025\/11\/fight-chat-control-extract-whats-next-768x305.png 768w, https:\/\/techreport.com\/wp-content\/uploads\/2025\/11\/fight-chat-control-extract-whats-next-777x308.png 777w\" sizes=\"auto, (max-width: 958px) 100vw, 958px\"\/>\n<\/picture>\n<\/noscript><figcaption class=\"wp-element-caption\">Source: fightchatcontrol.eu<\/figcaption><\/figure>\n<p>In theory, Parliament could oppose it.\u00a0<\/p>\n<p>In practice, Parliament has often compromised on surveillance laws after political pressure. Privacy groups fear a rushed trilogue where Parliament gives in to urgency.<\/p>\n<p>The Council and the Commission are now aligned. Both want stronger online monitoring. This alignment alone makes many observers nervous.\u00a0<\/p>\n<h2 class=\"wp-block-heading\">The Bigger Story: Europe Keeps Trying to Build Scanning Systems That Don\u2019t Exist\u00a0<\/h2>\n<p>There is a broader theme here. The EU continues to propose scanning systems that experts say cannot operate safely.\u00a0<\/p>\n<p>The automatic detection of CSAM in encrypted environments remains technically unsolved. Client-side scanning has accuracy issues, privacy concerns, and a potential for misuse.\u00a0<\/p>\n<p>Even Apple backed away from its own client-side scanning feature after heavy criticism from researchers.\u00a0<\/p>\n<p class=\"has-green-300-background-color has-background\">The EU is once again attempting to regulate technology that does not yet exist in a safe form. It is similar to writing a law that requires cars to fly by next summer.\u00a0<\/p>\n<p>The idea might be noble. The engineering reality is not ready.\u00a0<\/p>\n<p>Governments want a system that detects serious crimes. Researchers seek a system that malicious actors cannot exploit. Companies want a system that doesn\u2019t destroy trust.\u00a0<\/p>\n<p>So far, no system satisfies all three.\u00a0<\/p>\n<h2 class=\"wp-block-heading\">The Real Test Is About to Begin<\/h2>\n<p>The next few days will decide how far the EU is willing to push this plan.\u00a0<\/p>\n<p>Coreper will review the text, and if nobody objects, the Council will lock in its position fast. Privacy groups and security experts are raising alarms again because the new compromise still creates a path to mass scanning, even if the language looks softer.\u00a0<\/p>\n<p>The proposal also threatens anonymity and introduces new monitoring routes that could reshape private communication for 450M people in the EU.\u00a0<\/p>\n<p>Lawmakers call it progress. Experts call it a warning sign.\u00a0<\/p>\n<p>Everything now depends on how Article 4 is interpreted and how much power it quietly hands over. The final battle will happen in trilogue, and the tech community is already bracing for impact.\u00a0<\/p>\n<div class=\"author-card\">\n<div class=\"author-card-upper-line\">\n<div class=\"author-card-image\">\n            <picture><source type=\"image\/webp\" srcset=\"https:\/\/techreport.com\/wp-content\/uploads\/2024\/11\/anya-zhukova-techreport-journalist-1-286x300.jpeg.webp?_t=1730785811\"\/><img decoding=\"async\" src=\"https:\/\/techreport.com\/wp-content\/uploads\/2024\/11\/anya-zhukova-techreport-journalist-1-286x300.jpeg?_t=1730785811\" alt=\"Anya Zhukova\"\/>\n<\/picture>\n<\/p><\/div>\n<div class=\"author-card-info\">\n<div class=\"author-card-socials\">\n<div class=\"socials\">\n<p>                            <img loading=\"lazy\" decoding=\"async\" width=\"24\" height=\"24\" src=\"https:\/\/techreport.com\/wp-content\/themes\/sage\/public\/images\/socials\/linkedin.5b509c.svg\"\/><\/p><\/div>\n<\/p><\/div>\n<\/p><\/div>\n<\/p><\/div>\n<div class=\"author-card-content\">\n<p>Anya Zhukova is an in-house tech and crypto writer at Techreport with 10 years of hands-on experience covering cybersecurity, consumer tech, digital privacy, and blockchain. She\u2019s known for turning complex topics into clear, useful advice that regular people can actually understand and use.\u00a0 <\/p>\n<p>Her work has been featured in top-tier digital publications including <i>MakeUseOf<\/i>, <i>Online Tech Tips<\/i>, <i>Help Desk Geek<\/i>, <i>Switching to Mac<\/i>, and <i>Make Tech Easier<\/i>. Whether she\u2019s writing about the latest privacy tools or reviewing a new laptop, her goal is always the same: help readers feel confident and in control of the tech they use every day. <\/p>\n<p>Anya holds a BA in English Philology and Translation from Tula State Pedagogical University and also studied Mass Media and Journalism at Minnesota State University, Mankato. That mix of language, media, and tech has given her a unique lens to look at how technology shapes our daily lives.\u00a0 <\/p>\n<p>Over the years, she\u2019s also taken courses and done research in data privacy, digital security, and ethical writing \u2013 skills she uses when tackling sensitive topics like PC hardware, system vulnerabilities, and crypto security.\u00a0 Anya worked directly with brands like <i>Framework<\/i>, <i>Insta360<\/i>, <i>Redmagic<\/i>, <i>Inmotion<\/i>, <i>Secretlab<\/i>, <i>Kodak<\/i>, and <i>Anker<\/i>, reviewing their products in real-life scenarios. <\/p>\n<p>Her testing process involves real-world use cases \u2013 whether it&#8217;s stress-testing laptops for creative workloads, reviewing the battery performance of mobile gaming phones, or evaluating the long-term ergonomics of furniture designed for hybrid workspaces.\u00a0 <\/p>\n<p>In the world of crypto, Anya covers everything from beginner guides to deep dives into hardware wallets, DeFi protocols, and Web3 tools. She helps readers understand how to use multisig wallets, keep their assets safe, and choose the right platforms for their needs.\u00a0 <\/p>\n<p>Her writing often touches on financial freedom and privacy \u2013 two things she strongly believes should be in everyone\u2019s hands. Outside of writing, Anya contributes to editorial style guides focused on privacy and inclusivity, and she mentors newer tech writers on how to build subject matter expertise and write responsibly.\u00a0 <\/p>\n<p>She abides by high editorial standards, only recommends products she\u2019s personally tested, and always aims to give readers the full picture.\u00a0 You can find her on LinkedIn, where she shares more about her work and projects.\u00a0\u00a0<\/p>\n<p>Whether she\u2019s reviewing a new wallet or benchmarking a PC build, Anya brings curiosity, care, and a strong sense of responsibility to everything she writes. Her mission? To make the digital world a little easier \u2013 and safer \u2013 for everyone.\u00a0<\/p>\n<p><b>Key Areas of Expertise:<\/b> Consumer Tech (laptops, phones, wearables, etc.) Cybersecurity and Digital Privacy PC\/PC Hardware Blockchain, Crypto Wallets, and DeFi In-Depth Product Reviews and Buying Guides<\/p>\n<\/p><\/div>\n<p>        View all articles by Anya Zhukova<br \/>\n        <svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"8\" height=\"13\" viewbox=\"0 0 8 13\" fill=\"none\">\n            <path d=\"M1.5 11.9297L6.5 6.92969L1.5 1.92969\" stroke=\"#080C2D\" stroke-width=\"2\" stroke-linecap=\"round\" stroke-linejoin=\"round\"\/>\n        <\/svg><\/p>\n<\/div>\n<div class=\"editorial-process\">\n<div class=\"editorial-process__content\">\n<p>The Tech Report\u00a0editorial policy\u00a0is centered on providing helpful, accurate content that offers real value to our readers. We only work with experienced writers who have specific knowledge in the topics they cover, including latest developments in technology, software, hardware, and more. Our editorial policy ensures that each topic is researched and curated by our in-house editors. We maintain rigorous journalistic standards, and every article is 100% written by\u00a0real authors.<\/p>\n<\/p><\/div>\n<\/p><\/div>\n<\/p><\/div>\n\n","protected":false},"excerpt":{"rendered":"<p>Key Takeaways: The EU has introduced a new Chat Control proposal: Mandatory scanning is gone, but Article 4\u2019s \u2018risk mitigation\u2019 clause could still push services toward&#46;&#46;&#46;<\/p>\n","protected":false},"author":1,"featured_media":2268,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"fifu_image_url":"https:\/\/techreport.com\/wp-content\/uploads\/2025\/11\/new-eu-chat-control-proposal-privacy-experts-see-dangerous-backdoor-1200x675.jpg?_t=1763287191","fifu_image_alt":"","footnotes":""},"categories":[1],"tags":[],"class_list":["post-2267","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-rj"],"_links":{"self":[{"href":"https:\/\/rjbarrett.redirectme.net\/index.php?rest_route=\/wp\/v2\/posts\/2267","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/rjbarrett.redirectme.net\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/rjbarrett.redirectme.net\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/rjbarrett.redirectme.net\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/rjbarrett.redirectme.net\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=2267"}],"version-history":[{"count":0,"href":"https:\/\/rjbarrett.redirectme.net\/index.php?rest_route=\/wp\/v2\/posts\/2267\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/rjbarrett.redirectme.net\/index.php?rest_route=\/wp\/v2\/media\/2268"}],"wp:attachment":[{"href":"https:\/\/rjbarrett.redirectme.net\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=2267"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/rjbarrett.redirectme.net\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=2267"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/rjbarrett.redirectme.net\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=2267"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}